SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
In-depth
                                   E-learning: The Dark Side?
Authors                              There are concerns that the Internet has created new risks for our society and in par-
                                     ticular for young people. We argue that the way we frame these risks is affected by the
Philip Banyard
                                     way we view young people, in particular their maturity and ability to make choices for
Reader in Psychology
Division of Psychology,              themselves.
Nottingham Trent University,
UK                                   A recurrent metaphor concerns the ‘dark-side’ of the Internet which draws on ancient
phil.banyard@ntu.ac.uk               and modern myths about the nature of good and evil. We argue that a knowledge
                                     divide between adults and youth has developed concerning the use of digital technolo-
Jean Underwood                       gies. Digital natives are able to change the power balance of our society: this threatens
Professor of Psychology              the status quo and therefore has created a moral panic.
Division of Psychology,
Nottingham Trent University,         The key areas of concern for risk include: cyber-bullying, game-playing, social network-
UK                                   ing, sexual solicitation and addictive behaviours. Although these areas present real
jean.underwood@ntu.ac.uk
                                     risks, we note that young people are moderating their own behaviour as they develop
                                     understandings about the possibilities offered by new technologies. The answer to
Tags                                 our concerns should not be to seek to control digital technologies, but rather to edu-
                                     cate adults and young people about what is possible and appropriate, so that they can
risk, learning, moral panic,         choose to become responsible, digital citizens of the 21st century.
digital citizens, cyber-bullying

                                   1. Introduction
                                      “There is no dark side of the moon, really. Matter of fact, it’s all dark.”
                                      Pink Floyd, Dark Side of the Moon

                                   Does the Internet have a dark side? Should we be protecting ourselves and our children from
                                   the dangers of the Internet or encouraging them to embrace the opportunity for knowledge
                                   and community that it offers? The way we frame our answers to this question is structured
                                   by our implicit assumptions about human nature and our understandings about self and
                                   society. In this article we will look at these assumptions and review the scientific evidence to
                                   see how much we can bring these two sets of understandings together.

                                   One assumption concerns the power of persuasion and hence the ability of individuals to
                                   resist influences from powerful others. One view sees the person as passive, malleable and
                                   gullible, and the other sees the person as active and capable of making decisions and being
                                   discriminating. The volume of books about persuasion on the psychology, business and self-
                                   help shelves illustrates our concern and interest in the issue. A second assumption about
                                   human behaviour, crucial to our response to the Internet, concerns our view of children and
                                   the maturity they are able to show when given the opportunity to do so. This view affects the
                                   level of responsibility we allow them to exercise.

                                   These assumptions about human behaviour are only partially framed by the scientific evi-
                                   dence available because they touch our core beliefs about what it means to be human. The
                                   ‘dark-side’ is therefore a useful phrase to explore because it refers to a modern retelling



       ing
  earn
                                                             eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                        28
                          u
                     ers.e
                 gpap
    www
       .elea
             rnin                                                                                              n.º 28 • April 2012
Pap
                                                                                                                                1
In-depth

of judeo-christian ideas about people. The ‘force’ (in the film           just found some unwanted material on one of the machines
Star Wars) refers to a universal and metaphysical power that we           and was waiting for [the Local Education Authority] to send
have access to, but whose strength is so great that it can turn           someone to check it out. The school is assiduous in its at-
us from good people to bad if we don’t use it wisely. Use it un-          tempts to keep unwanted material away from the pupils and
wisely and you will go to the ‘dark side’ and become consumed             to make sure that they do not inadvertently come across an
by your own darkness such as addiction or a lust for power. This          offensive site.” (unpublished research notes)
central story of good and evil about how we see ourselves and
                                                                       The contrast between teaching children to click-away from in-
our society has a profound effect on the general response to
                                                                       appropriate material and training all staff to monitor children
the Internet.
                                                                       and close down the system if there are any concerns could not
                                                                       be more marked. This was not a unique observation and we re-
2. Perceived risks                                                     corded similar contrasting approaches in neighbouring schools
We live in an increasingly risk averse society, and this is par-       in other parts of the UK. The different approaches, we argue,
ticularly true in relation to the protection of children. The dif-     have less to do with understandings about the Internet than
ferent focus that schools adopt to safety concerns about the           with assumptions about human behaviour.
Internet was illustrated by two neighbouring primary schools
that we visited in 2006 as part of a research project for the UK       3. 	What are the risks?
government (Underwood et al., 2007). Situated in rural East An-
                                                                       We will look at some of the risks that have been identified to be
glia with similar catchments, demographics and rated as above
                                                                       associated with the use of internet and then consider whether
average on national criteria, each viewed the computers in their
                                                                       these represent new challenges for educators or whether they
schools in very different ways. Our contemporaneous observa-
                                                                       are new expressions of old risks.
tions which we report here are in stark contrast. The first school
was on the ‘opportunity’ end of the spectrum,
                                                                       3.1	Cyber-bullying
   “The school is delightfully unaware of technical details and
   only showed a passing recognition of the local broadband            Online aggression is a very real danger. In a study of 501 regular
   consortium (e2bn) who probably provide their broadband              Internet users (aged 10–17 years), 19% were involved in online
   link. […]                                                           aggression, 3% were aggressor/ targets, 4% targets only, and
                                                                       12% online aggressors only. Aggressor/targets reported charac-
   The school believes that most children have access to com-          teristics similar to off-line bully/ victims. Furthermore, cyberbul-
   puters at home and many have access to the Internet. Access         lying rapidly transfers to real life, leaving children with no place
   at school is largely in lesson time though pupils are allowed       to hide and teachers with an undercurrent of activity they have
   to use the unlocked ICT suite in break-times with permission.       no control over (Ybarra & Mitchell, 2004). There are clear sex
   The school could not name who carried out the blocking of           differences in the acceptance of risk and in cyberbullying, with
   unwanted Internet sites. It was presumed to be the LEA [Lo-         young males being greater both greater risk takers and more
   cal Education Authority]. The school had not experienced any        involved in cyberbullying (Dehue et al., 2008).
   major problems with the Internet though it was accepted
   that unwanted material would occasionally slip through the          The question to consider is whether this represents a new and
   filters, for example a search for material on waterfalls elic-      substantial hazard for children or whether it is a different ex-
   ited some mildly erotic images. The policy of the school is to      pression of the social negotiation that is part of every child’s
   encourage children to respond responsibly to such material          development. Furthermore we have to consider whether regu-
   and to delete and report it. There has been no need to take         lation by adults is the best strategy as in involves the invasion of
   any further action so far.”                                         the private worlds of young people, and whether leaving space
                                                                       for the development of social skills in these young people will
The second school was on the ‘danger’ end of the spectrum              provide greater long-term benefit.
   “The classroom computers and the mini-suite were not being
   used on the day of the visit because the ICT coordinator had



        ing
   earn
                                                                     eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                  n.º 28 • April 2012
 Pap
                                                                                                                                      2
In-depth

