justifying control, 39, 40, 78, 79
mobile media in schools, 112, 113
pathologizing discourses, 186
policy making, 47–57, 64–66
porn panic, 50–55
risk, 8, 9, 52, 57, 59
sexting, 75
sexual content, 55–57, 85, 89
social networks, 66, 67
stress, 123, 124
unacceptable use, 109–111, 143
unhealthy effects of media, 123, 124
use of statistics, 53, 61, 62
Wikipedia, 100
youth sexuality, 76, 77
Hasinoff, A. A., 76, 77
Hayes, G. R., 110, 121
Horst, H., 97, 98
Hybrid media markets, 172
Identities capitalization of, 40, 200
context, 192
disassociation from, 197–199
experimenting with, 200, 208, 209
on Facebook, 200
on Google, 200
negotiating, 38
online, 188, 189, 208, 209
performative, 188, 189
persistent, 200
privacy, 190, 191, 196
regulation of, 41, 42
technical, 156
Ideology, 34, 60, 95, 101
Imagined collectives, 39
Indecency, 51, 52
Indirect regulation, 49, 59, 60
Inferential reasoning, 93
Information, 90–93
Information overload, 89, 90
Information seeking practices, 97–106
Innocence, 40, 48, 50, 62–65, 76
Instagram, 211
Interest-driven learning, 225–229
Interest-driven practices, 14, 131, 132, 135, 136, 228
Interest theory, 250
Internet, 47, 48, 51, 52, 101, 102, 150, 151
Internet Engineering Task Force, 58
Internet service providers, 55, 71, 72
Invisibility, 180
Ito, M., 14, 38, 39, 90, 91, 156, 158, 167, 216, 228
Jenkins, H., 90, 91, 155, 159, 178
Jones, J., 128, 129
Journaling, 38
Kaplan, A. M., 19
Kearney, M. C., 38
Kellner, D., 99–101
Kelly, P., 41, 43
King, A., 69
Lange, P., 156, 167
Lareau, A., 171
Larsen, R., 250
Lave, Jean, 159
Law (mode of regulation), 31, 32, 49
Learning, modes of, 14, 135, 136, 140, 141, 222–225, 228
Learning ecologies connected learning model, 13, 14
examples, 231, 232, 241–246, 250
ideal, 221
missing connections in, 253, 254
opportunities in, 24
Lesbians, 189, 190, 205, 206
Lessig, L. on barriers to digital literacy, 156
on competing values, 45
on fair use, 163–164
on indirect regulation, 59, 60
on modalities of regulation, 31, 32, 49, 129
on read-only cultures, 150, 151
on read/write cultures, 150, 151, 154
LGBTQ youth, 56, 73, 86, 88
Library online resources, 96, 97
Ling, R., 37
Livingstone, S., 11, 37, 218, 264, 281
Luhmann, N., 279, 280
Lumby, C., 46
Lupton, D., 7, 8, 42, 280–282
Lurkers, 158, 159
Lyle, J., 125, 126, 144
Mann, S., 139
Marginalized youth after-school clubs, 227
college aspirations, 217, 218, 231, 232, 235, 236
connected learning, 218, 219, 222, 242–245
invisibility online, 212
networked connections, 5, 197, 205, 206
in networked publics, 172
opportunities, 11
school Wi-Fi, 133, 134
tracking in schools, 43
vocational track, 225, 226
Market (mode of regulation), 31, 32, 49
Marron, D., 152
Martin, Trayvon, 102–106
Marwick, A., 63
McRobbie, A., 35
Media collapsed contexts, 37
as focus of moral panics, 34, 35
health fears about, 123, 124
as risk, 41
television, 3, 4, 124–126
use in moral panics, 6, 7, 11, 33, 34, 52–55, 62, 63, 112
Media ecologies, 13–17 inequalities in, 15, 154, 259
information overload, 90, 91
research methodologies, 267, 268
Media industries, 39, 40, 151, 152, 172
Media literacy, 21, 125, 126, 155
Media production career aspirations, 233, 234, 238–240, 243, 244, 264, 265
Cinematic Arts Project, 19, 233, 234
conditions of, 150
democratization of, 151–153
Digital Media Club, 18, 19
as risk intervention, 44, 223–225
Mediated communities, 38, 39
Megan Meier Cyberbullying Prevention Act (2009), 71
Methodologies, 17, 18, 45–51, 267–274
Middlewood, B. L., 139
Miles, A., 178
Miller, D., 21
Minors, 22, 76
Misinformation, 92–94
Mobile phones covert use, 131
disengagement, 138
as learning tools, 142–144
marginalized youth, 15
norms, 127, 128
parents, 112
responsibilization, 118–121
school bans on, 109–114
use practices, 121
Mobile technologies digital divide, 153, 154
harm-driven expectations, 23, 123, 124
as learning tools, 142, 143
modes of teaching, 115–117
school bans on, 39, 84, 109–113, 140, 141
Montiel, I., 200, 209
Moral panics, 33–35 cyberbullying, 67–74
harm-driven expectations in, 6, 11, 78, 79
ideology in, 34
