1. bookVolume 27 (2019): Issue 2 (June 2019)
    Special Issue: Technological Innovations in the Socio-Humanistic Context
Journal Details
License
Format
Journal
eISSN
2450-5781
First Published
30 Mar 2017
Publication timeframe
4 times per year
Languages
English
Open Access

Safety Management in the Age of Internet Threats

Published Online: 03 Jun 2019
Volume & Issue: Volume 27 (2019) - Issue 2 (June 2019) - Special Issue: Technological Innovations in the Socio-Humanistic Context
Page range: 88 - 92
Received: 01 Dec 2018
Accepted: 01 Feb 2019
Journal Details
License
Format
Journal
eISSN
2450-5781
First Published
30 Mar 2017
Publication timeframe
4 times per year
Languages
English
Abstract

Contemporary world brings people more and more dangers. Creation of the Internet made it even easier to harm other users without consequences. However we still can do something about it. We can learn how to protect ourselves in the network. That is why it is so important to disseminate the main goals of safety management while using Internet. The paper presents main dangers awaiting for network users – both the youngest and the older ones, such as cyberbullying or phishing. The authors also point to the more frequent Internet addiction. The main goal of this paper is to indicate on how the on-line safety management should look like and how people can protect themselves from the dangers, of which they are sometimes even not aware. Children and adults shall be educated about the dangers in the Internet, and how to avoid them. Only then will they know, how to properly manage their on-line safety.

Keywords

[1] K. Conn, „Bullying and harassment: A legal guide for educators” Alexandria: ASCD, 2004.Search in Google Scholar

[2] Cyberbullying Taken To A Whole New Level: Enter The ‘Blue Whale Challenge’ – Available: https://www.forbes.com/sites/andrewrossow/2018/02/28/cyberbullying-taken-toa-whole-new-level-enter-the-blue-whale-challenge/#630eda0a2673 [Dec. 09, 2018].Search in Google Scholar

[3] O. Findahl. “Preschoolers and The Internet: Will children start to use Internet when they start walking?” presented at the EU-kids online conference, London, Great Britain, 2009. Available:http://s3.amazonaws.com/zanran_storage/www.lse.ac.uk/ContentPages/14151569.pdf [Dec. 15, 2018].Search in Google Scholar

[4] Five-year-old girl suffers horrific burns after becoming the latest victim of ‘fire fairy’ game spreading online where children are told to secretly turn on gas rings. Available https://www.dailymail.co.uk/news/article-4290590/Fire-fairy-game-tells-children-turn-gas-stoves.html [Dec. 09, 2018].Search in Google Scholar

[5] K. Hollá. Sexting a kyberšikana. Bratislava: Iris, 2016.Search in Google Scholar

[6] R. Juncor, J. Masrodicasa. Connecting to the Net.Generation: What higher education professionals need to know about today’s students. Washington DC: NASPA, 2007.Search in Google Scholar

[7] T. Keipi, M. Näsi, A. Oksanen, P. Räsänen. Online Hate and Harmful Content: Cross-National Perspectives. Abingdonon-Thames 2016.10.4324/9781315628370Search in Google Scholar

[8] P. Kumaraguru, Y. W. Rhee, A. Acquisti, L. Cranor, J. Hong, E. Nunge. Protecting People from Phishing. The Design and Evaluation of an Embedded Training Email System. Pittsburgh, 2006.10.1145/1240624.1240760Search in Google Scholar

[9] S. Livingstone, L. Haddon, A. Görzig, K. Ólafsson. Risks and safety on the internet: the perspective of European children: full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries. London: EU Kids Online Network. 2011.Search in Google Scholar

[10] Mª Paz Prendes Espinosa, „Bullying and cyberbullying: two forms of violence in schools” Journal of new approaches in educational research, vol. 7, no. 1. pp. 1-2, 2018.10.7821/naer.2018.1.274Search in Google Scholar

[11] M. McCrindle. Generation Z Defined: Global, Visual and Digital. Available: http://clairemadden.com/wp-content/uploads/2013/07/Generation-Z-Defined-Global-Visual-Digital_McCrindle-Research-2013.pdf [Dec. 15, 2018].Search in Google Scholar

[12] Nigeryjski przekrętczym jest i jak nie dać się nabrać? Available: https://www.infor.pl/prawo/prawokarne/przestepstwa-komputerowe/2702803,Nigeryjskiprzekret-czym-jest-i-jak-nie-dac-sie-nabrac.html.Search in Google Scholar

[13] R. Ortega et. al. “The emotional impact of bullying and cyberbullying on victims: A European cross-national study” Aggressive Behavior, vol. 38, pp. 342-356. 2012.10.1002/ab.2144022782434Search in Google Scholar

[14] V. Pozza, A. Di Pietro, S. Morel, E. Psaila, Cyberbullying among young people. European Union, 2016. Available: http://www.europarl.europa.eu/Reg-Data/etudes/STUD/2016/571367/IPOL_STU(2016)571367_EN.pdf [Dec. 15, 2018].Search in Google Scholar

[15] A. Turner. „Generation Z: Technology And Social Interest”, Journal of individual psychology, vol. 71, pp. 103-113, 2015.10.1353/jip.2015.0021Search in Google Scholar

[16] N. Willard, „Cyberbullying and cyberthreats” in Tying it all together: Comprehensive strategies for safe and drugFree Schools. Washington, 2005.Search in Google Scholar

[17] K. S. Young. “Internet addiction: The emergence of a new clinical disorder” Cyber Psychology and Behavior, vol. 1, pp. 237-244, 1996.10.1089/cpb.1998.1.237Search in Google Scholar

[18] WTH Is Momo Suicide Challenge? 4 Tips for Students to Help Protect Their Siblings –Available: https://typicalstu-dent.org/hot/news/momo-suicide-challenge-tips-for-students [Dec, 09. 2018].Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo