Main risks in the use of information technologies in teenagers

Authors

DOI:

https://doi.org/10.56162/transdigital218

Keywords:

cyber-attacks, cyber education, cybersecurity, cyberspace, information technologies

Abstract

At the beginning of 2020, the world faced one of the biggest pandemics in history, resulting in a change in people's way of life with the use of information technologies at its center. Although their use had evolved rapidly, there were still many sectors of the population that had not fully integrated them. With the arrival of the pandemic, the entire world had to adapt to a new way of interacting, from the way of living with the family to the way of teaching and taking classes, to name a few activities. Basic education was one of the most affected sectors, as it had to transition from face-to-face work to completely online teaching. However, a large part of this population, made up of adolescents, girls and boys, were not familiar with the risks that daily coexistence with the Internet entailed. This revealed that educational institutions did not have time to educate their students on cybersecurity. This article shows some of the main risks that adolescents face, derived mainly from an increasing exposure to the Internet, and does not contemplate minimum safety and prevention measures. Finally, some strategies are presented that help to mitigate these problems.

References

Alqahtani, N. (2017). A state of the art review of Internet risks on children. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 108-112. https://doi.org/10.1109/Anti-Cybercrime.2017.7905273.

Alqahtani, N., Furnell, S., Atkinson, S. & Stengel, I. (2017). Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context. 2017 Internet Technologies and Applications (ITA), 98-103. https://doi.org/10.1109/ITECHA.2017.8101918.

Andrade Ureña, R. F. & Guevara Yánez, R. E. (2019). El acto de sextorsión y su necesaria tipificación en el código orgánico integral penal ecuatoriano. Proyecto de Investigación de Abogado(a) de los Tribunales de la República (Universidad Regional Autónoma de los Andes “Uniandes”). https://dspace.uniandes.edu.ec/bitstream/123456789/10098/1/PIUSDAB049-2019.pdf.

Asociación de Internet. (2021). 17º Estudio de Hábitos de Internet en México. https://www.asociaciondeinternet.mx/estudios/habitos-de-internet.

Aubley, C., Bowen, E., Frank, W., Golden, D., Norton, K., & Morris, M. (2022). Cyber AI: Real defense. Deloitte Insights. https://www2.deloitte.com/us/en/insights/focus/tech-trends/2022/future-of-cybersecurity-and-ai.html

Barrense-Días, Y., Berchtold, A., Surís, J. C. & Akre, C. (2017). Sexting and the definition issue. Journal of Adolescent Health, (61), 544-554. https://doi.org/10.1016/j.jadohealth.2017.05.009.

BBC News Mundo. (2018, 25 julio). Qué es «Momo», el juego viral por WhatsApp que preocupa a autoridades en América Latina. BBC News Mundo. https://www.bbc.com/mundo/noticias-44952770.

BBC News Mundo. (2019, 27 enero). La verdadera historia del reto suicida de la «Ballena Azul» que se hizo viral en internet. BBC News Mundo. https://www.bbc.com/mundo/noticias-46974250.

Binti Mt Tahir, T. & Bin Husin, M. H. (2017). Online social media and risks: An exploration into existing children practice. 2017 International Conference on Electrical Engineering and Informatics (ICELTICs), 195-200. https://doi.org/10.1109/ICELTICS.2017.8253250

Borj, P. R. & Bours, P. (2019). Predatory Conversation Detection. 2019 International Conference on Cyber Security for Emerging Technologies (CSET), 1-6. https://doi.org/10.1109/CSET.2019.8904885.

Bours, P., & Kulsrud, H. (2019). Detection of Cyber Grooming in Online Conversation. 2019 IEEE International Workshop on Information Forensics and Security (WIFS), 1-6. https://doi.org/10.1109/WIFS47025.2019.9035090.

Craven, S., Brown, S. & Gilchrist, E. (2007). Sexual grooming of children: Review of literature and theoretical considerations. Journal of Sexual Aggression, 12(3), 287-299. https://doi.org/10.1080/13552600601069414.

Coello Coello, C. A. (2003). Breve Historia de la Computación y sus Pioneros. Fondo de Cultura Económica. ISBN 968-16-7106-6.

Demirol, D., Tuna, G. & Das, R. (2017). A simple logging system for safe internet use. 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), 1-5. https://doi.org/10.1109/IDAP.2017.8090252.

Digital, M. (2022, 11 noviembre). ¿De qué trata el reto viral con clonazepam? Estos son los riesgos y casos en México. Grupo Milenio. https://www.milenio.com/virales/el-reto-del-clonazepam-que-esta-alertando-a-los-padres.

Fauzi, M. A. & Bours, P. (2020). Ensemble Method for Sexual Predators Identification in Online Chats. 2020 8th International Workshop on Biometrics and Forensics (IWBF), 1-6. https://doi.org/10.1109/IWBF49977.2020.9107945.

Fortinet. (s.f). ¿Qué es el Catfishing en línea? Señales y cómo distinguirlo. https://www.fortinet.com/lat/resources/cyberglossary/catfishing.

Garriga Domínguez. A. (2016). Nuevos retos para la protección de datos personales. En la Era del Big Data y de la computación ubicua. Dykinson, 18-24.

Guiot Limón, I. (2021). Uso de las TICS en la educación superior durante la Pandemia COVID-19: Ventajas y desventajas. Interconectando Saberes, 12, 223–227. https://doi.org/10.25009/is.v0i12.2724.

