SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
+                                                              LONDON – LSE
                                                               23.sept.2011
Contribution for the
definition of online
violence in the context
of a study with school    EU KIDS ONLINE                                >>
children
                                      Teresa Sofia Castro | University of Minho | Portugal
                                      teresa.sofia.castro@gmail.com

                                      António J. Osório | University of Minho | Portugal
+ “Encountering risk does not necessarily result in an experience of
      harm”
      Cross-national comparison of risks and safety on the internet
      Initial analysis from the EU Kids Online survey of European children




A suburban family is torn apart when fourteen-year-old Annie meets her first boyfriend
online. After months of communicating via online chat and phone, Annie discovers her
friend is not who he originally claimed to be. Shocked into disbelief, her parents are
shattered by their daughter's actions and struggle to support her as she comes to terms
with what has happened to her once innocent life.
+ “Most teenagers use the internet at home in the privacy of their
   own bedroom”
   Risks and safety on the internet: The perspective of European children
   Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries




                          No face-to-face interaction                                                                           No one can hide


                                                                                  ICT skills
                                                                                                                              Unpredictable proportions


                                                                          Identity management: anonymity vs. multiplicity

                                                                                 Deindividuation
                                                                                                                                    Diversity of media

  Absence of barriers: geography, time, language                                                                                Inhumane
+ “Among those children who ride a bicycle, a small percentage will
    have an accident”
    Risks and safety on the internet: The perspective of European children
    Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries




hybrid and liquid universe of network

                                the border between opportunity and threat fades
                                                          new kind of violence
                                           Thus, these are some beginning questions of our starting research:
                                           What can we consider as online violence?
                                           What proportions can violence gain in the virtual world?
                                           What effects may have the disclosure of a compromising photo?
                                           How do children protect themselves from online harm?
                                           How to prepare parents, school and community for these challenges?
+ “Welcome to social cruelty, 21                                               st   century style”
    in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55.




First things first…
              1) Extensive and detailed review on the state of the art around the concept of
                 online violence
                 • “lack of consistent terminology” (David-Ferdon & Hertz, 2009, para.24)
                 • “the variety of terms used” (David-Ferdon & Hertz, 2007, S2)

                    Internet aggression (Werner, Bumpus & Rock, 2010)
                    Electronic violence (David-Ferdon & Hertz, 2009)
                    Bullying online (Juvonen & Gross, 2008)
                    Online Harassment (Wolak, Mitchell, & Finkelhor, 2007, Juvonen & Gross, 2008)
                    Internet bullying (Williams & Guerra, 2007)
                    Online bullying (Wolak, Mitchell, & Finkelhor, 2007)
                    Electronic Bullying (Kowalski & Limber, 2007)
                    Online aggression (Kowalski & Limber, 2007)
                    Electronic aggression(David-Ferdon & Hertz, 2007)
                    Internet harassment (Ybarra, West & Leaf, 2007; Ybarra, Espelage & Mitchell, 2007; Ybarra, Mitchell, Wolak, Finkelhor, 2006)
                    Internet bullying and harassment (Worthen, 2007)
+ “The distinction between aggression and violence, however, is a
   subtle one”
   in Kirsh, Steven J. (2006) Children, Adolescents and Media Violence: A critical look at the research, p.10.




  2) Violence and Aggression (Kirsh, 2006)


                                                                                 Violence                        repeatedly kicking
                                                                                                                 the leg to the point of
                                                                                                                 it breaking

                                                                               Aggression
                                                                                Violence
            kicking someone in
            the leg once
+ “While the Internet has certainly proved to be a valuable
   tool, there is, indeed a dark side.”
   in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55.




  3) types and instruments

                               •     the types of inflicted online violence

                               •     current instruments used for its practice
+                                                          LONDON – LSE
                                                            23.sept.2011
  Contribution for the
  definition of online
  violence in the context
  of a study with school    EU KIDS ONLINE                        >>
  children

                                      Teresa Sofia Castro | University of Minho | Portugal
                                      António J. Osório | University of Minho | Portugal
THANK YOU FOR YOUR ATTENTION!
              

