SlideShare a Scribd company logo
1 of 11
Download to read offline
1 of 13
43. Do violent Videogames contribute to youth violence?
English Course
Teacher Claudia
Student Ana Chantal Belmont Del Valle
Thursday, May 5th, 2022.
Introduction.
The accelerated development of violent video
games, and their great popularity among the
new generations, make them an increasingly
worrying issue, which is not reduced to a specific
type of society or country, says Luis Alberto
Notario Barrera, master in Cultural Studies of the
Caribbean, Director of the magazine Cuba, and
he´s Author of the article video games and
violence.
Notes for reflection.
2 of 13
The aggressive behaviors in adolescents and youth people who frequently consume video
games where cruelty is appealed, are not an isolated event, addiction which causes in the
player the same symptoms that addicts to any type of drug suffer. That begins to be, in
most of the world, a generalized reality.
3 of 13
According to Notario Barrera, at least three percent of European teens between 12 and
18 years old suffer from addiction to the Internet or computer games, and its estimated
that in countries such as South Korea, Taiwan or China the figures are even higher. These
spend eight to ten hours a day in front of the screen and sixteen on weekends.
And also he said that the average age at which an American child starts in computer games
is six years, and at ten they begin to use those videogames designed for mobile phones.
4 of 13
In my opinion, the worrying thing is that these are not limited to showing a violent act
before a passive spectator, as a certain film or television program could do. But, given its
interactive nature, demands the player to identify with the character and act for him.
Also its playful character causes a certain distancing, which prevents users from
rationalizing the magnitude of the act they commit.
In addition, the Author said that the systematic use opens the possibility of settling a
vision of reality in which the other is always an enemy and must be eliminated. These
stereotypes of representation can affect a particular nation equally, but in particular case
in women. Who are generally shown as a victim unable to fend for themselves, or through
sexed body models with exaggerated voluptuousness.
5 of 13
I think that something similar happens with war games, which sometimes show war
situations and scenarios with real references. These have generated the addiction of
thousands of kids, teens and young people, who learn to assume it as fun or as a
means of solving conflicts.
Some experts even argue that they could be used to stimulate them to join the
American war machine.
6 of 13
At the end of the 70s Death Race appeared on the market, the first product to outrage
public opinion, because it consisted of running over as many "gremlins" as possible,
without hitting the crosses that were left on the road.
Then others such as Custer's Revenge, distributed by the Atari industry in 1983, which not
only included violent actions, but also had an explicitly sexual content.
7 of 13
It should be noted that, by the emergence of genres such as FPS (First Person Shooter),
and Role-playing, which places the player "in the skin" of the protagonist of the story.
Among the products developed from FPS technology are highly violent games like:
Doom, Manhunt, Postal, Carmageddon and the famous GTA (Grand Theft Auto).
In GTA the player, only for play and earn more money, can hit to death those he finds on
his way, and also the user wins some firearms. Which snatches to the bleeding and
lifeless victims.
8 of 13
Its important to mention that, according to the digital site on technology
http://www.neoteo.com In 2003 the Rockstar Company, producer of GTA, received a
lawsuit from an American family that had lost one of their members.
It turns out that two teens shot the victim from a car, imitating the modus operandi of the
main characters of this game. The teenagers were 14 and 16 years old, so from that
moment on GTA became a forbidden game for children.
9 of 13
Conclusion.
Associating violent behaviors only with the systematic practice of video games
significantly limits the analysis of the phenomenon, a comprehensive analysis it
should be consider taking into account that the influence by other elements such as
the family, the school and social context where the subjects develop.
10 of 13
Everyone, at some point in our daily lives, are exposed to films of violent content, and
not all of us commit robberies or murders. That depends on a number of factors, such as
the subject's personality, family environment and social conditions. Information from the
media, the internet and social networks are one more factor that can positively or
negatively influence the perspective of teens and youth.
11 of 13
The video games as technology at last, supposes a new learning of a whole of skills, from
the motor and cognitive areas, which obviously benefit the people.
Much of our daily life activities consist in new information technologies and video games
are an instrument that allows children, teens and young people connecting with them.
What we must pay attention to, is the time of use and the type of video games. Its the
responsibility of the family and the school, which must offer other possibilities and spaces
of creation so that the children and teens don’t become video addict.
MANY THANKS!!!