3.2	Game playing                                                            3.4	Social networking
As the developing child acquires social norms about acceptable              Do people behave different when communicating online to
behavior from his or her experiences, any activity that promotes            how they do in face-to-face situations? Online interactions
violence is likely to be a risk factor for violent behavior. The re-        have been found to generate more self-disclosure and foster
petitive playing of violent games has been reported as leading              deeper personal questionings than face-to-face communication
to more aggressive behaviour and the desensitisation of the in-             (Tidwell & Walther, 2002). Underwood, et al. (2011) identified 3
dividual demonstrating by decreased brain activity when shown               types of Facebook users in young people. One group, the broad-
scenes of real violence. (Bartholew, et al., 2006). Meta-analyses,          casters exhibited worrying high risk behaviour which tended to
combining data from hundreds of individual studies, confirm an              focus on one-to-many low quality communications, in which
association between exposure to violence in media and antiso-               self–promotion and lying were clearly evident. Could it be that
cial tendencies such as aggression (Huesmann, 2009). Although               social networking facilities encourage risky behaviour in vulner-
Ferguson (2010) asserts that much of the research on the link               able young people and open them up to the possibilities of dan-
between gaming and aggression is inconsistent and hampered                  gerous relationships and encounters? Another feature of social
by poor methodologies and the intrusion of ideology and dog-                networking is the ability to know ever more details about your
ma.                                                                         partner including their changing moods (status on Facebook),
                                                                            where they are (Find my iphone) and who they are with. It is
The risks associated with less violent video games, particularly
                                                                            perhaps no surprise that heavy Facebook use is associated with
those marketed to young children are not well understood, but
                                                                            increased levels of jealousy (Muise, et al., 2009).
recent research has shown experimental evidence that video
games may displace after-school activities that have educa-                 Use of social networking sites has been associated with greater
tional value and may interfere with the development of reading              levels of social capital, or benefits made possible by the exist-
and writing skills in some children (Weis & Ceranksoky, 2010).              ence of a social structure. For example, Ellison et al. (2007) have
It is worth reflecting, however, whether previous generations of            show that students who are active on Facebook feel higher lev-
children have also turned away from educational activities to               els of both forms of social capital, and the effects are greater for
play football or tiddlywinks or French skipping.                            students with lower self-esteem. However, the perceived ben-
                                                                            efits may depend on the nature of the interactions. A survey of
3.3	Unwelcome sexual solicitation                                           1,193 students found users who engaged in directed interaction
                                                                            with others, such as leaving wall posts or messaging friends,
It is difficult to collect reliable data on sexual solicitation via the     reported lowered feelings of loneliness and increased feelings
Internet. One large-scale study in the USA (Finkelhor, Mitchell             of social capital. On the other hand, students who engaged in
and Wolak, 2000) carried out interviews with a sample of 1,501              passive viewing of others’ content, such as status updates and
youths aged 10 to 17 years who use the Internet regularly (at               photos reported feelings of increased loneliness and reduced
least once a month for the past 6 months). They reported that               social capital (Burke, Marlow & Lento, 2010).
19 per cent of their sample received an unwanted sexual solici-
tation or approach over the Internet in the previous year. The
                                                                            3.5	Addictive behaviour
definition was extremely broad and included someone trying
to get them to unwillingly talk about sex; asking unwanted inti-            Addiction is a perceived danger of Internet use that is fuelled by
mate questions; requests to do sexual things they did not want              parental concerns about the amount of time their children ap-
to do; and invitations to run away. In addition, 3 per cent (one in         pear to spend online. Recent surveys suggest that about 2% of
seven of all the solicitations) included an attempt to contact the          youth can be described as having Internet addiction with 10%–
youth via telephone/postal mail and/or in person so the vast                20% engaging in at-risk Internet use (Johansson & Götestam,
majority were associated with the Internet. However, the sur-               2004; Cao & Su, 2007, Christakis et al., 2011). There is some
vey found few sexually orientated relationships between young               evidence that adolescents and college students that are heavy
people and adults. This last point appears to support the idea              users of the internet have lower self-esteem and are more so-
that children are able to insulate themselves from the more se-             cially disinhibited (Niemz, et al., 2005), but a recent review of
rious hazards.                                                              the area (Widyanto & Griffiths, 2009) concluded that if internet



        ing
   earn
                                                                          eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                       n.º 28 • April 2012
 Pap
                                                                                                                                           3
In-depth

addiction does indeed exist, it only affects a relatively small pro-     2004) because it is also strongly associated with risk-taking, sen-
portion of the population and there is very little evidence that it      sation seeking and reckless behaviour. All of which can have life-
is problematic among adolescents.                                        changing consequences for the individual. While adolescents
                                                                         are good at assessing risk under conditions of low arousal and
4.	 Digital natives and moral panics                                     cool emotions, under intense emotional arousal they can fail to
                                                                         make a responsible choice.
There are perhaps two features of the digital world that en-
hance the fears of the general population. In the first instance         The fear about young people and their behaviour has been a
it belongs to the young. Yes, we all use digital technologies but        recurrent theme. Sociologists observe the moral panic (Cohen,
the learning environment has been transformed by them and as             2002) that is created when people fear a threat to the social
Prensky (2001) notes today’s young people “are no longer the             order. The term was originally used to describe the reaction to
people our educational system was designed to teach” (page 1).           youth culture as it developed mid-way through the twentieth
They “are all ‘native speakers’ of the digital language of comput-       century as young people became independent consumers in the
ers, video games and the Internet” (page 1). In our research on          new age of prosperity. In today’s world it is digital technologies
the impact of digital technologies in schools (Underwood, et al.,        that present a clear and present danger to the social order and
2007) we observed a class of 27 four and five year old children          the demonisation of the Internet is a response to that threat.
log on to their laptops and develop new versions of the song
                                                                         The digital technologies represent a threat to the social order
‘Twinkle, twinkle little star’ for a full hour despite having very
                                                                         because they create a shift in power. There is a loss of adult
limited reading and writing skills. For example it was noted at
                                                                         power over children because much of the digital word is a mys-
the time,
                                                                         tery to parents. There is also the democratisation of knowledge
   “During a demonstration to the whole class, the teacher had           that the Internet offers through facilities such as Twitter. Gov-
   difficulty in making the programme work. She was able to              ernments, even repressive governments, are no longer able to
   problem-solve in front of the class and finally demonstrate           control the flow of information. The loss of power from people
   how to move the words around on screen and put them into              and organisations who are used to exerting it creates uncertain-
   cells in the on-screen grid. This did not trouble either the          ty and fear.
   teacher or the children. The solution was to move the cur-
   sor over the cell and then press SHIFT and LEFT CLICK at the          5.	 What’s to be done?
   same time to select it. This was initially taxing for the chil-
                                                                         To reiterate, we live in a risk averse society and so one of the
   dren when they returned to their laptops but some of them
                                                                         first responses to a threat is to restrict access to digital tech-
   picked it up very quickly and were soon confidently putting
                                                                         nologies and to try and control them. The metaphor we would
   text into the various cells.” (unpublished research notes).
                                                                         suggest here, however, is of the outdoor world. Mountains are
These digital natives have a different experience of dealing with        very good to look at but can be dangerous if you climb up them.
information and technology to previous generations. Technol-             People sometimes get lost on them and occasionally fall off
ogy use is associated both with transient changes in arousal/            them. There is no suggestion that we should fence them off and
mood and with long-term changes in behavior/brain function.              protect people from themselves, rather we urge walkers to have
Prensky (2001) goes on to suggest that this change is having an          the right kit and to develop relevant skills such as the ability to
effect on brain structure but whether this is the case or not, it is     read maps. However, with the Internet we consider this a pos-
clear that young people bring a different skill set to school and        sibility because of the moral panic that has been generated to
to life in general.                                                      demonise it.

The second feature that enhances fears about the digital tech-           If we consider again the risks associated with the Internet that
nologies comes from this association of the changes in technol-          we looked at above, then we must ask to what extent these
ogy with the age-group who are the principle users. Adolescence          risks are exclusive to the Internet, and how great the risk really
is a period of rapid increases in physical and mental capabilities.      is. We must also ask who is at risk. The youngest children have
Yet, despite having the cognitive ability to understand risk, mor-       low exposure, but risk rises as children approach adolescence.
tality rates increase by over 200% in this dangerous age (Dahl,          As Ferguson (2010) remarks we are at risk that concerns about


        ing
   earn
                                                                       eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                   n.º 28 • April 2012
 Pap
                                                                                                                                       4
In-depth

technology use could move beyond objective examination and             6.	 Are Internet dangers different to real-
into the realm of ideology, dogma and moral panic                          life dangers?
One aspect of the moral panic concerns the impact of video             Many hazards and associated risks offline are relatively well
from television and YouTube. Newspaper reports suggest that            known and understood but we have yet to fully explore whether
over ten hours of video is posted on YouTube every minute and          online hazards and risks are essentially the same or, in some
the 20 million daily viewers in the UK watch more than 3.6 bil-        important ways, different from those in the non-virtual world.
lion videos online every month (Johnson, 2008). The fear is that       However, one area where there appears to be a difference in
we have created a cult of the amateur where what we see on             the level and quality of risk between off and online worlds is the
YouTube is given equal weight to the considered evaluation of          area of cyberbullying. Bullying is a phenomena in all walks of life
journalists. If we all become amateur journalists and critics then     but technology brings a new dimension to this problem in that
there are no experts, and the prevailing view is formed by the         the victims of bullying feel unable to escape and the perpetra-
loudest and most opinionated (Keen, 2007).                             tors feel invulnerable due to anonymity.

