The document discusses factors that predict teenagers' online and offline romantic encounters known as "on-off dating". A study of over 1,800 Romanian teenagers found that use of instant messaging, time spent online, and positive social self-concept were among the strongest predictors for both boys and girls engaging in on-off dating. However, factors like parental monitoring and exposure to sexually explicit content showed more ambiguous relationships to on-off dating behavior.
This document summarizes research on cyberbullying among adolescent victims. It finds that cyberbullying can lead to both positive and negative behavioral changes in victims. Positively, it can help them recognize aggressive people online. However, it can also result in lower self-esteem, loneliness, distrust of others, and in extreme cases self-harm. The study examines coping strategies used by victims, which include technical defenses, confronting the aggressor, avoidance, seeking social support, and defensive strategies. The effectiveness of different coping strategies remains unclear.
This document discusses two conceptual approaches - social compensation and rich-get-richer - that have been proposed to explain adolescent online risk-taking behaviors. It summarizes a study that examined which approach better predicts such behaviors using data from the Pew Internet Foundation. The study found that predictors of risk-taking included a lack of extracurricular activities, especially for boys, and infrequent socializing with friends in person, especially for girls. This supports the social compensation approach, which posits that those with less satisfying offline lives engage in more online risk as compensation. The document provides background on the approaches and outlines the study's methodology using the Pew Internet Foundation survey data to analyze relationships between adolescent characteristics and risk behaviors.
The document discusses the growing influence of Facebook on today's youth. It begins by reviewing literature on social networks and important facts about Facebook's growth up until 2011. The main objectives of the research are to study how Facebook has become important to students aged 17-24 and changed their communication patterns. Specifically, it aims to examine how much time youth spend on Facebook, what activities they use it for, and if advertisements influence them. The research will provide insight into Facebook's growing impact on youth.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
Debunking the oft-repeated assertion that young people don\’t care about privacy, new research shows that Web users between the ages of 18 and 24 are highly protective of certain information about themselves.
1) The document compares predictors of self-disclosure and privacy settings use between adolescents and adults on social network sites. It finds that adolescents disclose more personal information and have more lenient privacy settings than adults.
2) Several factors were found to affect disclosure and privacy settings, with some differences between adolescents and adults. Gender, age, frequency of use, motives for use, concerns about privacy and contacts, trust in others, and susceptibility to peer influence were investigated as predictors.
3) The study aims to provide better information for developing interventions to encourage appropriate privacy management tailored for different age groups on social network sites.
This document provides a summary of research on digital health and safety issues, particularly regarding social media use and cyberbullying among teens. Some key points:
- Teens are consuming more online information than ever before. Critical thinking skills are important for evaluating online content.
- Employers often review applicants' online profiles, and inappropriate content can negatively impact career opportunities.
- Anonymity online may breed irresponsibility, as seen on sites like Chatroulette where users can encounter unwanted contact.
- Research shows nearly half of teens have experienced harassment online, such as private messages or photos being shared without consent. However, most teens believe bullying occurs more offline.
- While online harassment is prevalent, the majority
The document discusses several ways that internet use can negatively impact adolescents. It argues that internet has contributed to a decline in education among adolescents by promoting the use of "chat language" in writing. It also asserts that internet reduces morality by giving easy access to pornography and normalizing behaviors like homosexuality. The document further claims that internet reduces thinking capacity by encouraging plagiarism and exam cheating as adolescents copy information directly from online sources without understanding it. It posits that internet use reduces face-to-face communication as adolescents rely more on online communication through social media on their phones.
This document summarizes research on cyberbullying among adolescent victims. It finds that cyberbullying can lead to both positive and negative behavioral changes in victims. Positively, it can help them recognize aggressive people online. However, it can also result in lower self-esteem, loneliness, distrust of others, and in extreme cases self-harm. The study examines coping strategies used by victims, which include technical defenses, confronting the aggressor, avoidance, seeking social support, and defensive strategies. The effectiveness of different coping strategies remains unclear.
This document discusses two conceptual approaches - social compensation and rich-get-richer - that have been proposed to explain adolescent online risk-taking behaviors. It summarizes a study that examined which approach better predicts such behaviors using data from the Pew Internet Foundation. The study found that predictors of risk-taking included a lack of extracurricular activities, especially for boys, and infrequent socializing with friends in person, especially for girls. This supports the social compensation approach, which posits that those with less satisfying offline lives engage in more online risk as compensation. The document provides background on the approaches and outlines the study's methodology using the Pew Internet Foundation survey data to analyze relationships between adolescent characteristics and risk behaviors.
The document discusses the growing influence of Facebook on today's youth. It begins by reviewing literature on social networks and important facts about Facebook's growth up until 2011. The main objectives of the research are to study how Facebook has become important to students aged 17-24 and changed their communication patterns. Specifically, it aims to examine how much time youth spend on Facebook, what activities they use it for, and if advertisements influence them. The research will provide insight into Facebook's growing impact on youth.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
Debunking the oft-repeated assertion that young people don\’t care about privacy, new research shows that Web users between the ages of 18 and 24 are highly protective of certain information about themselves.
1) The document compares predictors of self-disclosure and privacy settings use between adolescents and adults on social network sites. It finds that adolescents disclose more personal information and have more lenient privacy settings than adults.
2) Several factors were found to affect disclosure and privacy settings, with some differences between adolescents and adults. Gender, age, frequency of use, motives for use, concerns about privacy and contacts, trust in others, and susceptibility to peer influence were investigated as predictors.
3) The study aims to provide better information for developing interventions to encourage appropriate privacy management tailored for different age groups on social network sites.
This document provides a summary of research on digital health and safety issues, particularly regarding social media use and cyberbullying among teens. Some key points:
- Teens are consuming more online information than ever before. Critical thinking skills are important for evaluating online content.
- Employers often review applicants' online profiles, and inappropriate content can negatively impact career opportunities.
- Anonymity online may breed irresponsibility, as seen on sites like Chatroulette where users can encounter unwanted contact.
- Research shows nearly half of teens have experienced harassment online, such as private messages or photos being shared without consent. However, most teens believe bullying occurs more offline.
- While online harassment is prevalent, the majority
The document discusses several ways that internet use can negatively impact adolescents. It argues that internet has contributed to a decline in education among adolescents by promoting the use of "chat language" in writing. It also asserts that internet reduces morality by giving easy access to pornography and normalizing behaviors like homosexuality. The document further claims that internet reduces thinking capacity by encouraging plagiarism and exam cheating as adolescents copy information directly from online sources without understanding it. It posits that internet use reduces face-to-face communication as adolescents rely more on online communication through social media on their phones.
This document discusses the evolution of bullying to cyberbullying and provides an overview of the best methods for implementing a cyberbullying prevention program. It begins by explaining how bullying has changed with new technologies that allow bullying to occur online and anonymously. It then analyzes the effects of cyberbullying on victims and discusses how various countries are addressing the issue. Finally, it outlines strategies for preventing cyberbullying, such as educating students and parents about online safety and the importance of reporting incidents to authorities.
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
This study examined how narcissism and self-esteem are manifested on Facebook. 100 Facebook users completed questionnaires measuring narcissism and self-esteem. Their Facebook profiles were then coded for self-promotional content. Results found that individuals higher in narcissism and lower in self-esteem engaged in more Facebook activity and displayed more self-promotional content on their profiles. Gender differences also influenced the type of self-promotional content, with males higher in narcissism displaying more descriptive self-promotion and females displaying more superficial self-promotion through photos. The study provided initial evidence that personality traits are related to online self-presentation and behavior on social media.
Online and offline social networks --use of social networking sites by emergi...Leung Man Yin Daniel
Emerging adults often use social networking sites to connect and reconnect with friends and family from their offline lives. A study of college students' social networking site use found overlap between their online and offline social networks, though the overlap was imperfect. Students may use different online contexts like social media versus instant messaging to strengthen different aspects of offline relationships. The findings suggest online and offline social worlds are psychologically connected for emerging adults as they navigate relationships and identity development.
The document summarizes research on teens' online behaviors and experiences. Some key findings include:
- 32% of online teens reported contact with a complete stranger, but only 7% found it disturbing. Girls and those who posted photos were more likely to experience contact.
- 32% experienced some form of online bullying, like rumors or embarrassing photos posted without permission. Social network users faced higher risks.
- Exposure to inappropriate content was reported by 24% of parents, though teens often encountered it accidentally.
- Monitoring and rules varied among families, but most teens were aware of parental oversight online.
This document summarizes research on how technology has influenced human communication and encounters, particularly among youth. It discusses the evolution of communication technologies from newspapers to modern dating apps. Research shows that while technology enables connection, it may also strain relationships by reducing autonomy and face-to-face interaction. Interviews suggest that overuse of technology risks desensitizing intimacy and relationships for young people. The document examines these issues through analyzing smartphone usage, social media behaviors, privacy concerns, and how technology both facilitates casual sex and impacts human interaction more broadly.
The group is working on a project exploring relationships and how social media impacts romantic relationships. They are in the initial research phase gathering sources on the topic. Rebecca shares 5 academic sources she found in APA format. Emily shares 3 sources on online dating and extraversion. Jade had forwarded an article previously. They agree to each find 3 more sources by Friday and discuss further on Wednesday. Rebecca also provides a report on online dating in Canada as an additional resource.
The document summarizes research on cyberbullying among teens. It finds that between 10-33% of youth report being cyberbullied, though most cyberbullying occurs offline at school. While not more common than online harassment, cyberbullying can be highly distressing for the 14% of teens it affects each year. New technologies like cell phones have introduced new platforms for bullying behaviors, but the underlying impulses have not changed. More coordinated research is still needed to fully understand the issue.
This document summarizes a study on lying in virtual environments among Czech adolescents and young adults. The study examined how frequently lying occurs in different online environments, who is most often the recipient of lies, and common motivations for lying. Results were compared based on gender and three age groups: adolescents, emerging adults, and adults. Key findings include that younger respondents lied more frequently than older ones, and motivations for lying varied between age groups and genders. For example, adolescents of both genders were more likely to lie about age and appearance in chat rooms.
The document discusses a research project investigating how children are influenced by media consumed on the Internet. It will examine how easily accessible harmful/sexual content is online and how it may negatively impact children's social/psychological development and increase violent/sexual behaviors. The literature review discusses previous research finding links between media violence exposure and aggression in children, and how the Internet has made filtering content more difficult. The methodology will include textual analysis of online content, auto-ethnography, and interviews.
Workshop on the Aesthetics of Information EthicsPaolo Cirio
The document discusses an upcoming workshop hosted by artist Paolo Cirio focused on the aesthetics and ethics of information. The workshop will explore pressing issues related to privacy, algorithms, censorship, hacking, and more through hypothetical scenarios, debates, and discussions of Cirio's work and historical cases. Students will navigate complex ethical issues, provide feedback on shared documents, and discuss differing viewpoints. The goal is to spark inquiry and reflection on difficult questions regarding balancing freedoms, justice, and related issues in the digital age.
The document discusses research on how students actually use the internet for educational purposes more than assumed. A study of over 1,000 students found that 71% use social networking at least weekly, with 96% using it for social purposes, and they spend almost as much time online as watching TV. The internet is used for discussing schoolwork more than downloading music. While cyberbullying affects many teens, students are online for social and educational reasons more than assumed.
This document discusses cyberbullying among Estonian youth. It provides statistics showing that over 1/3 of students have experienced cyberbullying, with the most common forms being disrespect, insults, and physical threats. The document advocates for raising awareness of cyberbullying, supporting victims, investigating incidents, and strengthening relevant laws and policies. It also examines common misconceptions around youth online behaviors and argues for the importance of education over legislative overreaction in addressing this issue.
This document summarizes research on millennials' use of social media and their awareness of how it could impact future careers or education. The research found that most millennials were aware employers and schools may check their social media, and they carefully managed privacy settings and content. While initially assuming risqué content would be common, the researcher found most profiles were innocuous, with millennials learning social norms from both online and real-world communities. The study concluded millennials understand how to present themselves appropriately online for professional purposes.
Can Internet technology still revolutionize activism?Lebowitzcomics
The document discusses the effectiveness of Internet activism and whether it can truly revolutionize grassroots participation. While early predictions saw the Internet empowering individuals, e-mail petitions are now seen as flawed due to duplication and lack of commitment. Web-based petitions require more initiative but still see limited success. However, the Internet remains effective for mobilizing demonstrations and coordinating mass actions across large areas through easy distribution of event information. Some groups also utilize virtual sit-ins to flood and temporarily disable opponent websites, though such tactics remain controversial.
Cyberbullying has become a significant issue among college students with the rise of internet and social media use. The document examines the influence of cyberbullying behavior on the academic achievement of college students. Studies have found that 8-29% of college students report experiencing cyberbullying. Victims of cyberbullying exhibit negative effects like anxiety, depression, low self-esteem, and low academic achievement. The paper aims to further analyze the impact of cyberbullying on the academic performance of college-going students.
This proposal examines language use and identity management on Facebook through discourse analysis. The study will record Facebook interactions directly using screen recording software to analyze language in real time, including identity construction and repair. Both younger and older male and female participants will be recruited. Discourse analysis will be used to understand how participants discursively manage their identities and negotiate interactions through their language choices. Potential challenges around participant privacy during data collection will need to be addressed.
