Worried About the Wrong Things

Home > Other > Worried About the Wrong Things > Page 45
Worried About the Wrong Things Page 45

by Jacqueline Ryan Vickery


  Texas STD Surveillance Report (2014). Texas Department of State Health Services. https://www.dshs.texas.gov/hivstd/reports/STDSurveillanceReport2014.pdf.

  Thevenot, C. G. 2014. Parents sue school district over bullied daughter’s suicide. Las Vegas Review-Journal, October 21. http://www.reviewjournal.com/news/las-vegas/parents-sue-school-district-over-bullied-daughter-s-suicide

  Thiel-Stern, S. 2007. Instant Identity: Adolescent Girls and the World of Instant Messaging. Peter Lang.

  Thiel-Stern, S. 2014. From the Dance Hall to Facebook: Teen Girls, Mass Media, and Moral Panic in the United States, 1905–2010. University of Massachusetts Press.

  Thomas, D., and J. S. Brown. 2011. A New Culture of Learning: Cultivating the Imagination for a World of Constant Change. CreateSpace.

  Thomson, K. 2011. White Supremacist Site MartinLutherKing.org Marks 12th Anniversary. Huffington Post, January 16. http://www.huffingtonpost.com/keith-thomson/white-supremacist-site-ma_b_809755.html

  Tinker v. Des Moines Independent Community School District, 393 U.S. 503, 504 (1969).

  Trenholm, C., B. Devaney, K. Forston, J. Wheeler, and M. Clark. 2007. Impacts of Four Title V, Section 510 Abstinence Education Programs: Final Report. Princeton Mathematica Policy Research. http://www.mathematica-mpr.com/~/media/publications/PDFs/impactabstinence.pdf

  Trump, K. S. 1995. Schools security assessments and crisis preparedness. Updating School Board Policies 26 (6): 1–5.

  Trump, K. S. 2009. Is it safe to allow cell phones in school? District Administration, November. http://www.districtadministration.com/article/it-safe-allow-cell-phones-school

  Turkle, S. 1995. Life on the Screen: Identity in the Age of the Internet. Simon & Schuster.

  Turkle, S. 2011. Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books.

  Turrill, D. 2014. The Total Audience Report. Neilsen. http://s1.q4cdn.com/199638165/files/doc_presentations/2014/The-Total-Audience-Report.pdf

  Tyner, K. 1998. Literacy in a Digital World: Teaching and Learning in the Age of Information. Erlbaum.

  Urbina, I. 2007. Court rejects law limiting online pornography. New York Times, March 23. http://www.nytimes.com/2007/03/23/us/23porn.html

  van Dijck, J. 2013a. The Culture of Connectivity: A Critical History of Social Media. Oxford University Press.

  van Dijck, J. 2013b. “You have one identity”: Performing the self on Facebook and LinkedIn. Media Culture & Society 35 (2): 199–215.

  Vickery, J. R. 2008. The Megan Meier MySpace suicide: Exploring the social aspects of convergent media, citizen journalism, and online anonymity and credibility. Presented at International Symposium on Online Journalism, Austin.

  Vickery, J. R. 2010. Blogrings as online communities for adolescent girls. In Girl Wide Web 2.0: Revisiting Girls, the Internet, and the Negotiation of Identity, ed. S. Mazzarella. Peter Lang.

  Vickery, J. R. 2014a. Talk whenever, wherever: How the U.S. mobile phone industry commodifies talk, genders youth mobile practices, and domesticates surveillance. Journal of Children and Media 8 (4): 387–403.

  Vickery, J. R. 2014b. “I don’t have anything to hide, but … ”: The challenges and negotiations of social and mobile media privacy for non-dominant youth. Information Communication and Society 18 (3): 281–294.

  Vitelli, R. 2013. Stress, texting, and being social. Psychology Today, December 16. https://www.psychologytoday.com/blog/media-spotlight/201312/stress-texting-and-being-social

  Vogel-Walcutt, J. J., L. Fiorella, T. Carper, and S. Schatz. 2011. The definition, assessment, and mitigation of state boredom within education settings: A comprehensive review. Educational Psychology Review 24: 89–111.

  Walker, K. 2000. “It’s difficult to hide it”: The presentation of self on Internet homepages. Qualitative Sociology 23 (1): 99–120.

  Wallin, P. 2009. Bullying: What’s the big deal? PennLive, February 17. http://www.pennlive.com/bodyandmind/index.ssf/2009/02/bullying_whats_the_big_deal.html

  Ward, J. R., ed. 2015. Real Sister: Stereotypes, Respectability, and Black Women in Reality TV. Rutgers University Press.