A counter view comes from the report on the Video Republic             Recent data from the UK suggests that 19% of children between
by the UK think-tank Demos (Hannon et al, 2008). They note             the ages of 9 and 19 say that have been bullied in the last 12
the problems with the rise of video culture but comment that it        months. Interestingly for this debate when you break down that
offers hope for new forms of democratic expression and partici-        figure you find that 13% of those instances were face to face,
pation. They provide many recommendations for how we can               3% were via mobile phones and only 6% were via the Internet
embrace the technology and better prepare our young people             (Livingstone et al., 2011). The report, which included data from
for work and for life. For example they recommend                      countries across Europe goes on to note that “Bullying online
                                                                       appears more common in countries where bullying in general is
   “Schools, universities and businesses should prepare young
                                                                       more common (rather than, say, in countries where the Internet
   people for an era where CVs may well be obsolete, enabling
                                                                       is more established).” (page 62)
   them to manage their online reputation. They should pass
   on guidance from recruitment agencies and other experts to          The evidence for the other areas we suggested above, addictive
   help them make informed decisions about what they put on-           behaviours, game playing, social networking and unwelcome
   line and contribute to the Video Republic.” (page 66)               sexual solicitation is much less clear. These are all issues for off-
                                                                       line behaviour and so our focus on the potential damage cre-
The Demos report also uses the ubiquitous ‘dark-side’ rhetoric
                                                                       ated by the Internet means we are focusing on the medium and
but they come up with a solution to the fear of harmful and
                                                                       not the real problem. If we return to the ‘dark-side’ metaphor
objectionable material.
                                                                       then just as with these myths, the dark side is not out there but
   “Currently the tools we have to distinguish between harmful         inside people. And this brings us back to the assumptions we
   content are too blunt: content is either deemed ‘inappropri-        hold about people, their ability to deal with persuasion and the
   ate’ or is for over-18s only. People should have the ability to     responsibility they have for their actions. Do we see people as
   select age-rating systems for videos on websites. The aver-         passive, malleable and gullible, or as active, discriminating and
   age of these ratings could then be translated into a region’s       capable of making intelligent decisions?
   film-rating classification system.” (page 70)

In other words, use the facility developed by TripAdvisor and
                                                                       7.	 Dealing with risk
Amazon and other consumer sites to allow users to post evalu-          We argue in this paper that the Internet does not pose a spe-
ations and view the evaluations of others. The expert judge is         cial threat in and of itself. It is not the dark side but is another
replaced by the collective expertise of the users. Although there      stage on which people display the full range of social and inter-
are concerns about the ability of the crowd to make good deci-         personal behavior. As such it is also the stage where some nega-
sions (Keen, 2007) it is part of the modern democratisation of         tive and distressing behaviours can occur. The issue we argue is
knowledge that allows us to comment on things and events and           about identifying who is particularly vulnerable to these risks
see the comments of others.                                            and how we can provide some structure that limits the ex-
                                                                       tremes of negative behavior.


        ing
   earn
                                                                     eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                   n.º 28 • April 2012
 Pap
                                                                                                                                       5
In-depth

The first challenge is for adults to be aware of what happens          of students had private profiles of which less than 10% allowed
on the Internet and to offer the same guidance for interactions        some level of restricted searching, while Dey, Jelveh and Ross
online that they would offer for face to face interactions. Par-       (2012) report that in 2010 less than 20% of their 1,700 users hid
ents appear to be overconfident, for example, about the extent         their friend lists but that this had increased to over half using
of bullying. Among the 3% of European children who reported            this form of self-protection some 15 months later. This move
that they had been bullied on the Internet, less than a third of       away from the default privacy settings to more restrictive set-
their parents (29%) were aware of this with over half asserting        tings is evidence of increasing awareness of privacy and security
that their child had not been bullied (Livingstone et al., 2011).      issues had increased. Our young can and do learn. We need to
                                                                       provide convincing evidence for them to so.
As noted above, the Internet belongs to the young and parents
and teachers are only partially aware of what children are do-
ing. This lack of knowledge can create a sense of threat in those      8.	Conclusions
who are aware of their lack of knowledge. It is worth noting           We argue here that it is important for teachers and parents to
however that a detailed analysis of the 3% of children who were        make themselves more familiar with the Internet and hence of
bullied online found that over 90% reported that they were not         the potential risks. Currently in the UK half of parents with chil-
bothered by the event after a few days (Livingstone et al., 2011).     dren aged 5-15 who use the Internet believe that they know less
They were commonly able to do something about it by, for ex-           about the Internet than their children (Ofcom, 2011). It is clear
ample, blocking the person who sent the message. So the threat         that parents are becoming more aware of the risk and the 2011
is out there, but it is much less than the face-to-face threat and     Ofcom survey showed an increase in homes using passwords
children are commonly able to find ways of dealing with it.            on their multichannel televisions (36% to 44%) but no change
                                                                       in the use of parental controls on Internet use (steady at 39%).
Further evidence on the different approaches of parents and
                                                                       Simple controls and observations of behavior can manage the
children comes from the ongoing Ofcom Media Literacy Studies
                                                                       majority of risks.
in the UK (Ofcom, 2011). In the most recent study they find that
parents are more likely to be concerned about the television           We argue here that the most effective way to manage risk on
content their child watches (31%) compared to Internet content         the Internet is to help the young to gain an understanding of
(23%). The issue to consider is whether the reduced concern            the risks related to the Interent and then trust in the maturity
about Internet use is justified. The responses of the children to      of young people, and trust in their overall judgement and social
the survey suggest that there are, indeed, reasons to be cheer-        skills to negotiate these news ways of relating and behaving.
ful. For example, close to half of 12-15 year olds who use search      Apgar (2006) coined the term risk intelligence, that is the ca-
engines make critical judgements about the results concerning          pacity to learn about risk from experience. We need to expose
the truthfulness of sites. Also when asked about their attitude        the young to risk in safe environments such as schools so that
towards sharing personal information online, the majority of           they become risk intelligent. In this way they can be guided to
children in this age range said they would either want nobody          become responsible, digital citizens of the twenty first century.
or only friends to see their information (Ofcom 2011).

The second challenge is to help young people to understand the
risks related to the Internet. That such an understanding is de-
veloping is shown by a set of studies on student use of social
networking sites. In 2005 Gross and Acquisti (2005) surveyed
4,000 student Facebook users and found a disturbing degree of
naivety about personal information. These students openly pro-
vided sensitive data: over 50% broadcast their address and very
few used the privacy settings. By 2007 Fogel and Nehmad (2009)
found only 10% of students were openly distributing their per-
sonal address. Use of the privacy settings is also increasing. In
2007 Lewis, Kaufman and Christakis (2008) found that a third



        ing
   earn
                                                                     eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
      www
         .elea
               rnin                                                                                                 n.º 28 • April 2012
 Pap
                                                                                                                                     6
In-depth


References                                                               Finkelhor, D., Mitchell, K. J. & Wolak, J. (2000). Online
                                                                         Victimization: A Report on the Nation’s Youth. Washington, D. C.:
Apgar, D. (2006) Risk Intelligence: Learning to Manage What We           National Center for Missing and Exploited Children.
Don’t Know. Boston: Harvard Business School Press.
                                                                         Hannon, C., Bradwell, P, & Tims, C. (2008) Video Republic.
Banyard, P., & Underwood, J. (2008). Understanding the                   London: Demos. retrieved 12 March, 2012 from http://www.
learning space. eLearning Papers, 1(9), retrieved March 12, 2012         eurocult.org/uploads/docs/1066.pdf
from www.elearningpapers.eu/et/download/file/fid/19379
                                                                         Huesmann L.R. (2009). The impact of electronic media violence:
Bartholew, B. D., Bushman, B. J., & Sestir, M. A. (2006).                Scientific theory and research. J. Adolesc. Health, 41, S6–S13.
Chronic violent video game exposure and desensitization to
violence: Behavioural and event-related brain potential data.            Gross, R.& Acquisti, A. (2005). Information Revelation
Journal of Experimental Social Psychology, 42, 532-539.                  and Privacy in Online Social Networks: The Facebook case.
                                                                         Proceedings of the 2005 Workshop on Privacy in the Electronic
Burke, M., Marlow, C., and Lento, T. (2010). Social network              Society, (WPES), ACM 71-80.
activity and social well-being. ACM CHI 2010: Conference on
Human Factors in Computing Systems, 1909-1912, retrieved 9th             Johansson, A. & Götestam, K.G. (2004), Internet addiction:
March 2012 from http://www.thoughtcrumbs.com/publications/               characteristics of a questionnaire and prevalence in Norwegian
burke_chi2010_sns_and_wellbeing.pdf                                      youth (12-18 years) Scand. J. Psychol., 45, 223–229

Cao F. & Su, L. (2007). Internet addiction among Chinese                 Johnson, B. (2008), “The rise and rise of the YouTube generation,
adolescents: prevalence and psychological features. Child Care           and how adults can help”,The Guardian, 6 October, retrieved 12
Health Dev., 33 275–281.                                                 March, 2012 from http://www.guardian.co.uk/technology/2008/
                                                                         oct/06/youtube.youngpeople?INTCMP=SRCH
Carnagey, N.L., Anderson, C.A. (2005) The effects of reward
and punishment in violent video games on aggressive affect,              Keen, A. (2007), The Cult of the Amateur: How Today’s Internet
cognition and behaviour. Psychological Science, 16, 882–889.             is Killing Our Culture and Assaulting Our Economy, Nicholas
                                                                         Brealey Publishing, London.
Christakis D.A., Moreno, M.M., Jelenchick, L., Myaing,
M.T & Chuan Zhou, C. (2001). Problematic internet usage                  Lewis, K. Kaufman, J. Christakis, N. (2008). The Taste
in US college students: a pilot study. BMC Medicine 2011, 9:77,          for Privacy: An Analysis of College Student Privacy Settings
retrieved 12 March, 2012 from http://www.biomedcentral.                  in an Online Social Network. Journal of Computer-Mediated
com/1741-7015/9/77                                                       Communication, 14, 79–100

Cohen, S. (2002) Folk Devils and Moral Panics, 3rd Edition.              Livingstone, S., Haddon, L., Görzig, A., and Ólafsson,
Oxford: Routledge                                                        K. (2011). Risks and safety on the internet: The perspective of
                                                                         European children. Full Findings. LSE, London: EU Kids Online.
Dahl, RE (2004). Adolescent brain development: A period of               retrieved 12 March, 2012 from http://eprints.lse.ac.uk/33731/
vulnerabilities and opportunities. Annals of the New York Academy
of Science, 1021, 1-22.                                                  Muise, A., Christofides, E., and Desmarais, S. (2009) More
                                                                         information than you ever wanted: Does Facebook bring out the
Dehue, F., Bolman, C. & Vollink, T. (2008). Cyberbullying:               green-eyed monster of jealousy? CyberPsychology & Behavior
Youngsters experiences and parental perceptions. Cyberpsychology         12(4):441-444. doi:10.1089/cpb.2008.0263.
& Behavior, 11, 217-223.
                                                                         Niemz, K., Griffiths, M., & Banyard, P. (2005). Prevalence
Dey, R. Jelveh, Z. & Ross, K. (2012) “Facebook Users Have                of pathological internet use among university students and
Become Much More Private: A Large-Scale Study”. Read at 4th              correlations with self-esteem, the general health questionnaire
IEEE International Workshop on Security and Social Networking            (GHQ), and disinhibition. Cyberpsychology and Behavior, 8. 8,
(SESOC), March 2012. retrieved 9th March 2012 from http://cis.           562-570.
poly.edu/~ratan/
                                                                         Ofcom. (2011). Children and parents: media use and attitudes
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits         report. Ofcom. retrieved 12 March, 2012 from http://stakeholders.
of Facebook “friends:” Social capital and college students’ use of       ofcom.org.uk/binaries/research/media-literacy/oct2011/
online social network sites. JCMC 12(4)                                  Children_and_parents.pdf

Ferguson, C. J. (2010). The wild west of assessment: Measuring           Prensky, M. (2001) On the Horizon. MCB University Press, 9,
aggression and violence in video games. In L. Annetta and S.             1-6.
Bronack, (Eds.). Serious Educational Game Assessment: Practical
Methods and Models for Educational Games, Simulations and Virtual        Tidwell, L. C., & Walther, J. B. (2002). Computer-mediated
Worlds (pp. 31-44). Rotterdam: Sense Publishers.                         communication effects on disclosure, impressions, and interpersonal




       ing
  earn
                                                                     eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                        28
                          u
                     ers.e
                 gpap
    www
       .elea
             rnin                                                                                                       n.º 28 • April 2012
Pap
                                                                                                                                           7
In-depth


evaluations: Getting to know one another a bit at a time. Human
Communication Research, 28(3), 317–348.

Underwood, J., Baguley, T., Banyard, P., Coyne, E.,
Farrington-Flint, L., & I., S. (2007). Impact 2007: Personalising
Learning with Technology. Coventry: Final report for Becta.

Underwood, J.D., Kerlin, L. & Farrington-Flint, L. (2011).
The lies we tell and what they say about us: Using behavioural
characteristics to explain Facebook activity. Computers in Human
Behavior. 27, 1621-1626.

Underwood, J.D.M., Banyard, P.E. & Davies, M.N.O. (2007).
Students in Digital Worlds: Lost in Sin City or Reaching Treasure
Island? British Journal of Educational Psychology Monograph
Series II, 5. 83-99.

Weis, R. & Ceranksoky, B.C. (2010). Effects of Video-Game
Ownership on Young Boys’ Academic and Behavioral Functioning:
A Randomized, Controlled Study. Psychological Science, 21(4),
463-470

Widyanto, L. & Griffiths, M.D. (2009). Unravelling the
Web: Adolescents and Internet Addiction. In R. Zheng, J.
Burrow-Sanchez & C. Drew (Eds.), Adolescent Online Social
Communication and Behavior: Relationship Formation on the
Internet. pp. 29-49. Hershey, Pennsylvania: Idea Publishing.

Ybarra M.L, & Mitchell K.J. (2004). Online aggressor/
targets, aggressors, and targets: a comparison of associated youth
characteristics. Journal of Child Psychology and Psychiatry, 45(7),
1308-16.




 Edition and production
 Name of the publication: eLearning Papers                              Copyrights
 ISSN: 1887-1542
                                                                        The texts published in this journal, unless otherwise indicated, are subject
 Publisher: elearningeuropa.info
                                                                        to a Creative Commons Attribution-Noncommercial-NoDerivativeWorks
 Edited by: P.A.U. Education, S.L.                                      3.0 Unported licence. They may be copied, distributed and broadcast pro-
 Postal address: c/Muntaner 262, 3r, 08021 Barcelona (Spain)            vided that the author and the e-journal that publishes them, eLearning
 Phone: +34 933 670 400                                                 Papers, are cited. Commercial use and derivative works are not permitted.
 Email: editorial@elearningeuropa.info                                  The full licence can be consulted on http://creativecommons.org/licens-
 Internet: www.elearningpapers.eu                                       es/by-nc-nd/3.0/




       ing
  earn
                                                                      eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                        28
                          u
                     ers.e
                 gpap
    www
       .elea
             rnin                                                                                                             n.º 28 • April 2012
Pap
                                                                                                                                                   8

Contenu connexe

Tendances

Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportVasily Ryzhonkov
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schoolsMichael Young
 
Digital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline VickeryDigital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline VickeryJacqueline Vickery
 
Donor graphics webinar 050112 pdf
Donor graphics webinar 050112 pdfDonor graphics webinar 050112 pdf
Donor graphics webinar 050112 pdfstacyguidice
 
New approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resourcesNew approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resourcesGrainne Conole
 
M&L 2012 - Emergent mindsets in the digital age - by Edith Ackermann
M&L 2012 - Emergent mindsets in the digital age - by Edith AckermannM&L 2012 - Emergent mindsets in the digital age - by Edith Ackermann
M&L 2012 - Emergent mindsets in the digital age - by Edith AckermannMedia & Learning Conference
 
Noise about nothingness - the Disconnected consumer
Noise about nothingness - the Disconnected consumerNoise about nothingness - the Disconnected consumer
Noise about nothingness - the Disconnected consumerDr Mariann Hardey
 
The Ethics of Structured Information
The Ethics of Structured InformationThe Ethics of Structured Information
The Ethics of Structured InformationNicholas Poole
 
near field interactions with the internet of things
near field interactions with the internet of thingsnear field interactions with the internet of things
near field interactions with the internet of thingsBoni
 
Social media security users guide edited
Social media security users guide  editedSocial media security users guide  edited
Social media security users guide editedSergey Miller
 
Sci Fi YAL Presentation
Sci Fi YAL PresentationSci Fi YAL Presentation
Sci Fi YAL Presentationamypiotrowski
 
Bms fri 1000 sarita bhatt
Bms fri 1000 sarita bhattBms fri 1000 sarita bhatt
Bms fri 1000 sarita bhattMediaPost
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safetyemilyensign
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Stephen Carrick-Davies
 
Strategic Directions for School Libraries
Strategic Directions for School LibrariesStrategic Directions for School Libraries
Strategic Directions for School LibrariesJudy O'Connell
 
Critical Essay
Critical EssayCritical Essay
Critical Essay晓星 樊
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity Johannes Meier
 
'Albin Wallace Technucation
'Albin Wallace Technucation'Albin Wallace Technucation
'Albin Wallace Technucationeucunet
 

