This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
When an article is published in this journal, the Journal retains the copyright. Author(s) may republish the article as part of a book or other materials. A copyright statement is displayed on the full-text PDF of each article.
This policy describes guidelines in the publication process of our journals. Specifically, Journal Issues adopts and strives to adhere to the following standards and requirements: COPE – Committee on Publication Ethics.
An author is an individual who has significantly contributed to the development of a manuscript. The WJR recommends that authorship be based on the following four criteria:
- Substantial contributions to the conception or design of the work; or the acquisition, analysis, or interpretation of data for the work; and
b. Drafting the work or revising it critically for important intellectual content, and
c. Final approval of the version to be published; and
d. Agreement to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.
Individuals who participated in the development of a manuscript but do not qualify as an author should be acknowledged. Organizations that provided support in terms of funding and/or other resources should also be acknowledged.
Changes in authorship
Whenever there is a need to make changes in the authorship of a manuscript or a published article, the changes will be implemented according to COPE specification. Only corresponding authors can make a request for a change in authorship. The request should be made to the editor using the Changes in Authorship Form or via e-mail from the corresponding author's email address.
Submission of Manuscript
Authors should read the “Authors Guidelines” on the journal’s page before making a submission. The manuscript should be prepared according to the style and specifications of the journal’s policy. The authors listed on the manuscript should have met the requirements for Authorship specified above. Where possible, specify the contribution of each of the authors.
All authors should approve the final version of the manuscript prior to submission. Once a manuscript is submitted, it is therefore assumed that all authors have read and given their approval for the submission of the manuscript. Contact information of all authors should be stated in the manuscript. Surname/Other names, affiliation, emails, and phone/fax numbers.
Declaration of Conflicts of Interest should be stated in the manuscript.
Conflict of interest
“Conflict of interest (COI) exists when there is a divergence between an individual’s private interests (competing interests) and his or her responsibilities to scientific and publishing activities such that a reasonable observer might wonder if the individual’s behavior or judgment was motivated by considerations of his or her competing interests” WAME4.
The authors should disclose all financial/relevant interests that may have influenced the development of the manuscript.
Approaches to safeguard teens online: the case of adolescents aged 12-14 years in Kenya
Corresponding Author(s) : Oloo Ong'ong'a
WORLDWIDE JOURNAL OF RESEARCH,
Vol. 1 No. 3 (2020): Volume 1 Number 3
The emergence of new media and technology in recent epoch has precipitated the question of teens' online safety. In contrast, teens continue to utilize these technologies in school spaces and their homes for their obvious reasons. Although these technologies are often encrypted with essential protection mechanisms to ensure that the users are fully protected, teens continue to encounter problems emanating from sexting, pornography, and fraud. The study aims to explore the current discussions of online safety issues by providing a reference point and a context for academics, policymakers, and paves the way in re-looking into the security of teens online. The study uses a qualitative approach and employs interviews and focus group discussions on exploring the extent of the safety of teens online. Cyberbullying, gambling, and cyberstalking are the most common dangers that teens experience online. The study recommends for enhancement of supervision both online and offline by parents, teachers, and the formulation of online education policies to protect teens online
- Akdeniz.Y.(2016). Internet Child Pornography and the Law: National and International Responses. New York: Routledge
- Alsmadi. I, Karabatis.A, and Aleroud.A. (2017). Studies in Computational Intelligence 691: Information Fusion for Cyber-Security Analytics. Gewerbestrasse: Springer Publishers
- Annan, K, A.(2011).We the Children: Meeting the Promises of the World Summit for Children. New York: UNICEF House
- Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
- Byron, T., Great Britain, Department for Children, S. and F., Great Britain, & Department for Culture, M., and S. (2008). Safer children in a digital world: The report of the Byron Review. DCSF Publications.
- Farrell, G (2007). ICT in Education in Kenya, infodev.org.
- Gargiulo, R.M, and Metcalf, D. (2013). Teaching in Today's Inclusive Classrooms: Universal Design for Learning Approach. Wadsworth, Cengage Learning. Belmont
- Gasser, U, et al., (2010). Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations: Harvard Law School Public Law & Legal Theory Working Paper Series Paper No. 10-36.
- Gilgi, S. (2013). A Private-Public Space: Examining the Use and Impact of Digital and Social Media Among Adolescents in Kenya, Unicef.
