1 results
ten - Risky contacts
- Edited by Sonia Livingstone, London School of Economics and Political Science, Leslie Haddon, London School of Economics and Political Science
-
- Book:
- Kids Online
- Published by:
- Bristol University Press
- Published online:
- 15 July 2022
- Print publication:
- 30 September 2009, pp 123-134
-
- Chapter
- Export citation
-
Summary
Introduction
One of the anxieties regarding children's internet use relates to the potential for risky contacts (see, for example, EC, 2008). This chapter critically reviews the latest findings and theories on children's risky contacts with adults and children – grooming, harassment and meetings – in order to identify who is really at risk from what. Two primary types of risks will be discussed: children and young people as victims of aggressive communication and as victims of sexually oriented communication. This discussion will expand our current understanding of both media and social psychological dimensions of the misuse and abuse of the internet, which in turn can enable industry, policy makers and future generations to approach and develop an online environment that poses fewer dangers.
The specific characteristics of online communication that appear to lower thresholds to find, contact and interact with others have led to perceptions that dangerous encounters are likely. Media panics similarly emphasise the dangers represented by adults with intentions of deceiving children and young people online (Weathers, 2008). Whereas this is indeed a risk, with potentially grave and tragic outcomes, research shows that children and young people are quick to emphasise that they are aware of ill-intended adults online, and that they take action to prevent such contact (Dunkels, 2008). However, research concerning what counter-strategies are actually helpful is conspicuous by its absence. Children may be regarded as native users of contemporary technology, but there is little research on the effectiveness of their often self-taught strategies to avoid online victimisation. Young people who are at risk of meeting adults typically already face serious problems offline (Shannon, 2007), and often they are not being deceived (Ybarra et al, 2007). The most likely scenario is that a sexual predator takes advantage of the fact that a child discloses vulnerability online. The predator offers to be an understanding and supporting adult and starts building a manipulative relationship with the child. When this process, called grooming, is completed, the potential victim often readily travels to meet the predator, even if aware of the adult's sexual intentions.