SlideShare a Scribd company logo
1 of 8
+                                                              LONDON – LSE
                                                               23.sept.2011
Contribution for the
definition of online
violence in the context
of a study with school    EU KIDS ONLINE                                >>
children
                                      Teresa Sofia Castro | University of Minho | Portugal
                                      teresa.sofia.castro@gmail.com

                                      António J. Osório | University of Minho | Portugal
+ “Encountering risk does not necessarily result in an experience of
      harm”
      Cross-national comparison of risks and safety on the internet
      Initial analysis from the EU Kids Online survey of European children




A suburban family is torn apart when fourteen-year-old Annie meets her first boyfriend
online. After months of communicating via online chat and phone, Annie discovers her
friend is not who he originally claimed to be. Shocked into disbelief, her parents are
shattered by their daughter's actions and struggle to support her as she comes to terms
with what has happened to her once innocent life.
+ “Most teenagers use the internet at home in the privacy of their
   own bedroom”
   Risks and safety on the internet: The perspective of European children
   Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries




                          No face-to-face interaction                                                                           No one can hide


                                                                                  ICT skills
                                                                                                                              Unpredictable proportions


                                                                          Identity management: anonymity vs. multiplicity

                                                                                 Deindividuation
                                                                                                                                    Diversity of media

  Absence of barriers: geography, time, language                                                                                Inhumane
+ “Among those children who ride a bicycle, a small percentage will
    have an accident”
    Risks and safety on the internet: The perspective of European children
    Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries




hybrid and liquid universe of network

                                the border between opportunity and threat fades
                                                          new kind of violence
                                           Thus, these are some beginning questions of our starting research:
                                           What can we consider as online violence?
                                           What proportions can violence gain in the virtual world?
                                           What effects may have the disclosure of a compromising photo?
                                           How do children protect themselves from online harm?
                                           How to prepare parents, school and community for these challenges?
+ “Welcome to social cruelty, 21                                               st   century style”
    in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55.




First things first…
              1) Extensive and detailed review on the state of the art around the concept of
                 online violence
                 • “lack of consistent terminology” (David-Ferdon & Hertz, 2009, para.24)
                 • “the variety of terms used” (David-Ferdon & Hertz, 2007, S2)

                    Internet aggression (Werner, Bumpus & Rock, 2010)
                    Electronic violence (David-Ferdon & Hertz, 2009)
                    Bullying online (Juvonen & Gross, 2008)
                    Online Harassment (Wolak, Mitchell, & Finkelhor, 2007, Juvonen & Gross, 2008)
                    Internet bullying (Williams & Guerra, 2007)
                    Online bullying (Wolak, Mitchell, & Finkelhor, 2007)
                    Electronic Bullying (Kowalski & Limber, 2007)
                    Online aggression (Kowalski & Limber, 2007)
                    Electronic aggression(David-Ferdon & Hertz, 2007)
                    Internet harassment (Ybarra, West & Leaf, 2007; Ybarra, Espelage & Mitchell, 2007; Ybarra, Mitchell, Wolak, Finkelhor, 2006)
                    Internet bullying and harassment (Worthen, 2007)
+ “The distinction between aggression and violence, however, is a
   subtle one”
   in Kirsh, Steven J. (2006) Children, Adolescents and Media Violence: A critical look at the research, p.10.




  2) Violence and Aggression (Kirsh, 2006)


                                                                                 Violence                        repeatedly kicking
                                                                                                                 the leg to the point of
                                                                                                                 it breaking

                                                                               Aggression
                                                                                Violence
            kicking someone in
            the leg once
+ “While the Internet has certainly proved to be a valuable
   tool, there is, indeed a dark side.”
   in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55.




  3) types and instruments

                               •     the types of inflicted online violence

                               •     current instruments used for its practice
+                                                          LONDON – LSE
                                                            23.sept.2011
  Contribution for the
  definition of online
  violence in the context
  of a study with school    EU KIDS ONLINE                        >>
  children

                                      Teresa Sofia Castro | University of Minho | Portugal
                                      António J. Osório | University of Minho | Portugal
THANK YOU FOR YOUR ATTENTION!
              