  Watkins, S. C. 2009. The Young and the Digital: What the Migration to Social Network Sites, Games and Anytime, Anywhere Media Means for Our Future. Beacon.

  Watkins, S. C. 2012. Digital divide: Navigating the digital edge. International Journal of Learning and Media 3 (2): 1–12.

  Watkins, S. C., A. Cho, A. Bermudez, J. Vickery, V. Shaw, and L. Weinzimmer. 2017. The Digital Edge: The Evolving World of Social, Educational, and Digital Inequality. New York University Press.

  Webb, J. 2014. Should companies monitor their employees’ social media? Wall Street Journal, October 22. http://www.wsj.com/articles/should-companies-monitor-their-employees-social-media-1399648685

  Weeks, L. 2012. Tragedy gives the hoodie a whole new meaning. NPR, March 24. http://www.npr.org/2012/03/24/149245834/tragedy-gives-the-hoodie-a-whole-new-meaning

  Weiss, J. 2012. Texas’ standardized tests a poor measure of what students learned, UT-Austin professor says. Dallas Morning News, August 11. http://www.dallasnews.com/news/education/headlines/20120811-texas-standardized-tests-a-poor-measure-of-what-students-learned-ut-austin-professor-says.ece

  Wentzel, K. R. 2005. Peer relationships, motivation, and academic performance at school. In Handbook of Competence and Motivation, ed. A. Elliot and C. Dweck. Guilford.

  Wesch, M. 2008. An anthropological introduction to YouTube. https://www.youtube.com/watch?v=TPAO-lZ4_hU

  Wesch, M. 2009. Participatory media literacy: Why it matters. mediatedcultures.net, January 3. http://mediatedcultures.net/thoughts/192/

  Widder, B. 2014. Think you know how to Google? Digital Trends, November 9. http://www.digitaltrends.com/computing/the-35-best-google-search-tips-and-tricks/

  Winsten, J. 2011. The Designated Driver campaign: Why it worked. Huffington Post, March 18. http://www.huffingtonpost.com/jay-winston/designated-driver-campaig_b_405249.html

  Withers, G., and M. Batten. 1995. Programs for At-Risk Youth: A Review of the American, Canadian and British Literature since 1984. Australian Council for Educational Research.

  Wolfgang, M. E. 2002. Victim precipitated criminal homicide. In Crime and Justice at the Millennium, ed. R. Silverman et al. Springer Science + Business Media.

  Wood, E. 2013. The Harlem Shake has exploded. YouTube Trends, February 12. Available: http://web.archive.org/web/20130424074859/http://youtube-trends.blogspot.com.au/2013/02/the-harlem-shake-has-exploded.html

  Woollaston, V. 2013. Revealed, what happens in just ONE minute on the internet: 216,000 photos posted, 278,000 Tweets and 1.8m Facebook likes. Daily Mail, July 30. http://www.dailymail.co.uk/sciencetech/article-2381188/Revealed-happens-just-ONE-minute-internet-216-000-photos-posted-278-000-Tweets-1-8m-Facebook-likes.html

  Yazzie-Mintz, E. 2007. Voices of students on engagement: A report of the 2006 High School Survey of Student Engagement. Center for Evaluation and Education Policy, Indiana University. http://eric.ed.gov/?id=ED495758

  Yin, R. K. 2009. Case Study Research: Design and Methods, fourth edition. SAGE.

  Zetter, K. 2009. Judge acquits Lori Drew in cyberbullying case, overrules jury. Wired, July 2. http://www.wired.com/2009/07/drew_court/

  Zheng, R. 2006. From WebQuest to virtual learning: A study on students’ perception of factors affecting design and development of online learning. In Teaching and Learning with Virtual Teams, ed. S. Ferris and S. Godar. Information Science Publishing.

