"Cyber-deviance has been studied extensively over the past two decades, though owing to the elusive nature of cyberspace and the anonymity it affords its users, research has yet to paint a clear picture of the risk factors that predict online deviance. Early identification of these factors is critic
...
al to the development of effective crime prevention strategies. To date, a comprehensive review of the longitudinal risk factors associated with juvenile cyber-deviance, in all its forms, has yet to be examined. This study aims to address this research gap by conducting an exploratory systematic literature review appraising current knowledge on the risk factors associated with juvenile cyber-deviance. Various databases were systematically searched for relevant English-language journal articles comprising longitudinal studies on young people aged 12–17 years. Eligible studies included an outcome measure of any distinct form of deviance perpetrated using digital devices and/or the Internet, potential risk and/or protective factors, and quantitative analyses. This search yielded 26,926 studies, of which 38 met the inclusion criteria. Most of the studies found examined the longitudinal risk factors associated with cyberbullying, followed by studies on sexting, cyber dating abuse, and general cyber-delinquency. Results indicated several longitudinal factors were consistently associated with cyber-deviance (e.g., gender, physical bullying, low self-control, child-rearing, parental attachment, and deviant peers). Physical bullying had the most consistent and pronounced association with cyber-deviance. Most studies had a relatively sound methodological quality; however, the small number of studies and their concentration on cyberbullying requires that the findings be interpreted with caution. Additional high-quality research is needed examining the longitudinal risk factors associated with all types of cyber-deviance to identify vulnerable young people and prioritise them for intervention prospectively." (Abstract)
more
"De hecho, según los últimos datos del Ministerio del Interior3 en 2022 se presentaron 954 denuncias por delitos sexuales cibernéticos4 que tenían como víctima a un niño, niña o adolescente, de las cuales 64,6% eran chicas. Las denuncias que tienen como víctima a la infancia y adolescencia r
...
epresentan el 84% del total de este tipo de delitos. Así, como veíamos en nuestro informe “Violencia viral” tener entre 10 y 17 años y ser niña o chica adolescente aumenta la vulnerabilidad ante los delitos cibernéticos. Por ello, hemos querido reflejar también el abuso sexual infantil en internet, conocido como online grooming. Por todo ello, hemos analizado 33 sentencias5 correspondientes a 61 casos que corresponden a online grooming y hemos visto algunas diferencias respecto al abuso sexual infantil "físico." (Introducción)
more
"Bringing together 15 journalism scholars from around the world, this book explores and offers solutions to the common issues and inadequacies of reporting on sexual violence in the media. Presenting a range of conceptual, methodological, and empirical chapters, the book tackles issues related to, o
...
r missing, from journalism in three parts: Part I acknowledges and surveys the role journalism plays in shining a light on social injustices and critiques research deficits in reporting on sexual violence; Part II employs cutting-edge research linked to an intersectional lens to amplify the voices that have been silenced in the media coverage; Part III explores how advocacy, campaign, and solutions journalism offers frameworks for ethical reporting on the shadow epidemic of sexual violence during these COVID-normal times." (Publisher description)
more
"In 2023, Advancing Rights in Southern Africa (ARISA) through its consortium partner, Internews, undertook the most comprehensive review yet of laws affecting media practice and the freedom of expression, including cyber laws, penal codes, constitutions and acts of parliament, in the sixteen Souther
...
n African Development Community (SADC) countries. The Information Ecosystem Analysis (IEA) provides an in-depth overview of the legal provisions that have been enacted or are in various stages of becoming laws in the region, and are being used by SADC governments to stifle and limit press freedom and public debate. Each of the sixteen SADC countries are included as individual country chapters in this report, providing country-specific legal analyses of the relevant Cyber security and related laws used by the respective country’s governments to stifle freedom of expression. The approach used by the researchers considered the legislative environment together with literature on the relevant topics, court cases and media reports about the application of specific laws and focused on incidents of where laws were used, dating from 2020 to present. The respective country analyses have been informed by extensive virtual interviews conducted with journalists, civil society representatives and academics in the region. Attention was also given to countries holding elections in 2023 and 2024." (Executive summary)
more
"The intention of this Brief is to support sports organizations – clubs and associations at both the grassroots and professional levels – to better protect children online. It aims to help:
– Develop a dedicated child online protection strategy and policy, which can be integrated into existin
...
g child protection frameworks or guidelines and into child-friendly statements.
