130<strong>Comunicar</strong>, <strong>39</strong>, XX, 20121. Introduction1.1. Internet and social networks: a new socialenvironmentThe increasing use of information and communicationstechnologies (ICTs) in everyday life hasbrought about considerable changes in many areas.One such area is that of interpersonal relationships,which are now no longer exclusively direct but alsoindirect and conducted by means of digital devices.We now live in what Azuma (1997) calls «augmentedreality»: our activities tend to combine physical realitywith virtual elements capable of supporting and impr ov -ing them. Internet, and in particular social networks,plays a major role in this augmented reality, especiallyamong young people, a group which uses theseresources to an increasingly greater extent. Latest fi -gures in Spain show that 55% of regular Internet usersaccess social networks, rising to 84% among youngpeople aged between 10 and 18 (Garmendia, Garita -onandia, Martínez & Casado, 2011), an age group inwhich nine out of 10 boys and girls have a social networkprofile.Social networks represent the most important facetof Internet’s social dimension. They are essentiallyweb services that are used for regular communicationand sharing information, in which users make up anonline community where they can interact with otherpeople who share some or all of their interests (Boyd& Ellison, 2007). The key to the potential of socialnetworks as a unique, attractive environment for interpersonalrelationships lies in this element of self-selection.It has been claimed, perhaps with some exagger -ation that the social situation of a person who lacksfriends or contacts in a social network differs from thatof a person with real friends and online contacts(Christakis & Fowler, 2010). Life is now lived in bothphysical and virtual environments. In terms of cultivat -ing interpersonal relationships these virtual environmentsoffer new opportunities, creating what Azuma(1997) calls «augmented reality» in which the interdependenceof the physical and virtual worlds is takenfor granted and the differences between the two arepassed over. Virtual resources offer several socialadvantages: they make it easier to establish inter per s on -al relationships, they contribute to diversity in the typesof social relationships cultivated, they facilitate ubiquityand they increase the amount of information availablein real time (Winocur, 2006). But these advantagescan become disadvantages if they are used incorrectly.Belonging to a social network means making decisionsabout our own intimacy (Liu, 2007), and those decisionsare not always made consciously or sensibly(Stuzman, 2006). In other words, virtual life involvescertain identity-related issues that people need to learnto deal with (Reig & Fretes, 2011).1.2. Risks posed by Internet and social networksThe use of Internet and social networks involvescertain risks which are particularly serious among childrenand young people (Dinev & Hart, 2004; Eche -burúa & Corral, 2009; 2010; Graner, Beranuy-Far gues,Sánchez-Carbonell, Chamarro & Castellana, 2007; Or -tega, Calmaestra & Mora-Merchán, 2008). They in -clude: a) loss of control over personal informationaccessible on Internet; b) addiction to this type of technologyand the consequent absence or decline of ac -tivities or relationships necessary for healthy development;and c) cyber-harassment, as an indirect form ofthe age-old problem of school bullying.Lack of control over information can be exploitedby others to ridicule, intimidate or blackmail (Dinev &Hart, 2004; Dinev, Xu & Smith, 2009). The informationuploaded by a person, or by others, constitutes thebasis for the virtual identity that is being created forthat person. Although it may not affect the person’severyday life (Turkle, 1997), manipulation of thatinformation by others or lack of control over it by theperson in question may place that person in a positionof vulnerability by removing their intimacy (Nosko,Wood & Molema, 2010) thereby damaging theirsocial relationships. One example of this is «sexting»(McLaughlin, 2010; Stone, 2011), a practice which isbecoming increasingly widespread among Spanish teen -agers (Agustina, 2010) and which involves postinghalf-naked pictures in virtual environments. This