Tendances (19)

Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP Report
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schools
 
Digital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline VickeryDigital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
 
Donor graphics webinar 050112 pdf
Donor graphics webinar 050112 pdfDonor graphics webinar 050112 pdf
Donor graphics webinar 050112 pdf
 
New approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resourcesNew approaches to openness – beyond open educational resources
New approaches to openness – beyond open educational resources
 
M&L 2012 - Emergent mindsets in the digital age - by Edith Ackermann
M&L 2012 - Emergent mindsets in the digital age - by Edith AckermannM&L 2012 - Emergent mindsets in the digital age - by Edith Ackermann
M&L 2012 - Emergent mindsets in the digital age - by Edith Ackermann
 
Noise about nothingness - the Disconnected consumer
Noise about nothingness - the Disconnected consumerNoise about nothingness - the Disconnected consumer
Noise about nothingness - the Disconnected consumer
 
The Ethics of Structured Information
The Ethics of Structured InformationThe Ethics of Structured Information
The Ethics of Structured Information
 
near field interactions with the internet of things
near field interactions with the internet of thingsnear field interactions with the internet of things
near field interactions with the internet of things
 
Social media security users guide edited
Social media security users guide  editedSocial media security users guide  edited
Social media security users guide edited
 
Sci Fi YAL Presentation
Sci Fi YAL PresentationSci Fi YAL Presentation
Sci Fi YAL Presentation
 
CyberPedagogy
CyberPedagogyCyberPedagogy
CyberPedagogy
 
Bms fri 1000 sarita bhatt
Bms fri 1000 sarita bhattBms fri 1000 sarita bhatt
Bms fri 1000 sarita bhatt
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safety
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)
 
Strategic Directions for School Libraries
Strategic Directions for School LibrariesStrategic Directions for School Libraries
Strategic Directions for School Libraries
 
Critical Essay
Critical EssayCritical Essay
Critical Essay
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
 
'Albin Wallace Technucation
'Albin Wallace Technucation'Albin Wallace Technucation
'Albin Wallace Technucation
 

Similaire à E-learning: The Dark Side?

Identity in a Digital World
Identity in a Digital WorldIdentity in a Digital World
Identity in a Digital WorldAlec Couros
 
Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)InterMedia Consulting
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parentingbermandry
 
Social Networking
Social NetworkingSocial Networking
Social Networkingguest1b0960
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid
 
Genocide Essay
Genocide EssayGenocide Essay
Genocide Essayf6a5mww8
 
Negative impacts of social media as my space and facebook on teenagers in th...
Negative impacts of social media as my space and facebook on teenagers  in th...Negative impacts of social media as my space and facebook on teenagers  in th...
Negative impacts of social media as my space and facebook on teenagers in th...GeorgeDolezal
 
Research Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docxResearch Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docxaudeleypearl
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Artikel "New Millenium Learners"
Artikel "New Millenium Learners"Artikel "New Millenium Learners"
Artikel "New Millenium Learners"lernenzweinull
 

Similaire à E-learning: The Dark Side? (20)

Meet the e strangers
Meet the e strangersMeet the e strangers
Meet the e strangers
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Identity in a Digital World
Identity in a Digital WorldIdentity in a Digital World
Identity in a Digital World
 
Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Module1.culture[1]
Module1.culture[1]Module1.culture[1]
Module1.culture[1]
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Directed research 050114_EmpathyinDigital
Directed research 050114_EmpathyinDigitalDirected research 050114_EmpathyinDigital
Directed research 050114_EmpathyinDigital
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Genocide Essay
Genocide EssayGenocide Essay
Genocide Essay
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
Negative impacts of social media as my space and facebook on teenagers in th...
Negative impacts of social media as my space and facebook on teenagers  in th...Negative impacts of social media as my space and facebook on teenagers  in th...
Negative impacts of social media as my space and facebook on teenagers in th...
 
Research Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docxResearch Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docx
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Artikel "New Millenium Learners"
Artikel "New Millenium Learners"Artikel "New Millenium Learners"
Artikel "New Millenium Learners"
 

Plus de eLearning Papers

OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...eLearning Papers
 
Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...eLearning Papers
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learningeLearning Papers
 
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...eLearning Papers
 
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...eLearning Papers
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningeLearning Papers
 
Reaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholarReaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholareLearning Papers
 
Managing Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentsManaging Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentseLearning Papers
 
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious GamesReflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious GameseLearning Papers
 
SKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence GainSKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence GaineLearning Papers
 
Experience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational CompetenciesExperience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational CompetencieseLearning Papers
 
Leveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyLeveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyeLearning Papers
 
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...eLearning Papers
 
Website – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and SchoolsWebsite – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and SchoolseLearning Papers
 
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...eLearning Papers
 
The Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong LearningThe Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong LearningeLearning Papers
 
Checklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning ContentChecklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning ContenteLearning Papers
 
The International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong LearningThe International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong LearningeLearning Papers
 
Fostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active AgeingFostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active AgeingeLearning Papers
 
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active AgeingeLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active AgeingeLearning Papers
 

Plus de eLearning Papers (20)

OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
 
Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learning
 
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
 
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual Learning
 
Reaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholarReaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open Scholar
 
Managing Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentsManaging Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business Environments
 
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious GamesReflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
 
SKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence GainSKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence Gain
 
Experience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational CompetenciesExperience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational Competencies
 
Leveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyLeveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case Study
 
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
 
Website – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and SchoolsWebsite – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and Schools
 
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
 
The Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong LearningThe Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong Learning
 
Checklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning ContentChecklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning Content
 
The International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong LearningThe International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong Learning
 
Fostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active AgeingFostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active Ageing
 
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active AgeingeLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
 

Dernier

Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Dernier (20)

Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

E-learning: The Dark Side?