More Related Content

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Violent Videogames contribute to youth violence Chanty.pdf

  • 1. 1 of 13 43. Do violent Videogames contribute to youth violence? English Course Teacher Claudia Student Ana Chantal Belmont Del Valle Thursday, May 5th, 2022. Introduction. The accelerated development of violent video games, and their great popularity among the new generations, make them an increasingly worrying issue, which is not reduced to a specific type of society or country, says Luis Alberto Notario Barrera, master in Cultural Studies of the Caribbean, Director of the magazine Cuba, and he´s Author of the article video games and violence. Notes for reflection.
  • 2. 2 of 13 The aggressive behaviors in adolescents and youth people who frequently consume video games where cruelty is appealed, are not an isolated event, addiction which causes in the player the same symptoms that addicts to any type of drug suffer. That begins to be, in most of the world, a generalized reality.
  • 3. 3 of 13 According to Notario Barrera, at least three percent of European teens between 12 and 18 years old suffer from addiction to the Internet or computer games, and its estimated that in countries such as South Korea, Taiwan or China the figures are even higher. These spend eight to ten hours a day in front of the screen and sixteen on weekends. And also he said that the average age at which an American child starts in computer games is six years, and at ten they begin to use those videogames designed for mobile phones.
  • 4. 4 of 13 In my opinion, the worrying thing is that these are not limited to showing a violent act before a passive spectator, as a certain film or television program could do. But, given its interactive nature, demands the player to identify with the character and act for him. Also its playful character causes a certain distancing, which prevents users from rationalizing the magnitude of the act they commit. In addition, the Author said that the systematic use opens the possibility of settling a vision of reality in which the other is always an enemy and must be eliminated. These stereotypes of representation can affect a particular nation equally, but in particular case in women. Who are generally shown as a victim unable to fend for themselves, or through sexed body models with exaggerated voluptuousness.
  • 5. 5 of 13 I think that something similar happens with war games, which sometimes show war situations and scenarios with real references. These have generated the addiction of thousands of kids, teens and young people, who learn to assume it as fun or as a means of solving conflicts. Some experts even argue that they could be used to stimulate them to join the American war machine.
  • 6. 6 of 13 At the end of the 70s Death Race appeared on the market, the first product to outrage public opinion, because it consisted of running over as many "gremlins" as possible, without hitting the crosses that were left on the road. Then others such as Custer's Revenge, distributed by the Atari industry in 1983, which not only included violent actions, but also had an explicitly sexual content.
  • 7. 7 of 13 It should be noted that, by the emergence of genres such as FPS (First Person Shooter), and Role-playing, which places the player "in the skin" of the protagonist of the story. Among the products developed from FPS technology are highly violent games like: Doom, Manhunt, Postal, Carmageddon and the famous GTA (Grand Theft Auto). In GTA the player, only for play and earn more money, can hit to death those he finds on his way, and also the user wins some firearms. Which snatches to the bleeding and lifeless victims.
  • 8. 8 of 13 Its important to mention that, according to the digital site on technology http://www.neoteo.com In 2003 the Rockstar Company, producer of GTA, received a lawsuit from an American family that had lost one of their members. It turns out that two teens shot the victim from a car, imitating the modus operandi of the main characters of this game. The teenagers were 14 and 16 years old, so from that moment on GTA became a forbidden game for children.
  • 9. 9 of 13 Conclusion. Associating violent behaviors only with the systematic practice of video games significantly limits the analysis of the phenomenon, a comprehensive analysis it should be consider taking into account that the influence by other elements such as the family, the school and social context where the subjects develop.
  • 10. 10 of 13 Everyone, at some point in our daily lives, are exposed to films of violent content, and not all of us commit robberies or murders. That depends on a number of factors, such as the subject's personality, family environment and social conditions. Information from the media, the internet and social networks are one more factor that can positively or negatively influence the perspective of teens and youth.
  • 11. 11 of 13 The video games as technology at last, supposes a new learning of a whole of skills, from the motor and cognitive areas, which obviously benefit the people. Much of our daily life activities consist in new information technologies and video games are an instrument that allows children, teens and young people connecting with them. What we must pay attention to, is the time of use and the type of video games. Its the responsibility of the family and the school, which must offer other possibilities and spaces of creation so that the children and teens don’t become video addict. MANY THANKS!!!