  Index

  Acceptable use, 58, 121, 122, 136, 137, 143, 144

  Access after-school clubs, 215

  digital divide, 87, 107, 113, 153, 154

  marginalized youth, 5, 6, 15, 16, 133, 134, 233, 234, 238, 239, 252, 253, 261

  Activism, 104–107

  Addiction, discourse of, 4, 112, 124, 128–130

  Adult anxieties new technologies, 6

  perceptions of risk, 23

  regulation of youth practices, 29, 33, 41, 42, 48, 1
29, 130

  youth cultures, 34–36

  Affordances of technology informal learning spaces, 44

  managing distraction, 122

  modes of learning, 106

  networked publics, 38–40

  participatory cultures, 106

  social media platforms, 183, 187

  social networks, 20

  After-school clubs, 215, 218, 225–230

  Agency blocked by adults, 9, 10, 129, 130

  harm-driven expectations, 8, 9, 23

  in information seeking practices, 97, 98

  in mobile technologies use, 119–121

  sexting, 76, 77

  social regulation, 30

  tactical practices, 130, 131

  of technology, 29

  in television use, 125

  Amateur cultures, 157

  Amateur works, 38, 39, 95–97, 102, 107

  American Civil Liberties Union of Massachusetts, 211

  Anonymity, 69, 191, 209, 211

  Anti-harassment policies, 71, 72

  Architecture (mode of regulation), 31, 32, 49

  “At-risk” label, 34, 35, 41–44, 60, 79

  Attention literacies, 119–123

  Audiences, 192, 211

  Authoritative sources, 97, 102, 107

  Autonomy, 97, 98, 140–143, 250

  Bagonstos, Samuel, 212

  Baker, P., 33

  Barriers boredom as, 139, 142

  to digital literacies, 97, 105, 126

  financial, 15

  to media production, 16

  to participation, 147–149, 153, 154, 160–162, 171–173, 257, 258, 262

  resistance to, 130–135, 140–142

  technical, 5, 16

  Batten, M., 41

  Beck, U., 281

  Beland, L., 114, 119

  Berman, J., 58

  Bias, 93, 104, 105

  Blogs girl-centric, 38

  information seeking practices, 90

  networked publics, 184

  online communities, 168, 189

  participatory cultures, 19, 170

  regulation, 65

  teaching with, 179

  Tumblr, 176

  Boredom, 138–141

  Boundaries adolescent/adult, 60, 121, 256

  child/adult, 48, 51, 79

  critical digital literacies, 91, 118, 121, 128–133, 143

  public/private, 36, 37

  sexual content, 51

  boyd, d. on context collapse, 37

  on information overload, 90, 91

  on language of addiction, 128–130

  on publics, 39, 187, 192, 205

  on social network sites, 20

  Brown, J. S., 264

  Buckingham, D., 95, 96, 188

  Burden of representation, 172, 173

  Burkus, D., 139

  Butler, J., 188, 189

  Cadman, R., 139

  Carter, S. P., 115, 119

  Castel, R., 42

  Center for Democracy and Technology, 58

  Centers for Disease Control and Prevention, 68

  Chaney, C., 186, 187

  Charmaz, K., 276

  Childhood, 22 constructs of youth, 76

  innocence, 40, 62–65

  policies of panic, 79, 80

  risk anxieties, 1, 40, 41, 48, 50

  sexuality, 49–51

  Children and the Internet (Livingstone), 281

  Children’s Internet Protection Act (2000), 58–61, 83, 89

  Child’s Online Protection Act (1998), 55–60

  Cinematic Arts Project, 18, 224, 225, 228–231, 238, 239, 248, 249

  Class, The (Livingstone and Sefton-Green), 218

  Code (mode of regulation), 31, 32, 49

  Cohen, S., 34

  Collective learning environments, 264

  Commercial platforms, 24, 212, 213

  Commodification, 39, 40, 259, 260

  Communications Decency Act (1996), 51, 52, 55, 60, 71, 72

  Competence, 250

  Connected learning model after-school clubs, 236

  disconnections, 162, 163, 232–234

  elements of, 215–217, 220, 221

  home life in, 218–220, 232, 233, 252, 253

  opportunities and risks, 24

  social capital in, 237, 238

  in technology classes, 223, 224

  Consent, 47, 51, 74, 77, 78, 102, 196, 204, 255

  Conspicuous sociality, 123

  Consumerism, 1, 40, 53, 54, 103, 107, 150, 157, 158, 162, 165

  Context collapse, 37, 192

  Contextual integrity, 193, 194, 256

  Control, discourse of, 23, 38, 112

  Co-presence, 37

  Copyright, 30, 162–166

  Cramer, M., 110, 121

  Creative Commons, 164, 165

  Crimes against children, 61, 62

  Crimes Against Children Research Center, 61, 66

  Criminalization of youth practices, 70–72, 75, 76, 137, 138

  Crisis news, 102–106

  Critical digital literacies, 96, 99–103

  Critical pedagogy, 106

  Criticism, 166–171

  Crockford, K., 211

  Cultivation theory, 4

  Culture of Connectivity, The (van Dijck), 199, 200

  Cyberbullying, 1–4, 47, 67–76, 256

  Damned and the Beautiful, The (Fass), 35

  Danger, 8

  Databases, 96, 97

  Data collection, 102, 289n5

  Dawes, N. P., 250

  de Certeau, M., 130, 131

  Deleting Online Predators Act (2006), 65, 66

  Digital divide, 15, 87, 153, 154

  Digital Edge project, 17, 267

  Digital literacies, 21 categories of, 94–96, 99–103, 106, 119, 120, 148, 154–155, 177–179