isinevitably harmful for minors, who believe that theirconduct in those virtual environments is in no wayconnected to their real lives (Menjívar, 2010).Internet activity can create addiction. Boys andgirls who spend a lot of time in front of a computerscreen, neglecting their duties and their own leisuretime and basing their relationships with others on technologicalinteraction, may begin to show signs of un -ease when they are not using a computer or a cellphone. ICTs abuse is a risk which may negativelyaffect quality of life for teenagers in a hyper-technologicalworld, reducing their freedom and possibly cre -ating addiction (Echeburúa & Corral, 2009; 2010).Cyberbullying is another risk posed by the virtualworld for teenagers and young people. For bullies thisvirtual environment offers a space less invigilated byadults and by the authorities (Tejerina & Flores,2008). Cyber-harassment can be divided into twomain types: «grooming» and «cyberbullying».© ISSN: 1134-3478 • e-ISSN: 1988-3293• Pages 129-137
131Grooming, also known as «child-grooming» in legalparlance, refers to the procedure by which an adultestablishes a relationship with a minor in order toachieve some kind of sexual satisfaction (Monge,2010). Cyberbullying is defined as aggressive inten -tional acts carried out by a group or individual, usingelectronic forms of contact, repeatedly and over timeagainst a victim who cannot easily defend him or herself(Smith, Mahdavi, Carvalho & Tippett 2006).Many researchers consider it an indirect form of traditionalbullying (Ortega & Mora Merchán, 2008; Smith& al., 2006), characterized bya series of specific featureswhich include: a) the channelsof communication are alwaysopen, and aggression can thereforetake place at any time andin any place; b) attacks can bewitnessed an indefinite numberof times by large numbersof spectators and c) victimsmay never know who theirattackers are because thechannels used allow a highdegree of anonymity.These risks have increasedbecause it is precisely teen -agers and young people whohave become computer literatemuch faster and to a muchbroader extent than the adultpopulation, thus giving rise towhat is known as the digital gap (Piscitelli, 2006,Marín and González-Piñal, 2011). Significantly, 80%of young Spaniards say they learned to use Internetwithout the help of an adult (Bringué & Sádaba 2011).1.3. School: a key area for encouraging cybersocializationSchools play a crucial role in developing children’stechnology skills (OECD, 2005). Such skills should notbe seen merely as familiarity with tools and devices,but should be addressed jointly with other capabilities,such as those of citizenship and personal autonomy(Ricoy, Sevillano & Feliz, 2011). In the new skillsbasedapproach to syllabus design, the functional,healthy mastery of ICTs constitutes a basic buildingblock for the development of personal autonomy,learning-to-learn skills and a cosmopolitan sense of citizenship(Ortega, Del Rey & Sánchez, 2011). Theneed to take action and help the whole educationcommunity is also a priority issue in new psychosocialInternet activity can create addiction. Boys and girls whospend a lot of time in front of a computer screen, neglectingtheir duties and their own leisure time and basing theirrelationships with others on technological interaction, maybegin to show signs of unease when they are not using acomputer or a cell phone. ICTs abuse is a risk which maynegatively affect quality of life for teenagers in a hypertechnologicalworld, reducing their freedom andpossibly creating addiction.models based on scientific evidence (Del Rey &Ortega, 2011). Schools should be seen as learningcommunities in which interaction between the playersinvolved can be analyzed in terms of their mutual supportas complementary elements within the task ofeducating. Schools are places of convivencia (harmoniousinteraction) and development in which youngpeople should play a major role as learners: in the fieldof digital literacy, they are often ahead of their ownresponsible adults. This may upset the teaching-learningpattern and make it necessary to rethink conventionalapproaches. Teenagers and young people, considereddigital natives (Prensky, 2001), may be quickerand more efficient in the use of digital devices but theynevertheless