TRACK 9. A world of digital competences: mobile apps, e-citizenship and computacional systems as learning tools
Authors: Inés Ruiz Requies, Eduardo Fernandez Rodríguez, Jose Miguel Gutiérrez Pequeño and Rocío Anguita Martínez.
https://youtu.be/NrwIHD5pWic
Running head: FINAL PAPER 1
FINAL PAPER 11
Final Paper
Laura Dunkerson
South University Online
8/24/13
Cyber Bullying
Cyber bullying do your sources use one word or two for this term? Take another look. is one of the current social problems that have flourished with the advancement in technology because many people have access to technology today repetitive of “current”. The technology has gone to both good and bad hands. In bad hands, technology has been used to orchestrate various criminal activities. Among the criminal activities facilitated by the technology is cyber bullying. Various studies have been conducted on cyber bullying. This paper highlights some of the arguments in these studies. Despite being an activity that came with the advancement in technology, cyber bullying has rapidly spread in the society and can now affect anybody wherever he or she is if he or she is accessible to the internet. Thesis? What will the essay argue?
A research V conducted by a Harford County Examiner revealed that half the population of teenagers is word form victims of cyber bullying and only 10% of the victims take a step to report the matter to their parents. Among the cyber bullying incidents, less than 20% of the incidents get reported to the law enforcement agencies. Approximately 20% of teenagers have photos of them taken while in embarrassing situations. It further revealed that girls are V often involved in cyber bullying than boys. The study therefore indicates that cyber bullying is V common in teenagers than any other age group. It further shows how parents distance themselves towards monitoring what their teenage children do on the internet how does it show that? The evidence about from the source don’t show that. Therefore, it can be concluded that inadequate parental consent is a major contributor to the high trends of cyber bullying (Thaxter, 2010). The information in this paragraph doesn’t support this conclusion.
In regard to this, Thaxter (2010) researched and wrote a journal article titled “Cyber bullying: Challenges and strategies faced by juvenile police officers.” In this article, the author claims that juvenile police officers are expected by the government to ensure the full enforcement of laws and regulations related to cyber bullying in a school classroom setting. This makes the officers to be outstanding educational reserve this sentence doesn’t make sense. This move what move? by the police officers is centered towards the consequences of cyber bullying on the victims and also impacts that the school cyber bullying has on the behavior on the environment and ambiance at the school. A vital technique to link the differing levels of involvement in bullying is by calling attention to all stu ...
The document discusses a new approach to online safety called Online Safety 3.0. It argues that traditional fear-based approaches focusing only on risks are obsolete and irrelevant to youth. Online Safety 3.0 is research-based, respects youth agency, and aims to empower youth rather than view them only as potential victims. It focuses on both safety from harm and safety for full participation in online communities. The document advocates treating online safety as a whole-school responsibility and promoting digital citizenship and media literacy skills.
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxjoellemurphey
Running head: ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC
1
ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC
2Annotated Bibliography for Cyber BullyingDalal Amin
DeVry University
8/3/2014
Cyber bullying
Introduction
This paper is going to cover the annotated bibliography for cyber bullying. It is going to discuss on five journal articles covering cyber bullying. It will involve summarizing the work done by the authors of the different articles and also discussing their findings or conclusions briefly. Among the articles to be covered are Ongoing and online: Children and youth's perceptions of cyber bullying,Cyber bullying: Youngsters' Experiences and Parental Perception, Cyber Bullying: An Old Problem in a New Guise?,Students’ Perspectives on Cyber Bullying and Cyberbullying among Turkish Adolescents. The annotated bibliography is therefore as follows.
Faye M., Michael S., & Steven S. (2009).Ongoing and online: Children and youth's perceptions
of cyber bullying. Children and Youth Services Review. Vol.31 (12) December 2009,
Pages
1222–1228
The application of online technology is rapidly growing across the world. It is also rapidly becoming a preferred way of interacting. The authors in this article argue that while most of the online or web interactions are positive or neutral, the internet offers a new means through which youth and children are bullied. The authors therefore, did a grounded theory approach with the aim of exploring virtual relationships, technology, and cyber bullying from the students’ perspectives. The authors held seven focus groups with thirty eight students between 5th and 8th grades. The participants saw cyber bullying as a serious issue and some participants claimed that online bullying was more serious than conventional or traditional bullying due to the associated anonymity. Despite the fact that the students indicated anonymity as core to cyber bullying, the outcomes of this study suggest that much of the cyber bullying took place within the context of the students’ relationships and social groups. The outcomes revealed 5 main themes. These are telling adults, types of cyber bullying, factors affecting cyber bullying, views and definitions of cyber bullying and technology being embraced at younger ages and being the main medium for communication. The outcomes bring out the complexity of the anonymity offered by the internet and the way this may affect cyber bullying.
Francine D., Catherine B., & Trijntje V. (2008). Cyber bullying: Youngsters' Experiences and
Parental Perception. CyberPsychology & Behavior. April 2008, 11(2): 217-223.
doi:10.1089/cpb.2007.0008
The authors of this article discuss a study on the nature and prevalence of cyber bullying by and of youngsters as well as the parental perceptions. The survey was done using two questionnaires. One of the questionnaires was for the parents and the other for their youngsters. They were administered to 1,211 primary school pupils in their final y ...
This document discusses the evolution of bullying to cyberbullying and provides an overview of the best methods for implementing a cyberbullying prevention program. It begins by explaining how bullying has changed with new technologies that allow bullying to occur online and anonymously. It then analyzes the effects of cyberbullying on victims and discusses how various countries are addressing the issue. Finally, it outlines strategies for preventing cyberbullying, such as educating students and parents about online safety and the importance of reporting incidents to authorities.
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
This study examined how narcissism and self-esteem are manifested on Facebook. 100 Facebook users completed questionnaires measuring narcissism and self-esteem. Their Facebook profiles were then coded for self-promotional content. Results found that individuals higher in narcissism and lower in self-esteem engaged in more Facebook activity and displayed more self-promotional content on their profiles. Gender differences also influenced the type of self-promotional content, with males higher in narcissism displaying more descriptive self-promotion and females displaying more superficial self-promotion through photos. The study provided initial evidence that personality traits are related to online self-presentation and behavior on social media.
Online and offline social networks --use of social networking sites by emergi...Leung Man Yin Daniel
Emerging adults often use social networking sites to connect and reconnect with friends and family from their offline lives. A study of college students' social networking site use found overlap between their online and offline social networks, though the overlap was imperfect. Students may use different online contexts like social media versus instant messaging to strengthen different aspects of offline relationships. The findings suggest online and offline social worlds are psychologically connected for emerging adults as they navigate relationships and identity development.
The document summarizes research on teens' online behaviors and experiences. Some key findings include:
- 32% of online teens reported contact with a complete stranger, but only 7% found it disturbing. Girls and those who posted photos were more likely to experience contact.
- 32% experienced some form of online bullying, like rumors or embarrassing photos posted without permission. Social network users faced higher risks.
- Exposure to inappropriate content was reported by 24% of parents, though teens often encountered it accidentally.
- Monitoring and rules varied among families, but most teens were aware of parental oversight online.
This document summarizes research on how technology has influenced human communication and encounters, particularly among youth. It discusses the evolution of communication technologies from newspapers to modern dating apps. Research shows that while technology enables connection, it may also strain relationships by reducing autonomy and face-to-face interaction. Interviews suggest that overuse of technology risks desensitizing intimacy and relationships for young people. The document examines these issues through analyzing smartphone usage, social media behaviors, privacy concerns, and how technology both facilitates casual sex and impacts human interaction more broadly.
The group is working on a project exploring relationships and how social media impacts romantic relationships. They are in the initial research phase gathering sources on the topic. Rebecca shares 5 academic sources she found in APA format. Emily shares 3 sources on online dating and extraversion. Jade had forwarded an article previously. They agree to each find 3 more sources by Friday and discuss further on Wednesday. Rebecca also provides a report on online dating in Canada as an additional resource.
The document summarizes research on cyberbullying among teens. It finds that between 10-33% of youth report being cyberbullied, though most cyberbullying occurs offline at school. While not more common than online harassment, cyberbullying can be highly distressing for the 14% of teens it affects each year. New technologies like cell phones have introduced new platforms for bullying behaviors, but the underlying impulses have not changed. More coordinated research is still needed to fully understand the issue.
This document summarizes a study on lying in virtual environments among Czech adolescents and young adults. The study examined how frequently lying occurs in different online environments, who is most often the recipient of lies, and common motivations for lying. Results were compared based on gender and three age groups: adolescents, emerging adults, and adults. Key findings include that younger respondents lied more frequently than older ones, and motivations for lying varied between age groups and genders. For example, adolescents of both genders were more likely to lie about age and appearance in chat rooms.
The document discusses a research project investigating how children are influenced by media consumed on the Internet. It will examine how easily accessible harmful/sexual content is online and how it may negatively impact children's social/psychological development and increase violent/sexual behaviors. The literature review discusses previous research finding links between media violence exposure and aggression in children, and how the Internet has made filtering content more difficult. The methodology will include textual analysis of online content, auto-ethnography, and interviews.
Workshop on the Aesthetics of Information EthicsPaolo Cirio
The document discusses an upcoming workshop hosted by artist Paolo Cirio focused on the aesthetics and ethics of information. The workshop will explore pressing issues related to privacy, algorithms, censorship, hacking, and more through hypothetical scenarios, debates, and discussions of Cirio's work and historical cases. Students will navigate complex ethical issues, provide feedback on shared documents, and discuss differing viewpoints. The goal is to spark inquiry and reflection on difficult questions regarding balancing freedoms, justice, and related issues in the digital age.
The document discusses research on how students actually use the internet for educational purposes more than assumed. A study of over 1,000 students found that 71% use social networking at least weekly, with 96% using it for social purposes, and they spend almost as much time online as watching TV. The internet is used for discussing schoolwork more than downloading music. While cyberbullying affects many teens, students are online for social and educational reasons more than assumed.
This document discusses cyberbullying among Estonian youth. It provides statistics showing that over 1/3 of students have experienced cyberbullying, with the most common forms being disrespect, insults, and physical threats. The document advocates for raising awareness of cyberbullying, supporting victims, investigating incidents, and strengthening relevant laws and policies. It also examines common misconceptions around youth online behaviors and argues for the importance of education over legislative overreaction in addressing this issue.
This document summarizes research on millennials' use of social media and their awareness of how it could impact future careers or education. The research found that most millennials were aware employers and schools may check their social media, and they carefully managed privacy settings and content. While initially assuming risqué content would be common, the researcher found most profiles were innocuous, with millennials learning social norms from both online and real-world communities. The study concluded millennials understand how to present themselves appropriately online for professional purposes.
Can Internet technology still revolutionize activism?Lebowitzcomics
The document discusses the effectiveness of Internet activism and whether it can truly revolutionize grassroots participation. While early predictions saw the Internet empowering individuals, e-mail petitions are now seen as flawed due to duplication and lack of commitment. Web-based petitions require more initiative but still see limited success. However, the Internet remains effective for mobilizing demonstrations and coordinating mass actions across large areas through easy distribution of event information. Some groups also utilize virtual sit-ins to flood and temporarily disable opponent websites, though such tactics remain controversial.
Cyberbullying has become a significant issue among college students with the rise of internet and social media use. The document examines the influence of cyberbullying behavior on the academic achievement of college students. Studies have found that 8-29% of college students report experiencing cyberbullying. Victims of cyberbullying exhibit negative effects like anxiety, depression, low self-esteem, and low academic achievement. The paper aims to further analyze the impact of cyberbullying on the academic performance of college-going students.
This proposal examines language use and identity management on Facebook through discourse analysis. The study will record Facebook interactions directly using screen recording software to analyze language in real time, including identity construction and repair. Both younger and older male and female participants will be recruited. Discourse analysis will be used to understand how participants discursively manage their identities and negotiate interactions through their language choices. Potential challenges around participant privacy during data collection will need to be addressed.
TRACK 9. A world of digital competences: mobile apps, e-citizenship and computacional systems as learning tools
Authors: Inés Ruiz Requies, Eduardo Fernandez Rodríguez, Jose Miguel Gutiérrez Pequeño and Rocío Anguita Martínez.
https://youtu.be/NrwIHD5pWic
Running head: FINAL PAPER 1
FINAL PAPER 11
Final Paper
Laura Dunkerson
South University Online
8/24/13
Cyber Bullying
Cyber bullying do your sources use one word or two for this term? Take another look. is one of the current social problems that have flourished with the advancement in technology because many people have access to technology today repetitive of “current”. The technology has gone to both good and bad hands. In bad hands, technology has been used to orchestrate various criminal activities. Among the criminal activities facilitated by the technology is cyber bullying. Various studies have been conducted on cyber bullying. This paper highlights some of the arguments in these studies. Despite being an activity that came with the advancement in technology, cyber bullying has rapidly spread in the society and can now affect anybody wherever he or she is if he or she is accessible to the internet. Thesis? What will the essay argue?
A research V conducted by a Harford County Examiner revealed that half the population of teenagers is word form victims of cyber bullying and only 10% of the victims take a step to report the matter to their parents. Among the cyber bullying incidents, less than 20% of the incidents get reported to the law enforcement agencies. Approximately 20% of teenagers have photos of them taken while in embarrassing situations. It further revealed that girls are V often involved in cyber bullying than boys. The study therefore indicates that cyber bullying is V common in teenagers than any other age group. It further shows how parents distance themselves towards monitoring what their teenage children do on the internet how does it show that? The evidence about from the source don’t show that. Therefore, it can be concluded that inadequate parental consent is a major contributor to the high trends of cyber bullying (Thaxter, 2010). The information in this paragraph doesn’t support this conclusion.
