SlideShare ist ein Scribd-Unternehmen logo
1 von 27
1. Data Collection



                               Exploratory research,
                               Quantitative and
                               Qualitative surveys’
                               main focus:

                               ■   Access and Use
                               ■   Digital Behavior
                               ■   Safety Risks
                               ■   Rights




Digital Citizenship & Safety
2. Campaign Mobilization




    Raising awareness on
      the optimal and safe
    use of Information and
           Communication
              Technologies




Digital Citizenship & Safety
3. Policy Advocacy




                               Advocate the concept of
                               Digital Citizenship at
                               government level




Digital Citizenship & Safety
Targeted countries




Digital Citizenship & Safety
Table of Contents



  o   General Characteristics of the Turkish Net
  o   Digital Access and Activities
  o   Behavioral Online Trends
  o   Safety Risks
  o   Recommendations




Digital Citizenship and Safety
Turkish Net
Digital Environment




Digital Citizenship and Safety
Digital Divide

   Internet                      In 2010, usage of computer
    Access                       with & without internet


  Desktop
 Computer



  Portable
 Computer



    Mobile
   Phones


                                   ages 16-74 nationwide household ICT ownership
Digital Citizenship and Safety
Gender Participation Gap
2010 usage of computer with & without internet for 16-24 years old




  Digital Citizenship and Safety
Digital Access and Activities
Digital Access




                                 children aged 6-13

Digital Citizenship and Safety
Digital Activities




                                 children aged 9-16


Digital Citizenship and Safety
Social Network Sites: Facebook




Digital Citizenship and Safety
Gender divide in Online Gamers


                                 69% of 15-18 years old internet users play
                                 online games




Digital Citizenship and Safety
Behavioral Online Trends
Frequency of Internet and Social Networking site use

Frequency of Internet use              Frequency of social networking site use
                                                                              8%
                                                                            Less
                                                                            often
    11%
Once or                 33% Everyday                          23.7%
 twice a                                                      More than
  month                                                       once a day
                                              43.1%
                                              Once a day
    4%
  Less               53% Few times                         24%
  often                                                    More than
                         a week                                             1.2%
                                                           once a week
                                                                           Once a
                                                                            week


Digital Citizenship and Safety
Online Safety Risks to the Youth of Turkey
Risks online




                         Sharing Personal Information / Child as recipient
                         Malicious Software and Fraud / Child as recipient
                         Exposure to Adult Content / Child as recipient
                         Cyber-bullying / being bullied & bullying others
                         Meeting Strangers / Child as participant
                         Production of Child Abuse Images/Videos / Child as participant




Digital Citizenship and Safety
Malicious Software and Fraud


    Chances of being attacked
     by virus and malware on
                      Internet




Digital Citizenship and Safety
Accept friendship request on SNS




                                   children aged 9-16

Digital Citizenship and Safety
Reply to messages from stranger on SNS



                                         ■ Males more likely to
                                             reply back than females.

                                         ■ Older respondents more
                                             likely to reply to
                                             strangers‘ messages.




                                                     children aged 9-16

Digital Citizenship and Safety
Exposure to Adult Content




Digital Citizenship and Safety
Cyberbullying




                                 children aged 9-16

Digital Citizenship and Safety
Cyberbullying




                                 ■ The study found that males
                                    were significantly more
                                    likely to engage in
                                    cyberbullying than females




Digital Citizenship and Safety
Discussions

Weitere ähnliche Inhalte

Was ist angesagt?

National Security Review
National Security ReviewNational Security Review
National Security ReviewSimoun Ung
 
Daily News 3rd ed
Daily News 3rd edDaily News 3rd ed
Daily News 3rd ed03bmai
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyCTIC Technology Centre
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךgkurtz
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
 
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)soe sumijan
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report IGF Indonesia
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionICT Watch
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)ICT Watch
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyondhudsonpd
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweIOSR Journals
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignity
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignity2018 National Dialog. Internet of Trust; Security, Freedom and sovereignity
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 

Was ist angesagt? (20)

National Security Review
National Security ReviewNational Security Review
National Security Review
 
Daily News 3rd ed
Daily News 3rd edDaily News 3rd ed
Daily News 3rd ed
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
Singapore's regulation of cybercrime
Singapore's regulation of cybercrimeSingapore's regulation of cybercrime
Singapore's regulation of cybercrime
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Sea igf 2021 executive summary
Sea igf 2021 executive summarySea igf 2021 executive summary
Sea igf 2021 executive summary
 
ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online Protection
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyond
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignity
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignity2018 National Dialog. Internet of Trust; Security, Freedom and sovereignity
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignity
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 

Andere mochten auch

Безбедност и здравље на раду
Безбедност и здравље на радуБезбедност и здравље на раду
Безбедност и здравље на радуCNTI
 
Convention on the Rights of the Child - Pocket book in Russian
Convention on the Rights of the Child - Pocket book in RussianConvention on the Rights of the Child - Pocket book in Russian
Convention on the Rights of the Child - Pocket book in RussianUNICEF Europe & Central Asia
 
State of the World's Children - Georgia Update 2011
State of the World's Children - Georgia Update 2011State of the World's Children - Georgia Update 2011
State of the World's Children - Georgia Update 2011UNICEF Europe & Central Asia
 
Vodič za postupanje u vanrednim situacijama (in Montenegrin)
Vodič za postupanje u vanrednim situacijama (in Montenegrin)Vodič za postupanje u vanrednim situacijama (in Montenegrin)
Vodič za postupanje u vanrednim situacijama (in Montenegrin)UNICEF Europe & Central Asia
 
Study on ill treatment and torture of juveniles in the republic of Armenia
Study on ill treatment and torture of juveniles in the republic of ArmeniaStudy on ill treatment and torture of juveniles in the republic of Armenia
Study on ill treatment and torture of juveniles in the republic of ArmeniaUNICEF Europe & Central Asia
 
Study on the quality of water, sanitation and hygiene practices in the school...
Study on the quality of water, sanitation and hygiene practices in the school...Study on the quality of water, sanitation and hygiene practices in the school...
Study on the quality of water, sanitation and hygiene practices in the school...UNICEF Europe & Central Asia
 

Andere mochten auch (7)

Безбедност и здравље на раду
Безбедност и здравље на радуБезбедност и здравље на раду
Безбедност и здравље на раду
 
Convention on the Rights of the Child - Pocket book in Russian
Convention on the Rights of the Child - Pocket book in RussianConvention on the Rights of the Child - Pocket book in Russian
Convention on the Rights of the Child - Pocket book in Russian
 
Serbia 2014 MICS National and Roma Settlements
Serbia 2014 MICS National and Roma SettlementsSerbia 2014 MICS National and Roma Settlements
Serbia 2014 MICS National and Roma Settlements
 
State of the World's Children - Georgia Update 2011
State of the World's Children - Georgia Update 2011State of the World's Children - Georgia Update 2011
State of the World's Children - Georgia Update 2011
 
Vodič za postupanje u vanrednim situacijama (in Montenegrin)
Vodič za postupanje u vanrednim situacijama (in Montenegrin)Vodič za postupanje u vanrednim situacijama (in Montenegrin)
Vodič za postupanje u vanrednim situacijama (in Montenegrin)
 
Study on ill treatment and torture of juveniles in the republic of Armenia
Study on ill treatment and torture of juveniles in the republic of ArmeniaStudy on ill treatment and torture of juveniles in the republic of Armenia
Study on ill treatment and torture of juveniles in the republic of Armenia
 
Study on the quality of water, sanitation and hygiene practices in the school...
Study on the quality of water, sanitation and hygiene practices in the school...Study on the quality of water, sanitation and hygiene practices in the school...
Study on the quality of water, sanitation and hygiene practices in the school...
 

Ähnlich wie Youth of Turkey online

Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With CyberbullyingUsing Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullyingwitsprograms
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Parenting in the digital world 2012
Parenting in the digital world 2012Parenting in the digital world 2012
Parenting in the digital world 2012Holly Gerla
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2groot83
 

Ähnlich wie Youth of Turkey online (20)

Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Web safety
Web safetyWeb safety
Web safety
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With CyberbullyingUsing Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullying
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Parenting in the digital world 2012
Parenting in the digital world 2012Parenting in the digital world 2012
Parenting in the digital world 2012
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
 

Mehr von UNICEF Europe & Central Asia

Istrazivanje predskolsko obrazovanje Crna Gora (2014)
Istrazivanje predskolsko obrazovanje Crna Gora (2014)Istrazivanje predskolsko obrazovanje Crna Gora (2014)
Istrazivanje predskolsko obrazovanje Crna Gora (2014)UNICEF Europe & Central Asia
 
