{"id":116247,"date":"2014-04-09T00:00:00","date_gmt":"2014-04-09T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/victimizacion-de-menores-por-actos-de-ciberacoso-continuado-y-actividades-cotidianas-en-el-ciberespacio\/"},"modified":"2014-04-09T00:00:00","modified_gmt":"2014-04-09T00:00:00","slug":"victimizacion-de-menores-por-actos-de-ciberacoso-continuado-y-actividades-cotidianas-en-el-ciberespacio","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/murcia\/victimizacion-de-menores-por-actos-de-ciberacoso-continuado-y-actividades-cotidianas-en-el-ciberespacio\/","title":{"rendered":"Victimizacion de menores por actos de ciberacoso continuado y actividades cotidianas en el ciberespacio"},"content":{"rendered":"<h2>Tesis doctoral de <strong> Natalia Garcia Guilabert <\/strong><\/h2>\n<p>Resumen tesis dotoral victimizaci\u00f3n de menores por actos de ciberacoso continuado y actividades cotidianas en el ciberespacio  1. Objetivos el cibercrimen, como concepto que a\u00fana a toda la criminalidad cometida en el \u00e1mbito del ciberespacio, ha adquirido un inusitado protagonismo en los \u00faltimos a\u00f1os. Es cierto que no se trata de un fen\u00f3meno completamente nuevo, dado que sus primeras manifestaciones surgieron casi al tiempo que internet comenzaba a dar sus primeros pasos. Sin embargo, ha sido con la popularizaci\u00f3n de la red de redes y con su conversi\u00f3n en un nuevo \u00e1mbito esencial para la intercomunicaci\u00f3n personal, cuando hemos comprendido que m\u00e1s que ante un nuevo tipo de delitos, nos encontramos ante un nuevo tipo de lugar en el que los cr\u00edmenes se cometen. Una vez m\u00e1s la tecnolog\u00eda modifica los h\u00e1bitos sociales, hace surgir nuevos intereses, nuevas necesidades, nuevas formas de comunicaci\u00f3n social y, tambi\u00e9n, nuevos cr\u00edmenes o diferentes concreciones de los mismos. dentro de las diferentes formas de cibercriminalidad detectadas, el objeto de este trabajo se ha centrado en la cibercriminalidad social y, espec\u00edficamente, en las conductas concretas de ciberacoso continuado que en mayor medida sufren los menores en internet, sin limitar el \u00e1mbito de procedencia de las agresiones al entorno escolar como tradicionalmente se ha venido haciendo. Se ha seleccionado este universo por ser especialmente vulnerable y, por ello, particularmente digno de atenci\u00f3n y, por tratarse, sobre todo, de un colectivo que hace un elevado uso de las tic, que ha modificado su cotidianeidad hasta niveles inimaginables hace algunas d\u00e9cadas, cambiando sus usos y la forma de relacionarse entre s\u00ed. As\u00ed, el presente trabajo tiene como objetivo, a partir del approach de las &quot;actividades cotidianas&quot;, de identificar factores de riesgo dependientes de la cotidianeidad de la propia v\u00edctima que incidan en su propia configuraci\u00f3n como parte del evento criminal para, a su vez, definir en un futuro mejores estrategias de prevenci\u00f3n.   2. Metodolog\u00eda a partir de la creaci\u00f3n de una encuesta de victimizaci\u00f3n se ha preguntado a 2038 menores de la provincia de alicante, de entre 12 y 18 a\u00f1os, de veinte centros de ense\u00f1anza secundaria obligatoria, acerca de su actuar cotidiano en internet y sobre la vigilancia experimentada por parte de los familiares, y todo ello se ha puesto en relaci\u00f3n con el hecho de haber sido v\u00edctimas de ciberacoso continuado.   tras llevar a cabo los distintos an\u00e1lisis descriptivos y bivariados, se ha realizado un modelo matem\u00e1tico mediante la creaci\u00f3n de una red neuronal artificial  3. Resultados todo ello nos ha permitido identificar que los menores se convierten en objetivos adecuados para el ciberacoso cuando introducen con su actuar, consciente o inconsciente, bienes al ciberespacio, as\u00ed como cuando se hacen visibles a partir la interacci\u00f3n, es decir, a partir de la realizaci\u00f3n de diferentes acciones de comunicaci\u00f3n. Combinado esto adem\u00e1s con la menor vigilancia experimentada por parte de los padres u otros familiares, aumenta la probabilidad de estos sujetos de convertirse en v\u00edctimas de ciberacoso. Los resultados nos han mostrado tambi\u00e9n, por un lado, que pr\u00e1cticamente la mayor\u00eda de los menores llevan a cabo conductas de riesgo pero los que han resultado ser v\u00edctimas, las realizan en mayor medida y, por otro lado, que existen m\u00faltiples combinaciones de factores, siendo la composici\u00f3n concreta de estos en cada caso, la que determine la probabilidad de victimizaci\u00f3n. Se confirma por tanto, que el menor juega un papel muy importante en su adecuaci\u00f3n como v\u00edctima en el ciberespacio al introducir sus bienes y al hacerse visible para otros usuarios, a partir de sus actividades del d\u00eda a d\u00eda en la red y que tambi\u00e9n, es decisivo el rol que puedan ejercer los padres y otros familiares como guardianes capaces. Todo ello, nos aporta evidencias cient\u00edficas acerca las cuestiones clave que se deben de abordar para desarrollar estrategias de prevenci\u00f3n eficaces en este \u00e1mbito.     