  • 1. In-depth E-learning: The Dark Side? Authors There are concerns that the Internet has created new risks for our society and in par- ticular for young people. We argue that the way we frame these risks is affected by the Philip Banyard way we view young people, in particular their maturity and ability to make choices for Reader in Psychology Division of Psychology, themselves. Nottingham Trent University, UK A recurrent metaphor concerns the ‘dark-side’ of the Internet which draws on ancient phil.banyard@ntu.ac.uk and modern myths about the nature of good and evil. We argue that a knowledge divide between adults and youth has developed concerning the use of digital technolo- Jean Underwood gies. Digital natives are able to change the power balance of our society: this threatens Professor of Psychology the status quo and therefore has created a moral panic. Division of Psychology, Nottingham Trent University, The key areas of concern for risk include: cyber-bullying, game-playing, social network- UK ing, sexual solicitation and addictive behaviours. Although these areas present real jean.underwood@ntu.ac.uk risks, we note that young people are moderating their own behaviour as they develop understandings about the possibilities offered by new technologies. The answer to Tags our concerns should not be to seek to control digital technologies, but rather to edu- cate adults and young people about what is possible and appropriate, so that they can risk, learning, moral panic, choose to become responsible, digital citizens of the 21st century. digital citizens, cyber-bullying 1. Introduction “There is no dark side of the moon, really. Matter of fact, it’s all dark.” Pink Floyd, Dark Side of the Moon Does the Internet have a dark side? Should we be protecting ourselves and our children from the dangers of the Internet or encouraging them to embrace the opportunity for knowledge and community that it offers? The way we frame our answers to this question is structured by our implicit assumptions about human nature and our understandings about self and society. In this article we will look at these assumptions and review the scientific evidence to see how much we can bring these two sets of understandings together. One assumption concerns the power of persuasion and hence the ability of individuals to resist influences from powerful others. One view sees the person as passive, malleable and gullible, and the other sees the person as active and capable of making decisions and being discriminating. The volume of books about persuasion on the psychology, business and self- help shelves illustrates our concern and interest in the issue. A second assumption about human behaviour, crucial to our response to the Internet, concerns our view of children and the maturity they are able to show when given the opportunity to do so. This view affects the level of responsibility we allow them to exercise. These assumptions about human behaviour are only partially framed by the scientific evi- dence available because they touch our core beliefs about what it means to be human. The ‘dark-side’ is therefore a useful phrase to explore because it refers to a modern retelling ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 1
  • 2. In-depth of judeo-christian ideas about people. The ‘force’ (in the film just found some unwanted material on one of the machines Star Wars) refers to a universal and metaphysical power that we and was waiting for [the Local Education Authority] to send have access to, but whose strength is so great that it can turn someone to check it out. The school is assiduous in its at- us from good people to bad if we don’t use it wisely. Use it un- tempts to keep unwanted material away from the pupils and wisely and you will go to the ‘dark side’ and become consumed to make sure that they do not inadvertently come across an by your own darkness such as addiction or a lust for power. This offensive site.” (unpublished research notes) central story of good and evil about how we see ourselves and The contrast between teaching children to click-away from in- our society has a profound effect on the general response to appropriate material and training all staff to monitor children the Internet. and close down the system if there are any concerns could not be more marked. This was not a unique observation and we re- 2. Perceived risks corded similar contrasting approaches in neighbouring schools We live in an increasingly risk averse society, and this is par- in other parts of the UK. The different approaches, we argue, ticularly true in relation to the protection of children. The dif- have less to do with understandings about the Internet than ferent focus that schools adopt to safety concerns about the with assumptions about human behaviour. Internet was illustrated by two neighbouring primary schools that we visited in 2006 as part of a research project for the UK 3. What are the risks? government (Underwood et al., 2007). Situated in rural East An- We will look at some of the risks that have been identified to be glia with similar catchments, demographics and rated as above associated with the use of internet and then consider whether average on national criteria, each viewed the computers in their these represent new challenges for educators or whether they schools in very different ways. Our contemporaneous observa- are new expressions of old risks. tions which we report here are in stark contrast. The first school was on the ‘opportunity’ end of the spectrum, 3.1 Cyber-bullying “The school is delightfully unaware of technical details and only showed a passing recognition of the local broadband Online aggression is a very real danger. In a study of 501 regular consortium (e2bn) who probably provide their broadband Internet users (aged 10–17 years), 19% were involved in online link. […] aggression, 3% were aggressor/ targets, 4% targets only, and 12% online aggressors only. Aggressor/targets reported charac- The school believes that most children have access to com- teristics similar to off-line bully/ victims. Furthermore, cyberbul- puters at home and many have access to the Internet. Access lying rapidly transfers to real life, leaving children with no place at school is largely in lesson time though pupils are allowed to hide and teachers with an undercurrent of activity they have to use the unlocked ICT suite in break-times with permission. no control over (Ybarra & Mitchell, 2004). There are clear sex The school could not name who carried out the blocking of differences in the acceptance of risk and in cyberbullying, with unwanted Internet sites. It was presumed to be the LEA [Lo- young males being greater both greater risk takers and more cal Education Authority]. The school had not experienced any involved in cyberbullying (Dehue et al., 2008). major problems with the Internet though it was accepted that unwanted material would occasionally slip through the The question to consider is whether this represents a new and filters, for example a search for material on waterfalls elic- substantial hazard for children or whether it is a different ex- ited some mildly erotic images. The policy of the school is to pression of the social negotiation that is part of every child’s encourage children to respond responsibly to such material development. Furthermore we have to consider whether regu- and to delete and report it. There has been no need to take lation by adults is the best strategy as in involves the invasion of any further action so far.” the private worlds of young people, and whether leaving space for the development of social skills in these young people will The second school was on the ‘danger’ end of the spectrum provide greater long-term benefit. “The classroom computers and the mini-suite were not being used on the day of the visit because the ICT coordinator had ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 2
  • 3. In-depth 3.2 Game playing 3.4 Social networking As the developing child acquires social norms about acceptable Do people behave different when communicating online to behavior from his or her experiences, any activity that promotes how they do in face-to-face situations? Online interactions violence is likely to be a risk factor for violent behavior. The re- have been found to generate more self-disclosure and foster petitive playing of violent games has been reported as leading deeper personal questionings than face-to-face communication to more aggressive behaviour and the desensitisation of the in- (Tidwell & Walther, 2002). Underwood, et al. (2011) identified 3 dividual demonstrating by decreased brain activity when shown types of Facebook users in young people. One group, the broad- scenes of real violence. (Bartholew, et al., 2006). Meta-analyses, casters exhibited worrying high risk behaviour which tended to combining data from hundreds of individual studies, confirm an focus on one-to-many low quality communications, in which association between exposure to violence in media and antiso- self–promotion and lying were clearly evident. Could it be that cial tendencies such as aggression (Huesmann, 2009). Although social networking facilities encourage risky behaviour in vulner- Ferguson (2010) asserts that much of the research on the link able young people and open them up to the possibilities of dan- between gaming and aggression is inconsistent and hampered gerous relationships and encounters? Another feature of social by poor methodologies and the intrusion of ideology and dog- networking is the ability to know ever more details about your ma. partner including their changing moods (status on Facebook), where they are (Find my iphone) and who they are with. It is The risks associated with less violent video games, particularly perhaps no surprise that heavy Facebook use is associated with those marketed to young children are not well understood, but increased levels of jealousy (Muise, et al., 2009). recent research has shown experimental evidence that video games may displace after-school activities that have educa- Use of social networking sites has been associated with greater tional value and may interfere with the development of reading levels of social capital, or benefits made possible by the exist- and writing skills in some children (Weis & Ceranksoky, 2010). ence of a social structure. For example, Ellison et al. (2007) have It is worth reflecting, however, whether previous generations of show that students who are active on Facebook feel higher lev- children have also turned away from educational activities to els of both forms of social capital, and the effects are greater for play football or tiddlywinks or French skipping. students with lower self-esteem. However, the perceived ben- efits may depend on the nature of the interactions. A survey of 3.3 Unwelcome sexual solicitation 1,193 students found users who engaged in directed interaction with others, such as leaving wall posts or messaging friends, It is difficult to collect reliable data on sexual solicitation via the reported lowered feelings of loneliness and increased feelings Internet. One large-scale study in the USA (Finkelhor, Mitchell of social capital. On the other hand, students who engaged in and Wolak, 2000) carried out interviews with a sample of 1,501 passive viewing of others’ content, such as status updates and youths aged 10 to 17 years who use the Internet regularly (at photos reported feelings of increased loneliness and reduced least once a month for the past 6 months). They reported that social capital (Burke, Marlow & Lento, 2010). 19 per cent of their sample received an unwanted sexual solici- tation or approach over the Internet in the previous year. The 3.5 Addictive behaviour definition was extremely broad and included someone trying to get them to unwillingly talk about sex; asking unwanted inti- Addiction is a perceived danger of Internet use that is fuelled by mate questions; requests to do sexual things they did not want parental concerns about the amount of time their children ap- to do; and invitations to run away. In addition, 3 per cent (one in pear to spend online. Recent surveys suggest that about 2% of seven of all the solicitations) included an attempt to contact the youth can be described as having Internet addiction with 10%– youth via telephone/postal mail and/or in person so the vast 20% engaging in at-risk Internet use (Johansson & Götestam, majority were associated with the Internet. However, the sur- 2004; Cao & Su, 2007, Christakis et al., 2011). There is some vey found few sexually orientated relationships between young evidence that adolescents and college students that are heavy people and adults. This last point appears to support the idea users of the internet have lower self-esteem and are more so- that children are able to insulate themselves from the more se- cially disinhibited (Niemz, et al., 2005), but a recent review of rious hazards. the area (Widyanto & Griffiths, 2009) concluded that if internet ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 3