CRC@25 - Celebrating 25 years of the Convention on the Rights of the Child
CRC@25 - Celebrating 25 years of the Convention on the Rights of the ChildCRC@25 - Celebrating 25 years of the Convention on the Rights of the Child
CRC@25 - Celebrating 25 years of the Convention on the Rights of the ChildUNICEF Europe & Central Asia
 
A study on investing in early childhood education in Montenegro
A study on investing in early childhood education in MontenegroA study on investing in early childhood education in Montenegro
A study on investing in early childhood education in MontenegroUNICEF Europe & Central Asia
 
Studija o ulaganju u rano obrazovanje djece u Crnoj Gori
Studija o ulaganju u rano obrazovanje djece u Crnoj GoriStudija o ulaganju u rano obrazovanje djece u Crnoj Gori
Studija o ulaganju u rano obrazovanje djece u Crnoj GoriUNICEF Europe & Central Asia
 
Convention on the Rights of the Child - BiH child-friendly version
Convention on the Rights of the Child - BiH child-friendly versionConvention on the Rights of the Child - BiH child-friendly version
Convention on the Rights of the Child - BiH child-friendly versionUNICEF Europe & Central Asia
 
Analysis of TV programmes for children in Serbia (11/2014)
Analysis of TV programmes for children in Serbia (11/2014)Analysis of TV programmes for children in Serbia (11/2014)
Analysis of TV programmes for children in Serbia (11/2014)UNICEF Europe & Central Asia
 
Convention on the Rights of the Child - Pocket book in Uzbek
Convention on the Rights of the Child - Pocket book in UzbekConvention on the Rights of the Child - Pocket book in Uzbek
Convention on the Rights of the Child - Pocket book in UzbekUNICEF Europe & Central Asia
 

Mehr von UNICEF Europe & Central Asia (20)

Achievements and lessons learnt in WASH
Achievements and lessons learnt in WASHAchievements and lessons learnt in WASH
Achievements and lessons learnt in WASH
 
Immunization in Bosnia and Herzegovina (2015)
Immunization in Bosnia and Herzegovina (2015)Immunization in Bosnia and Herzegovina (2015)
Immunization in Bosnia and Herzegovina (2015)
 
UNICEF Montenegro flyer - Rozaje
UNICEF Montenegro flyer - RozajeUNICEF Montenegro flyer - Rozaje
UNICEF Montenegro flyer - Rozaje
 
UNICEF Montenegro flyer - Plav
UNICEF Montenegro flyer - PlavUNICEF Montenegro flyer - Plav
UNICEF Montenegro flyer - Plav
 
UNICEF Montenegro flyer - Bijelo Polje
UNICEF Montenegro flyer - Bijelo PoljeUNICEF Montenegro flyer - Bijelo Polje
UNICEF Montenegro flyer - Bijelo Polje
 
UNICEF Montenegro flyer - Berane
UNICEF Montenegro flyer - BeraneUNICEF Montenegro flyer - Berane
UNICEF Montenegro flyer - Berane
 
UNICEF Montenegro flyer - Andrijevica
UNICEF Montenegro flyer - AndrijevicaUNICEF Montenegro flyer - Andrijevica
UNICEF Montenegro flyer - Andrijevica
 
Istrazivanje predskolsko obrazovanje Crna Gora (2014)
Istrazivanje predskolsko obrazovanje Crna Gora (2014)Istrazivanje predskolsko obrazovanje Crna Gora (2014)
Istrazivanje predskolsko obrazovanje Crna Gora (2014)
 
KAP study preschool education in Montenegro 2014
KAP study preschool education in Montenegro 2014KAP study preschool education in Montenegro 2014
KAP study preschool education in Montenegro 2014
 
Inclusion indicators UNICEF Montenegro 2015
Inclusion indicators UNICEF Montenegro 2015Inclusion indicators UNICEF Montenegro 2015
Inclusion indicators UNICEF Montenegro 2015
 
CRC@25 - Celebrating 25 years of the Convention on the Rights of the Child
CRC@25 - Celebrating 25 years of the Convention on the Rights of the ChildCRC@25 - Celebrating 25 years of the Convention on the Rights of the Child
CRC@25 - Celebrating 25 years of the Convention on the Rights of the Child
 
Roma Early Childhood Inclusion+ Croatia Report
Roma Early Childhood Inclusion+ Croatia ReportRoma Early Childhood Inclusion+ Croatia Report
Roma Early Childhood Inclusion+ Croatia Report
 
A study on investing in early childhood education in Montenegro
A study on investing in early childhood education in MontenegroA study on investing in early childhood education in Montenegro
A study on investing in early childhood education in Montenegro
 
Studija o ulaganju u rano obrazovanje djece u Crnoj Gori
Studija o ulaganju u rano obrazovanje djece u Crnoj GoriStudija o ulaganju u rano obrazovanje djece u Crnoj Gori
Studija o ulaganju u rano obrazovanje djece u Crnoj Gori
 
Children's Rights festival 2014 (UNICEF Croatia)
Children's Rights festival 2014 (UNICEF Croatia)Children's Rights festival 2014 (UNICEF Croatia)
Children's Rights festival 2014 (UNICEF Croatia)
 
Convention on the Rights of the Child - BiH child-friendly version
Convention on the Rights of the Child - BiH child-friendly versionConvention on the Rights of the Child - BiH child-friendly version
Convention on the Rights of the Child - BiH child-friendly version
 
Analysis of TV programmes for children in Serbia (11/2014)
Analysis of TV programmes for children in Serbia (11/2014)Analysis of TV programmes for children in Serbia (11/2014)
Analysis of TV programmes for children in Serbia (11/2014)
 
Convention on the Rights of the Child - Pocket book in Uzbek
Convention on the Rights of the Child - Pocket book in UzbekConvention on the Rights of the Child - Pocket book in Uzbek
Convention on the Rights of the Child - Pocket book in Uzbek
 
Take us seriously (UNICEF BiH 2014)
Take us seriously (UNICEF BiH 2014)Take us seriously (UNICEF BiH 2014)
Take us seriously (UNICEF BiH 2014)
 
Prioritising access to justice for all children
Prioritising access to justice for all childrenPrioritising access to justice for all children
Prioritising access to justice for all children
 

Kürzlich hochgeladen

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Youth of Turkey online

  • 1.
  • 2. 1. Data Collection Exploratory research, Quantitative and Qualitative surveys’ main focus: ■ Access and Use ■ Digital Behavior ■ Safety Risks ■ Rights Digital Citizenship & Safety
  • 3. 2. Campaign Mobilization Raising awareness on the optimal and safe use of Information and Communication Technologies Digital Citizenship & Safety
  • 4. 3. Policy Advocacy Advocate the concept of Digital Citizenship at government level Digital Citizenship & Safety
  • 6.
  • 7. Table of Contents o General Characteristics of the Turkish Net o Digital Access and Activities o Behavioral Online Trends o Safety Risks o Recommendations Digital Citizenship and Safety
  • 10. Digital Divide Internet In 2010, usage of computer Access with & without internet Desktop Computer Portable Computer Mobile Phones ages 16-74 nationwide household ICT ownership Digital Citizenship and Safety
  • 11. Gender Participation Gap 2010 usage of computer with & without internet for 16-24 years old Digital Citizenship and Safety
  • 12. Digital Access and Activities
  • 13. Digital Access children aged 6-13 Digital Citizenship and Safety
  • 14. Digital Activities children aged 9-16 Digital Citizenship and Safety
  • 15. Social Network Sites: Facebook Digital Citizenship and Safety
  • 16. Gender divide in Online Gamers 69% of 15-18 years old internet users play online games Digital Citizenship and Safety
  • 18. Frequency of Internet and Social Networking site use Frequency of Internet use Frequency of social networking site use 8% Less often 11% Once or 33% Everyday 23.7% twice a More than month once a day 43.1% Once a day 4% Less 53% Few times 24% often More than a week 1.2% once a week Once a week Digital Citizenship and Safety
  • 19. Online Safety Risks to the Youth of Turkey
  • 20. Risks online Sharing Personal Information / Child as recipient Malicious Software and Fraud / Child as recipient Exposure to Adult Content / Child as recipient Cyber-bullying / being bullied & bullying others Meeting Strangers / Child as participant Production of Child Abuse Images/Videos / Child as participant Digital Citizenship and Safety
  • 21. Malicious Software and Fraud Chances of being attacked by virus and malware on Internet Digital Citizenship and Safety
  • 22. Accept friendship request on SNS children aged 9-16 Digital Citizenship and Safety
  • 23. Reply to messages from stranger on SNS ■ Males more likely to reply back than females. ■ Older respondents more likely to reply to strangers‘ messages. children aged 9-16 Digital Citizenship and Safety
  • 24. Exposure to Adult Content Digital Citizenship and Safety
  • 25. Cyberbullying children aged 9-16 Digital Citizenship and Safety
  • 26. Cyberbullying ■ The study found that males were significantly more likely to engage in cyberbullying than females Digital Citizenship and Safety

