70<strong>Comunicar</strong>, <strong>39</strong>, XX, 2012basic features of any educational curriculum. Thisinclusion can be treated as specific content, as is thecase in the MIL Curriculum, but also as (an educationaloverlap) (interdisciplinary), ever-present on a dayto day basis in any school and in all subjects taught.Due to the increased use of ICTs by children, the educationalcommunity cannot only limit itself to definingthe empowerment of children to a few scheduled sessions.On the contrary, global educational strategiesmust be devised to strengthen competencies related tomedia and information literacy (Perez-Tornero &Varis, 2010).Educators, on the other hand, as previouslyshown, demand orientation in order to address thisproblem. For this very reason the following recommendationsare defined as basic by both authors andsocial organizations:• Focusing prevention content on interaction andnot just on the publication of data, messages or images.Often, content designed to prevent violent situationssuch as cyberbullying or grooming concentrates onalerting of the danger which, it is assumed, is conveyedexclusively by data or images on the Internet withoutexploring the ‘why’ of such information. Researcherswarn that using language of prohibition and more sowith minors and adolescents, is counterproductive.Therefore, the most important factor is to focus oncontent of prevention within on-line interactions thatminors may be exposed to (Valls, Puigvert & Duque,2008; Wolak & al., 2008).• Designing community-based prevention modelsthat include the entire community, especially familymembers. As previously shown, both teachers andfamilies need training in these risks, but also to participatetogether in the designing of the communitymodels in the prevention of violence (Oliver & al.,2009). Only by jointly coordinating efforts will goalsbe achieved more effectively. Minors also express theirvoice with respect to on-line risks at conferences suchas the one organized by the CEOP, IYAC(International Youth Advisory Congress), held on July17, 2008 in London. At the conference critical trainingin ML within the entire education community wascalled for; teachers and family, the media as a wholeand business in general were requested to get involvedin promoting a cyberspace free of violence. Whenadults acquire more crucial training in dealing with onlineinteractions that generate violence, the more childrenwill be inclined to be included and thus empoweredin the face of these risks. As a consequence,there will be a more positive impact in the children’sown empowerment.• Promoting the protagonism of children in theapplication of prevention programs that address therisks of online interactions. Most documents analyzedindicate how prevention should also focus on the peergroup. By empowering children as agents of creativeuse of the Internet and overcoming on-line risks, trainingother children or even their own community, oneattains more effective programs (UNICEF InnocentiResearch Centre, 2011; Wolak & al., 2008).Some examples of international scope that alreadyinclude direct participation are: the programThinkUKnow$ from the UK and the internationalorganization I-Safe4. Both are examples that may beuseful for teachers. One can browse content designedfor families, teachers and children of different ages andestablish them as models.-Designing strategies that include educational andinformational media literacy from a humanistic and criticalperspective. Media literacy has no meaning unlessit is linked to a greater purpose which is the creation ofa society based on a culture of peace and ultimately, asstated by Pérez-Tornero (2010: 122), contributes tobuilding a world that is a good place to live, «to createa peaceful and interdependent world that constitutes agood place to live».It is also necessary that children empower themselvesin order to be active players in this change, fromthe building of a society based on a culture of peace,and in the promotion of their creativity to achieve thisgoal. Therefore, educational strategies must also includethis perspective to advance a more humane andless destructive