  • 4. In-depth addiction does indeed exist, it only affects a relatively small pro- 2004) because it is also strongly associated with risk-taking, sen- portion of the population and there is very little evidence that it sation seeking and reckless behaviour. All of which can have life- is problematic among adolescents. changing consequences for the individual. While adolescents are good at assessing risk under conditions of low arousal and 4. Digital natives and moral panics cool emotions, under intense emotional arousal they can fail to make a responsible choice. There are perhaps two features of the digital world that en- hance the fears of the general population. In the first instance The fear about young people and their behaviour has been a it belongs to the young. Yes, we all use digital technologies but recurrent theme. Sociologists observe the moral panic (Cohen, the learning environment has been transformed by them and as 2002) that is created when people fear a threat to the social Prensky (2001) notes today’s young people “are no longer the order. The term was originally used to describe the reaction to people our educational system was designed to teach” (page 1). youth culture as it developed mid-way through the twentieth They “are all ‘native speakers’ of the digital language of comput- century as young people became independent consumers in the ers, video games and the Internet” (page 1). In our research on new age of prosperity. In today’s world it is digital technologies the impact of digital technologies in schools (Underwood, et al., that present a clear and present danger to the social order and 2007) we observed a class of 27 four and five year old children the demonisation of the Internet is a response to that threat. log on to their laptops and develop new versions of the song The digital technologies represent a threat to the social order ‘Twinkle, twinkle little star’ for a full hour despite having very because they create a shift in power. There is a loss of adult limited reading and writing skills. For example it was noted at power over children because much of the digital word is a mys- the time, tery to parents. There is also the democratisation of knowledge “During a demonstration to the whole class, the teacher had that the Internet offers through facilities such as Twitter. Gov- difficulty in making the programme work. She was able to ernments, even repressive governments, are no longer able to problem-solve in front of the class and finally demonstrate control the flow of information. The loss of power from people how to move the words around on screen and put them into and organisations who are used to exerting it creates uncertain- cells in the on-screen grid. This did not trouble either the ty and fear. teacher or the children. The solution was to move the cur- sor over the cell and then press SHIFT and LEFT CLICK at the 5. What’s to be done? same time to select it. This was initially taxing for the chil- To reiterate, we live in a risk averse society and so one of the dren when they returned to their laptops but some of them first responses to a threat is to restrict access to digital tech- picked it up very quickly and were soon confidently putting nologies and to try and control them. The metaphor we would text into the various cells.” (unpublished research notes). suggest here, however, is of the outdoor world. Mountains are These digital natives have a different experience of dealing with very good to look at but can be dangerous if you climb up them. information and technology to previous generations. Technol- People sometimes get lost on them and occasionally fall off ogy use is associated both with transient changes in arousal/ them. There is no suggestion that we should fence them off and mood and with long-term changes in behavior/brain function. protect people from themselves, rather we urge walkers to have Prensky (2001) goes on to suggest that this change is having an the right kit and to develop relevant skills such as the ability to effect on brain structure but whether this is the case or not, it is read maps. However, with the Internet we consider this a pos- clear that young people bring a different skill set to school and sibility because of the moral panic that has been generated to to life in general. demonise it. The second feature that enhances fears about the digital tech- If we consider again the risks associated with the Internet that nologies comes from this association of the changes in technol- we looked at above, then we must ask to what extent these ogy with the age-group who are the principle users. Adolescence risks are exclusive to the Internet, and how great the risk really is a period of rapid increases in physical and mental capabilities. is. We must also ask who is at risk. The youngest children have Yet, despite having the cognitive ability to understand risk, mor- low exposure, but risk rises as children approach adolescence. tality rates increase by over 200% in this dangerous age (Dahl, As Ferguson (2010) remarks we are at risk that concerns about ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 4
  • 5. In-depth technology use could move beyond objective examination and 6. Are Internet dangers different to real- into the realm of ideology, dogma and moral panic life dangers? One aspect of the moral panic concerns the impact of video Many hazards and associated risks offline are relatively well from television and YouTube. Newspaper reports suggest that known and understood but we have yet to fully explore whether over ten hours of video is posted on YouTube every minute and online hazards and risks are essentially the same or, in some the 20 million daily viewers in the UK watch more than 3.6 bil- important ways, different from those in the non-virtual world. lion videos online every month (Johnson, 2008). The fear is that However, one area where there appears to be a difference in we have created a cult of the amateur where what we see on the level and quality of risk between off and online worlds is the YouTube is given equal weight to the considered evaluation of area of cyberbullying. Bullying is a phenomena in all walks of life journalists. If we all become amateur journalists and critics then but technology brings a new dimension to this problem in that there are no experts, and the prevailing view is formed by the the victims of bullying feel unable to escape and the perpetra- loudest and most opinionated (Keen, 2007). tors feel invulnerable due to anonymity. A counter view comes from the report on the Video Republic Recent data from the UK suggests that 19% of children between by the UK think-tank Demos (Hannon et al, 2008). They note the ages of 9 and 19 say that have been bullied in the last 12 the problems with the rise of video culture but comment that it months. Interestingly for this debate when you break down that offers hope for new forms of democratic expression and partici- figure you find that 13% of those instances were face to face, pation. They provide many recommendations for how we can 3% were via mobile phones and only 6% were via the Internet embrace the technology and better prepare our young people (Livingstone et al., 2011). The report, which included data from for work and for life. For example they recommend countries across Europe goes on to note that “Bullying online appears more common in countries where bullying in general is “Schools, universities and businesses should prepare young more common (rather than, say, in countries where the Internet people for an era where CVs may well be obsolete, enabling is more established).” (page 62) them to manage their online reputation. They should pass on guidance from recruitment agencies and other experts to The evidence for the other areas we suggested above, addictive help them make informed decisions about what they put on- behaviours, game playing, social networking and unwelcome line and contribute to the Video Republic.” (page 66) sexual solicitation is much less clear. These are all issues for off- line behaviour and so our focus on the potential damage cre- The Demos report also uses the ubiquitous ‘dark-side’ rhetoric ated by the Internet means we are focusing on the medium and but they come up with a solution to the fear of harmful and not the real problem. If we return to the ‘dark-side’ metaphor objectionable material. then just as with these myths, the dark side is not out there but “Currently the tools we have to distinguish between harmful inside people. And this brings us back to the assumptions we content are too blunt: content is either deemed ‘inappropri- hold about people, their ability to deal with persuasion and the ate’ or is for over-18s only. People should have the ability to responsibility they have for their actions. Do we see people as select age-rating systems for videos on websites. The aver- passive, malleable and gullible, or as active, discriminating and age of these ratings could then be translated into a region’s capable of making intelligent decisions? film-rating classification system.” (page 70) In other words, use the facility developed by TripAdvisor and 7. Dealing with risk Amazon and other consumer sites to allow users to post evalu- We argue in this paper that the Internet does not pose a spe- ations and view the evaluations of others. The expert judge is cial threat in and of itself. It is not the dark side but is another replaced by the collective expertise of the users. Although there stage on which people display the full range of social and inter- are concerns about the ability of the crowd to make good deci- personal behavior. As such it is also the stage where some nega- sions (Keen, 2007) it is part of the modern democratisation of tive and distressing behaviours can occur. The issue we argue is knowledge that allows us to comment on things and events and about identifying who is particularly vulnerable to these risks see the comments of others. and how we can provide some structure that limits the ex- tremes of negative behavior. ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 5