Hinweis der Redaktion

  1. The Digital Citizenship and Safety project is framed by the Convention on the Rights of the Child. The Turkish Government has been a signatory since 1990. Turkey and many other countries seeking a contemporary interpretation of some of the articles - in the digital age. What do some of the rights such as the right to access information, the right to express views, the right to privacy constitute for today’s youth? How are they even translated in the world of new technologies and varying cultures and socio-economic environments of different countries. On the one hand it is about the rights that this country among other 190 countries have signed up for .. But it is also about reality .. With billions of people having now a dual life (real and virtual) hundreds of millions of children (young, teenagers, etc.) are spending more and more time on the web. This brings lots of opportunities and not a small number of risks. This project is about supporting rights, seizing opportunities and managing risks.The project is also a partnership with the Berkman Center for Internet and Society at Harvard University, Governments and NGOs, academia, and private companies. It looks at compiling a situation analysis in each country around the access, behavior, opportunities, rights impacted by Information and Communication Technologies (ICTs) as well as the risks faced by adolescents and young people when using ICTs. Once we have the situation analysis we work together on all possible fronts including advocacy and legal fronts to again reinforce rights, seize more opportunities and be better at avoiding risks.
  2. The project consists of three phases. First, the data collection phase where the evidence surrounding the access, use, digital behavior, safety risks and rights is assessed through different methodologies starting with an exploratory study meaning the review of all secondary data and then quantitative and qualitative surveys to fill the gaps and needs for further research identified. There is a structured approach in validating all the data collected in this phase through partnerships with the local and international knowledge leaders and validation workshops.
  3. The campaign mobilization phase focuses on evidence-based creation of communication materials to raise awareness on the optimal and safe use of ICTs to support children and young people to become responsible digital citizens. Many of the campaigns and materials are designed with youth participation.
  4. Finally, the policy advocacy phase of the project enables the discussion of ICT-related issues and focuses on how current approaches can be re-adjusted or strengthened so that opportunities surrounding ICTs are maximized and the risks minimized for children. Here, depending on the country, this phase happens simultaneously with the phase two mobilization campaign but, in any case, has to happen post data collection to ensure advocacy approaches are evidence-based.
  5. Currently the project is operating in the countries appearing in green such as Turkey, Brazil, Argentina but also South Africa, Ukraine, Russia and Indonesia. Each country finds their own approaches on the way evidence is collected. For example, in Indonesia, the Government is taking the lead in the collection of data and UNICEF, and Harvard act as capacity building experts, providing technical expertise on methodologies to support the work. In South Africa, the research component took the shape of a working group composed of Government actors, private actors, academia and identified national experts convening around the different themes and share knowledge and expertise. The process however for all countries has been highly collaborative to ensure high quality output and sustainability. 8 green countries. Can we lose the ones under discussion … the oranges!
  6. Now, what has been done in Turkey so far? The project underwent the exploratory research which enables to lay the foundation of knowledge. While, there is a need for further research in this field in Turkey, the data captured in the paper Young Turks Online is a solid start. Academia, Government, civil society, all have been conducting this excellent research phase.
  7. This presentation will offer you a snapshot of the findings of the exploratory paper starting with the general characteristics of the Turkish digital landscape.
  8. The digital environment of the youth of Turkey is diverse and consists of mainly Western platforms but also some smaller local ones such as Sahibinden (xxxxxxx), MyNet or Vatan (xxxxxxxxxxx). Pronunciation!!Compared to some of its neighboring countries such as Russia, there appear less platforms that have been developed within Turkey. For instance, Russia has its own substantial social networking sites, Vkontakte (In Contact) (xxxxxxxx) pronunicationwhich offers many of the options similar to Facebook but also a blogging platform incorporated in the social network site and a full video search capability. RuTube is another example of a Russian bred platform that is used by its youth in lieu of YouTube. Why are comparing russia and turkey?[Source: Comscore]