In regard to this, Thaxter (2010) researched and wrote a journal article titled “Cyber bullying: Challenges and strategies faced by juvenile police officers.” In this article, the author claims that juvenile police officers are expected by the government to ensure the full enforcement of laws and regulations related to cyber bullying in a school classroom setting. This makes the officers to be outstanding educational reserve this sentence doesn’t make sense. This move what move? by the police officers is centered towards the consequences of cyber bullying on the victims and also impacts that the school cyber bullying has on the behavior on the environment and ambiance at the school. A vital technique to link the differing levels of involvement in bullying is by calling attention to all stu ...
The document discusses a new approach to online safety called Online Safety 3.0. It argues that traditional fear-based approaches focusing only on risks are obsolete and irrelevant to youth. Online Safety 3.0 is research-based, respects youth agency, and aims to empower youth rather than view them only as potential victims. It focuses on both safety from harm and safety for full participation in online communities. The document advocates treating online safety as a whole-school responsibility and promoting digital citizenship and media literacy skills.
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxjoellemurphey
Running head: ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC
1
ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC
2Annotated Bibliography for Cyber BullyingDalal Amin
DeVry University
8/3/2014
Cyber bullying
Introduction
This paper is going to cover the annotated bibliography for cyber bullying. It is going to discuss on five journal articles covering cyber bullying. It will involve summarizing the work done by the authors of the different articles and also discussing their findings or conclusions briefly. Among the articles to be covered are Ongoing and online: Children and youth's perceptions of cyber bullying,Cyber bullying: Youngsters' Experiences and Parental Perception, Cyber Bullying: An Old Problem in a New Guise?,Students’ Perspectives on Cyber Bullying and Cyberbullying among Turkish Adolescents. The annotated bibliography is therefore as follows.
Faye M., Michael S., & Steven S. (2009).Ongoing and online: Children and youth's perceptions
of cyber bullying. Children and Youth Services Review. Vol.31 (12) December 2009,
Pages
1222–1228
The application of online technology is rapidly growing across the world. It is also rapidly becoming a preferred way of interacting. The authors in this article argue that while most of the online or web interactions are positive or neutral, the internet offers a new means through which youth and children are bullied. The authors therefore, did a grounded theory approach with the aim of exploring virtual relationships, technology, and cyber bullying from the students’ perspectives. The authors held seven focus groups with thirty eight students between 5th and 8th grades. The participants saw cyber bullying as a serious issue and some participants claimed that online bullying was more serious than conventional or traditional bullying due to the associated anonymity. Despite the fact that the students indicated anonymity as core to cyber bullying, the outcomes of this study suggest that much of the cyber bullying took place within the context of the students’ relationships and social groups. The outcomes revealed 5 main themes. These are telling adults, types of cyber bullying, factors affecting cyber bullying, views and definitions of cyber bullying and technology being embraced at younger ages and being the main medium for communication. The outcomes bring out the complexity of the anonymity offered by the internet and the way this may affect cyber bullying.
Francine D., Catherine B., & Trijntje V. (2008). Cyber bullying: Youngsters' Experiences and
Parental Perception. CyberPsychology & Behavior. April 2008, 11(2): 217-223.
doi:10.1089/cpb.2007.0008
The authors of this article discuss a study on the nature and prevalence of cyber bullying by and of youngsters as well as the parental perceptions. The survey was done using two questionnaires. One of the questionnaires was for the parents and the other for their youngsters. They were administered to 1,211 primary school pupils in their final y ...
Authors: Philip E. Banyard, Jean Underwood
There are concerns that the Internet has created new risks for our society and in particular for young people. We argue that the way we frame these risks is affected by the way we view young people, in particular their maturity and ability to make choices for themselves.
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16VannaSchrader3
This research proposal aims to study bullying among African American youth ages 11-14. It will examine the origins of bullying, how it has evolved in the last decade with cyberbullying, and ways to prevent bullying. The study will use questionnaires and interviews of African American youth, their parents, and a control group of white youth to understand their experiences with traditional and cyberbullying and suggestions to address the problem. The research methods, participants, timeline, and responsibilities are outlined to comprehensively address the factors that trigger bullying among this group and how to stop it.
While youth internet use has increased, rates of child abuse and bullying have generally decreased over time. Research shows that online risks reflect real-life dynamics and are better predicted by a child's environment than any single technology. Effective online safety involves addressing the full social context rather than focusing only on rules or devices.
The document discusses the evolution of online safety approaches from the early focus on crime and adult content (1.0), to including peer harm (2.0), to the current need for a new approach (3.0) that empowers and protects youth. It outlines key aspects of youth online behavior and risks, noting that most experiences are positive and risks have decreased over time. The new 3.0 approach proposes comprehensive digital citizenship education and a whole-community response to issues like cyberbullying.
International Forum of Educational Technology & SocietyMid.docxLaticiaGrissomzz
International Forum of Educational Technology & Society
Middle School Students’ Social Media Use
Author(s): Florence Martin, Chuang Wang, Teresa Petty, Weichao Wang and Patti Wilkins
Source: Journal of Educational Technology & Society , Vol. 21, No. 1 (January 2018), pp.
213-224
Published by: International Forum of Educational Technology & Society
Stable URL: https://www.jstor.org/stable/10.2307/26273881
REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-
reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
International Forum of Educational Technology & Society is collaborating with JSTOR to digitize,
preserve and extend access to Journal of Educational Technology & Society
This content downloaded from
������������130.160.24.117 on Mon, 26 Aug 2019 01:28:12 UTC�������������
All use subject to https://about.jstor.org/terms
https://www.jstor.org/stable/10.2307/26273881
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-reference#references_tab_contents
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-reference#references_tab_contents
Martin, F., Wang, C., Petty, T., Wang, W., & Wilkins, P. (2018). Middle School Students’ Social Media Use. Educational
Technology & Society, 21 (1), 213–224.
213
ISSN 1436-4522 (online) and 1176-3647 (print). This article of the Journal of Educational Technology & Society is available under Creative Commons CC-BY-ND-NC
3.0 license (https://creativecommons.org/licenses/by-nc-nd/3.0/). For further queries, please contact Journal Editors at [email protected]
Middle School Students’ Social Media Use
Florence Martin*, Chuang Wang, Teresa Petty, Weichao Wang and Patti Wilkins
University of North Carolina Charlotte, Charlotte, NC, USA // [email protected] //
[email protected] // [email protected] // [email protected] // [email protected]
*Corresponding author
ABSTRACT
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics
that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and
“bring your own technology” initiatives, attention to these topics is becoming increasingly important. A
total of 593 middle school students were surveyed about digital footprints and concerns about social media.
The results show that 17% started using social media at age nine or yo.
This systematic review examines the relationship between social media use and depressive symptoms in children and adolescents. Eleven studies with a total sample of 12,646 young people were included. The analysis found a small but statistically significant correlation between greater social media use and higher rates of depressive symptoms. However, the studies varied widely in methods, sample sizes, and results, so the clinical significance of this relationship remains unclear. Over half the studies were cross-sectional, and longitudinal studies were of limited duration. Further research is needed using consistent variables and measurements.
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTSAJHSSR Journal
ABSTRACT:This paper explores the cyberbullying experiences among Criminology students at the
University of Mindanao. A simple random sampling method was used to distribute the study's online
questionnaire to the respondents and to survey the target population. This study has four hundred (400)
respondents, and the respondents are Criminology students at the University of Mindanao. The findings of this
study revealed that the level of cyberbullying experiences is sometimes manifested. On the other hand, the
cyberbullying experiences of the students indicate a moderate level, which indicates that the cyberbullying
experiences of the respondents are sometimes manifested. Also, the computations showed that among the
indicators presented, the highest mean is obtained in the psychological effect, which implies that there is a
significant effect of cyberbullying experiences of the respondents in terms of the Gender level of the
respondents. Therefore, respondents with a low level of cyberbullying experiences tend to have a moderate level
of cyberbullying experience. However, there is no significant effect in terms of age and year level of the
respondents according to the results regarding the psychological, emotional, and physical impact of
cyberbullying.
KEYWORDS :cyberbullying, emotional, experiences, psychological,physical effect, and simple random
sampling method.
Social networks provide opportunities for both benefits and risks. The benefits include maintaining social connections, emotional support, meeting new people, job searching, and online education. However, social networks can also enable harassment, over-exposure to inappropriate content, and risky online behavior. Additionally, a lack of nonverbal cues may decrease empathy. While social networks make some issues more visible, the root problems are often long-standing societal issues, not technology itself. Overall social networks reflect both the good and bad aspects of human social interaction.
While this weeks topic highlighted the uncertainty of Big Data, th.docxharold7fisher61282
While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research. Pick one of the following for your Research paper.:
· Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
· The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
· New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
· More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
· Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.
Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the required cover page and reference page.
• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. The UC Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
ORIGINAL ARTICLE
Meanings of Bodily and Sexual Expression in Youth Sexting Culture:
Young Women’s Negotiation of Gendered Risks and Harms
Emily Setty1
Published online: 31 August 2018
# Springer Science+Business Media, LLC, part of Springer Nature 2018
Abstract
The present paper explores how young people construct gendered social meanings and cultural norms surrounding sexual and
bodily expression in youth sexting culture. Previous research suggests youth sexting is a gendered phenomenon in which young
men are able to seek social capital through sexting, whereas young women are subject to social shaming and harassment.
Drawing upon findings from group and one-to-one interviews with 41 young people aged 14–18, I show how constructs of risk,
shame, and responsibility operated along gendered lines. Young people attributed agency and legitimacy to young men’s sexual
practices, whereas young women were disempowered, denied legitimacy, and tasked with managing gendered risks of harm in
youth sexting culture. I discuss how young women negotiated and navigated risk and shame and, in some instances, made space
for safe, pleasurable sexting experiences despite and within these narratives. The accounts of two young women, who shared
experiences sexting and social shaming, are presented to show some of the ways young women make sense of social meani.
Almalki1 Yousef Almalki Kathy Lowley English 20.docxgalerussel59292
Almalki1
Yousef Almalki
Kathy Lowley
English 201-08
10/20/2015
Teenagers and Texting Effects
If you go around and ask teenagers how many times do you usually text in day, I bet that
the majority of the young people will say that they use it every time a day. According to Mark,
among the 88 percent of teen cell users who text, three in 10 of them send 100 or more messages
per day. Using cell phone are really important in a modern society and it helps the parents to
keep in touch with their kids and even know where they are by using the GPS apps. However,
there are some side effects that influence teenagers; it does not give attention to the people
around them “accident”, and it leads to sexting, accident’s, bullying..etc.
Texting and not being aware of what going around it is one of biggest problems in
today’s society. Many teenagers’ text and drive or walk in streets or cheching messages while
they are in streets or driving their cars. “For teenage drivers (or anyone, really), texting while
driving is a bad idea. Texting while walking may not be much safer. A new study from Safe Kids
Worldwide (PDF), a Washington (D.C.)-based nonprofit, found that 40 percent of teens say
they’ve been hit or nearly hit by a car, bike, or motorcycle while walking. The primary culprit:
distraction from a mobile device.” Alyssa Abkowitz. Teenagers themselves don't appear to see
the association between focusing and staying safe. At the point when requested that whether it's
typical cross the road with messaging or chatting on the telephone, 63 percent of teenagers
who've been hit or just about hit said yes, contrasted and not as much as half of youngsters who
http://www.safekids.org/sites/default/files/documents/ResearchReports/skw_pedestrian_study_2014_final.pdf
http://www.safekids.org/sites/default/files/documents/ResearchReports/skw_pedestrian_study_2014_final.pdf
http://www.businessweek.com/authors/55041-alyssa-abkowitz
Almalki2
hadn't been hit. What's more, because of inquiries regarding what happened when the teenagers
were hit or about hit, just 13 percent said they didn't look both ways; 24 percent said the driver
was going too quick; 10 percent said the driver wasn't focusing. Another article about how
messaging is connected with unfavorable wellbeing impacts including musculoskeletal issue, rest
aggravations, and car accidents. Numerous studies have depended on self-reported messaging
recurrence, yet the legitimacy of self-reports is obscure. Our goal was to give a percentage of the
first information on the legitimacy of self-reported messaging recurrence, phone qualities
including data gadget (e.g. touchscreen), key design (e.g., QWERTY), and messaging styles
including telephone introduction (e.g., even) and hands holding the telephone while messaging.
Judith E and others said
Internet and American Life Project, 97% of young adult cell phone users, ages 18 to 24,
engage in t.
The document discusses the evolution of online safety approaches from the early Web 1.0 era focused on crime and adult content (Online Safety 1.0) to the current era of user-generated content on social media (Online Safety 3.0). It advocates for an approach that is research-based rather than fear-based, respects youth agency, and focuses on empowering youth rather than just protecting them from harm. Key aspects of the proposed Online Safety 3.0 approach include being flexible rather than one-size-fits-all, and focusing on media literacy, prevention tailored to risks like bullying or sexting, and intervention for youth already experiencing issues.
Oren Golan Friendship Over The Net Ph D Abstract Engongolan
This document provides an abstract for a study on friendship among Israeli youth in computer-mediated communication. It discusses three main points:
1. How online relationships are modified among youth and how virtual friendships affect youth in Israel.
2. How youth create new symbolism, construct trust relations, and engage in entrepreneurship online.
3. How information and communication technologies impact contemporary youth cultures and profiles of "digital youth".
This document discusses the dangers that children face from unsupervised internet use, such as cyberbullying, inappropriate content, and online scams. It provides statistics on cyberbullying in the US, such as 9% of students experiencing cyberbullying. The document also compares two articles on how parents can prevent cyberbullying and provides tips for helping children experiencing cyberbullying by noticing changes, talking to them, documenting incidents, and reporting issues to schools or authorities.