More Related Content

Viewers also liked

Local Search - SES London 2011
Local Search - SES London 2011Local Search - SES London 2011
Local Search - SES London 2011Lisa Myers
 
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчасаОлег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса404fest
 
Markaların Logoları
Markaların LogolarıMarkaların Logoları
Markaların LogolarıYunus Emre
 
Host University And Advisor Ppt
Host University And Advisor PptHost University And Advisor Ppt
Host University And Advisor PptIREX
 
Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012Lisa Myers
 
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнесаДмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса404fest
 
C:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upC:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upAngele Champigny
 
Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Lisa Myers
 
Calendario Disegna Italia
Calendario Disegna ItaliaCalendario Disegna Italia
Calendario Disegna ItaliaItaloblog
 
8 steps to requirements success
8 steps to requirements success8 steps to requirements success
8 steps to requirements successSteve Orr
 
Host University And Advisor Ppt2
Host University And Advisor Ppt2Host University And Advisor Ppt2
Host University And Advisor Ppt2IREX
 
TRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finaleTRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finaleConetica
 

Viewers also liked (16)

Stackato v4
Stackato v4Stackato v4
Stackato v4
 
Local Search - SES London 2011
Local Search - SES London 2011Local Search - SES London 2011
Local Search - SES London 2011
 
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчасаОлег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
Олег Макаров – Как адаптировать интерфейс iOS приложения под Android за полчаса
 
Markaların Logoları
Markaların LogolarıMarkaların Logoları
Markaların Logoları
 
Host University And Advisor Ppt
Host University And Advisor PptHost University And Advisor Ppt
Host University And Advisor Ppt
 
Tour 2010 TECH SQUAD
Tour 2010 TECH SQUADTour 2010 TECH SQUAD
Tour 2010 TECH SQUAD
 
Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012Google Places - Global Approach ISS 2012
Google Places - Global Approach ISS 2012
 
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнесаДмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
Дмитрий Калаев – Три реальных провала при создании ИТ-бизнеса
 
C:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upC:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set up
 
Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012
 
What You Need to Know about Instagram
What You Need to Know about Instagram What You Need to Know about Instagram
What You Need to Know about Instagram
 
Com190 Mock Powerpoint
Com190 Mock PowerpointCom190 Mock Powerpoint
Com190 Mock Powerpoint
 
Calendario Disegna Italia
Calendario Disegna ItaliaCalendario Disegna Italia
Calendario Disegna Italia
 
8 steps to requirements success
8 steps to requirements success8 steps to requirements success
8 steps to requirements success
 
Host University And Advisor Ppt2
Host University And Advisor Ppt2Host University And Advisor Ppt2
Host University And Advisor Ppt2
 
TRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finaleTRI-CICLO pubblicazione finale
TRI-CICLO pubblicazione finale
 

More from Teresa Sofia Castro

Visual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen IdentitiesVisual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen IdentitiesTeresa Sofia Castro
 
Violência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das criançasViolência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das criançasTeresa Sofia Castro
 
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...Teresa Sofia Castro
 
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...Teresa Sofia Castro
 
“I love my bones!” Online violence involving children: Self-harm and danger...
“I love my bones!”  Online violence involving children:  Self-harm and danger...“I love my bones!”  Online violence involving children:  Self-harm and danger...
“I love my bones!” Online violence involving children: Self-harm and danger...Teresa Sofia Castro
 
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...Teresa Sofia Castro
 
internet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulaçãointernet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulaçãoTeresa Sofia Castro
 

More from Teresa Sofia Castro (12)

Visual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen IdentitiesVisual Stimulation: Shaping Teen Identities
Visual Stimulation: Shaping Teen Identities
 
Violência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das criançasViolência Online: perscrutando as experiências digitais das crianças
Violência Online: perscrutando as experiências digitais das crianças
 
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
‘‘I love my bones!’’ – self-harm and dangerous eating youth behaviours in Por...
 
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
QUANDO AS TECLAS FALAM, AS PALAVRAS CALAM – UTILIZAÇÃO DE TELEMÓVEL E MESS...
 
Psychnology journal 10_3_castro
Psychnology journal 10_3_castroPsychnology journal 10_3_castro
Psychnology journal 10_3_castro
 
“I love my bones!” Online violence involving children: Self-harm and danger...
“I love my bones!”  Online violence involving children:  Self-harm and danger...“I love my bones!”  Online violence involving children:  Self-harm and danger...
“I love my bones!” Online violence involving children: Self-harm and danger...
 
