136<strong>Comunicar</strong>, <strong>39</strong>, XX, 2012young; part of the students’ learning process and justanother subject teachers are required to impart as partof the syllabus. Teachers should receive ongoing train -ing in this field, thereby narrowing the digital gapwhich separates them from their students and enablingthem to provide help and guidance. In the same vein,families should know about their children’s onlinesocial environment in order to be able to help and supportthem. To conclude, ConRed has shown how, byworking in collaboration with the whole educationcommunity, it is possible to improve the quality of adolescents’lives, both virtual and real.The ConRed program is the beginning of a seriesof evidence-based practices aimed at improving thesociety in which we live through education. Never -theless, this study inevitably has certain limitations andfurther research yet needs to be carried out. For example,our data was collected from only three schoolsand the research team played a very active role in theaction taken with the students. In the future, moreschools should be included in the research and re -sponsibility for the program should be passed on toeach school’s teaching staff, providing them with theautonomy they should ideally enjoy when implement -ing programs of this type.Despite its limitations, the study allows us to concludethat projects implemented today to encourageharmonious interpersonal relationships (convivencia)in schools should at least be supported by short terminitiatives addressing social relationships in virtual environments.We know that by involving students, tea -chers and families it is possible to improve young people’sknowledge of and control over social networks,narrow the generation gap which exists between digitalnatives and immigrants and alleviate the problemsassociated with the inappropriate use of ICTs. Andthat is how cyberbullying, and especially cyber-victimization,can be reduced. In view of all this, at least fourthings should be taken into consideration by the educationauthorities: the vital importance of awarenessraisingcampaigns in the education community; themain line of action should be teacher training and theboosting of teachers’ confidence in their ability; thisshould ideally be articulated through the introductionof new education legislation; and financial support isneeded to make it possible.SupportThis program was funded by the European Project: Cyberbullyingin adolescence: investigation and intervention in six EuropeanCountries» (Code: JLS/2008/CFP1DAP12008-1; European Union,DAPHNE III Program) and by the University of Cordoba.ReferencesAGUSTINA, J.R. (2010). ¿Menores infractores o víctimas de pornografíainfantil? Respuestas legales e hipótesis criminológicas ante elSexting. <strong>Revista</strong> Electrónica de Ciencia Penal y Criminología, 12,(11), 1-44.AZUMA, R. (1997). A Survey of Augmented Reality. Presence: Tele -operators and Virtual Environments. 6, (4), 355-385.BANDURA, A. (1977). Social Learning Theory. Englewood Cliff,NJ. Prentice Hall.BANDURA, A. (1986). Social Foundations of Thought and Action.Englewood Cliff, NJ: Prentice Hall.BERANUY, M., CHAMARRO, A., GRANER C. & SÁNCHEZ-CARBONELL,X. (2009). Validación de dos escalas breves para evaluar la adiccióna Internet. Psicothema 3, 480-485.BORSARI, B. & CAREY, K.B. (2003). Descriptive and injunctive normsin college drinking: A meta-analytic integration. Journal of Studieson Alcohol, 64, 331-341.BOYD, D.M. & ELLISON, N.B. (2007). Social Network Sites: De fi -nition, History, and Scholarship. Journal of Computer-Media tedCom munication, 13 (1), 