society. Children should be autonomouslycritical with their use of the media and self-criticalwith the impact of their use.Once the main priorities on how to promote theempowerment of children are discussed, the nextquestion is: What steps should a school undertake toachieve this empowerment?First and foremost, teachers must be trained toconfront this critical situation. Their training must bebased on the most significant international recommendationswith the greatest repercussions within thescientific community, as well as on the social impact itobtains.For instance, having round table discussions(Aubert & al., 2008) on leading articles or books onthe subject. Teachers must have access to cutting edgescientific literature in order to exercise their position ascritical, intellectual educators (Giroux, 1989). Sometopics in their training would be: how to work onmedia literacy by reflecting on how children themselvesuse the media; what the real risks are and what© ISSN: 1134-3478 • e-ISSN: 1988-3293 • Pages 65-72
71they are not; which messages are key to preventionand which are a waste of time. At the same time, teachersneed to be encouraged to share their trainingwith families. It is essential to create spaces for debateand interaction between teachers and families so thatboth groups are better prepared than they are today.Secondly, design specific and transversal strategiesimplementing media literacy learning, especially withthe idea of further developing critical thinking. To dothis it would be necessary to involve the studentsthemselves in the design of educational activities topromote a critical understanding of abusive and violentinteractions (either cyberbullying or grooming). Alsonecessary is the promoting of joint projects based ontheir creativity and collective intelligence (Levy, 1997)to help overcome such interactions. Teachers havethe responsibility to ensure that the design and implementationof the activity are both carried out successfully.Continuous assessment of the activities and initiativesis essential to evaluate their results and impact.Therefore, it is necessary to establish mechanisms forthis ongoing evaluation.Thirdly, the risks discussed are those that affect theemotional development of children, therefore theemotional dimension must not be ignored. Ultimately,both grooming and cyberbullying are interactions thatdirectly affect the self-esteem of victims and their deepestfeelings. They also foment a sense of violencewithin those who carry out and support these acts.Therefore, when we talk about empowering childrenwe also must take into account the interactions be -tween them. Are they repeating social patterns withoutbeing aware of it? As teachers, have we giventhem enough media literacy to recreate their identitiesregardless of social influences? Finally, up to whatpoint have we offered children the opportunities tolearn how to counter on-line violence? A key challengefor media literacy is precisely to include the link be -tween its acquisition as the basis for recreation of theself and values of active citizenship, namely nonvio -lence and solidarity.4. ConclusionsThe implementation of the MIL Curriculum inschools favours the empowerment of children in theiruse of the media. The acquisition of skills related tomedia literacy and informational training is essential fortheir education in a constantly changing world. Theinclusion of a specific unit of content related to on-linerisks in the MIL Curriculum is considered positivesince it is one of the demands of teacher training.In the unit analyzed the most common risks areidentified. In this article we have extended the descriptionof two of them, cyberbullying and grooming. Theprevalence of both risks in Europe, Spain and theUnited States is similar. The data clearly demonstratesthe need to work on preventing these risks, including itin the daily education strategy as well as dealing withit in specific sessions.It is essential that the application of the MIL Curri -culum accompany the recommendations defined; thecritical reflection of on-line interactions, the inclusionof the whole community, the leadership of children ineducational activities and, finally, the aim of constructinga society based on a culture of peace with the childrenbeing the builders of a better and more just worldto live in.Footnotes1 Questionnaire on information technologies in the home. Firstsemester of 2006 (National Institute of Statistics).