Contenu connexe

En vedette

Local Search - SES London 2011
Local Search - SES London 2011Local Search - SES London 2011
Local Search - SES London 2011Lisa Myers
 
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчасаОлег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса404fest
 
Markaların Logoları
Markaların LogolarıMarkaların Logoları
Markaların LogolarıYunus Emre
 
Host University And Advisor Ppt
Host University And Advisor PptHost University And Advisor Ppt
Host University And Advisor PptIREX
 
Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012Lisa Myers
 
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнесаДмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса404fest
 
C:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upC:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upAngele Champigny
 
Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Lisa Myers
 
Calendario Disegna Italia
Calendario Disegna ItaliaCalendario Disegna Italia
Calendario Disegna ItaliaItaloblog
 
8 steps to requirements success
8 steps to requirements success8 steps to requirements success
8 steps to requirements successSteve Orr
 
Host University And Advisor Ppt2
Host University And Advisor Ppt2Host University And Advisor Ppt2
Host University And Advisor Ppt2IREX
 
TRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finaleTRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finaleConetica
 

En vedette (16)

Stackato v4
Stackato v4Stackato v4
Stackato v4
 
Local Search - SES London 2011
Local Search - SES London 2011Local Search - SES London 2011
Local Search - SES London 2011
 
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчасаОлег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
 
Markaların Logoları
Markaların LogolarıMarkaların Logoları
Markaların Logoları
 
Host University And Advisor Ppt
Host University And Advisor PptHost University And Advisor Ppt
Host University And Advisor Ppt
 
Tour 2010 TECH SQUAD
Tour 2010 TECH SQUADTour 2010 TECH SQUAD
Tour 2010 TECH SQUAD
 
Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012
 
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнесаДмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
 
C:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upC:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set up
 
Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012
 
What You Need to Know about Instagram
What You Need to Know about Instagram What You Need to Know about Instagram
What You Need to Know about Instagram
 
Com190 Mock Powerpoint
Com190 Mock PowerpointCom190 Mock Powerpoint
Com190 Mock Powerpoint
 
Calendario Disegna Italia
Calendario Disegna ItaliaCalendario Disegna Italia
Calendario Disegna Italia
 
8 steps to requirements success
8 steps to requirements success8 steps to requirements success
8 steps to requirements success
 
Host University And Advisor Ppt2
Host University And Advisor Ppt2Host University And Advisor Ppt2
Host University And Advisor Ppt2
 
TRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finaleTRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finale
 

Plus de Teresa Sofia Castro

Visual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen IdentitiesVisual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen IdentitiesTeresa Sofia Castro
 
Violência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das criançasViolência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das criançasTeresa Sofia Castro
 
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...Teresa Sofia Castro
 
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...Teresa Sofia Castro
 
“I love my bones!” Online violence involving children: Self-harm and danger...
“I love my bones!”  Online violence involving children:  Self-harm and danger...“I love my bones!”  Online violence involving children:  Self-harm and danger...
“I love my bones!” Online violence involving children: Self-harm and danger...Teresa Sofia Castro
 
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...Teresa Sofia Castro
 
internet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulaçãointernet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulaçãoTeresa Sofia Castro
 

Plus de Teresa Sofia Castro (12)

Visual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen IdentitiesVisual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen Identities
 
Violência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das criançasViolência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das crianças
 
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
 
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
 
Psychnology journal 10_3_castro
Psychnology journal 10_3_castroPsychnology journal 10_3_castro
Psychnology journal 10_3_castro
 
“I love my bones!” Online violence involving children: Self-harm and danger...
“I love my bones!”  Online violence involving children:  Self-harm and danger...“I love my bones!”  Online violence involving children:  Self-harm and danger...
“I love my bones!” Online violence involving children: Self-harm and danger...
 