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
Perspetivas sobre o stress e desordens emocionais resultantes de contactos in...
 
internet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulaçãointernet, crianças, jovens e violência online: mediação e auto-regulação
internet, crianças, jovens e violência online: mediação e auto-regulação
 
Investing in Youth
Investing in YouthInvesting in Youth
Investing in Youth
 
Inpact 2012 presentation
Inpact 2012 presentationInpact 2012 presentation
Inpact 2012 presentation
 
Criminologia
Criminologia Criminologia
Criminologia
 
Chall11 Simsafety
Chall11 SimsafetyChall11 Simsafety
Chall11 Simsafety
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Ue kids online

  • 1. + LONDON – LSE 23.sept.2011 Contribution for the definition of online violence in the context of a study with school EU KIDS ONLINE >> children Teresa Sofia Castro | University of Minho | Portugal teresa.sofia.castro@gmail.com António J. Osório | University of Minho | Portugal
  • 2. + “Encountering risk does not necessarily result in an experience of harm” Cross-national comparison of risks and safety on the internet Initial analysis from the EU Kids Online survey of European children A suburban family is torn apart when fourteen-year-old Annie meets her first boyfriend online. After months of communicating via online chat and phone, Annie discovers her friend is not who he originally claimed to be. Shocked into disbelief, her parents are shattered by their daughter's actions and struggle to support her as she comes to terms with what has happened to her once innocent life.
  • 3. + “Most teenagers use the internet at home in the privacy of their own bedroom” Risks and safety on the internet: The perspective of European children Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries No face-to-face interaction No one can hide ICT skills Unpredictable proportions Identity management: anonymity vs. multiplicity Deindividuation Diversity of media Absence of barriers: geography, time, language Inhumane
  • 4. + “Among those children who ride a bicycle, a small percentage will have an accident” Risks and safety on the internet: The perspective of European children Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries hybrid and liquid universe of network the border between opportunity and threat fades new kind of violence  Thus, these are some beginning questions of our starting research:  What can we consider as online violence?  What proportions can violence gain in the virtual world?  What effects may have the disclosure of a compromising photo?  How do children protect themselves from online harm?  How to prepare parents, school and community for these challenges?
  • 5. + “Welcome to social cruelty, 21 st century style” in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55. First things first… 1) Extensive and detailed review on the state of the art around the concept of online violence • “lack of consistent terminology” (David-Ferdon & Hertz, 2009, para.24) • “the variety of terms used” (David-Ferdon & Hertz, 2007, S2) Internet aggression (Werner, Bumpus & Rock, 2010) Electronic violence (David-Ferdon & Hertz, 2009) Bullying online (Juvonen & Gross, 2008) Online Harassment (Wolak, Mitchell, & Finkelhor, 2007, Juvonen & Gross, 2008) Internet bullying (Williams & Guerra, 2007) Online bullying (Wolak, Mitchell, & Finkelhor, 2007) Electronic Bullying (Kowalski & Limber, 2007) Online aggression (Kowalski & Limber, 2007) Electronic aggression(David-Ferdon & Hertz, 2007) Internet harassment (Ybarra, West & Leaf, 2007; Ybarra, Espelage & Mitchell, 2007; Ybarra, Mitchell, Wolak, Finkelhor, 2006) Internet bullying and harassment (Worthen, 2007)
  • 6. + “The distinction between aggression and violence, however, is a subtle one” in Kirsh, Steven J. (2006) Children, Adolescents and Media Violence: A critical look at the research, p.10. 2) Violence and Aggression (Kirsh, 2006) Violence repeatedly kicking the leg to the point of it breaking Aggression Violence kicking someone in the leg once
  • 7. + “While the Internet has certainly proved to be a valuable tool, there is, indeed a dark side.” in Willard, N. (2006) Flame Retardant: Cyberbullies torment their victims 24/7. Here’s how to stop the abuse, p.55. 3) types and instruments • the types of inflicted online violence • current instruments used for its practice
  • 8. + LONDON – LSE 23.sept.2011 Contribution for the definition of online violence in the context of a study with school EU KIDS ONLINE >> children Teresa Sofia Castro | University of Minho | Portugal António J. Osório | University of Minho | Portugal THANK YOU FOR YOUR ATTENTION! 