This is a presentation I gave about my PhD topic at the North West Gender Conference. It is about the role of gender in 'youth sexting' - young people creating and sharing sexual images of themselves via technology. I discuss background info and the direction of my research.
22Reported data versus the unknown data within sexual exploi.docxdomenicacullison
2
2
Reported data versus the unknown data within sexual exploitation of children
Sexual exploitation of children is a form of sexual abuse whereby a child is given money, gifts, among others, in exchange for doing sexual activities. In this case, the children are misled into thinking they are in a consensual and loving relationship and hence may end up trusting their abuser and thus not understand that they are being abused. The issue of sexual exploitation has gained much attention especially with the evolution of the internet which has elevated child trafficking across the globe. However, the true scale of the issue is unknown. This is because centralized data is lacking and also reporting bodies are inadequate. This is further contributed by the culture of shame, stigma, and silence, and also the expansion of information technology all of which are risk factors for the issue. Hence the relevance of the research topic is to assess the available resources regarding the issue to understand the scale of the problem.
Boyd, D., & Mitchell, K. J. (2014). “Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement”.
In this article, Boyd & Mitchell (2014), conducted an exploratory study to evaluate how technology could be utilized in investigating child trafficking. According to the authors, commercial sexual exploitation of children, also known as child sex trafficking constitute a wide context of sexual victimization because, in addition to the victims being sexually assaulted and abused, they are treated as commodities and used for economic and financial gain. It is now obvious that many types of social activities involve the use of technology. However, criminal and child protection investigators are always struggling to use technology effectively to assess the underlying issues. Also, empirical research on the issue is almost non-existence, and hence media stories and legal reports offer guidance on summaries of case characteristics and the use of technology in such cases. The use of technology to investigate the issue is seen to offer both benefits and drawbacks. The drawbacks lean more towards the offender which includes giving them more opportunity to widen their activities. Hence, the investigators instead feel overwhelmed to deal with what they do not have control over and hence turn to analog means. This, in turn, contributes to the lack of data for research on the issue.
Franchino-Olsen, H. (2019). “Vulnerabilities relevant for commercial sexual exploitation of children/domestic minor sex trafficking: A systematic review of risk factors. Trauma, Violence, & Abuse, 1524838018821956”.
In this article, Franchino-Olsen (2019) conducted a review of the reviewed publications to identify the risk factors for commercial sexual exploitation for children. According to the author, the issue has become widespread across the United States, violating the health and the rights of many .
El documento proporciona instrucciones para instalar Odoo, un sistema de gestión de relaciones con clientes (CRM), en un servidor Debian. Estas incluyen (1) actualizar el sistema operativo, (2) crear un usuario Odoo, (3) instalar y configurar PostgreSQL, (4) descargar e instalar Odoo, (5) configurar Odoo para ejecutarse al inicio del sistema.
Este documento presenta una introducción a las funciones básicas de PostgreSQL, incluyendo la autenticación de usuarios, la administración de usuarios y grupos, y los tipos de datos soportados. Explica cómo crear y modificar usuarios y grupos mediante comandos SQL como CREATE USER y ALTER USER, así como mediante el programa createuser. También cubre la eliminación de usuarios y grupos, y describe los diferentes tipos de datos como numéricos, cadenas y fechas.
Estudio exploratorio de las necesidades del departamento de Canindeyú a diciembre del 2013, en los ejes: económico, social, político, institucional y de infraestructura.
Este documento presenta el plan de acción a corto y mediano plazo de la coordinación de investigación del Departamento de Investigación de la Facultad de Ciencias Contables y Administrativas de la Universidad Católica “Nuestra Señora de la Asunción”. El plan incluye la formación continua de docentes, un programa de iniciación a la investigación, la vinculación a la comunidad científica, y el estímulo a la participación en programas de investigación. El objetivo final es contar con un equipo capacitado en investigación compuesto
Este documento describe las aplicaciones de las tecnologías de la información y la comunicación (TIC) en la psicología, incluyendo la educación continua, la investigación y la práctica profesional. Se enfoca en el uso de cursos en línea, bases de datos, herramientas de investigación y evaluación digital para mejorar la educación, la investigación y el diagnóstico y tratamiento de pacientes. También cubre temas como la realidad virtual, aumentada y la telepsicología.
El documento describe la técnica de los mapas mentales como una herramienta para organizar y estructurar ideas. Los mapas mentales permiten relacionar conceptos clave de manera gráfica mediante líneas y ramas, activando ambos hemisferios cerebrales y facilitando la creatividad, retención y comunicación de la información. El proceso de crear un mapa mental implica identificar una idea central y generar asociaciones radiales de otras ideas conectadas de manera no lineal.
El documento compara y contrasta las relaciones entre la psicología y la informática. Explora cómo estas disciplinas comparten intereses como la ciencia cognitiva y la ergonomía, pero también se diferencian en sus enfoques y objetivos. Por ejemplo, la psicología estudia procesos mentales como la percepción y el razonamiento, mientras que la informática se enfoca en el procesamiento de la información y el desarrollo de software y hardware. El documento también discute los efectos positivos y negativos de la tecnología en áreas como la educ
The role of structural characteristics in problem video game playingMarcelo Pesallaccia
This document provides a review of the literature on structural features of video games and their potential role in excessive video game playing. It discusses how features like variable ratio schedules of reinforcement, concurrent tasks, and grinding behaviors may influence player involvement, even when not enjoyable. However, more research is still needed to better understand how specific game features impact normal versus problem players. The review calls for future studies using experimental and longitudinal methods to assess key features and identify what problem players seek from games.
The document discusses different methods for measuring cyberbullying and traditional bullying among students. It compares using a global survey item versus specific behavior items, and applying lenient versus strict cut-off scores to identify bullies. The study aimed to see how prevalence rates differed based on these measurement methods. 1150 students aged 10-15 completed online surveys about bullying and cyberbullying behaviors. More students were identified as occasional or frequent cyberbullies when using specific behavior items compared to a global item. Applying a strict versus lenient cut-off score also impacted prevalence rates. Irrespective of measurement method, students identified as both traditional and cyberbullies exhibited higher levels of aggression.
Relationships between facebook intensity self esteem and personalityMarcelo Pesallaccia
1) The study examined relationships between Facebook use, friendship-contingent self-esteem, personality, and narcissism in 200 U.S. college students.
2) It found that students who strongly tied their self-esteem to the quality of their friendships were more active Facebook users, supporting the hypothesis.
3) No significant relationships were found between Facebook use and personality or narcissism. The results suggest Facebook allows students to maintain social connections that are important for friendship-contingent self-esteem.
- The document discusses a study that tested how social attraction on Facebook influences self-disclosure, predictability, and trust between users. It found that Facebook users are more likely to disclose personal information to those they feel socially attracted to and find more predictable. Increased disclosure and predictability led to greater feelings of trust. The study supports theories of relationship development like Uncertainty Reduction Theory.
Cell Therapy Expansion and Challenges in Autoimmune DiseaseHealth Advances
There is increasing confidence that cell therapies will soon play a role in the treatment of autoimmune disorders, but the extent of this impact remains to be seen. Early readouts on autologous CAR-Ts in lupus are encouraging, but manufacturing and cost limitations are likely to restrict access to highly refractory patients. Allogeneic CAR-Ts have the potential to broaden access to earlier lines of treatment due to their inherent cost benefits, however they will need to demonstrate comparable or improved efficacy to established modalities.
In addition to infrastructure and capacity constraints, CAR-Ts face a very different risk-benefit dynamic in autoimmune compared to oncology, highlighting the need for tolerable therapies with low adverse event risk. CAR-NK and Treg-based therapies are also being developed in certain autoimmune disorders and may demonstrate favorable safety profiles. Several novel non-cell therapies such as bispecific antibodies, nanobodies, and RNAi drugs, may also offer future alternative competitive solutions with variable value propositions.
Widespread adoption of cell therapies will not only require strong efficacy and safety data, but also adapted pricing and access strategies. At oncology-based price points, CAR-Ts are unlikely to achieve broad market access in autoimmune disorders, with eligible patient populations that are potentially orders of magnitude greater than the number of currently addressable cancer patients. Developers have made strides towards reducing cell therapy COGS while improving manufacturing efficiency, but payors will inevitably restrict access until more sustainable pricing is achieved.
Despite these headwinds, industry leaders and investors remain confident that cell therapies are poised to address significant unmet need in patients suffering from autoimmune disorders. However, the extent of this impact on the treatment landscape remains to be seen, as the industry rapidly approaches an inflection point.
Osteoporosis - Definition , Evaluation and Management .pdfJim Jacob Roy
Osteoporosis is an increasing cause of morbidity among the elderly.
In this document , a brief outline of osteoporosis is given , including the risk factors of osteoporosis fractures , the indications for testing bone mineral density and the management of osteoporosis
Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...Oleg Kshivets
Overall life span (LS) was 1671.7±1721.6 days and cumulative 5YS reached 62.4%, 10 years – 50.4%, 20 years – 44.6%. 94 LCP lived more than 5 years without cancer (LS=2958.6±1723.6 days), 22 – more than 10 years (LS=5571±1841.8 days). 67 LCP died because of LC (LS=471.9±344 days). AT significantly improved 5YS (68% vs. 53.7%) (P=0.028 by log-rank test). Cox modeling displayed that 5YS of LCP significantly depended on: N0-N12, T3-4, blood cell circuit, cell ratio factors (ratio between cancer cells-CC and blood cells subpopulations), LC cell dynamics, recalcification time, heparin tolerance, prothrombin index, protein, AT, procedure type (P=0.000-0.031). Neural networks, genetic algorithm selection and bootstrap simulation revealed relationships between 5YS and N0-12 (rank=1), thrombocytes/CC (rank=2), segmented neutrophils/CC (3), eosinophils/CC (4), erythrocytes/CC (5), healthy cells/CC (6), lymphocytes/CC (7), stick neutrophils/CC (8), leucocytes/CC (9), monocytes/CC (10). Correct prediction of 5YS was 100% by neural networks computing (error=0.000; area under ROC curve=1.0).
Our backs are like superheroes, holding us up and helping us move around. But sometimes, even superheroes can get hurt. That’s where slip discs come in.
share - Lions, tigers, AI and health misinformation, oh my!.pptxTina Purnat
• Pitfalls and pivots needed to use AI effectively in public health
• Evidence-based strategies to address health misinformation effectively
• Building trust with communities online and offline
• Equipping health professionals to address questions, concerns and health misinformation
• Assessing risk and mitigating harm from adverse health narratives in communities, health workforce and health system
Does Over-Masturbation Contribute to Chronic Prostatitis.pptxwalterHu5
In some case, your chronic prostatitis may be related to over-masturbation. Generally, natural medicine Diuretic and Anti-inflammatory Pill can help mee get a cure.
8 Surprising Reasons To Meditate 40 Minutes A Day That Can Change Your Life.pptxHolistified Wellness
We’re talking about Vedic Meditation, a form of meditation that has been around for at least 5,000 years. Back then, the people who lived in the Indus Valley, now known as India and Pakistan, practised meditation as a fundamental part of daily life. This knowledge that has given us yoga and Ayurveda, was known as Veda, hence the name Vedic. And though there are some written records, the practice has been passed down verbally from generation to generation.
One health condition that is becoming more common day by day is diabetes.
According to research conducted by the National Family Health Survey of India, diabetic cases show a projection which might increase to 10.4% by 2030.
- Video recording of this lecture in English language: https://youtu.be/kqbnxVAZs-0
- Video recording of this lecture in Arabic language: https://youtu.be/SINlygW1Mpc
- Link to download the book free: https://nephrotube.blogspot.com/p/nephrotube-nephrology-books.html
- Link to NephroTube website: www.NephroTube.com
- Link to NephroTube social media accounts: https://nephrotube.blogspot.com/p/join-nephrotube-on-social-media.html
These lecture slides, by Dr Sidra Arshad, offer a simplified look into the mechanisms involved in the regulation of respiration:
Learning objectives:
1. Describe the organisation of respiratory center
2. Describe the nervous control of inspiration and respiratory rhythm
3. Describe the functions of the dorsal and respiratory groups of neurons
4. Describe the influences of the Pneumotaxic and Apneustic centers
5. Explain the role of Hering-Breur inflation reflex in regulation of inspiration
6. Explain the role of central chemoreceptors in regulation of respiration
7. Explain the role of peripheral chemoreceptors in regulation of respiration
8. Explain the regulation of respiration during exercise
9. Integrate the respiratory regulatory mechanisms
10. Describe the Cheyne-Stokes breathing
Study Resources:
1. Chapter 42, Guyton and Hall Textbook of Medical Physiology, 14th edition
2. Chapter 36, Ganong’s Review of Medical Physiology, 26th edition
3. Chapter 13, Human Physiology by Lauralee Sherwood, 9th edition
- Video recording of this lecture in English language: https://youtu.be/Pt1nA32sdHQ
- Video recording of this lecture in Arabic language: https://youtu.be/uFdc9F0rlP0
- Link to download the book free: https://nephrotube.blogspot.com/p/nephrotube-nephrology-books.html
- Link to NephroTube website: www.NephroTube.com
- Link to NephroTube social media accounts: https://nephrotube.blogspot.com/p/join-nephrotube-on-social-media.html
1. Meet the "E-Strangers". Predictors of Teenagers' Online-
Offline Encounters
Monica Barbovschi
Faculty of Sociology and Social Work
"Babeș -Bolyai" University Cluj-Napoca, Romania
Abstract
The purpose of this study is to investigate several factors associated with adolescents‟
online-offline dating behavior (On-Off Dating), i.e. romantic encounters initiated online
and transferred offline at a certain point. Due to the novelty of the topic in the Romanian
context, multiple dimensions were taken into consideration. In order to move beyond the
victimization perspective, this article relies mostly on the social agency theory that
envisions teenagers as skilled and informed actors, who possess the technological, social
and communicative competencies which enable them to distinguish between safe and
unsafe situations (both online and offline). The sample consisted of 1806 subjects aged
10 to 19 who completed a self-report questionnaire administered in 101 classrooms from
secondary schools and high schools in Cluj- Napoca, Romania, in November 2007.