- Gillespie, A.(2012). Child Pornography: Law and Policy. New York. Routledge
- Holloway D., Green L. & Livingstone S., (2013). Zero to Eight: Young children and their internet use, The London School of Economics and Political Science. Retrieved on 2 October 2014 from http://eprints.lse.ac.uk/52630/1/Zero_to_eight.pdf
- iHUB Research, (2012). Mobile Internet Usage Field Survey: Kenya, Hub Research.
- Jenkins, P. (2003). Beyond Tolerance: Child Pornography On The Internet. New York University Press. New York
- Johnson, G. (2010). Internet Use and Child Development: The Techno-Microsystem, Australian Journal of Educational & Developmental Psychology. Vol10, 2010, pp32 – 43. K. Ribisl & E. Quayle, Preventing Online Exploitation of Children. London
- Jwan, J & Ong' ondo, C. (2011). Qualitative research: an introduction to principles and techniques. Eldoret: Moi University Press.
- Kinyanjui, M. (2014). ‘Kids on the Tab’: Kenya National Library Service’s tablet computers project for slum school children. IFLA WLIC 2014, Lyon, France. http://library.ifla.org/862/
- Kirigha, J.M., Mukhongo, L.L., & Masinde, R. (2016). Beyond Web 2.0. Social Media and Urban Educated Youths Participation in Kenyan Politics.
- Maurer, T. (2013). Social media and international affairs: An opportunity and risk for democracy. International Affairs Forum, 4(1), 95–97. https://doi.org/10.1080/23258020.2013.824237
- McAfee (2013). McAfee Digital Deception Study 2013: Exploring the Online Disconnect between Parents & Preteens, Teens and Young Adults, McAfee An Intel Company.
- Michele, L. (2011). National Trends in Exposure to and Experiences of Violence on the Internet Among Children, Journal of the American Academy of Pediatrics, Volume 128, Number 6.
- Misra.S, Muthucumaru M, and Hashmi, S. (2017).Security Challenges and Approaches in the Internet of Things. Montreal: Springer
- Morse, J. (2007). Strategies of Intra-project Sampling: Qualitative Perspective. Sudbury, Massachusetts. Jones and Bartlett Publishers.
- O'Keeffe, G. S., Clarke-Pearson, K., & Council on Communications and Media. (2011). The impact of social media on children, adolescents, and families. PEDIATRICS, 127(4), 800–804. https://doi.org/10.1542/peds.2011-0054
- Okendo, D. (2014). Child consumer protection online child safety for Kenya; Briefing paper. Nairobi, CUTS
- Ong'ong'a, D. O., Mukhongo, L. L., & Chebii, S. (2017). Utilization Of Digital Communication Technologies In Kenya: How Children Aged 12-14 Years Report Cyber Bullying In School. IOSR Journal Of Humanities And Social Science, 22(8), 49–56. https://doi.org/10.9790/0837-22080104956
- Palfrey, G. (2008). Born Digital: Understanding The First Generation of Digital Natives. Basic Book. New York
- Palfrey, J, and Gasser, U (2013). Born Digital: Understanding The First Generation of Digital Natives. New York, Basic Books
- Rössler, P., Hoffner, C. A., & Zoonen, L. (Eds.). (2017). The international encyclopedia of media effects (1st ed.). Wiley. https://doi.org/10.1002/9781118783764
- Ruggiero, T. E. (2000). Uses and gratifications theory in the 21st century. Mass Communication and Society, 3(1), 3–37. https://doi.org/10.1207/S15327825MCS0301_02
- Souter, D, & Kerretts-Makau, M. (2012). Internet governance in Kenya-An assessment, ICT development associates.
- Streubert, H.J. (2007). The Conduct of Qualitative Research: Common Essential Elements. (4th Ed). Philadelphia. Lippincott, Williams & Wilkins.
- Terrace, V. (2015). Internet Drama and Mystery Television series: 1996-2014.North Carolina, McFarland & Company, Inc., publishers
- The Kenya ICT master plan: towards a digital Kenya April 2014; 2013/2014-2017/2018
- The Kenya Information and Communication Act: Chapter 411A, Section 29: Revised Edition 2011 (2010) Published by the National Council for Law Reporting
- UNICEF IGF (2013). Thesis, 2013, Digital rights: opportunity and risk for children from the Global South, Unicef
- Vanderhoven, E., Schellens, T., & Valcke, M. (2014). Educating teens about the risks on social network sites. An intervention study in Secondary Education. Comunicar, 22(43), 123–132. https://doi.org/10.3916/C43-2014-12