210-230.BRINGUÉ, X. & SÁDABA, C. (2011). Menores y redes sociales. Ma -drid: Colección Foro Generaciones Interactivas/Fundación-Tele -fónica. (www.generacionesinteractivas.org/?page_id=1678).CHRISTAKIS, N. & FOWLER, J. (2010). Conectados. Madrid: Tau rus.DAVIES, P. (1999). What is Evidence-based Education? BritishJournal of Educational Studies, 47, 108-121.DEL REY, R. & ORTEGA, R. (2011). An Educative Program to Copewith Cyberbullying in Spain: CONRED. In Conference EvidencebasedPrevention of Bullying and Youth Violence: European Inno -va tion and eEperience. Cambridge, UK, 5-6 July 2011.DEL REY, R., FLORES, J., GARMENDIA, M. & AL. (2010). Protocolo deactuación escolar ante el cyberbullying. Bilbao: Gobierno Vasco.DEL REY, R., CASAS, J.A. & ORTEGA, R. (under review). SpanishValidation of the European Cyberbullying Questionnaire fromDaphne Project.DINEV T. & HART, P. (2004). Internet Privacy Concerns and TheirAntecedents, Measurement Validity and a Regression Model. Beha -viour & Information Technology 23 (6), 413-422.DINEV, T., XU, H. & SMITH, H.J. (2009). Information Privacy andCorrelates: An Attempt to Navigate in the Misty Conceptual Wa -ters. Proceedings of 69 th Annual Meeting of the Academy of Ma -na gement (AOM 2009). Chicago: Illinois.ECHEBURÚA, E. & CORRAL, P. (2009). Las adicciones con o sindroga: una patología de la libertad. In E. ECHEBURÚA, F.J.LABRADOR & E. BECOÑA (Eds.). Adicción a las nuevas tecnologíasen adolescentes y jóvenes (pp. 29-44). Madrid: Pirámide.ECHEBURÚA, E. & CORRAL, P. (2010). Adicción a las nuevas tecnologíasy a las redes sociales en jóvenes: un nuevo reto. Adicciones,22, (2), 91-96.GARMENDIA, M., GARITAONANDIA, C., MARTÍNEZ, G. & CASADO,M.A. (2011). Riesgos y seguridad en internet: Los menores españolesen el contexto europeo. Universidad del País Vasco/Euskal He -rriko Unibertsitatea, Bilbao: EU Kids Online.GRANER, P., BERANUY-FARGUES, M., SÁNCHEZ-CARBONELL, C. &AL. (2007). ¿Qué uso hacen los jóvenes y adolescentes de Internety del móvil? In L. ALVAREZ-POUSA & J. E. PIM (Eds.), CongresoComunicación e Xuventude: Actas do Foro Internacional, 71-90.GRANERO, R., DOMÉNECH, J.M., BONILLO, A. & EZPELETA, L.(2001). Psicología basada en la evidencia: Un nuevo enfoque parame jorar la toma de decisiones. Madrid: VII Congreso deMetodología de las Ciencias Sociales y de la Salud.GRIFFITHS, M.D. (2005). Internet Abuse in the Workplace, Issues© ISSN: 1134-3478 • e-ISSN: 1988-3293• Pages 129-137
137and Concerns for Employers and Employment Counselors. Journalof Employment Counseling, 40, 87-96.HAINES, M. & SPEAR, S.F. (1996). Changing the Perception of theNorm: A Strategy to Decrease Binge Drinking Among CollegeStudents. Journal of American College Health, 45, 134-140.HUNSLEY, J. & JOHNSTON, C. (2000). The Role of EmpiricallySupported Treatments in Evidence-Based Psychological Practice: ACanadian Perspective. Clinical Psychology: Science & Practice, 7,269-272.HUNTER, S. & BOYLE, J. (2004). Appraisal and Coping StrategyUse in Victims of School Bullying. British Journal of EducationalPsychology, 74, 83-107.LAPINSKI, M.K. & RIMAL, R.N. (2005). An Explication of SocialNorm. Communication Theory, 5, (2), 127-147LINDQVIST, P. & SKIPWORTH, J. (2000). Evidence-Based Reha bi li -tation in Forensic Psychiatry. British Journal of Psychiatry, 176,320-323.Liu, H. (2007) Social Network Profiles as Taste Performances.Jour nal of Computer-Mediated Communication, 13 (1), 252-275.LUENGO-LATORRE, J.A. (2011). Cyberbullying, guía de recursospara centros educativos. La intervención en los centros educativos:Materiales para equipos directivos y acción tutorial. Madrid: De -fensor del Menor.MACHARGO, J., LUJÁN, I., LEÓN, M.E., LÓPEZ, P. & MARTÍN, M.A.