Results of the analyses indicate a series of factors significantly associated with this
particular practice, with some differences for boys and girls, e.g. parental monitoring,
identity management (disclosure and dissimulation), exposure to unsolicited (and
deliberate) sexual material and unwanted solicitations online, use of Social Networking
Sites (SNS), and several psychosocial factors. Among the most important predictors, e.g.
use of Instant Messaging (IM), the amount of time spent online, and positive social self-
concept appear to influence both boys‟ and girls‟ decision for online-offline dating. Other
items, like parental monitoring and exposure to sexually explicit content, showed
ambivalent relation to the investigated behavior.
Key words: adolescents, online-offline dating, predictors, skilled social agents
Introduction (overview)
Early concerns about the way children and teenagers use the Internet have
generally followed the trend established by dystopian theories about ICTs,
suspected to have negative side-effects, such as increasing depression and
loneliness, weakening social ties and promoting superficial relations (Kraut,
Patterson, Lundmark, Kiesler, Mukhopadhyay, & Scherlis, 1998). More recently,
while technophobes are increasingly nuancing their discourse, scholars have
begun to focus on specific issues and risk groups. The topic of online
victimization of youth has started to grow in breadth and coherence, with
valuable studies focusing extensively on online sexual victimization (Finkelhor,
Mitchell, & Wolak, 2000; Mitchell, Finkelhor, & Wolak, 2003a, 2004), or even
more specifically, on online harassment (Ybarra, Mitchell, Wolak, & Finkelhor,
2006) and Internet-initiated sex crimes (Walsh & Wolak, 2005). More recent
approaches suggest that an authoritative, adult viewpoint to youth‟s behavior
online that would further emphasize parental control is only prone to produce
normative statements, panic-driven recommendations, without a comprehensive
understanding of “what the kids are really doing online” (Goodstein, 2007;
Wolak, Finkelhor, Mitchell, & Ybarra, 2008, p.2).
Without further legitimizing parental control and exaggerated safety advice, a
closer look and deeper understanding of adolescents‟ romantic and sexual
experimentations on the Internet is needed. First, a safe assumption would be
that teenagers tend to keep their Internet communication ties in their close
circle of friends and real-life acquaintances (peers), rather than adventuring
2. outside (Barbovschi & Diaconescu, 2008, Annex, p.250)1
. Therefore, the
imagery of Internet dangers described by terms like ”strangers” and ”sexual
predators” is often over-represented and counter-productive. Second,
adolescents often act as skilled agents, employing various communication tools
for a series of purposes, although the delineation is not always clear
(instrumental, rational purposes that overlap with ludic, playful
experimentations); it should be kept in mind that while teenagers might become
victims of online deceit, they themselves may also misrepresent personal
information and lie.
However, the great increase in the frequency of online-offline dating - 33% from
our sample report having met offline at least one person they met online, in
comparison with the first Youth Internet Safety Survey 2000 (Wolak, Mitchell, &
Finkelhor, 2002), where only 7% reported face to face meetings with online
friends, and 2% who described the relationship as romantic - requires a closer
look into the mechanism of this particular practice.
Breaking with the discourse of innocence: the agency
perspective
As one can easily notice, most research in this field has focused on "what the
media do to children" as opposed to „what children do with the media‟ or, as
pointed out in a review of Internet usage written by Livingstone (2003), most
research on the usage and impact of the Internet actually ignores children.
Therefore, there is a need for contextualizing Internet use within everyday
practices, for seeing children as active agents, in order to avoid constructing
them as passive or vulnerable (Livingstone, 2002). In Livingstone‟s perspective,
the depiction of children as vulnerable only legitimates further disempowerment
and adult authority in the regulation of children‟s life.
Although the debate will only advance when it transcends the futile oppositions
between optimists and pessimists or technophiles and technophobes, this rough
categorization of opportunities and dangers, from both children‟s and adults‟
perspectives, organizes what follows. In addition to this, I will try to avoid the
rhetoric of moral panic, doubled by the "moral quality of the discourse of
innocence" (Meyer, 2007) intertwined with the sacralisation of childhood. In
light of the fast pace of Internet adoption and the spread of new uses, it
becomes more and more necessary to view the children as skilled agents in
using different Internet tools, often more skilled that most adults:
On the contrary, the discourse of innocence is reinforced through calls for adults to „do
more to make the Internet safer for children‟. Such demands assume that children need
adult protection, which is incongruent with claims that children tend to be more skilled at
using the Internet than their parents. (Livingstone, 2002, p. 89)
Although critics could argue that this is precisely the problem: they are skilled,
but not self-reflexive and they lack the maturity to grasp the whole meaning and
possible implications of their actions, I feel strongly that a shift in perspective is
necessary.
It has been argued that the discourse of innocence turns children into helpless
victims in constant need of adult protection, through re-productions of children
representations as both structurally and innately vulnerable (Meyer, 2007). One
concept that proves useful is structural vulnerability (as opposed to physical or
social vulnerability), which is constructed through asymmetrical power relations
3. (mainly between children and adults) and reinforced by the discourse of
innocence. The necessity to consider children‟/teenagers‟ behavior from a
perspective of social agency has been also formulated by Jill Korbin (2003), who
talks about an increasing need for the inclusion of child perspective in the
explanation of larger structural conditions of violence. In my opinion this
theoretical approach could be applied for the analysis of teenagers‟ romantic and
sexual behavior in relation to the use of online communication tools. As it will
become apparent throughout the present study, I chose the title in a rather
“subversive” way, in order to emphasize the exaggerated concerns that populate
the collective in regards to Internet dangers and pitfalls.
The attempt to bring together research on adolescent behavior and research
related to romance and sexuality on the Internet appears to be a difficult
endeavor. While on one hand, there is the mainstream panic voice that calls for
safety precautions when surfing the Web (doubled by the fear that adults will
not be able to keep pace with the technological perspective), on the other hand
we have the perspective of skilled, rational, utilitarian adults, using the Internet
for various instrumental purposes, including sexually related.
From the latter, two theoretical ideas about dating practices of adults
investigated by Peter and Valkenburg (2007) have caught my attention: the
compensation hypothesis (looking for casual dates online in order to
compensate for shortcomings in offline dating, e.g. low physical self-esteem,
high dating anxiety) and the recreation hypothesis (sexually permissive people
and high-sensation seekers who value the anonymity of the Internet). However,
in the case of teenagers, specific conditions such as peer pressure and the
nature of the online communication might work in a completely different
direction: popular teenagers, with high physical and social self-esteem might
have a higher probability to engage in online-offline dating (due to the high
visibility to their circle of friends, classmates or schoolmates). Conversely, the
same mechanisms would prevent shy ones to expose themselves to possible
scrutiny and ridicule). As for the recreation hypothesis, even though high-
sensation seeking adolescents might engage in more active search for sexually
explicit material or dates, any investigation should take into account their ludic
tendencies, such as deliberate dissimulation of information on the Internet.
Unwanted and Wanted Exposure to Sexual Materials and
Sexual Solicitations Online
Earlier research on adults has also found a positive connection between
exposure to sexually explicit materials and more permissive sexual attitudes
(Davis & Bauserman, 1993). Scholars have also explored youth‟s deliberate
exposure to sexually explicit materials (Peter & Valkenburg, 2006a, Wolak,
Mitchell, & Finkelhor, 2007) and the connection between this type of exposure
and positive attitudes towards uncommitted sexual exploration (Peter &
Valkenburg, 2008), with findings suggesting a positive connection between the
two. Wanted, deliberate exposure was found to be higher for boys and youth
who talked to strangers online about sex (Wolak et al., 2007).
In line with the above mentioned research, I predicted that deliberate exposure
to explicit content, along with surfing for topics related to sex life or surfing for
romantic contacts, would be positively connected to the online-offline dating
decision; however, my subsequent goal is to see also whether the exposure to
unwanted sexual materials and solicitations online acts as a (negative) predictor
of the decision to continue the interpersonal relation formed online with an
4. offline date (encounter).
There has been a significant amount of work done in the area of online sexual
victimization of youth, including unwanted exposure to sexually explicit content
and sexual solicitations; some of the most relevant (Mitchell, Finkelhor, &
Wolak, 2001; Wolak et al., 2007) has brought important nuances to the
exploration of risk situations and risky behaviors through an integrative
explanatory approach to the sexual interpersonal victimization. There are a
priori reasons to presume that unwanted or unexpected exposure to such
content might trigger negative feelings and distress that could further impede
teenagers from engaging in various types of romantic/sexual explorations
(including on-off dating). Nevertheless, previous research investigating the
relation between unwanted exposure (unwanted sexual solicitations,
respectively) and distress/negative feeling has reached cautious conclusions
(Mitchell, Finkelhor, & Wolak, 2003b; Mitchell et al., 2001). Unwanted exposure
might indeed affect young people‟s sense of safety (Mitchell et al., 2003b).
Moreover, unwanted exposure seems to be higher for teenagers with higher
depression scores (Wolak et al., 2007). Consequently, I formulated the following
hypotheses:
H1. The surfing behavior (purposive/deliberate surfing for romantic contacts and sexual
content on the Internet- both pornographic and related to sexual life advice) is positively
connected to the On-Off dating decision (the item “Have you ever gone on a date offline
with someone you previously met online?”).
H2. Exposure to unwanted material and sexual solicitations online is negatively related to
the On-Off dating decision.
In line with previous findings (Mesch, 2009), I expect deliberate exposure to
pornography to be gender-dependent.
Identity management. Disclosure and deceptive strategies
Previous research has focused either on disclosure of personal information (and
its self-perception) as a potential risky behavior for the youth victimization
online (Moscardelli & Divine, 2007) or on deceptive strategies usually employed
by adults for instrumental purposes, namely securing a romantic date offline
(Toma, Hancock & Ellison, 2008). However, keeping in mind that teenagers act
as skilful social agents, it is time to bring these two perspectives back together.
While engaging in various degrees of online disclosure (usually on their SNS
profiles), some teenagers also choose to deliberately dissimulate (lie) about
their age, looks, school or even sex. While safety advocates recommend that
teenagers should refrain from divulging personal information online, Ybarra,
Mitchell, Finkelhor and Wolak (2007) suggest that actually is talking with people
teenagers know only online (“strangers”) that constitutes risky behavior, more
than sharing personal information.
While ”privacy concerns” lead to adoption of careful (self-protective) behavior
(Moscardelli & Divine, 2007), the ludic, playful nature of teenagers‟ online
communication might lead them in a totally different direction. One theoretical
tool for the investigation of adolescents‟ dating behavior could be the theory of
filtering (Davis, Hart, Bolding, Sherr & Elford, 2006; Couch & Liamputtong,
2008) in the selection of possible sexual/romantic partners. For example,
teenagers use deception strategies (either for play or identity management
purposes) in order to maintain the control over the online interactions. On the
other hand, teenagers misrepresent or simply lie about various information
5. (Knox, Daniels, Sturdivant, & Zusman, 2001) because it‟s fun; the items we
included in our questionnaire were related to age, sex, school, occupation,
physical appearance, and one item of general misrepresentation.
Previous research about deception in self-presentation in online dating profiles
suggests that the deceivers strategically manipulate the information accuracy in
order to match their romantic expectancies and constraints (Toma, Hancock, &
Ellison, 2008) and tend to be more honest if they place greater importance on
long-term face to face relationships goals (Gibbs, Ellison, & Heino, 2006).
However, in the case of teenagers‟ dating experiences, the deceptive strategies
have a greater chance to derive from ludic behavior, rather than to serve
instrumental purposes (e.g. finding a romantic partner, the indicator of dating
"success”).
According to Toma et al. (2008), two factors are crucial for the configuration of
dating patterns, namely the characteristics of the online communication and the
connection between one‟s online self and offline self. In case of the adolescents,
most of the communication is synchronous (90% from the teenagers in our
sample use IM services – Barbovschi & Diaconescu, 2008, Annex, p.250), while
the asynchronous communication is mostly adjacent to self-presentation and
interactions on SNS profiles (comments on each other‟s profile, pictures, status
etc). The dynamic nature of this communication pattern restricts any elaborate
self-presentation to the personal profile on the SNS, while maintaining scarce
cues and scripts for the instant communication.
For adolescents, the relation between the offline and online self has a particular
nature. As members of certain online/offline peer groups, their visibility (and
accountability) restricts their dissimulation possibilities, at least within the circle
of their friends or their friends‟ friends. In addition to this, teenagers employ
various strategies to optimize their dating selections (through referrals, e.g.
friends or colleagues that give "credentials” and who can certify the other
person is trustworthy).