  9. Nowwhich youth is accessing all these devices? Analyzing some of the data available, digital divides in location-based and gender-based gaps have been revealed. As you can see, the disparity in ICT equipment ownership and access is very high between urban and rural areas in Turkey. In a “household ICT ownership and access survey” conducted by the TurkStat in 2010, it was found that while 48.7 per cent of urban dwellers aged 16-74 have access to the Internet, only 24 per cent have access in rural areas.Due to lower costs, the gap in mobile phone ownership is not as significant, with 92.8 per cent of urban population owning mobile phones, as compared to 85 per cent for rural populations.(Source: TurkStat, ‘ICT Use in Households’, 2010)It should be noted that Turkey lags behind almost all of its European neighbors in Internet and mobile subscriber penetration rates but exceeds all of Middle East countries (except Israel and Gulf nations). (ITU 2010)
  10. An examination of the level of ICT usage in Turkey reveals a profound gender participation gap. While 78.5 per cent of males aged 16-24 use a computer, only 52.7 per cent of females in the same age range do so. Likewise, while 76.6 per cent of males aged 16-24 use the Internet, only 49.9 per cent of females aged 16-24 do so. Therefore, the gender participation gap in Turkey is quite significant especially compared to its neighboring European countries. This type of gaps hampers the principle of universal and equitable access to information. It should also be noted that there is a narrowing gender gap as the education level increases for females.[Source: TurkStat, ‘ICT Use in Households’, 2010]The paper also looks into age participation gap and digital literacy levels in Turkey in order to evaluate to what extent the right to access information, which is enshrined in the Convention on the Rights of the Child, is universal.
  11. In a study of 366 children aged 6-13 from four regions of Turkey, East Anatolia, South Anatolia, Marmara and Aegean, 61.9 per cent reported that they had a home Internet connection.In the same report, it is also mentioned that they access the Internet from school (29.7 per cent), from friends’ homes (37.5 per cent) and from Internet cafes (30.7 per cent).Only 2.1 per cent of respondents reported accessing the Internet from a library.[Source: Firat University, Elazig; Yeditepe University, Istanbul, 2010. Study of 366 children aged 6-13 from four regions of Turkey, East Anatolia, South Anatolia, Marmara and Aegean– Source: Bünyamin Atici, UğurBati, ‘New Media and Children: Internet Content Preferences of Primary School Children in Turkey’]Why friends’ home?
  12. What are the main online interests by the youth? In a study led by the London School of Economics using a methodology that has been called the EU Kids Online methodology, the youth of Turkey have indicated using internet to do school work as the first activity while listening to music clips and playing online games as second and third. [Source: EU KIDS 2010]
  13. With social networking coming in the fourth place as mentioned in the previous slide, Facebook is the network of choice of all adolescents and young people in Turkey. However, here again there is a sharp divide based on gender when it comes to its use. Unsurprisingly, the age range shows a high usage by 18-24 and 25 to 34. Turkey is the 5th biggest user of Facebook in the world with 87.7% penetration among internet users.[Source: Socialbakers2011]
  14. The gender divide is also found in online gaming which is identified as the most popular digital activity in a study conducted by the Middle East Technical University that focuses on 15 to 18 year old. [Source: computer in human behavior – middle east technical university. Study of 1 224 internet user students aged 15 – 18 in 4 cities.]
  15. Frequency of Internet use: Sample: 9-16 age group 1018 sample Source: EUKOLFrequency of SNS use: Sample: 9-16 years old 524 children in Istanbul, Ankara, IzmirSource: Middle East Technical University + Information and Communication Technologies Authority 2011Plus: From Middle East Technical University 20119-16 age Use of Internet 524 children in Istanbul, Ankara, Izmir38.4% use internet once a day, 30% use more than once a day, 22.9% use more than once a week and 8.8% use once a week.
  16. The risks. Once the research has undergone through the extensive study of the opportunities created by ICTs, like some of the ones we talked about right now, communication, sharing, networking, accessing the news, etc. The project looks into the risks that the research has underlined.
  17. The review of relevant literature revealed that exposure to adult content, malicious software and fraud, sharing of personal information, cyberbullying and meeting of strangers are all safety risks associated with Internet use in Turkey. The literature did not provide hard data with regards to exposure to violent and/or gruesome content, extremist content, grooming and gambling, although this is not to say that these safety issues do not exist in Turkey.
  18. In 2010, the Internet security company AVG named Turkey the country most at risk in the world for malicious software attacks on its ‗Global Threat Index‘, noting that a user in Turkey had a 1 in 10 chance of being attacked on a given day, compared to the global average of 1 in 73." [Source: AVG]