justifying control, 38
media in, 6, 7, 11, 33, 34, 52–55, 62, 63, 112
misuse of statistics in, 34, 53, 61, 62, 74, 75
and new media, 41, 255
and new technologies, 33
peer fear, 47, 67–77
policies, 46–48
porn panic, 47, 50–61
predator panic, 47, 61–67
privilege, 79, 80
sexting, 74–77
social regulation, 34, 35
youth as scapegoats, 34–37, 60, 73, 74
Morley, D., 13
Motivation, 229, 230, 250
Mullin, D., 52
Murphy, R., 114, 119
MySpace, 183
National School Safety and Security Services, 113
Navigation of risk crisis news, 103–106
critical digital literacies, 92
education for, 40, 57, 67, 80, 81, 143
harm-driven expectations, 48, 79–81
information overload, 89–92
opportunity-driven expectations, 81
Negotiation around barriers, 5, 6, 15, 16, 133, 134
of control, 261
marginalized youth, 136, 137, 233, 234
of public and private, 40
school Wi-Fi, 133–137
as tactical practice, 130, 131
Netiquette, 159
Net Smart (Rheingold), 119
Nett, U. E., 140
Networked publics adult surveillance of, 198, 199
amateur works, 172
benefits of, 157
connections, 195–198
elements of, 192
empowerment through, 40
girls, 156, 157
surveillance, 194
visibility, 194–196
Network literacy, 177–179
Nissenbaum, Helen, 193, 194
Norms (mode of regulation) cell
phone use, 127, 128
cyberbullying, 72
development of, 78, 129
interaction with other modes, 31, 32, 49
markets, 72
network architectures, 201–203
privacy, 193
sexting, 77, 78
Oakes, J., 43
O’Brien, M., 130, 131, 138
Obscenity, 51, 52
Online communities, 3, 5, 88, 188–191, 200
Online sharing, 157, 158, 168–171, 187, 188
Opportunity, expectations of, 8, 9 approaches to, 11, 12
beneficial visibility, 156–160, 256
Creative Commons licenses, 164–166
digital literacies, 44
government regulation, 67
institutional contexts, 237, 238
marginalized youth, 11, 259, 260
model of connections, 258, 259
navigation of risk, 57, 80–82
network literacy, 177–179
resilience, 171–174
in schools, 262, 263
students as producers, 165
technology education, 84, 85
Parents autonomy of, 49, 52
on mobile phone use, 112, 128
as mode of regulation, 30, 31, 49, 56, 57, 58
Parker, E., 125, 126
Parker, J. K., 98–100, 144
Participation, 14, 158
Participation gap, 15, 16, 23, 24, 259
Participatory cultures barriers, 147–149, 153, 154, 160–162, 171–173, 257, 258, 262
beneficial visibility, 155–160
classed subject positions, 171
commercial use of, 19, 20, 212, 213
conditions of, 150–153
creators in, 107
differentiating practices, 171, 172
digital literacies, 155
fandom, 38
inequalities in, 15, 16, 153, 154
labor in, 175, 176
social media, 19, 20
Participatory literacies, 148, 154, 155
Pathologizing discourses, 124, 128–130, 186
Peer cultures accountability in, 78
connected learning, 252, 253
development of, 35, 36
norms in, 37
peer knowledge, 97
public life, 39
as public space, 37
sharing practices, 133–136
Peer fear, 47, 67–77
Persistent identity, 200
Personally expressive media, 168–171
Pew Research Center, 69, 126, 149
Phillips, S., 123, 124
Piracy, 162, 163
Plagiarism, 162, 163
Policies evidence-based, 261
harm-driven expectations, 6–9
inequalities, 15–17, 134, 154, 225
moral panics, 46–48, 55
risk constructs in, 8, 30, 31, 46, 47
Porn panic, 47 Communications Decency Act (1996), 51, 52
harm-driven expectations in, 50, 54
media in, 52–55
sexting, 74
Power, 13, 101, 130, 131
Predator panic, 47, 61–67, 74
Prensky, M., 88, 106
Pre-professionals career aspirations, 233, 234, 238–240, 243, 244, 264, 265
concerns with online sharing, 158–162, 166–174
Privacy commercial platforms, 24
as concealment, 196
context collapse, 192
contexts, 24, 190
data collection, 102
differentiated practices, 188
expectations of, 186, 187, 190–194
Facebook Like function, 201–206
Facebook strategies, 205, 206
identities, 190, 191, 196
individualized responsibility for, 185–188, 194, 195
network architectures, 201–206
privilege, 79, 80
sexual health information, 56, 88
strategies on Facebook, 205, 206
Tumblr, 208, 209
youth strategies for, 210, 211
Private sphere, 37
Project-based learning, 117, 140, 141, 217, 222–225