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
 
internet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulaçãointernet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulação
 
Investing in Youth
Investing in YouthInvesting in Youth
Investing in Youth
 
Inpact 2012 presentation
Inpact 2012 presentationInpact 2012 presentation
Inpact 2012 presentation
 
Criminologia
Criminologia Criminologia
Criminologia
 
Chall11 Simsafety
Chall11 SimsafetyChall11 Simsafety
Chall11 Simsafety
 

Dernier

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 

Dernier (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 

Ue kids online

  • 1. + LONDON – LSE 23.sept.2011 Contribution for the definition of online violence in the context of a study with school EU KIDS ONLINE >> children Teresa Sofia Castro | University of Minho | Portugal teresa.sofia.castro@gmail.com António J. Osório | University of Minho | Portugal
  • 2. + “Encountering risk does not necessarily result in an experience of harm” Cross-national comparison of risks and safety on the internet Initial analysis from the EU Kids Online survey of European children A suburban family is torn apart when fourteen-year-old Annie meets her first boyfriend online. After months of communicating via online chat and phone, Annie discovers her friend is not who he originally claimed to be. Shocked into disbelief, her parents are shattered by their daughter's actions and struggle to support her as she comes to terms with what has happened to her once innocent life.
  • 3. + “Most teenagers use the internet at home in the privacy of their own bedroom” Risks and safety on the internet: The perspective of European children Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries No face-to-face interaction No one can hide ICT skills Unpredictable proportions Identity management: anonymity vs. multiplicity Deindividuation Diversity of media Absence of barriers: geography, time, language Inhumane
  • 4. + “Among those children who ride a bicycle, a small percentage will have an accident” Risks and safety on the internet: The perspective of European children Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries hybrid and liquid universe of network the border between opportunity and threat fades new kind of violence  Thus, these are some beginning questions of our starting research:  What can we consider as online violence?  What proportions can violence gain in the virtual world?  What effects may have the disclosure of a compromising photo?  How do children protect themselves from online harm?  How to prepare parents, school and community for these challenges?
  • 5. + “Welcome to social cruelty, 21 st century style” in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55. First things first… 1) Extensive and detailed review on the state of the art around the concept of online violence • “lack of consistent terminology” (David-Ferdon & Hertz, 2009, para.24) • “the variety of terms used” (David-Ferdon & Hertz, 2007, S2) Internet aggression (Werner, Bumpus & Rock, 2010) Electronic violence (David-Ferdon & Hertz, 2009) Bullying online (Juvonen & Gross, 2008) Online Harassment (Wolak, Mitchell, & Finkelhor, 2007, Juvonen & Gross, 2008) Internet bullying (Williams & Guerra, 2007) Online bullying (Wolak, Mitchell, & Finkelhor, 2007) Electronic Bullying (Kowalski & Limber, 2007) Online aggression (Kowalski & Limber, 2007) Electronic aggression(David-Ferdon & Hertz, 2007) Internet harassment (Ybarra, West & Leaf, 2007; Ybarra, Espelage & Mitchell, 2007; Ybarra, Mitchell, Wolak, Finkelhor, 2006) Internet bullying and harassment (Worthen, 2007)
  • 6. + “The distinction between aggression and violence, however, is a subtle one” in Kirsh, Steven J. (2006) Children, Adolescents and Media Violence: A critical look at the research, p.10. 2) Violence and Aggression (Kirsh, 2006) Violence repeatedly kicking the leg to the point of it breaking Aggression Violence kicking someone in the leg once
  • 7. + “While the Internet has certainly proved to be a valuable tool, there is, indeed a dark side.” in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55. 3) types and instruments • the types of inflicted online violence • current instruments used for its practice
  • 8. + LONDON – LSE 23.sept.2011 Contribution for the definition of online violence in the context of a study with school EU KIDS ONLINE >> children Teresa Sofia Castro | University of Minho | Portugal António J. Osório | University of Minho | Portugal THANK YOU FOR YOUR ATTENTION! 