doctoral thesis summary victimization of minors by repeated acts of cyberharassment and routine activities in cyberspace  1. Objectives cybercrime, as a concept joining any type of criminality committed in cyberspace, has acquired unusual protagonism over the last years. It is true that it is not a completely new phenomenon, as the first manifestations appeared almost at the same time that internet took its first steps. However, it has not been until the moment the net of nets has become popular and a vital sphere for the personal communication, when we have become aware of the fact that we are not dealing with a new type of criminality but with a new space in which a crime takes places. Once again technology modifies our social habits, generates new interests, new necessities, new ways of social communication and new crimes or new ways of committing a crime too. within the different shapes of cybercriminality detected, the aim of this study has been focused on social cybercriminality and more precisely, in the specific behavior of constant cyberharassment suffered mainly by minors on the internet, not limiting the area of origin of these aggressions to the school environment as it has been the tradition. We have chosen this scope of study because we consider it especially vulnerable and worthy of attention but especially because it is a social group who highly uses itc. Therefore, taking as a starting point the approach to &quot;daily activities&quot;, this thesis aims to identify risk factors depending on the everyday reality of the victim affecting his or her own configuration as a part within the criminal event, this way allowing us to define better strategies of prevention for the future.   2. Methodology with the creation of a survey of victimization we have asked 2038 minors aged between 12 and 18 about their daily routines on the internet and the parental monitoring they experienced. All this related to the fact that they had been constantly cyberbullied.  Minors were from 20 different secondary education schools throughout the province of alicante.  after carrying out different and varied descriptive analysis we have created a mathematical model through the creation of an artificial neural network.   3. Results all this has allowed us to conclude that minors are easy targets for cyberbullying in the very moment they load, in a conscious or unconscious way, goods onto the cyberspace. And even more so when they make themselves visible by means of interacting, that is to say, when they participate in different means of communication. All this combined with less parental control increases the probability of minors becoming victims of cyberbullying. Results have also revealed, on one hand, that practically the majority of minors carry out risk behavior and not only that, those minors ending up being victims carry them out more frequently. And on the other hand, that there is a multiple combination of factors which will determine the possibility of victimization. We can therefore confirm that minors play an important role in their suitability as victims in cyberspace by loading their goods and also by making themselves visible for other users, on the basis of their daily routine on the net and also it is critical the role played by the parents or other members of the family acting as capable guardians. All this provides scientific evidence concerning the key issues to be addressed in order to develop appropriate prevention strategies in this area.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Victimizacion de menores por actos de ciberacoso continuado y actividades cotidianas en el ciberespacio<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Victimizacion de menores por actos de ciberacoso continuado y actividades cotidianas en el ciberespacio <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Natalia Garcia Guilabert <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Murcia<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 04\/09\/2014<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Fernando Miro Llinares<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: lorenzo Morillas cueva <\/li>\n<li>rebeca Bautista ortu\u00f1o (vocal)<\/li>\n<li>alfonso Serrano maillo (vocal)<\/li>\n<li>josep Mar\u00eda Tamarit sumalla (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Natalia Garcia Guilabert Resumen tesis dotoral victimizaci\u00f3n de menores por actos de ciberacoso continuado y actividades cotidianas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[54687,30223,8235],"tags":[50413,58362,71577,21819,229579,229580],"class_list":["post-116247","post","type-post","status-publish","format-standard","hentry","category-cibernetica","category-criminalidad","category-murcia","tag-alfonso-serrano-maillo","tag-fernando-miro-llinares","tag-josep-maria-tamarit-sumalla","tag-lorenzo-morillas-cueva","tag-natalia-garcia-guilabert","tag-rebeca-bautista-ortuno"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/116247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=116247"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/116247\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=116247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=116247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=116247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}