– Develop specific procedures and codes of conduct to promote safe online practices for children, young people and staff (e.g. for the use of videoconferencing platforms, social networks and Wi-Fi services).
– Define a protection focal point to receive reports and complaints from victims of online violence and establish mechanisms to respond effectively, linking victims to the appropriate support and referral services.
– Provide capacity building for children, coaches, parents, educators and staff, and support efforts towards the development of their digital skills." (Page 2)
more
"This article takes up the popular argument that much online discussion is toxic and hence harmful to democracy, and argues that the pervasiveness of incivility is not incompatible with democratically relevant political talk. Instead of focusing on the tone of political talk, scholars interested in
...
understanding the extent to which digital platforms threaten democratic values should focus on expressions of intolerance. I demonstrate the validity of this conceptual model by investigating the discursive and contextual features associated with incivility and intolerance online in the context of public comments in two different platforms—news websites and Facebook. Results show that incivility and intolerance occur in meaningfully different discussion settings. Whereas incivility is associated with features that reveal meaningful discursive engagement, such as justified opinion expression and engagement with disagreement, intolerance is likely to occur in homogeneous discussions about minorities and civil society—exactly when it can hurt democracy the most." (Abstract)
more
"[...] Filipino youth characterize bullying and harassment on social media as an intersection of three key dimensions: targets, acts and, spaces. We thus need to account for this by rethinking our understanding of how young people identify and experience them. Bullying and harassment on social media
...
happen both in social and technological contexts and, as such, include a wide range of targets [individuals, groups and ideas], acts [direct or veiled], and spaces [bounded and open]. Since the youth interpret the many configurations of these dimensions in personal ways, we should broaden how bullying and harassment have been traditionally defined [...]" (Executive summary)
more
"Im Januar 2022 werden die UN-Mitgliedstaaten Verhandlungen über ein globales Abkommen zur Bekämpfung der Cyberkriminalität aufnehmen. Mehr internationale Zusammenarbeit in diesem Bereich ist dringend geboten. Doch es gibt auch Risiken. So könnten vage Verpflichtungen, etwa zur Überwachung des
...
Internetverkehrs, von autoritären Regimen missbraucht werden, um unter dem Deckmantel der Kriminalitätsbekämpfung gegen Aktivisten und Oppositionelle vorzugehen. Um dies zu verhindern, müssen die Menschenrechte als Referenzrahmen gestärkt werden, fordert Mischa Hansel im Global Governance Spotlight 5-2021." (Verlagsbeschreibung)
more
"Cyber bullying has become a topical issue among school learners in South Africa. However, there is very little guidance for schools on how to deal with cyber bullying from the South African Department of Basic Education. This study investigated the perceptions of cyber bullying in primary and secon
...
dary schools among student teachers in the Eastern Cape. The study made use of a quantitative survey approach to collect data from 150 student teachers at a university in the Eastern Cape. The student teachers were representative of all four of the school phases. The results indicated that cyber bullying is a serious issue at the schools but that the topic has not been incorporated into policy or the school curriculum yet. The recommendation of the study is that the South African Department of Basic Education must provide a standardized policy that schools can use to implement and enforce cyber safety behavior in the schools." (Abstract)
more
"Hier in Kapitel 1 definieren wir einige grundlegende Begriffe, aus denen bereits der Ansatz der Autoren zu entnehmen ist. In Kapitel 2 geht es um Begriffsklärungen und Hintergrundwissen zum Thema Mobbing, Cyber-Mobbing und (Cyber)Mobbing. Insbesondere wird dabei auf die Dynamik des Mobbings und au
...
f die Spezifika des Mobbings mit digitalen Mitteln eingegangen. In Kapitel 3 werden vier Fälle von (Cyber)Mobbing aus der Praxis beschrieben. Sie zeigen in knapper Form, wie man mit Hilfe des Systemischen Konfliktmanagements bei (Cyber)Mobbing vorgehen kann. In Kapitel 4 stellen wir zwei Interventionsmethoden vor, die erfolgreich wissenschaftlich evaluierte Systemische Mobbingintervention (SMI) und die vielfach praxiserprobte Systemische Kurzintervention (SKI). In Kapitel 5 wird Systemisches Konfliktmanagement (SKM) als Bestandteil von Schulentwicklung mit Zielen, Maßnahmen und Teilprozessen ausführlich beschrieben. Sie erfahren, wie man den Schweregrad eines Falles eruiert und die dazu passenden Interventionen findet und durchführt. Die in Kapitel 4 beschriebenen Interventionsmethoden sind darin eingebettet. Am Ende des Kapitels erhalten Sie eine Kurzanleitung, auf die Sie im Notfall zurückgreifen können. Kapitel 6 beschreibt einen fünften (Cyber)Mobbing-Fall („Der Fall Nele“). Darin werden der Fall und das Vorgehen mittels Systemischen Konfliktmanagements ausführlich geschildert. Besonders für eilige Leser ist es empfehlenswert, diese Fallgeschichte zuerst zu lesen, bevor sie sich intensiv mit den Grundlagen des SKM in Kapitel 5 beschäftigen. Im Kapitel 6 erfahren sie anhand des Fallbeispiels, wie es praktisch gut laufen kann, um in Kapitel 5 zu erfahren, auf welchem konzeptionellen Hintergrund dies geschieht. In Kapitel 7 geht es um den pädagogischen Gesamtrahmen. Alles Wissen im Umgang mit (Cyber-)Mobbing darf nicht darüber hinwegtäuschen, dass eine Intervention nur dann eine nachhaltige Wirkung entfaltet, wenn sie auf einem pädagogischen Fundament steht. Dazu zählen Mut zur Führung, Souveränität und Bedürfnisorientierung, eine klare Werte- und Normorientierung, das Fördern personaler Kompetenzen, insbesondere der Fähigkeit zur Selbststeuerung, die Einbettung der Methoden in eine Motivations- und Beziehungskultur und die Förderung von emotionaler Empathie und Mitgefühl. Diese Aufzählung ist umfangreich und klingt anspruchsvoll — in Kapitel 7 wird sie mit Leben gefüllt. In Kapitel 8 finden sich zehn ausgearbeitete Praxisprojekte zur Präventionsarbeit in Klassen oder Gruppen zu (Cyber)Mobbing. Diese Projekte können ohne aufwendige Vorbereitungen umgesetzt werden. Lehrkräfte, Schulleitungen, Schulsozialarbeiter, Schulpsychologen, Präventionsbeauftragte, Multiplikatoren und Fortbildner aus Schule, Jugendhilfe und Polizei erhalten methodisch-didaktische Hinweise und Hintergrundinformationen für die rein vorbeugende Arbeit." (Einfürhung, Seite 9-10)
more
"While cyberviolence may be targeted at any individual or group and may entail a wide range of acts, this mapping study focuses in particular on children and women, who are often the victims of cyberviolence. The experience and solutions with regard to these victims should modus modendi be applicabl
...
e to other categories of victims while taking into account the specificities of violence against different categories of victims. The present study is thus aimed at mapping acts that constitute cyberviolence and drawing conclusions as to typologies and concepts; providing examples of national experiences and responses to such acts (including policies, strategies, legislation, cases and case law); discussing international responses under the Budapest Convention and other treaties (in particular the Istanbul and Lanzarote Conventions of the Council of Europe); developing recommendations as to the further course of action." (Page 2)
more