need support and supervision in the psychosocialprocesses which take place when socializingis conducted via digital activity. The generation gapmentioned above needs to be narrowed so that it canbe the corresponding adults –teachers and families–who educate minors in the new facet of life repre -sented by Internet.But the same thing has happened here as so oftenhappens in education. The need to take action hasaris en before the scientific community and, above all,the public authorities, have the information necessaryto be able to establish suitable procedures. Although inSpain a series of good practices do exist with thisobjective in mind (Luengo Latorre, 2011; Del Rey &al., 2010; Mercadal, 2009, and others), no empiricallyproven practices, procedures or evidence –based programsare yet available (Navarro, Giribet & Aguinaga,<strong>Comunicar</strong>, <strong>39</strong>, XX, 2012© ISSN: 1134-3478 • e-ISSN: 1988-3293• Pages 129-137
- Page 2 and 3:
© COMUNICAR, 39; XXLATIN AMERICAN
- Page 4 and 5:
4Comunicar, 39, XX, 2012C O N T E N
- Page 6 and 7:
6Comunicar, 39, XX, 2012Submission
- Page 8 and 9:
8Comunicar, 39, XX, 2012EditorialTh
- Page 10 and 11:
10Comunicar, 39, XX, 2012Introducti
- Page 12 and 13:
12Comunicar, 39, XX, 2012All these
- Page 14 and 15:
14Comunicar, 39, XX, 2012civic part
- Page 16 and 17:
16Comunicar, 39, XX, 20121. Introdu
- Page 18 and 19:
18Comunicar, 39, XX, 2012ponsible u
- Page 20 and 21:
20Comunicar, 39, XX, 20122.3.3. Cas
- Page 22 and 23:
22Comunicar, 39, XX, 2012best pract
- Page 24 and 25:
24Comunicar, 39, XX, 2012© ISSN: 1
- Page 26 and 27:
26Comunicar, 39, XX, 20121. Introdu
- Page 28 and 29:
28Comunicar, 39, XX, 2012tors for a
- Page 30 and 31:
30Comunicar, 39, XX, 2012This compe
- Page 32 and 33:
32Comunicar, 39, XX, 2012Croce, 200
- Page 34 and 35:
34Comunicar, 39, XX, 2012© ISSN: 1
- Page 36 and 37:
36Comunicar, 39, XX, 20121. Introdu
- Page 38 and 39:
38Comunicar, 39, XX, 2012the approp
- Page 40 and 41:
40Comunicar, 39, XX, 2012Table 3: I
- Page 42 and 43:
42Comunicar, 39, XX, 2012racy could
- Page 44 and 45:
44Comunicar, 39, XX, 2012© ISSN: 1
- Page 46 and 47:
46Comunicar, 39, XX, 20121. Introdu
- Page 48 and 49:
48Comunicar, 39, XX, 2012data, the
- Page 50 and 51:
50Comunicar, 39, XX, 2012habits of
- Page 52 and 53:
52Comunicar, 39, XX, 2012Acknowledg
- Page 54 and 55:
54Comunicar, 39, XX, 20121. Introdu
- Page 56 and 57:
56Comunicar, 39, XX, 2012and the ne
- Page 58 and 59:
58Comunicar, 39, XX, 2012interest i
- Page 60 and 61:
60Comunicar, 39, XX, 2012land, medi
- Page 62 and 63:
62Comunicar, 39, XX, 2012more than
- Page 64 and 65:
64Comunicar, 39, XX, 2012© ISSN: 1
- Page 66 and 67:
66Comunicar, 39, XX, 20121. Introdu
- Page 68 and 69:
68Comunicar, 39, XX, 2012Internet.
- Page 70 and 71:
70Comunicar, 39, XX, 2012basic feat
- Page 72 and 73:
72Comunicar, 35, XVIII, 2010(www.cy
- Page 74 and 75:
74Comunicar, 39, XX, 20121. Introdu
- Page 76 and 77:
76Comunicar, 39, XX, 2012country an
- Page 78 and 79:
78Comunicar, 39, XX, 2012was precis
- Page 80 and 81: 80Comunicar, 39, XX, 2012end, not a
- Page 82 and 83: 82Comunicar, 39, XX, 20121. Introdu
- Page 84 and 85: 84Comunicar, 39, XX, 2012media thro
- Page 86 and 87: 86Comunicar, 39, XX, 2012tegies for
- Page 88 and 89: 88Comunicar, 39, XX, 2012researcher
- Page 90 and 91: 90Comunicar, 39, XX, 2012© ISSN: 1
- Page 92 and 93: 92Comunicar, 39, XX, 20121. The imp
- Page 94 and 95: 94Comunicar, 39, XX, 2012literacy i
- Page 96 and 97: 96Comunicar, 39, XX, 2012Finally, t
- Page 98 and 99: 98Comunicar, 39, XX, 2012them. The
- Page 100 and 101: 100Comunicar, 39, XX, 2012© ISSN:
- Page 102 and 103: 102Comunicar, 39, XX, 2012«What ma
- Page 104 and 105: 104Comunicar, 39, XX, 2012categoriz
- Page 106 and 107: 106Comunicar, 39, XX, 20121) Being
- Page 108 and 109: 108Comunicar, 39, XX, 2012aprendiza
- Page 110 and 111: 110Comunicar, 39, XX, 2012© ISSN:
- Page 112 and 113: 112Comunicar, 39, XX, 20121. Introd
- Page 114 and 115: 114Comunicar, 39, XX, 2012Antena3,
- Page 116 and 117: 116Comunicar, 39, XX, 201224 to 29
- Page 118 and 119: 118Comunicar, 39, XX, 2012Opera. Lo
- Page 120 and 121: 120Comunicar, 39, XX, 20121. Introd
- Page 122 and 123: 122Comunicar, 39, XX, 2012hypertext
- Page 124 and 125: 124Comunicar, 39, XX, 2012Figure 1.