(2003). Videojuegos por los adolescentes. Anuario de Filosofía,Psicología y Sociología, 6, 159-172.MARÍN, I. & GONZÁLEZ-PIÑAL, R. (2011). Relaciones sociales en lasociedad de la Información. Prisma Social, 6, 119-137.MCLAUGHLIN, J.H. (2010). Crime and Punishment: Teen Sextingin Context. (http://works.bepress.com/julia_mclaughlin) (02-02-2012).MENJIVAR, M. (2010). El sexting y l@s nativ@s neo-tecnológic@s:Apuntes para una contextualización al inicio del siglo XXI. Actua -lidades Investigativas en Educación, 10, (2), 1-23.MERCADAL, R. (2009). Pantallas amigas. Comunicación y Peda go -gía, 2<strong>39</strong>, 55-57.MONGE, A. (2010). De los abusos y agresiones sexuales a menoresde trece años tras la reforma penal de 2010. <strong>Revista</strong> de Derecho yCiencias Penales, 15, 85-103.MONTERO, I. & LEÓN, O.G. (2007). Guía para nombrar los estudiosde investigación en Psicología. International Journal of Clini -cal and Health Psychology, 7, 847-862.NAVARRO, F., GIRIBET, C. & AGUINAGA, E. (1999). Psiquiatría basadaen la evidencia: Ventajas y limitaciones. Psiquiatría Biológica, 6,77-85.NOSKO, A., WOOD, E. & MOLEMA, S. (2010). All about Me: Dis -clo sure in Online Social Networking profiles: The Case of Face -book. Computers in Human Behavior. 26, (3), 406-418.OECD (Ed.) (2005). Policy Coherence for Development. Pro -moting Institutional Good Practice. The Development DimensionSeries. Paris: OECD.ORTEGA, R. (1997). El proyecto Sevilla Anti-violencia Escolar. Unmodelo de intervención preventiva contra los malos tratos entreiguales. <strong>Revista</strong> de Educación, 313, 143-158.ORTEGA, R. & DEL REY, R. (2001). Aciertos y desaciertos del proyectoSevilla Anti-violencia Escolar (SAVE). <strong>Revista</strong> de Educación.324, 253-270.ORTEGA, R. & MORA-MERCHÁN, J.A. (2008). Las redes de igualesy el fenómeno del acoso escolar: explorando el esquema dominiosumisión.Infancia y Aprendizaje, 31 (4), 515-528.ORTEGA, R., CALMAESTRA, J. & MORA-MERCHÁN, J. (2008). Cy -ber bullying. International Journal of Psychology and Psycho lo gicalTherapy, 8(2), 183-192.ORTEGA, R., DEL REY, R. & SÁNCHEZ, V. (2011). Nuevas dimensionesde la convivencia escolar y juvenil. Ciberconducta y relacionesen la Red: Ciberconvivencia. Madrid: Observatorio Estatal dela Convivencia Escolar. Informe interno.PISCITELLI, A. (2006). Nativos e inmigrantes digitales, ¿Brecha generacional,brecha cognitiva, o las dos juntas y más aún? <strong>Revista</strong> Me -xi cana de Investigación Educativa, 11 (28), 179-185.PRENSKY, M. (2001). Digital Natives, Digital Immigrants. On theHorizon, 9, 1-6.REIG, D. & FRETES, G. (2011). Identidades digitales: límites pococlaros. Cuadernos de Pedagogía, 418, 58-59.RICOY, M.C., SEVILLANO, M.L. & Feliz, T. (2011). Competenciasnecesarias para la utilización de las principales herramientas deInternet en la educación. <strong>Revista</strong> de Educación, 356, 483-507.RIMAL, R., LAPINSKI, M., COOK, R. & REAL, K. (2005). MovingToward a Theory of Normative Influences: How PerceivedBenefits and Similarity Moderate the Impact of Descriptive Normson Behaviors. Journal of Health Communication, 10, 433-50.RIMAL, R.N. & REAL, K. (2003). Understanding the Influence ofPerceived Norms on Behaviors. Communication Theory, 13, 184-203.RIMAL, R.N. & REAL, K. (2005). How Behaviors are Influenced byPerceived Norms: A Test of the Theory of Normative Social Be -havior. Communication Research, 32, 389-414.SACKETT, D.L., RICHARDSON, W.S., ROSENBERG, W. & HAYNES,R.B. (1997). Medicina basada en la evidencia: Cómo ejercer yenseñar la MBE. Churchill Livingston.SMITH, P.K., MAHDAVI, J., CARVALHO, M., FISHER, S., RUSSELL, S.