(www.ine.es/jaxi/menu.do?type=pcaxis&path=/t25/p450/a2006s1&file=pcaxis) (12-1-2012).2 Survey Parents and Teens (2006). Pew Internet & American LifeProject. Research carried out by Pew Research Centre. (www. -pewin ternet.org/Shared-Content/Data-Sets/2006/November-2006—Parents-and-Teens.aspx) (12-1-2012).3 www.thinkuknow.co.uk (12-1-2012).4 www.isafe.org/channels/?ch=ai (12-1-2012).ReferencesACPI/PROTEGELES (Ed.) (2002). Seguridad infantil y costumbresde los menores en Internet. Madrid: Defensor del Menor en laComunidad de Madrid.AUBERT, A., FLECHA, A., GARCÍA, C., FLECHA, R. & RACIONERO, S.(2008). Aprendizaje dialógico en la sociedad de la información.Barcelona: Hipatia Editorial.ANASTASIADES, P.S. & VITALAKI, E. (2011). Promoting Internet Sa -fety in Greek Primary Schools: The Teacher’s Tole. EducationalTechnology & Society, 14(2), 71-80.BOLEN, R.M. (2003). Child Sexual Abuse: Prevention or Pro mo -tion? Social Work, 48(2), 174.BRINGUÉ, X., SÁBADA, C. & Tolsa, J. (2011). La generación inter -ac tiva en Iberoamérica 2010. Niños y adolescentes ante las pantallas.Madrid: Foro Generaciones Interactivas.BRINGUÉ, X. & SÁBADA, C. (2008). La generación interactiva enIbe roa mérica 2008. Niños y adolescentes ante las pantallas. Ma -drid: Fundación Interactiva.FINKELHOR, D., WOLAK, J. & MITCHELL, K. (2006). Online Victi -mization of Youth: Five Years Later. Funding by Funded by the U.S.Congress through a Grant to the National Center for Missing &Exploited Children.GARMENDIA, M., GARITAONANDIA, C., MARTÍNEZ, G. & CASADO,M.A. (2011). Riesgos y seguridad en Internet. Los menores españolesen el contexto europeo. Bilbao: Universidad del País Vas co/ -Euskal Herriko Unibertsitatea, EU Kids Online.GIROUX, H.A. (1989). Los profesores como intelectuales. Barce lo -na: Paidós.HINDUJA, S. & PATCHIN, J. (2010). Cyberbullying. Identification,Prevention, and Response. Cyberbullying Research Center.<strong>Comunicar</strong>, <strong>39</strong>, XX, 2012© ISSN: 1134-3478 • e-ISSN: 1988-3293 • Pages 65-72
- Page 2 and 3:
© COMUNICAR, 39; XXLATIN AMERICAN
- Page 4 and 5:
4Comunicar, 39, XX, 2012C O N T E N
- Page 6 and 7:
6Comunicar, 39, XX, 2012Submission
- Page 8 and 9:
8Comunicar, 39, XX, 2012EditorialTh
- Page 10 and 11:
10Comunicar, 39, XX, 2012Introducti
- Page 12 and 13:
12Comunicar, 39, XX, 2012All these
- Page 14 and 15:
14Comunicar, 39, XX, 2012civic part
- Page 16 and 17:
16Comunicar, 39, XX, 20121. Introdu
- Page 18 and 19:
18Comunicar, 39, XX, 2012ponsible u
- Page 20 and 21: 20Comunicar, 39, XX, 20122.3.3. Cas
- Page 22 and 23: 22Comunicar, 39, XX, 2012best pract
- Page 24 and 25: 24Comunicar, 39, XX, 2012© ISSN: 1
- Page 26 and 27: 26Comunicar, 39, XX, 20121. Introdu
- Page 28 and 29: 28Comunicar, 39, XX, 2012tors for a
- Page 30 and 31: 30Comunicar, 39, XX, 2012This compe
- Page 32 and 33: 32Comunicar, 39, XX, 2012Croce, 200
- Page 34 and 35: 34Comunicar, 39, XX, 2012© ISSN: 1
- Page 36 and 37: 36Comunicar, 39, XX, 20121. Introdu
- Page 38 and 39: 38Comunicar, 39, XX, 2012the approp
- Page 40 and 41: 40Comunicar, 39, XX, 2012Table 3: I
- Page 42 and 43: 42Comunicar, 39, XX, 2012racy could
- Page 44 and 45: 44Comunicar, 39, XX, 2012© ISSN: 1
- Page 46 and 47: 46Comunicar, 39, XX, 20121. Introdu
- Page 48 and 49: 48Comunicar, 39, XX, 2012data, the
- Page 50 and 51: 50Comunicar, 39, XX, 2012habits of
- Page 52 and 53: 52Comunicar, 39, XX, 2012Acknowledg
- Page 54 and 55: 54Comunicar, 39, XX, 20121. Introdu
- Page 56 and 57: 56Comunicar, 39, XX, 2012and the ne
- Page 58 and 59: 58Comunicar, 39, XX, 2012interest i
- Page 60 and 61: 60Comunicar, 39, XX, 2012land, medi
- Page 62 and 63: 62Comunicar, 39, XX, 2012more than
- Page 64 and 65: 64Comunicar, 39, XX, 2012© ISSN: 1
- Page 66 and 67: 66Comunicar, 39, XX, 20121. Introdu
- Page 68 and 69: 68Comunicar, 39, XX, 2012Internet.