Protecting Children in the 21st Century Act (2007), 66
Protection of Children from Computer Pornography Act of 1995, 55
Proxy servers, 134–136
Publics, 37, 39, 49, 62–64, 187, 192
Putnam, A., 72
Radford, B., 62
Rainie, L., 40
Rating systems, 31, 58
Read-only cultures, 150, 151
Read/write cultures, 150, 151, 154
Reagle, J., 123
Record Industry Association of America, 162
Regulation at-risk populations, 41–44
indirect, 59, 60
modalities of, 31, 32, 49, 56–59, 77, 78, 129
social, 30
of youth practices, 33
of youth spaces, 39
Relatedness, 250
Reliability, 101
Remix culture, 149, 150, 164
Resilience, 173
Resistance, 130–136, 207, 208
Responsibilization, 9, 10, 57, 88, 89, 110, 111, 118, 119, 122, 123, 261, 262
Rheingold, H., 107, 118, 119, 159
Rights, discourse of, 109–112, 134, 135, 143
Rimm Study, 53, 54
Ripley, A., 139
Risk, theories of, 280–282
Risk-avoidance strategies, 48, 255
Risk industry, 11–13
Risk intervention adult anxieties, 48
“at-risk” label, 42, 43, 47, 48
digital education, 229, 230
insufficient, 56, 57
media production as, 223–225, 229, 230, 251
opportunity, 173, 215, 219
public spaces, 49
rating systems, 58
regulation as, 45, 46
technologies of, 44
youth constructs, 121
Risks, discourses of “at-risk” label, 47, 48
as barriers to participation, 262
class aspects, 64
commercial firewalls, 102
consequences of, 79
construction of, 6–8
distraction, 112
expectations of harm, 8, 9, 52, 57, 59, 108
history of, 279, 280
individualized responsibility in, 10
justifying control, 38, 78
in the media, 1–3
mobilization of, 46, 52–55, 144
opportunity, 44
privilege, 63–65, 79, 80
regulation, 31, 32, 46, 56, 57, 279
sexual content, 85, 89
stress, 112
technology, 3–6, 84
youth as scapegoats, 60
youth in, 40–44
Rock, D. A., 42
Russell, J., 41
Sacks, P., 114, 115
Schools, regulation in ambiguity, 109–111
bypassing, 130, 131
class aspects, 87, 107
critical digital literacies, 106
Deleting Online Predators Act (2006), 65
E-rate funding, 59, 65
harm-driven expectations, 23, 84
liability, 112
mobile technologies ban, 130
negotiation in, 131
personal electronic devices, 109–111
Protecting Children in the 21st Century Act (2007), 66, 67
surveillance, 59, 211
unacceptable use, 109–111
School technology resources, 96, 97, 133–137
School-to-prison pipeline, 137, 211
Schramm, W., 125, 126, 144
Sefton-Green, J., 218, 264
Self-authorization, 38
Self-censorship, 198, 212
Self-determination theory, 250
Selfies, 186
Self-regulation, 31, 57, 58, 71, 72, 124
Sex education, 85–89
Sexting, 74 criminalization of, 75, 76
> in the media, 1, 4, 255–266
norms, 77, 78
peer fear, 47
in relationships, 75
Sexual content, 51–60, 83–87
Sexuality access to information, 88
constructs of youth, 76, 77
harm-driven expectations, 56, 85, 187, 255
moral panics, 37
online communities, 189, 190
online privacy, 205, 206
Shaming, 75
Sharing, 133, 134, 147, 148, 194, 199–205
Sims, C., 171, 172
Situated learning, 14
Skenazy, L., 61, 62
Snapchat, 211
Social capital, 232, 233, 237, 238, 263, 264
Social constructivism, 6, 7
Sociality capitalization of, 200
conspicuous, 123
Internet participation, 19, 20
literacies, 155, 156
resistance, 131, 132
Social media, 19–21 activism, 104–107
amateur works, 172
boredom, 137–143
bypassing filters, 133
controlled membership, 184
covert use, 131
labor in, 175, 176
migrations across, 183, 184
Social network sites, 19, 20, 61–67
Social shaping, 29, 30
Solove, Daniel, 196
Standardized Minds (Sacks), 114, 115
Standardized tests, 114, 115
Statistics, misuse of, 53, 61, 62, 74, 75
Stereotypes, 104, 105
“Stranger danger
Strauss, A., 277
Stress, 123–128
Student Internet Safety Bill (2009), 72
Surveillance, 39, 42–44, 59, 211
Taylor, A., 131
Teaching, 115–117
Technological determinism, 12, 29, 93
Technologies affordances, 20, 30, 38–40, 44, 106, 122, 183, 187
competing discourses of, 84
as disruptive, 29, 113, 116, 129
historical anxieties about, 3, 4, 11, 124, 125
socially situated model, 221, 222
social shaping of, 29, 30, 84
Technology courses in school, 223–226
Technopanics, 63
Worried About the Wrong Things Page 46