& TIPPETT, N. (2008). Cyberbullying: its Nature and Impact in Se -condary School Pupils. Journal of Child Psychology and Psy -chiatry, 49, 376-385.SMITH, P.K., MAHDAVI, J., CARVALHO, C. & TIPPETT, N. (2006).An Investigation into Cyberbullying, its Forms, Awareness andImpact, and the Relationship between Age and Gender in Cy ber -bullying. Research Brief RBX03-06. London: DfES. (www.an -tibullyingalliance.org.uk/downloads/pdf/cyberbullyingreportfinal230106_000.pdf) (10-06-2007).STOIBER, K.C. & KRATOCHWILL, T.R. (2001). Evidence-basedIntervention Programs: Rethinking, Refining, and Renaming theNew Standing Section of School Psychology Quarterly. School Psy -chology Quarterly, 16, 1-8.STONE, N. (2011). The ‘Sexting’ Quagmire: Criminal Justice Res -ponses to Adolescents’ Electronic Transmission of Indecent Imagesin the UK and the USA. Youth Justice, 11, 3, 266-281.STUTZMAN, F. (2006). An Evaluation of Identity-sharing Behavior inSocial Network Communities. Journal of the International DigitalMedia and Arts Association, 3 (1), 10-18.TEJERINA, O. & FLORES, J. (2008). E-legales. Bilbao: Edex.TTOFI, M.M. & FARRINGTON, D.P. (2009). School-based Programsto Reduce Bullying and Victimization. Campbell Systematic Re -views. Oslo: Campbell Collaboration.TURKLE, S. (1997). La vida en la pantalla. Barcelona: PaidósWECHSLER, H. & KUO, M. (2000). College Students Define BingeDrinking and Estimate its Prevalence: Results of a National Survey.Journal of American College Health, 49, 57-64.WINOCUR, R. (2006). Internet en la vida cotidiana de los jóvenes.<strong>Revista</strong> Mexicana de Sociología, 68, (3), 551-580.<strong>Comunicar</strong>, <strong>39</strong>, XX, 2012© ISSN: 1134-3478 • e-ISSN: 1988-3293• Pages 129-1377
- Page 2 and 3:
© COMUNICAR, 39; XXLATIN AMERICAN
- Page 4 and 5:
4Comunicar, 39, XX, 2012C O N T E N
- Page 6 and 7:
6Comunicar, 39, XX, 2012Submission
- Page 8 and 9:
8Comunicar, 39, XX, 2012EditorialTh
- Page 10 and 11:
10Comunicar, 39, XX, 2012Introducti
- Page 12 and 13:
12Comunicar, 39, XX, 2012All these
- Page 14 and 15:
14Comunicar, 39, XX, 2012civic part
- Page 16 and 17:
16Comunicar, 39, XX, 20121. Introdu
- Page 18 and 19:
18Comunicar, 39, XX, 2012ponsible u
- Page 20 and 21:
20Comunicar, 39, XX, 20122.3.3. Cas
- Page 22 and 23:
22Comunicar, 39, XX, 2012best pract
- Page 24 and 25:
24Comunicar, 39, XX, 2012© ISSN: 1
- Page 26 and 27:
26Comunicar, 39, XX, 20121. Introdu
- Page 28 and 29:
28Comunicar, 39, XX, 2012tors for a
- Page 30 and 31:
30Comunicar, 39, XX, 2012This compe
- Page 32 and 33:
32Comunicar, 39, XX, 2012Croce, 200
- Page 34 and 35:
34Comunicar, 39, XX, 2012© ISSN: 1
- Page 36 and 37:
36Comunicar, 39, XX, 20121. Introdu
- Page 38 and 39:
38Comunicar, 39, XX, 2012the approp
- Page 40 and 41:
40Comunicar, 39, XX, 2012Table 3: I
- Page 42 and 43:
42Comunicar, 39, XX, 2012racy could
- Page 44 and 45:
44Comunicar, 39, XX, 2012© ISSN: 1
- Page 46 and 47:
46Comunicar, 39, XX, 20121. Introdu
- Page 48 and 49:
48Comunicar, 39, XX, 2012data, the
- Page 50 and 51:
50Comunicar, 39, XX, 2012habits of
- Page 52 and 53:
52Comunicar, 39, XX, 2012Acknowledg
- Page 54 and 55:
54Comunicar, 39, XX, 20121. Introdu
- Page 56 and 57:
56Comunicar, 39, XX, 2012and the ne
- Page 58 and 59:
58Comunicar, 39, XX, 2012interest i
- Page 60 and 61:
60Comunicar, 39, XX, 2012land, medi
- Page 62 and 63:
62Comunicar, 39, XX, 2012more than
- Page 64 and 65:
64Comunicar, 39, XX, 2012© ISSN: 1
- Page 66 and 67:
66Comunicar, 39, XX, 20121. Introdu
- Page 68 and 69:
68Comunicar, 39, XX, 2012Internet.