In terms of deception opportunities, the warranting elements (Walther & Parks,
2002) - the connection between the self and the given self-presentation, might
reduce the deception. Photographs on SNS profiles and referrals might work as
warrants.
Nevertheless, identity experiments on the Internet might prove to entail several
benefits. Valkenburg and Peter (2008) report that adolescents who engage in
online identity experimentation also communicate more often with people of
various ages and cultural backgrounds.
Identity protective behavior could be seen as a component of the broader
attitudes and behavioral set that can be described as Internet safety practices.
Identity protective behavior could be influenced by various factors (e.g. parental
monitoring, previous negative online experiences) and could further influence
the decision to move offline an online relationship.
Consequently, I formulate the following hypothesis for identity management:
H3. Identity protective behavior (nondisclosure and dissimulation) is negatively related to
On-Off dating decision.
6. SNS use and online profiles
One of the tools from the multimodal technologies (Ledbetter, 2008) the
adolescents employ in order to present themselves to peer-groups and potential
partners are the personal profiles on SNS sites that have recently received
increasing appeal among the communication and networking tools employed by
the young Romanian population. According to the recent findings of Pew
Internet & American Life Project, 55% of U.S. teenagers use SNSs and have
created an online profile (Lenhart & Madden, 2007), while 70% from the
adolescents in our study report SNS use.
The SNS profiles, as individually owned and controlled spaces (Hodkinson &
Lincoln, 2008), often serve as dating profiles through their self-promotion tools
they offer (the possibility to display various information about oneself, including
relationship status and pictures), as well as embedded communication and social
networking tools (the ”wall”, the picture comments, private messaging systems,
the visible friendship network).
“The creation and editing of personal profiles, how online daters balance accuracy with
self-promotions and desirability, and how they establish their credibility online are
important components of self-presentation.” (Couch & Liamputtong, 2008, p. 270)
Recent concerns about risks related to the creation and use of SNS profiles, in
relation to adolescents‟ identity as display or identity as connection (Livingstone,
2008), have led to the investigation of specific forms of sexual victimization
related to such sites. Smith (2007) found that teenagers who have a SNS profile
or post pictures of themselves online are no more likely than other youth to be
contacted by online strangers. Ybarra and Mitchell (2008) present the results of
the Growing Up With Media Survey (sample size 1588), where fifteen percent of
all youth reported an unwanted sexual solicitation online in the last year, while
4% reported an incident on a social networking site (consistent with our
findings). Among targeted youth, solicitations were more commonly reported via
instant messaging (43%) and in chat rooms (32%). However, their findings
suggest that SNS use does not appear to have increased the risk of sexual
victimization online (Ybarra & Mitchell, 2008). In addition to this, some have
tried to emphasize that restricting teenagers‟ access to SNS might even hamper
other educational and psychosocial benefits (Tynes, 2007). Others (Rosen,
2006) have discovered other benefits of SNS use: more support from friends,
more honest communication (that would complement our suppositions), less
shyness both online and offline.
Because of the extensive use of IM communication among Romanian teenagers,
I presumed a similar connection to the dating behavior; therefore I included
both social tools in the analysis:
H4. The use of social tools (IM, SNS, webcams) is positively related to the On-Off dating
decision.
Parental monitoring
Transferring a relationship from the relatively safe online playground to the
offline territory outside, to „the real life” might require a certain degree of
autonomy and independence. In previous research, parental monitoring was
defined as children‟s perception of their parents‟ awareness of where and with
7. whom they are spending time when they are not at home or at school (Heim,
Brandtzæg, Kaare, Endestad, & Torgersen, 2007). In a study related to feelings
of insecurity and fear of crime among teenagers, de Groof (2008) assessed the
positive connection between the level of parental supervision (here, monitoring)
and the level of fear experienced by children. Moreover, in their study conducted
on Australian teenagers, Fleming, Greentree, Cocotti-Muller, Elias and Morrison
(2006) found out that younger teenagers who do not discuss Internet safety
with their parents are less safety conscious. In line with this logic, I assumed
that a perception of more extensive supervision (of time, content and Internet
contacts) would be negatively related to the decision of meeting someone
offline.
However, when measuring parental mediation (or monitoring), researchers need
to take into consideration the gap between children‟s and parents‟ reporting of
Internet use monitoring, with former being usually much lower than the latter.
In a study related to Internet filters employed by parents in order to regulate
their children‟s use of the Internet, Lenhart (2005) discovered a significant gap
in the perception of parent-child mediation, with 62% of parents who declared
checking up on their children, in comparison with only 33% of adolescents who
reported parental mediation. Two years later, this gap showed signs of
decrease, with 41% teenagers believing their parents are checking up on their
Internet activities (Lenhart & Madden, 2007).
In spite of the concerns related to the gap in reports/perceptions of parent-child
Internet monitoring, the situation of Romanian families might be a real case of
difference in computer literacy skills between children and parents. With a
33.4% Internet penetration and the second highest user growth between 2000
and 2008 (Internet World Stats, 2009), Romania is in top 10 Internet countries
in the European Union. Nevertheless, the adults‟ perception of their own
computer literacy is rather modest. According to the last Public Opinion
Barometer (Comș a, Sandu, Toth, Voicu, & Voicu, 2006), most of them self-rate
their skills with 7 points out of 10, 9% declare low or no skills at all, whereas
only 5 % give themselves a maximum score. Due to the lack of studies related
to Romanian parents‟ mediation practices, we can‟t assess at this moment its
real extent and scope, the safe assumption being a rather low awareness,
knowledge and control of children‟s Internet use.
H5: The extent of parental monitoring (online and offline) has a negative influence on the
On-Off dating decision.
Other factors
Consistent with previous studies, I presumed that loneliness and social anxiety
are positively connected (Gross, Juvonen, & Gable, 2002; Valkenburg & Peter,
2008) and that both influence the On-Off dating decision negatively. Conversely,
I presumed that teenagers with a more positive self-image are more likely to
engage in offline encounters with people met online.
Some of the psychosocial factors defined as self-concept (Harter, 1985; Heim et
al., 2007) might be significantly related to the behavior of online-offline dating.
Teenagers‟ favorable self-perception, especially related to social acceptance
(self-assessment of popularity among peers, perceived ability to make friends)
could play a decisive role in the translation from online to offline encounters,
with those more outgoing being more easily inclined to engage in this kind of
8. activity.
The following hypotheses completed the theoretical model:
H6. The amount of time spent online is positively correlated with On-Off dating decision.
H7. The positive self-description behavior (PSDD) is positively related to the On-Off
dating decision.
Method
1806 self-report questionnaires were administered in 101 classrooms from
secondary and high schools in Cluj-Napoca, Romania, in November 2007.
Approval to conduct the survey was obtained from the local school inspectorate
and from the principals of each school included in the sample. Parents were
informed through the teachers and the pupils‟ consent was also requested for
participating in the survey. Although the questionnaire aimed to encompass a
variety of activities and behaviors, both online and offline, a special part was
dedicated to issues related to online-offline dating.
Table 1: Descriptive Characteristics of the Sample
9. On average, boys in our sample use the Internet for 3 hours on a school day
(Std. deviation =1.856) and 5.44 hours on a weekend day (Std.
deviation=3.311), while girls use the Internet for 2.77 hours on a school day
and 4.61 on a weekend day. Also, the teenagers have been using the Internet
for 2.88 years on average (Std. deviation=2.123). Almost half of them use a
webcam when they talk on IM, boys being less selective than girls (girls use the
10. webcam with a few friends, boys with virtually anybody in their list - the
difference is significant, r=.143, p<.001).
a) The Use of Internet, E-mail and Instant Messenger Related to Active
Searching for Sexual Information and Romantic Partners
Several items related to the frequency of searching for dating partners through
web surfing, e-mail, IM, as well as the frequency of looking for sexual
information (both pornography and sex advice) were included in the analysis.
Correlation coefficients were moderate but significant at p<.001. Another
interesting aspect were the strong correlations per medium (e.g. types of uses
through e-mail, items 4-6 were highly correlated, as well as types of uses
through instant messaging, items 7-9) and moderate-low correlations between
different media.
1. How often do you surf the Internet to find pornographic material? (S1)
2. How often do you surf the Internet to find dating partners (on
websites such as The Two of Us, Sentiments etc.)? (S2)
3. How often do you surf the Internet to find advice about sex life? (S3)
4. How often do you use the e-mail to talk to people from Cluj that
you‟ve met online and also face to face)? (S4)
5. How often do you use the e-mail to talk to people from Cluj that
you‟ve met online and want to meet face to face? (S5)
6. How often do you use the email to talk to people from Romania that
you‟ve met online but never met face to face? (S6)
7. How often do you talk on IM with people from Cluj that you‟ve met
online and also face to face? (S7)
8. How often you talk on IM with people from Cluj that you‟ve met online
but never met face to face? (S8)
9. How often do you set up actual dates on messenger with persons
you‟ve met online? (S9)
The measurement scale for these items was constructed as a 5-point Likert
scale, varying from “very rarely/never” to “very often/daily”.
A reliability analysis was conducted for the nine items. One item had rather low
interitem correlations with the others (S1) and the Alpha coefficient was .807
after the exclusion. The item that had the highest interitem correlations overall
was setting up actual dates with persons met online. The items that had
significant difference for boys and girls were S1 and S2 (boys more than girls,
r=.435 and .192, p<.001). The most salient item, S9, that makes the
translation from active searching to actual dating, also presents significant
differences between boys and girls, with boys reporting slightly more than girls
setting up dates through IM (r=.191, p<.001).
b) Parental monitoring: offline, online and SNS specific
Teenagers in our sample reported low levels of parental monitoring, both online
and offline, both general and SNS related. In spite of the concerns related to the
usual gap in parent-child Internet mediation, I tend to take the children‟s
answers at face value, due to the current Internet penetration rate among
Romanian adults and their self- perceived computer and Internet literacy
(Comș a et al., 2006).
Parental monitoring was measured by means of children‟s reported knowledge
of their parents‟ awareness of their leisure time online and offline. Teenagers‟
activity is poorly supervised/ monitored by their parents, 58.6% from our
sample declared they do not have any restrictions whatsoever in using the
computer and the Internet (N=1806). The most frequent form of parental
control is related to the time the children spend in front of the PC (reported by
11. 29.7% of the boys sample and 33% of the girls). However, no significant
differences were found for these three items of parental monitoring according to
teenagers‟ gender.
Table 2: Parental monitoring
Among the parents 43% have restricted, one way or another, their children‟s
access on the Internet. Although we didn‟t ask more questions about children‟s
relationship with their parents, that could have granted us a broader perspective
on different parenting styles and monitoring motivations, we have also included
two other items of parental monitoring, adapted from Heim et al. (2007),
related to teenagers‟ general relation with their parents, namely: “My
parents/tutors always know where I am when I‟m not at home or at school” -
OffM1 and “My parents/tutors always know with whom I spend my time when
I‟m not at home or at school”-OffM2 (r=.447, p<0.001). 30% and 40% of the
children gave negative answers to these two items.
Significant differences were found between boys and girls for these two items,
girls reporting more general parental monitoring for both items (though the
value of the correlation coefficients were rather small, they were significant at
0.01 level (r=.145 for the first item and .200 for the second). An independent T
12. test was conducted for the two items of offline monitoring, that also confirmed
the different monitoring for boys and girls (t= -5.934 for OffM1 and -8.287 for
OffM2, p<.001).
About their kids accessing the SNSs, 82.5% of the parents know about it
(according to the children‟s statements), but a large majority (94.7%) are not
interested at all in what the children are doing on these SNSs. Concordantly,
93% of the parents are not interested about the persons their children add to
their friends lists. However, girls report more parental interest on how they use
the SNS (although the values of the coefficients were small, r=.133, p<.001).
No significant differences between boys and girls were found for the item
“persons that I add as friends”. No differences were found between children who
use SNSs and children who do not use SNSs for the items of online monitoring
(OnM 1 to 3).
The nature of the parental monitoring online can be summarized as following: it
declines with age, it does not differ significantly for boys and girls in terms of
time spent, content or persons the children talk to. Nevertheless parental
monitoring offline (general) can be described as characterizing girls more than
boys.
No significant correlation was detected between the items of parental monitoring
online (both general and SNS specific) and offline. Week positive correlations
were found between the items of general online monitoring and SNS monitoring.
There is no special attention in terms of parental monitoring for children that
use SNSs (in comparison with chil dren that do not use these services).
Moreover, the vast majority of SNS users (92%) declare that their parents show
no interest in neither the way they use these social tools, nor the persons they
add as friends in their buddy lists.
However, parental monitoring (or mediation) items were included in the
regression models, even though the prediction value was rather low.
c) Unwanted Exposure to Sexual Materials and Sexual Solicitations
Online
One of the most important privacy issues is the one related to sexual predators
that "groom” children through various forms of computer-mediated
communication (CMC) and attract them into offline encounters. Other concerns
have focused on teenagers‟ exposure to inappropriate content; according to
recent findings, younger adolescents (13-14 years old) and those who have not
discussed safety issues with their parents seem to be more expose to sexually
explicit content online (Fleming et al., 2006).
60% from our sample declare they have at least once opened an Internet page
with pornographic images and 35.5% declare they felt indifferent. 31% have
told somebody about it, usually a colleague, friend or sibling. Amongst those
who have not, the most frequent reason is the minimization of the importance of
the incident.
2.5% (n=30) declare they have been exposed to sexual solicitations on a
metropolitan network, half of them told somebody, in most of the cases a friend.