- Page 72 and 73: 72Comunicar, 35, XVIII, 2010(www.cy
- Page 74 and 75: 74Comunicar, 39, XX, 20121. Introdu
- Page 76 and 77: 76Comunicar, 39, XX, 2012country an
- Page 78 and 79: 78Comunicar, 39, XX, 2012was precis
- Page 80 and 81: 80Comunicar, 39, XX, 2012end, not a
- Page 82 and 83: 82Comunicar, 39, XX, 20121. Introdu
- Page 84 and 85: 84Comunicar, 39, XX, 2012media thro
- Page 86 and 87: 86Comunicar, 39, XX, 2012tegies for
- Page 88 and 89: 88Comunicar, 39, XX, 2012researcher
- Page 90 and 91: 90Comunicar, 39, XX, 2012© ISSN: 1
- Page 92 and 93: 92Comunicar, 39, XX, 20121. The imp
- Page 94 and 95: 94Comunicar, 39, XX, 2012literacy i
- Page 96 and 97: 96Comunicar, 39, XX, 2012Finally, t
- Page 98 and 99: 98Comunicar, 39, XX, 2012them. The
- Page 100 and 101: 100Comunicar, 39, XX, 2012© ISSN:
- Page 102 and 103: 102Comunicar, 39, XX, 2012«What ma
- Page 104 and 105: 104Comunicar, 39, XX, 2012categoriz
- Page 106 and 107: 106Comunicar, 39, XX, 20121) Being
- Page 108 and 109: 108Comunicar, 39, XX, 2012aprendiza
- Page 110 and 111: 110Comunicar, 39, XX, 2012© ISSN:
- Page 112 and 113: 112Comunicar, 39, XX, 20121. Introd
- Page 114 and 115: 114Comunicar, 39, XX, 2012Antena3,
- Page 116 and 117: 116Comunicar, 39, XX, 201224 to 29
- Page 118 and 119: 118Comunicar, 39, XX, 2012Opera. Lo
- Page 120 and 121:
120Comunicar, 39, XX, 20121. Introd
- Page 122 and 123:
122Comunicar, 39, XX, 2012hypertext
- Page 124 and 125:
124Comunicar, 39, XX, 2012Figure 1.
- Page 126 and 127:
126Comunicar, 39, XX, 2012needs, gr
- Page 128 and 129:
128Comunicar, 39, XX, 2012© ISSN:
- Page 130 and 131:
130Comunicar, 39, XX, 20121. Introd
- Page 132 and 133:
132Comunicar, 39, XX, 20121999; Sac
- Page 134 and 135:
134Comunicar, 39, XX, 2012• Analy
- Page 136 and 137:
136Comunicar, 39, XX, 2012young; pa
- Page 138 and 139:
138Comunicar, 39, XX, 2012© ISSN:
- Page 140 and 141:
140Comunicar, 39, XX, 20121. Introd
- Page 142 and 143:
142Comunicar, 39, XX, 20121, and co
- Page 144 and 145:
144Comunicar, 39, XX, 2012Figure 5.
- Page 146 and 147:
146Comunicar, 39, XX, 2012can be de
- Page 148 and 149:
148Comunicar, 39, XX, 20129.6. Focu
- Page 150 and 151:
150Comunicar, 39, XX, 2012© ISSN:
- Page 152 and 153:
152Comunicar, 39, XX, 20121. Introd
- Page 154 and 155:
154Comunicar, 39, XX, 20122010), sp
- Page 156 and 157:
156Comunicar, 39, XX, 2012media use
- Page 158 and 159:
158Comunicar, 39, XX, 2012QAYYUM, M
- Page 160 and 161:
160Comunicar, 39, XX, 20121. Introd
- Page 162 and 163:
162Comunicar, 39, XX, 2012variety o
- Page 164 and 165:
164Comunicar, 39, XX, 2012Figure 1.
- Page 166 and 167:
166Comunicar, 39, XX, 2012contribut
- Page 168 and 169:
168Comunicar, 39, XX, 2012© ISSN:
- Page 170 and 171:
170Comunicar, 39, XX, 20121. Introd
- Page 172 and 173:
172Comunicar, 39, XX, 2012meanings:
- Page 174 and 175:
174Comunicar, 39, XX, 2012This comp
- Page 176 and 177:
176Comunicar, 39, XX, 2012Reference
- Page 178 and 179:
178Comunicar, 39, XX, 20121. Introd
- Page 180 and 181:
180Comunicar, 39, XX, 2012eating ha
- Page 182 and 183:
182Comunicar, 39, XX, 2012shows tha
- Page 184 and 185:
184Comunicar, 39, XX, 2012© ISSN:
- Page 186 and 187:
186Comunicar, 39, XX, 20121. Introd
- Page 188 and 189:
188Comunicar, 39, XX, 2012famous).
- Page 190 and 191:
190Comunicar, 39, XX, 20123.2.3. Th
- Page 192 and 193:
192Comunicar, 39, XX, 2012BIRESSI,
- Page 194 and 195:
194Comunicar, 39, XX, 20121. Introd
- Page 196 and 197:
196Comunicar, 39, XX, 2012Table 1.
- Page 198 and 199:
198Comunicar, 39, XX, 2012Graph 3.
- Page 200 and 201:
200Comunicar, 39, XX, 2012In one of