Google. (s. f.). Google Safe Browsing. Recuperado 16 de abril de 2023, de https://safebrowsing.google.com/.

Ibarrola, M. (2005). Educación y trabajo. Revista mexicana de investigación educativa, 10 (25), 303-313.

Joshi, S. C. & Rose, G. (2018). Information Technology, Internet Use, and Adolescent Cognitive Development. 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), 22-28. https://doi.org/10.1109/CSITSS.2018.8768780.

Juarez, M. B. (2019). La necesidad de clasificar los retos virales para establecer un sistema de prevención eficaz. Univesidad Nebrija, Madrid, España, 1267-1280.

Kahimise, J. & Shava, F. B. (2019). An analysis of children’s online activities and behaviors that expose them to cybercrimes. 2019 27th Telecommunications Forum (TELFOR), 1-4. https://doi.org/10.1109/TELFOR48224.2019.8971089.

Knafo, D. (2021). Digital Desire and the Cyber Imposter: A Psychoanalytic Reflection on Catfishing. Psychoanalytic Dialogues, 31(6), 728-743. https://doi.org/10.1080/10481885.2021.1976187.

Keeley, B., & Little, C. (2017). The State of the Worlds Children 2017: Children in a Digital World. En UNICEF. UNICEF. https://eric.ed.gov/?id=ED590013.

Kohli, V., Saxena, S. & Patni, J. (2015). A SURVEY- Academic demolition via internet addiction. 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 1769-1774.

Lu, Y., Baumler, E., & Temple, J. R. (2021). Multiple Forms of Sexting and Associations with Psychosocial Health in Early Adolescents. International journal of environmental research and public health, 18(5), 2760. https://doi.org/10.3390/ijerph18052760.

Martínez-de-Morentin, J. I., Lareki, A. & Altuna, J. (2021). Risks Associated With Posting Content on the Social Media. IEEE Revista Iberoamericana de Tecnologias del Aprendizaje, 16(1), 77-83. https://doi.org/10.1109/RITA.2021.3052655.

Matkovi?, R., Vejmelka, L. & Klju?evi?, Ž. (2021). Use of security settings on social networks of elementary and high school students in the Split-Dalmatia County. 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), 1476-1481. https://doi.org/10.23919/MIPRO48935.2020.9245249.

Naylor, D., Finamore, A., Leontiadis, I., Grunenberger, Y., Mellia, M., Munafò M. & Steenkiste, P. (2014). The cost of the" s" in https. Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologie, 133-140. https://doi.org/10.1145/2674005.2674991.

Norton. (2021). How to know if a website is safe: 10 steps to verify secure sites. Recuperado 16 de abril de 2023, de https://us.norton.com/blog/how-to/how-to-know-if-a-website-is-safe#safe.

Stouffer Clare. (1 de Julio de 2022). What is catfishing? Warning signs and protection tips. Norton. https://us.norton.com/blog/online-scams/what-is-catfishing.

Olweus, D. (2012). Cyberbullying: An overrated phenomenon. European Journal of Developmental Psychology. Eureopean Jornal of Developmental Psychology, 9(5), 520-538. https://doi.org/10.1080/17405629.2012.682358.

Sardianos, C., Varlamis, I., & Bouras, G. (2018). Extracting User Habits from Google Maps History Logs. 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 690-697. https://doi.org/10.1109/ASONAM.2018.8508442.

Shalini, P. & Shankaraiah. (2019). A Novel Technique to regulate access to immoral content for Minors. 2019 7th International Conference on Smart Computing & Communications (ICSCC), 1-5. https://doi.org/10.1109/ICSCC.2019.8843593.

Tesouro Cid, M. & Puiggalí Allepuz, J. (2004). Evolución y utilización de internet en la educación. Pixel-Bit. Revista de Medios y Educación, 24, 59-67.

Valencia Ortiz, R & Castaño Garrido, C. M. (2019). Use and abuse of social media by adolescents: a study in Mexico. Pixel-Bit. Revista de Medios y Educación, (54), 7-28. https://doi.org/10.12795/pixelbit.2019.i54.01

Wachs, S. (2021) How Are Consensual, Non-Consensual, and Pressured Sexting Linked to Depression and Self-Harm? The Moderating Effects of Demographic Variables. International Journal of Environmental Research and Public Health, 18(5) 2597. https://doi.org/10.3390/ijerph18052597

Yedra, S. (2023, 1 abril). En Guanajuato, alertan autoridades por reto viral de TikTok para “desaparecer por 48 horas”. Microsoft Start. https://www.msn.com/es-mx/noticias/other/en-guanajuato-alertan-autoridades-por-reto-viral-de-tiktok-para-desaparecer-por-48-horas/ar-AA19mvtt

Yellowlees, P. M., & Marks, S. (2007). Problematic Internet use or Internet addiction? Computers in Human Behavior, 23(3), 1447-1453. https://doi.org/10.1016/j.chb.2005.05.004

Autor de correspondencia

El autor de correspodencia se identifica con el siguiente símbolo: *

Published

06-06-2023

How to Cite

Aguilar-Torres, G., Delgado-Vargas, K. A., De Abiega-L’Eglisse, A. F., López-Hernández, L., & Gallegos-García, G. (2023). Main risks in the use of information technologies in teenagers. Transdigital, 4(7), 1–14. https://doi.org/10.56162/transdigital218

Issue

Section

Scientific essays

Categories