The ones who didn‟t tell also minimized the importance of the incident.
5% (n=74) declare they have been exposed to sexual solicitations on a social
13. networking site (SNS). 72% (n=46) have told somebody, usually a friend or a
sibling. Those that didn‟t say anything also minimized the importance of the
incident. Our results are consistent with previous research on Internet dangers
(e.g. Finkelhor, Mitchell, & Wolak, 2000- One in 5 youth received a sexual
approach or solicitation over the Internet, data from the first Youth Internet
Safety Survey).
However, the unpleasant incidents related to sexual solicitations didn‟t have a
predictive value for the On-Off-dating dynamic. Only the item “exposure to
unsolicited pornographic material” was included in the regression model.
Even though our research confirms previous findings about adolescents‟
unrealistic perceptions about the safety and benign nature of these experiences,
we need to take into account the purposive and agentive nature of teenagers‟
experiments with romance and sexuality on the online-offline continuum.
d) Identity management (disclosure and dissimulation)
According to teenagers answers, 36.4% from our sample declare they have
posted their e-mail address on a website, forum or blog, making it thus
accessible to anyone (N=1284). In addition to this, only 20% have restricted
SNS profiles (from N=1276). We also included several items of personal identity
management (disclosure but also dissimulation, on the grounds of the agency
perspective).
Table 3: Disclosure of personal information on SNS profiles
One item had the lowest interitem correlations with other items in the reliability
analysis (posting the name of the city in the personal SNS profile), the
explanation being that all the SNS sites offer default enabling of location
14. visibility and favor the display of geographical networks. After the item was
removed, the Alpha coefficient was .736.
Another dimension of identity management can be classified among agency
items, namely the online dissimulation and identity play. For the six items of
dissimulation (without the ones related to dissimulation for parents), the
reliability analysis revealed moderate interitem correlations, with Cronbach‟s
Alpha coefficient .745.
Table 4: Dissimulation of personal information online
e) Other factors
We asked our subjects to self-evaluate a series of social skills and abilities in
comparison to other peers of same age and sex, on a 5-point scale varying from
1 (much less) to 5 (much more). Some of the items (those with positive
connotations) revealed internal correlations (interitem analysis – Alpha
coefficient .744) suggested through the grouping of 5 items, into what I called
the Positive Self-Description Dimension (PSDD). The items included in the PSDD
are:
How much you would say the expression ….characterizes you (in comparison
with a person of same age and sex)?
1. “leadership abilities”
2. “I make new friends easily”
3. “open to new things”
15. 4. “popular among the other sex”
5. “self-confident”
There is a positive correlation between the PSDD dimension and the experience
of meeting offline someone previously met online, though very low (r =.180,
p<.001).
Even though self-reported loneliness and five items of social anxiety may not be
as equally suitable to predict the studied behavior as more elaborated
depression and loneliness scales, I included one item as independent variable (“I
often feel lonely” –dummy variable); in addition to this, I included an item of
Internet sociability (“Since I‟ve been using the Internet, I have more friends”,
dummy variable). The self-assessed loneliness showed a low relevance only in
the girls‟ case.
I‟ve separated the number of persons into three categories (1 to 10 persons, 10
to 20 and above 20). The correlation was .156 (p<.001) after I excluded the
subversive responses (teenagers declaring they have met over 100 persons). A
safe assumption would be that the number of romantic partners the adolescents
meet offline is not determined by the positive self-perception, but nevertheless
the latter influences the very step of meeting somebody offline in the first place.
Other items included in the analysis were related to possible gratifications the
teenagers can obtain through the initiation of romantic interactions on the
Internet:
1. “I‟ve found intimate relations, without danger”
2. “I‟ve found intimate satisfactions, without danger”
Results
The study was design to investigate a series of adolescents‟ behavior associated
with Internet use, among those behaviors, the practice of online-offline dating.
33% from our sample reported at least one online-offline encounter, i.e.
relationship initiated online and moved offline at a certain moment. First,
bivariate associations were calculated in order to assess the preliminary impact
of the independent variables in the explanatory model (Table 5). Several
differences can be observed from bivariate analyses between boys and girls with
respect to factors that might influence the On-Off dating decision.
Table 5: Bivariate associations with online-offline dating for boys and girls
16. H1. The surfing behavior (for romantic contacts and sexual content on the Internet- both
pornographic and for advice related to sexual life) is positively connected to the On- Off
dating decision (variable: “Have you ever gone on a date offline with someone you
previously met online?”- dichotomous scale). Partially confirmed for boys and girls
(the active search for pornographic materials is not significant).
17. H2. Exposure to unwanted material and sexual solicitations online is negatively related to
On-Off dating decision. Not confirmed for the unwanted solicitations- there is no
connection. Infirmed for the unwanted exposure to sexually explicit content
(positive connection for both boys and girls).
Adolescents who seek potential partners do not hide. Their SNS profiles are
open to anyone, some of them revealing personal information (e.g. full name);
on the other hand, some of them might engage in various dissimulation games,
for ludic gratifications. Boys tend to offer false/deceiving information related to
sex, physical appearance, while girls incline towards dissimulation about age,
school and sex (less than boys).
H3. Identity protective behavior (nondisclosure and dissimulation) is negatively related to
On-Off dating decision. Partially confirmed for boys and girls – restrictions of SNS
profiles are negatively related to the On-Off dating. Some of the dissimulation
actions are positively connected to the On-Off dating decision.
Furthermore, the use of social and communication tools (Instant Messaging,
SNS, webcams) is positively related to the On-Off dating, as well as to other
aspects of online sociability (number of persons the teenager talks to on the
Internet, higher number of friends since using the Internet).
H4. The use of social tools (IM, SNS, webcams) is positively related to the On-Off dating
decision. Confirmed for boys and girls.
The parental monitoring (mediation) of online activities of children is almost
non-existent, at most it is directed towards the children‟ time spent on the
Internet; as for the relation to the investigated behavior, only the offline
monitoring seems to have a negative impact on girls‟ decision for online-offline
dating. Other mediation items had no influence in the model.
H5. The extent of parental monitoring (online and offline) is negatively correlated to the
On-Off dating decision.Not confirmed for boys. Partially confirmed for the offline
monitoring of girls. Partially infirmed for the general online monitoring for girls.
Further items were introduces, e.g. the time spent on the Internet on a school
day and on a weekend day (positive correlations).
H6. The amount of time spent online is positively correlated with the On-Off dating
decision. Confirmed for boys and girls
As predicted, higher sociability and social self-esteem are positively connected
to online-offline dating, one explanation being the relative visibility of this
particular practice to the peer group. Loneliness does not influence the decision.
H7. The positive self-description dimension is positively related to the On-Off dating
decision. Confirmed for boys and girls
It is important not to overstate the relationship between online-offline dating
and characteristics such as offline monitoring or positive self-concept. These
associations were not strong and the explanatory model can be influenced by
other factors that we didn‟t take into account, e.g. peer pressure, perceived
controllability or reciprocity (Peter & Valkenburg, 2006b) of the online
environment.
18. I further conducted a binary logistic regression (table 6) due to the
characteristics of the variables in the model (dependant- categorical,
dichotomous; independent variables that violated the assumptions of the linear
regression, namely the normal distribution requirement). After I excluded the
subversive (exaggerated) answers, the self- reported number of online-offline
encounters was used as a filter for all calculations.
The binary logistic analysis showed interesting results: older teenagers are more
likely to engage in on-off dating, they tend to use the Internet more on a week
day, they also have publicly available SNS profiles and use IM to talk to people
in the proximity to set up dates. In addition to this, they tend to agree more
with the statement “You‟ve found intimate relations, without danger”. Consistent
with other computations, the positive self-description dimension had an
influence on the overall model, although the OR was low. What was rather
surprising was the influence of the online monitoring item “restrictions about
time I spend on the Internet”, with teenagers who report this type of monitoring
being 1.812 more likely to engage in online-offline dating than other teenagers.
From the dissimulation items, only lying about one‟s age appeared to have a
significance in the regression model.
Table 6: Binary logistic regression predicting online-offline dating decision
19. As the number of dating partners (measurement –scale) showed positive
correlations with several dimensions and key variables, I conducted separate
linear regressions for boys and girls, each time controlling for age (table 7). The
collinearity analysis showed that multi-collinearity was not a problem for the
20. regression model and the highest variance inflation factor (VIF) of any of the
predictors was 1.760, which is bellow the threshold for multi-collinearity
problems.
Among the items with strong predictive value for both boys and girls, the
amount of time spent on the Internet on a school day, along with IM use for
talking to various people online, as well as for setting up offline dates appear to
have the most influence in the regression models.
Other items had different predictive value for boys in comparison to girls‟ case.
For example, boys who surf for information related to sex life, or those who
value the development of intimate relations have a higher number of dating
experiences. However, deliberate search for pornographic material was not
significant, while unintended exposure appears to influence the model, one
possible explanation being the general surfing behavior that leads to exposure
or the social desirability effect.
Other significant items were related to online sociability indicators, namely
number of persons they talk to online or perceived increase in number of friends
since they have started using the Internet. Parental monitoring items revealed
ambiguous relations to the number of on-off encounters. On one hand, offline
monitoring doesn‟t seem to have any effect whatsoever, while restrictions about
the content accessed on the Internet seem to have a positive effect on the
dependent variable. Only SNS monitoring, i.e. general knowledge about their
children‟s use of SNS and interest in the persons their children add as friends
has a negative influence in the model.
Similarly for girls, the parents‟ interest about the persons their children add as
friends has a negative influence in the model. As opposed to boys, in girls‟ case
the positive self description dimension seemed to influence the model.
Other items, like loneliness, dissimulation dimension, offline monitoring, e-mail
and SNS use didn‟t have any significance for either boys or girls.
Table 7: Linear regression for predicting boy‟s number of dating partners
through online-offline encounters
21. Discussion
In this article I discussed some of the possible predictors of the teenagers‟
decision for online-offline dating, i.e. romantic online interactions transferred
offline at a certain point (although the denotation of „romantic” was extended
beyond the platonic idealism). Although causal interpretations of statistical
correlations must always be received with a reasonable amount of caution and
skepticism, some of the findings deserve our attention.
I first looked into the surfing behavior and its connection to the online-offline
dating practice. Surprisingly in both girls‟ and boys‟ cases the active search for
pornographic material does not influence the dating decision. However, the
active search for advice related to sex life and surfing on dating sites showed
positive relations in boys‟ case. Moreover, the unwanted exposure to sexual
22. solicitations online seems to have an impact on the investigated behavior of
boys. This might be explained through the general surfing patterns of boys who
engage in online-offline dating. However, in line with previous research (Wolak
et al., 2007), wanted and unwanted exposure to sexually explicit content is
more relevant for the boys behavior than for the girls‟. We can presume there is
still a great deal of self-restraint from the adolescents in admitting to socially
undesirable practices. At the same time, the lack of impact of sexual
solicitations on the overall model of analysis (correlated with the minimized
importance of these incidents), might represent an alarming indication of
teenagers‟ attitudes towards sexuality and sexual relations (instrumentalization
of sexual relations, uncommitted sexual explorations, a phenomenon revealed
by Peter & Valkenburg, 2008). Even the high frequency of On-Off dating (33%
from our sample) might indicate a similar transformation.
Furthermore, the parents‟ generalized lack of knowledge and control of their
children‟s online activities is in itself an issue of concern. It should be mentioned
that numerous parents of Romanian teenagers are digitally illiterate or have
little knowledge of social media, especially Instant Messaging or Social
Networking Sites. It is not surprising that the impact of parental mediation on
the dating decision (online and offline, general and SNS specific) is almost null.
Far from me the idea of preaching more parental control over children however,
I found it really alarming that parents have little clue what their children are
doing online and with whom. Several items of general offline monitoring,
general online monitoring and SNS specific were included in the analysis and
they revealed ambiguous relations with the investigated behavior. Consistent
with previous research (de Groof, 2008; Fleming et al., 2006), SNS monitoring
seemed to reduce the incidence of on-off dating, more for boys than for girls.
However, regression models showed a counterintuitive impact of content and
time monitoring on teenagers‟ on-off dating. Last, offline monitoring showed
only negative associations with girls‟ dating, but it had no predictive value in the
regression models.
One possible explanation for the ambiguous results might reside in the nature of
the parental monitoring itself. The lack of computer and Internet literacy of most
Romanian parents might result in some of the parents‟ rejection of various
forms of Internet use that are not perceived as “educational”. However, these
parents are more likely to regulate first their children‟s time, then content and
only last, the persons their children talk to online. Probably they have little
knowledge of social networking tools therefore they don‟t try to regulate its use.
On the other hand, children‟s responses to authoritative regulation might be
exactly the opposite of what their parents are expecting. On the contrary,
parents who do have knowledge of the functioning and use of SNS (higher
computer and Internet skills) might also have a deeper understanding of the
Internet social dynamics, risks and opportunities, therefore they might be better
equipped to regulate effectively and in a non-authoritative manner their
children‟s exploration with online and offline relationships. Unfortunately, due to
the extensive exploratory nature of the project, we were not able to include
more items related to parenting styles and communication, which would have
given us more detailed insights into this particular issue. What is also lacking is
the parents‟ view on Internet safety issues.
In terms of online disclosure and dissimulation, it appears to be difficult to draw
a clear distinction between rational/instrumental purposes and ludic behavior;
this zone of uncertainty might hinder explanatory approaches such as “the
recreation hypothesis” or “the compensation hypothesis” (Peter & Valkenburg,
2007) when it comes to adolescent behavior. However, such practices indicate
23. an active exploration of romantic relations and encounters, which might dismiss
the victimization perspective as unilateral and sometimes inaccurate.