  • 6. In-depth The first challenge is for adults to be aware of what happens of students had private profiles of which less than 10% allowed on the Internet and to offer the same guidance for interactions some level of restricted searching, while Dey, Jelveh and Ross online that they would offer for face to face interactions. Par- (2012) report that in 2010 less than 20% of their 1,700 users hid ents appear to be overconfident, for example, about the extent their friend lists but that this had increased to over half using of bullying. Among the 3% of European children who reported this form of self-protection some 15 months later. This move that they had been bullied on the Internet, less than a third of away from the default privacy settings to more restrictive set- their parents (29%) were aware of this with over half asserting tings is evidence of increasing awareness of privacy and security that their child had not been bullied (Livingstone et al., 2011). issues had increased. Our young can and do learn. We need to provide convincing evidence for them to so. As noted above, the Internet belongs to the young and parents and teachers are only partially aware of what children are do- ing. This lack of knowledge can create a sense of threat in those 8. Conclusions who are aware of their lack of knowledge. It is worth noting We argue here that it is important for teachers and parents to however that a detailed analysis of the 3% of children who were make themselves more familiar with the Internet and hence of bullied online found that over 90% reported that they were not the potential risks. Currently in the UK half of parents with chil- bothered by the event after a few days (Livingstone et al., 2011). dren aged 5-15 who use the Internet believe that they know less They were commonly able to do something about it by, for ex- about the Internet than their children (Ofcom, 2011). It is clear ample, blocking the person who sent the message. So the threat that parents are becoming more aware of the risk and the 2011 is out there, but it is much less than the face-to-face threat and Ofcom survey showed an increase in homes using passwords children are commonly able to find ways of dealing with it. on their multichannel televisions (36% to 44%) but no change in the use of parental controls on Internet use (steady at 39%). Further evidence on the different approaches of parents and Simple controls and observations of behavior can manage the children comes from the ongoing Ofcom Media Literacy Studies majority of risks. in the UK (Ofcom, 2011). In the most recent study they find that parents are more likely to be concerned about the television We argue here that the most effective way to manage risk on content their child watches (31%) compared to Internet content the Internet is to help the young to gain an understanding of (23%). The issue to consider is whether the reduced concern the risks related to the Interent and then trust in the maturity about Internet use is justified. The responses of the children to of young people, and trust in their overall judgement and social the survey suggest that there are, indeed, reasons to be cheer- skills to negotiate these news ways of relating and behaving. ful. For example, close to half of 12-15 year olds who use search Apgar (2006) coined the term risk intelligence, that is the ca- engines make critical judgements about the results concerning pacity to learn about risk from experience. We need to expose the truthfulness of sites. Also when asked about their attitude the young to risk in safe environments such as schools so that towards sharing personal information online, the majority of they become risk intelligent. In this way they can be guided to children in this age range said they would either want nobody become responsible, digital citizens of the twenty first century. or only friends to see their information (Ofcom 2011). The second challenge is to help young people to understand the risks related to the Internet. That such an understanding is de- veloping is shown by a set of studies on student use of social networking sites. In 2005 Gross and Acquisti (2005) surveyed 4,000 student Facebook users and found a disturbing degree of naivety about personal information. These students openly pro- vided sensitive data: over 50% broadcast their address and very few used the privacy settings. By 2007 Fogel and Nehmad (2009) found only 10% of students were openly distributing their per- sonal address. Use of the privacy settings is also increasing. In 2007 Lewis, Kaufman and Christakis (2008) found that a third ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 6
  • 7. In-depth References Finkelhor, D., Mitchell, K. J. & Wolak, J. (2000). Online Victimization: A Report on the Nation’s Youth. Washington, D. C.: Apgar, D. (2006) Risk Intelligence: Learning to Manage What We National Center for Missing and Exploited Children. Don’t Know. Boston: Harvard Business School Press. Hannon, C., Bradwell, P, & Tims, C. (2008) Video Republic. Banyard, P., & Underwood, J. (2008). Understanding the London: Demos. retrieved 12 March, 2012 from http://www. learning space. eLearning Papers, 1(9), retrieved March 12, 2012 eurocult.org/uploads/docs/1066.pdf from www.elearningpapers.eu/et/download/file/fid/19379 Huesmann L.R. (2009). The impact of electronic media violence: Bartholew, B. D., Bushman, B. J., & Sestir, M. A. (2006). Scientific theory and research. J. Adolesc. Health, 41, S6–S13. Chronic violent video game exposure and desensitization to violence: Behavioural and event-related brain potential data. Gross, R.& Acquisti, A. (2005). Information Revelation Journal of Experimental Social Psychology, 42, 532-539. and Privacy in Online Social Networks: The Facebook case. Proceedings of the 2005 Workshop on Privacy in the Electronic Burke, M., Marlow, C., and Lento, T. (2010). Social network Society, (WPES), ACM 71-80. activity and social well-being. ACM CHI 2010: Conference on Human Factors in Computing Systems, 1909-1912, retrieved 9th Johansson, A. & Götestam, K.G. (2004), Internet addiction: March 2012 from http://www.thoughtcrumbs.com/publications/ characteristics of a questionnaire and prevalence in Norwegian burke_chi2010_sns_and_wellbeing.pdf youth (12-18 years) Scand. J. Psychol., 45, 223–229 Cao F. & Su, L. (2007). Internet addiction among Chinese Johnson, B. (2008), “The rise and rise of the YouTube generation, adolescents: prevalence and psychological features. Child Care and how adults can help”,The Guardian, 6 October, retrieved 12 Health Dev., 33 275–281. March, 2012 from http://www.guardian.co.uk/technology/2008/ oct/06/youtube.youngpeople?INTCMP=SRCH Carnagey, N.L., Anderson, C.A. (2005) The effects of reward and punishment in violent video games on aggressive affect, Keen, A. (2007), The Cult of the Amateur: How Today’s Internet cognition and behaviour. Psychological Science, 16, 882–889. is Killing Our Culture and Assaulting Our Economy, Nicholas Brealey Publishing, London. Christakis D.A., Moreno, M.M., Jelenchick, L., Myaing, M.T & Chuan Zhou, C. (2001). Problematic internet usage Lewis, K. Kaufman, J. Christakis, N. (2008). The Taste in US college students: a pilot study. BMC Medicine 2011, 9:77, for Privacy: An Analysis of College Student Privacy Settings retrieved 12 March, 2012 from http://www.biomedcentral. in an Online Social Network. Journal of Computer-Mediated com/1741-7015/9/77 Communication, 14, 79–100 Cohen, S. (2002) Folk Devils and Moral Panics, 3rd Edition. Livingstone, S., Haddon, L., Görzig, A., and Ólafsson, Oxford: Routledge K. (2011). Risks and safety on the internet: The perspective of European children. Full Findings. LSE, London: EU Kids Online. Dahl, RE (2004). Adolescent brain development: A period of retrieved 12 March, 2012 from http://eprints.lse.ac.uk/33731/ vulnerabilities and opportunities. Annals of the New York Academy of Science, 1021, 1-22. Muise, A., Christofides, E., and Desmarais, S. (2009) More information than you ever wanted: Does Facebook bring out the Dehue, F., Bolman, C. & Vollink, T. (2008). Cyberbullying: green-eyed monster of jealousy? CyberPsychology & Behavior Youngsters experiences and parental perceptions. Cyberpsychology 12(4):441-444. doi:10.1089/cpb.2008.0263. & Behavior, 11, 217-223. Niemz, K., Griffiths, M., & Banyard, P. (2005). Prevalence Dey, R. Jelveh, Z. & Ross, K. (2012) “Facebook Users Have of pathological internet use among university students and Become Much More Private: A Large-Scale Study”. Read at 4th correlations with self-esteem, the general health questionnaire IEEE International Workshop on Security and Social Networking (GHQ), and disinhibition. Cyberpsychology and Behavior, 8. 8, (SESOC), March 2012. retrieved 9th March 2012 from http://cis. 562-570. poly.edu/~ratan/ Ofcom. (2011). Children and parents: media use and attitudes Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits report. Ofcom. retrieved 12 March, 2012 from http://stakeholders. of Facebook “friends:” Social capital and college students’ use of ofcom.org.uk/binaries/research/media-literacy/oct2011/ online social network sites. JCMC 12(4) Children_and_parents.pdf Ferguson, C. J. (2010). The wild west of assessment: Measuring Prensky, M. (2001) On the Horizon. MCB University Press, 9, aggression and violence in video games. In L. Annetta and S. 1-6. Bronack, (Eds.). Serious Educational Game Assessment: Practical Methods and Models for Educational Games, Simulations and Virtual Tidwell, L. C., & Walther, J. B. (2002). Computer-mediated Worlds (pp. 31-44). Rotterdam: Sense Publishers. communication effects on disclosure, impressions, and interpersonal ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 7
  • 8. In-depth evaluations: Getting to know one another a bit at a time. Human Communication Research, 28(3), 317–348. Underwood, J., Baguley, T., Banyard, P., Coyne, E., Farrington-Flint, L., & I., S. (2007). Impact 2007: Personalising Learning with Technology. Coventry: Final report for Becta. Underwood, J.D., Kerlin, L. & Farrington-Flint, L. (2011). The lies we tell and what they say about us: Using behavioural characteristics to explain Facebook activity. Computers in Human Behavior. 27, 1621-1626. Underwood, J.D.M., Banyard, P.E. & Davies, M.N.O. (2007). Students in Digital Worlds: Lost in Sin City or Reaching Treasure Island? British Journal of Educational Psychology Monograph Series II, 5. 83-99. Weis, R. & Ceranksoky, B.C. (2010). Effects of Video-Game Ownership on Young Boys’ Academic and Behavioral Functioning: A Randomized, Controlled Study. Psychological Science, 21(4), 463-470 Widyanto, L. & Griffiths, M.D. (2009). Unravelling the Web: Adolescents and Internet Addiction. In R. Zheng, J. Burrow-Sanchez & C. Drew (Eds.), Adolescent Online Social Communication and Behavior: Relationship Formation on the Internet. pp. 29-49. Hershey, Pennsylvania: Idea Publishing. Ybarra M.L, & Mitchell K.J. (2004). Online aggressor/ targets, aggressors, and targets: a comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45(7), 1308-16. Edition and production Name of the publication: eLearning Papers Copyrights ISSN: 1887-1542 The texts published in this journal, unless otherwise indicated, are subject Publisher: elearningeuropa.info to a Creative Commons Attribution-Noncommercial-NoDerivativeWorks Edited by: P.A.U. Education, S.L. 3.0 Unported licence. They may be copied, distributed and broadcast pro- Postal address: c/Muntaner 262, 3r, 08021 Barcelona (Spain) vided that the author and the e-journal that publishes them, eLearning Phone: +34 933 670 400 Papers, are cited. Commercial use and derivative works are not permitted. Email: editorial@elearningeuropa.info The full licence can be consulted on http://creativecommons.org/licens- Internet: www.elearningpapers.eu es/by-nc-nd/3.0/ ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap www .elea rnin n.º 28 • April 2012 Pap 8