  19. Accepting all friend requests has been identified as a risk because of the potential that it includes to interact with complete strangers.As you can see, half of the child participants noted that they accepted friendship requests of only those people whom they knew, 33 per cent said they only accepted the requests of their friends and their friends’ friends and 15 per cent said they accepted all friendship invitations. The research also showed that boys accepted the friendship requests of strangers more often than girls, and that high school students tended to more frequently acceptrequests from all people, irrespective of whether they knew them or not, as compared to middle school students.[9-16 age sharing personal information on social networking sites 524 Kids in 3 big cities( Istanbul, Ankara, Izmir)[Source: Middle East Technical University and Information Technologies and Communications Authority (BTK) 2010]]
  20. When asked what they would do when they get a message from a stranger on SNS, 44.8 per cent said they never reply back, while 30.3 per cent say that they reply if the message is appropriate. It is not clear from the study what type of message is deemed appropriate by the respondents. Nine per cent of the respondents always reply back to messages from a stranger, with males more likely to reply back than females. Older respondents were also more likely to reply to strangers’ messages.[9-16 age sharing personal information on social networking sites 524 Kids in 3 big cities( Istanbul, Ankara, Izmir)Source: Middle East Technical University and Information Technologies and Communications Authority (BTK) 2010]
  21. According to EU Kids Online, 13 per cent of the respondents reported seeing images containing sexual content on the Internet. Of those exposed to such content, 46 per cent reported that they were uncomfortable with the images. In addition, 12 per cent of respondents aged 11-16 have received messages with sexual content, of whom 50 per cent were uncomfortable with the messages. Four per cent of respondents reported having sent sexual content messages. These figures are very low compared to Russia for example where exposure to adult content has been proved to be of at least 40% for 9-16 year old Russian youth. [Face-to-face interviews with 1018 urban and rural internet users aged 9-16Source: EUKOL]
  22. While there is no internationally agreed definition of cyberbullying, many experts have been offering different definitions, for example the Berkman Center defines it as the "willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices”.In the EU Kids Online’s study of Turkish Internet users aged 9-16, participants were prompted about cyberbullying in the following manner: “sometimes children or teenagers say or do hurtful or nasty things to someone and this can often be quite a few times on different days over a period of time, for example. This can include: teasing someone in a way this person does not like; hitting, kicking or pushing someone around; leaving someone out of things”When asked if someone had behaved in such a manner to them in the previous 12 months on the Internet, only 3 per cent reported in the affirmative, placing the youth of Turkey below EU average of 6 per cent. [EU Kids Online aged 9-16 1018 sampleSource:EUKOL ]According to survey carried out by Anadolu University of 1,470 Internet users with a median age of 23 found Fifty six per cent of all participants reported experiencing at least one form of cyberbullying. The study found that the average cyberbullying by males was higher than females. [aged 17-29 1470 sample Source:Akbulut, Yavuz, Levent, Yusuf Sahin, Eristi, Bahadir, Cyberbullying Victimization among Turkish Online Social Utility Members‘, Educational Technology & Society, 13 (4), 2010.]
  23. The research has identified many other researches around the theme of cyberbullying, I only have time here to mention one more but the paper discusses them all in depth. This one shares interesting disaggregated data with males significantly more likely to engage in cyberbullying than females.[Source: Source: Selcuk University, 2009Sample: 695 undergraduate university students aged 18-22 from 15 different programmes at the Faculty of Education at Selçuk University]Other interesting information collected is the fact that: Females experienced significantly higher rates of victimization when they accessed the Internet at school or in Internet cafes than when they accessed the Internet at homeParticipants who used the Internet at night had higher instances of victimization than those who used it predominantly during the afternoon and eveningThose who utilized primarily foreign websites had significantly more problems than those who utilized a combination of foreign and Turkish websites or primarily Turkish websites
  24. Now there are other aspects of the topic that the research looks into such as the government and civil society ICT-led initiatives that show steps being taken towards a universal access but also the policy adopted in Turkey opening the discussion around whether or not they guarantee the maximization of the opportunities and the minimization of the safety risks.