Apparently, teenagers who “put themselves out there” in terms of profile
visibility are the ones with more on-off dating. Some of the dissimulation items
were also significantly correlated, differently for boys and girls but had no
predictive value (with the exception of lying about age). Teenagers seem to use
deceptive strategies in order to meet their dating goals (Toma et al., 2008) -
lying about age- more than for the sole ludic purpose (e.g. lying about sex).
More research related to the dynamics and specificities in the selection of dating
partners is much needed.
In line with previous research (Daneback, 2006; Ellison, Heino, & Gibbs, 2006),
the use of social media has predictive value for general dating, in this case, for
the on-off dating of teenagers in our sample. It is especially the extensive IM
use for various types of communication and for setting up offline dates that
seems to be the most salient in the explanatory model. Other than availability of
SNS profiles, other items related to SNS use didn‟t have any impact. Also, no
significance was detected for e-mail use, which has a lower popularity among
teenagers today. Together with the extensive IM use, the amount of time spent
online is one of the best predictors for the investigation of the online-offline
dating, in both the logistic and linear regression models.
Last, items related to online sociability and positive social self-concept seem to
influence this particular type of dating behavior. Teenagers who have more
friends, talk more on the Internet, are more outgoing (self-perceived ability to
make friends, openness to new ideas, leadership abilities, self-confidence,
perceived popularity among other sex) are more inclined to experiment with
online-offline relationships.
As it became apparent throughout the article, I deliberately chose a rather
subversive title, since the generic category of “online strangers”, usually seen as
“online sexual predators” has been pushed in the background of the
argumentation; instead I chose to focus more on the agency perspective and to
search for the factors that influence adolescents‟ decision to transfer an online
relation to an offline date/encounter.
Limitations of the study
In spite of some advantages in exploring adolescents‟ dating behavior, the
present study suffers from several limitations. The first is related to the nature
of adolescents‟ experiments with online identity and interaction, most of which
are marked by a ludic component; the distinction between instrumental behavior
(lying about age in order to get a date) and ludic behavior (lying about age to
get a date because “it‟s fun”) is increasingly blurred. Further studies should try
to investigate in-depth different adolescent gratifications of deceiving in relation
to online relations. Another important limitation is the data collection method.
In-class self -report questionnaires are more susceptible to provoke subversive
responses, i.e. providing deliberately false or joking answers, while the presence
of classmates or desk-mates might further distort the answers (the visibility of
their answers to their peers might induce the social desirability effect).
Also noteworthy is the partially exploratory nature of the study that merely
began to scratch the surface of multiple issues related to Romanian adolescents‟
use of the Internet. While on one hand the survey covered various issues (gain
in breadth), it sometimes failed to explore in detail those problematic areas that
24. emerged (loss in depth). Moreover, some of the areas investigated could have
benefited from a bidirectional perspective, i.e. children‟s perception on parental
monitoring, as well as parents‟ reporting of their supervision of children‟s
activities on the Internet.
Another assumption of the study was the heteronormativity, due mainly to the
heightened sensitivity of public opinion towards studies related to teenagers‟
sexuality.
In addition to this, the whole concept of ”dating” as an adult activity might not
be useful when thinking /talking about teenagers‟ romantic and sexual practices,
a more useful term could have been ”hooking up”, which is far different from the
entire ”dinner and a movie” experience.
Finally, the cross-sectional data collection does not allow any temporal
inferences at this point. Longitudinal designs could shed more light on the
dynamic of teenagers‟ online and offline romantic and sexual behavior.
Acknowledgements
This article is a result of the research project Risk and Effects of Internet Use
among Children and Adolescents;The Perspective of Evolution towards the
Knowledge Society financed by the Romanian Ministry of Education, type A
CNCSIS grant scheme (no. 1494/2007); research team coordinated by Maria
Roth, PhD. Babes-Bolyai University, Cluj-Napoca.
References
Barbovschi, M., & Diaconescu, M. (Eds.). (2008). Teenagers‟ Actions and
Interactions Online in Central and Eastern Europe. Potentials and Empowerment,
risks and victimization. Cluj: Cluj University Press.
Comș a, M., Sandu, D., Toth, A., Voicu, M., & Voicu, O. (2006). Public Opinion
Barometer. Perceptions about Mass-Media. Bucharest: Open Society Foundation.
Couch, D., & Liamputtong, P. (2008). Online dating and dating: The use of the
Internet to meet sexual partners.Qualitative Heath Research, 18, 268-280.
Daneback, K. (2006). Love and Sexuality on the Internet. Unpublished doctoral
dissertation, Goteborg, Goteborg University.
Davis, C. M., & Bauserman, R. (1993). Exposure to sexually explicit materials:
An attitude change perspective.Annual Review of Sex Research, 4, 121-209.
Davis, C. M., Hart, G., Bolding, G., Sherr, L., & Elford, J. (2006). E-Dating,
identity and HIV prevention: Theorising sexualities, risk and network society.
Sociology of Health & Illness, 28, 457-478.
Ellison, N., Heino, R., & Gibbs, J. (2006). Managing impressions online: Self-
presentation processes in the online dating environment. Journal of Computer-
Mediated Communication, 11(2). Retrieved Mai 2, 2009,
fromhttp://jcmc.indiana.edu/vol11/issue2/ellison.html
Finkelhor, D., Mitchell, K.J., & Wolak, J. (2000). Online victimization: A report
25. on the nation‟s youth. Alexandria, VA: National Center for Missing & Exploited
Children.
Fleming, M.J., Greentree, S., Cocotti-Muller, D., Elias, K.A., & Morrison, S.
(2006). Safety in cyberspace: Adolescents‟ safety and exposure online. Youth &
Society, 38, 135-154.
Gibbs, J.L., Ellison, N.B., & Heino, R.D. (2006). Self-presentation in online
personals: The role of anticipated future interaction, self-disclosure, and
perceived success in internet dating. Communication Research, 33, 152-177.
Goodstein, A. (2007). Totally Wired: What Teens and Tweens Are Really Doing
Online. New York: Saint Martin's Griffin.
Groof, S. de (2008). And my mama said…The (relative) parental influence on
fear of crime among adolescent girls and boys. Youth & Society, 39, 267-293.
Gross, E. F., Juvonen, J., & Gable, S. L. (2002). Internet use and well-being in
adolescence. Journal of Social Issues, 58, 75-90.
Harter, S. (1985). Competence as a dimension of self-evaluation: Toward a
comprehensive model of self-worth. In R.E. Leahy (Ed.), The Development of
the Self (pp. 55-121). Orlando, FL: Academic Press.
Heim, J., Brandtzæg, P.B., Kaare, B.H., Endestad, T., & Torgersen, L. (2007).
Children‟s usage of media technologies and psychosocial factors. New Media &
Society, 9, 425-454.
Hodkinson, P., & Lincoln, S. (2008). Online journals as virtual bedrooms?:
Young people, identity and personal space.Young, 16, 27-46.
Internet World Stats (2009). Internet usage in European Union [Table of
Internet users in European Union, March 31, 2009]. Retrieved May 26, 2009,
from http://www.internetworldstats.com/stats9.htm
Knox, D., Daniels, V., Sturdivant, L., & Zusman, M. (2001). College student use
of the Internet for mate selection.College Student Journal, 35, 158-160.
Korbin, J.E (2003). Children, childhoods, and violence. Annual Reviews of
Anthropology, 32, 431-446.
Kraut, R. E., Patterson, M., Lundmark, V., Kiesler, S., Mukhopadhyay, T., &
Scherlis, W. (1998). Internet paradox: A social technology that reduces social
involvement and psychological well-being? American Psychologist, 53, 1017-
1032.
Ledbetter, A. M. (2008). Media use and relational closeness in long-term
friendships: Interpreting patterns of multimodality. New Media & Society, 10,
547-565.
Lenhart, A. (2005). Protecting Teens Online. Washington, DC: The Pew Internet
& American Life Project.
Lenhart, A., & Madden, M. (2007). Teens, Privacy and Online Social Networks:
26. How Teens manage their Online Identities and Personal Information in the Age
of MySpace. Washington, DC: The Pew Internet & American Life Project.
Livingstone, S. (2002). Young People and New Media. London: Sage
Publications.
Livingstone, S. (2003). Children‟s use of the Internet: Reflections of the
emerging research agenda. New Media & Society, 9, 147-166.
Livingstone, S. (2008). Taking risky opportunities in youthful content creation:
Teenagers‟ use of social networking sites for intimacy, privacy and self-
expression. New Media & Society, 10, 393-411.
Mesch, G.S. (2009). Social bonds and Internet pornographic exposure among
adolescents. Journal of Adolescence, 32, 601-18.
Meyer, A. (2007). The moral rhetoric of childhood. Childhood 14(1), 85-104.
Mitchell, K.J., Finkelhor, D., & Wolak, J. (2001). Risk factors for and impact of
online sexual solicitations of youth (brief report). Journal of the American
Medical Association 285, 3011-3014. doi:10.1001/jama.285.23.3011.
Mitchell, K.J., Finkelhor, D., & Wolak, J. (2003a). Victimization of youth on the
Internet. Journal of Aggression, Maltreatment & Trauma, 8(1/2), 1-39.
Mitchell, K.J., Finkelhor, D., & Wolak, J. (2003b). The exposure of youth to
unwanted sexual material on the Internet. A national survey of risk, impact, and
prevention. Youth & Society, 34, 330-358.
Mitchell, K.J., Finkelhor, D., & Wolak, J. (2004). Victimization of youths on the
Internet. In J.L. Mullings, J.W. Marquart & D.J. Hartley (Eds.). The Victimization
of Children: Emerging Issues (pp. 1-39). New York, NY: The Haworth
Maltreatment & Trauma Press.
Moscardelli, D.M., & Divine, R. (2007). Adolescents‟ concerns for privacy when
using the Internet: An empirical analysis of predictors and relationships with
privacy- protective behaviors. Family and Consumer Science Research Journal,
35(3), 232-253.
Peter, J., & Valkenburg, P. (2006a). Adolescents‟ exposure to sexually explicit
material on the Internet.Communication Research, 33, 178-204.
Peter, J., & Valkenburg, P. (2006b). Research note: Individual differences in
perceptions of Internet communication.European Journal of Communication, 21,
213-226.
Peter, J., & Valkenburg, P. (2007). Who looks for casual dates on the Internet?
A test of the compensation and the recreation hypotheses. New Media & Society,
9, 455-474.
Peter, J., & Valkenburg, P. (2008). Adolescents‟ exposure to sexually explicit
Internet material, sexual uncertainty, and attitudes toward uncommitted sexual
exploration: Is there a link? Communication Research, 35, 579-601.
27. Rosen, L.D. (2006). Adolescents in MySpace: Identity formation, friendship and
sexual predators. (Executive summary). Retrieved December 17, 2008,
from http://www.csudh.edu/psych/...
Smith, A. (2007). Teens and Online Stranger Contact. (Data memo).
Washington, DC: The Pew Internet & American Life Project.
Toma, C.L., Hancock, J.T., & Ellison, N.B. (2008). Separating fact from fiction:
An examination of deceptive self-presentation in online dating
profiles. Personality and Social Psychology Bulletin, 34, 1023-1036.
Tynes, B.M. (2007). Internet safety gone wild?: Sacrificing the educational and
psychological benefits of online social environments. Journal of Adolescent
Research, 22, 575- 585.
Valkenburg, P., & Peter, J. (2008). Adolescents‟ identity experiments on the
Internet. Consequences for social competence and self-concept
unity. Communication Research, 35, 208-231.
Walsh, W.A., & Wolak, J. (2005). Nonforcible Internet-related sex crimes with
adolescent victims: Prosecution issues and outcomes. Child Maltreatment,
10(3), 260-271.
Walther, J. B., & Parks, M. R. (2002). Cues filtered out, cues filtered in:
Computer-mediated communication and relationships. In M. L. Knapp & J. A.
Daly (Eds.), Handbook of Interpersonal Communication (3rd Ed.). (pp. 529-
563). London: Sage Publications.
Wolak, J., Mitchell, K., & Finkelhor, D. (2002). Close online relationships in a
national sample of adolescents.Adolescence, 37, 441-455.
Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Unwanted and wanted exposure
to online pornography in a national sample of youth Internet users. Pediatrics,
119, 247-257.
Wolak, J., Finkelhor, D., Mitchell, K.J., & Ybarra, M.L. (2008). Online “predators”
and victims: Myths, realities and implications for prevention and
treatment. American Psychologist, 63, 111-128.
Ybarra, M.L., Mitchell, K.J., Wolak, J., & Finkelhor, D. (2006). Examining
characteristics and associated distress related to Internet harassment: Findings
from the second Youth Internet Safety Survey. Pediatrics, 118, 1168-1178.
Ybarra, M.L., Mitchell, K.J., Finkelhor, D., & Wolak, J. (2007, February). Internet
prevention messages. Targeting the right online behaviors. Archives of
Pediatrics & Adolescent Medicine, 161, 138- 145.
Ybarra, M.L., & Mitchell, K.J. (2008). How risky are social networking sites? A
comparison of places online where youth sexual solicitation and harassment
occurs. Pediatrics, 121, e350-e357.
(1) The pattern might not apply to SNS profiles, where teenagers tend to add
”friends” just to boost their online status.