- Page 126 and 127: 126Comunicar, 39, XX, 2012needs, gr
- Page 128 and 129: 128Comunicar, 39, XX, 2012© ISSN:
- Page 132 and 133: 132Comunicar, 39, XX, 20121999; Sac
- Page 134 and 135: 134Comunicar, 39, XX, 2012• Analy
- Page 136 and 137: 136Comunicar, 39, XX, 2012young; pa
- Page 138 and 139: 138Comunicar, 39, XX, 2012© ISSN:
- Page 140 and 141: 140Comunicar, 39, XX, 20121. Introd
- Page 142 and 143: 142Comunicar, 39, XX, 20121, and co
- Page 144 and 145: 144Comunicar, 39, XX, 2012Figure 5.
- Page 146 and 147: 146Comunicar, 39, XX, 2012can be de
- Page 148 and 149: 148Comunicar, 39, XX, 20129.6. Focu
- Page 150 and 151: 150Comunicar, 39, XX, 2012© ISSN:
- Page 152 and 153: 152Comunicar, 39, XX, 20121. Introd
- Page 154 and 155: 154Comunicar, 39, XX, 20122010), sp
- Page 156 and 157: 156Comunicar, 39, XX, 2012media use
- Page 158 and 159: 158Comunicar, 39, XX, 2012QAYYUM, M
- Page 160 and 161: 160Comunicar, 39, XX, 20121. Introd
- Page 162 and 163: 162Comunicar, 39, XX, 2012variety o
- Page 164 and 165: 164Comunicar, 39, XX, 2012Figure 1.
- Page 166 and 167: 166Comunicar, 39, XX, 2012contribut
- Page 168 and 169: 168Comunicar, 39, XX, 2012© ISSN:
- Page 170 and 171: 170Comunicar, 39, XX, 20121. Introd
- Page 172 and 173: 172Comunicar, 39, XX, 2012meanings:
- Page 174 and 175: 174Comunicar, 39, XX, 2012This comp
- Page 176 and 177: 176Comunicar, 39, XX, 2012Reference
- Page 178 and 179: 178Comunicar, 39, XX, 20121. Introd
- Page 180 and 181:
180Comunicar, 39, XX, 2012eating ha
- Page 182 and 183:
182Comunicar, 39, XX, 2012shows tha
- Page 184 and 185:
184Comunicar, 39, XX, 2012© ISSN:
- Page 186 and 187:
186Comunicar, 39, XX, 20121. Introd
- Page 188 and 189:
188Comunicar, 39, XX, 2012famous).
- Page 190 and 191:
190Comunicar, 39, XX, 20123.2.3. Th
- Page 192 and 193:
192Comunicar, 39, XX, 2012BIRESSI,
- Page 194 and 195:
194Comunicar, 39, XX, 20121. Introd
- Page 196 and 197:
196Comunicar, 39, XX, 2012Table 1.
- Page 198 and 199:
198Comunicar, 39, XX, 2012Graph 3.
- Page 200 and 201:
200Comunicar, 39, XX, 2012In one of