- Page 70 and 71:
70Comunicar, 39, XX, 2012basic feat
- Page 72 and 73:
72Comunicar, 35, XVIII, 2010(www.cy
- Page 74 and 75:
74Comunicar, 39, XX, 20121. Introdu
- Page 76 and 77:
76Comunicar, 39, XX, 2012country an
- Page 78 and 79:
78Comunicar, 39, XX, 2012was precis
- Page 80 and 81:
80Comunicar, 39, XX, 2012end, not a
- Page 82 and 83:
82Comunicar, 39, XX, 20121. Introdu
- Page 84 and 85:
84Comunicar, 39, XX, 2012media thro
- Page 86 and 87: 86Comunicar, 39, XX, 2012tegies for
- Page 88 and 89: 88Comunicar, 39, XX, 2012researcher
- Page 90 and 91: 90Comunicar, 39, XX, 2012© ISSN: 1
- Page 92 and 93: 92Comunicar, 39, XX, 20121. The imp
- Page 94 and 95: 94Comunicar, 39, XX, 2012literacy i
- Page 96 and 97: 96Comunicar, 39, XX, 2012Finally, t
- Page 98 and 99: 98Comunicar, 39, XX, 2012them. The
- Page 100 and 101: 100Comunicar, 39, XX, 2012© ISSN:
- Page 102 and 103: 102Comunicar, 39, XX, 2012«What ma
- Page 104 and 105: 104Comunicar, 39, XX, 2012categoriz
- Page 106 and 107: 106Comunicar, 39, XX, 20121) Being
- Page 108 and 109: 108Comunicar, 39, XX, 2012aprendiza
- Page 110 and 111: 110Comunicar, 39, XX, 2012© ISSN:
- Page 112 and 113: 112Comunicar, 39, XX, 20121. Introd
- Page 114 and 115: 114Comunicar, 39, XX, 2012Antena3,
- Page 116 and 117: 116Comunicar, 39, XX, 201224 to 29
- Page 118 and 119: 118Comunicar, 39, XX, 2012Opera. Lo
- Page 120 and 121: 120Comunicar, 39, XX, 20121. Introd
- Page 122 and 123: 122Comunicar, 39, XX, 2012hypertext
- Page 124 and 125: 124Comunicar, 39, XX, 2012Figure 1.
- Page 126 and 127: 126Comunicar, 39, XX, 2012needs, gr
- Page 128 and 129: 128Comunicar, 39, XX, 2012© ISSN:
- Page 130 and 131: 130Comunicar, 39, XX, 20121. Introd
- Page 132 and 133: 132Comunicar, 39, XX, 20121999; Sac
- Page 134 and 135: 134Comunicar, 39, XX, 2012• Analy
- Page 138 and 139: 138Comunicar, 39, XX, 2012© ISSN:
- Page 140 and 141: 140Comunicar, 39, XX, 20121. Introd
- Page 142 and 143: 142Comunicar, 39, XX, 20121, and co
- Page 144 and 145: 144Comunicar, 39, XX, 2012Figure 5.
- Page 146 and 147: 146Comunicar, 39, XX, 2012can be de
- Page 148 and 149: 148Comunicar, 39, XX, 20129.6. Focu
- Page 150 and 151: 150Comunicar, 39, XX, 2012© ISSN:
- Page 152 and 153: 152Comunicar, 39, XX, 20121. Introd
- Page 154 and 155: 154Comunicar, 39, XX, 20122010), sp
- Page 156 and 157: 156Comunicar, 39, XX, 2012media use
- Page 158 and 159: 158Comunicar, 39, XX, 2012QAYYUM, M
- Page 160 and 161: 160Comunicar, 39, XX, 20121. Introd
- Page 162 and 163: 162Comunicar, 39, XX, 2012variety o
- Page 164 and 165: 164Comunicar, 39, XX, 2012Figure 1.
- Page 166 and 167: 166Comunicar, 39, XX, 2012contribut
- Page 168 and 169: 168Comunicar, 39, XX, 2012© ISSN:
- Page 170 and 171: 170Comunicar, 39, XX, 20121. Introd
- Page 172 and 173: 172Comunicar, 39, XX, 2012meanings:
- Page 174 and 175: 174Comunicar, 39, XX, 2012This comp
- Page 176 and 177: 176Comunicar, 39, XX, 2012Reference
- Page 178 and 179: 178Comunicar, 39, XX, 20121. Introd
- Page 180 and 181: 180Comunicar, 39, XX, 2012eating ha
- Page 182 and 183: 182Comunicar, 39, XX, 2012shows tha
- Page 184 and 185: 184Comunicar, 39, XX, 2012© ISSN:
- Page 186 and 187:
186Comunicar, 39, XX, 20121. Introd
- Page 188 and 189:
188Comunicar, 39, XX, 2012famous).
- Page 190 and 191:
190Comunicar, 39, XX, 20123.2.3. Th
- Page 192 and 193:
192Comunicar, 39, XX, 2012BIRESSI,
- Page 194 and 195:
194Comunicar, 39, XX, 20121. Introd
- Page 196 and 197:
196Comunicar, 39, XX, 2012Table 1.
- Page 198 and 199:
198Comunicar, 39, XX, 2012Graph 3.
- Page 200 and 201:
200Comunicar, 39, XX, 2012In one of