  connected learning, 221, 222

  consent, 77

  copyright education, 163–166

  critical digital literacies, 95, 96, 99–103

  critical pedagogy, 91, 92

  cyberbullying, 66, 67

  digital divide, 154–155

  education for, 99–106, 264

  empowerment, 155

  equitable, 16, 17

  formal curriculum, 84

  government regulation, 67

  information overload, 90, 91

  marginalized youth, 6

  navigating risk, 80–82, 92

  networked participation, 179, 180

  opportunities, 23, 24

  privilege, 10

  Protecting Children in the 21st Century Act (2007), 44, 66, 67

  Digital media, 19

  Digital Media club, 18, 19, 227, 238, 239, 248, 249

  Digital Millennium Copyright Act, 71, 72

  Digital natives, 99

  Disassociation, 197, 198, 210

  Discrimination, 197–199

  Disengagement, 138, 247

  Disinformation, 92

  Distraction, 112–123, 142

  Douglas, M., 281

  Echo chamber effect, 93

  Ellison, N. B., 20

  Elmer-Dewitt, P., 53–55

  Engagement, 105, 140, 141, 229, 230, 250

  E-rate funding, 59, 60, 67, 84

  Ethnography, 267–274

  “Every Word Spoken” (Marron), 152

  Ewald, F., 7, 8

  Fabos, B., 101

  Facebook adult users, 184

  architecture of sharing, 194, 199

  archival nature, 200

  Like button, 201–206

  Like recycling, 204–206

  privacy strategies, 205, 206

  unfriending, 208

  Fair use, 164, 165

  Fan cultures, 38, 151

  Fass, P., 35–38

  Fear of missing out, 123, 124

  Ferry, B., 142, 143

  Filmmakers, 147, 148

  Filter bubble, 288n3

  Filters bypassing, 107, 111, 131–136

  Creative Commons use, 165

  E-rate funding, 59


  freedom of speech, 50

  and images, 165

  information on sexuality, 50, 51

  marginalized youth, 136, 137

  network literacy, 179

  rating systems, 58

  Finkelhor, D., 61, 63

  Finn, J. D., 42

  Firewalls blocking videos, 83

  bypassing, 107, 111, 131, 134–136

  Children’s Internet Protection Act (2000), 83

  commercial aspects, 101–103

  marginalized youth, 136, 137

  sexual content, 87–89

  First Amendment, 51, 52, 57, 58, 89

  Folk Devils and Moral Panics (Cohen)

  Ford, S., 151–153, 157, 178

  Foucault, M., 44, 47, 48, 281, 282

  Franks, M. A., 79, 80

  Frechette, J., 101, 103

  Freedom of speech, 51, 52, 57, 58, 69

  Friendship-driven practices, 14, 131–133

  Friendships, online, 132, 133

  Funnell, N., 46

  Gasper, K., 139

  Geertz, C., 276

  “Ghetto

  Giddens, A., 281

  Girls, 38, 65, 187, 256, 257

  Girls Make Media (Kearney), 38

  Giroux, H., 40, 70, 71

  Glaser, B., 277

  Goetz, T., 140

  Governability, 47, 48

  Governmentality, 281, 282

  Gray, M., 88

  Green, J., 151–153, 157, 178, 179

  Green, N., 121

  Greenberg, K., 115, 119

  Grounded theory, 276, 277

  Habitus, 219

  Haenlein, M., 19

  Hall, S., 34, 60, 78

  Hanging Out, Messing Around, and Geeking Out (Ito et al.), 14

  Harassment, online, 73

  Hargittai, E., 16

  Harm-driven expectations as barriers to digital literacy, 105, 155

  in construction of childhood, 40, 48–51, 62, 63, 79, 80

  cyberbullying, 68

  disempowerment through, 8, 9, 39, 40, 108, 165, 257, 258

  distraction, 119–121

  effects of, 257, 258

  firewalls, 59, 83, 84, 101, 102

 

‹ Prev