Lenka Dedkova

Lenka Dedkova
Masaryk University | MUNI · Interdisciplinary Research Team on Internet and Society

Ph.D.

About

50
Publications
23,157
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
955
Citations
Citations since 2017
32 Research Items
860 Citations
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
Introduction
Lenka Dedkova currently works at the Institute for Interdisciplinary Research Team on Internet and Society, Masaryk University. Lenka does research in Social Psychology and Media Psychology.
Additional affiliations
July 2012 - present
Masaryk University
Position
  • Researcher

Publications

Publications (50)
Article
To ensure their children's safety online, parents can utilize number of strategies, including active and restrictive parental mediation. Active mediation encompasses parents discussing and advising children about safe usage of the internet, whereas restrictive mediation means limiting children's internet usage. Both strategies aim to affect childre...
Article
Full-text available
Research of face-to-face meetings between adolescents and people met online stands on untested assumptions that these meetings are uniform, and adolescents attend them to expand their social circle. It is also unclear what makes such meetings pleasant or unpleasant. This study examined meetings of 611 Czech adolescents (age 11–16, Mage = 14.04, SD...
Article
Full-text available
Information and communication technologies (ICTs) have become commonplace in adolescents’ lives, and they have grown in importance during the COVID-19 pandemic, when online communication became standard for many parts of life. This brings the need for developmental psychology to revise and update its theories for these new societal challenges. It i...
Article
Full-text available
This study investigated the role of medium (face-to-face, cyber) and publicity (public, private) in adolescents’ perceptions of severity and coping strategies (i.e., avoidant, ignoring, helplessness, social support seeking, retaliation) for victimization, while accounting for gender and cultural values. There were 3,432 adolescents (ages 11-15, 49%...
Technical Report
Full-text available
This report presents findings about Czech adolescents’ cyberhate experiences and their caregivers’ knowledge. Caregivers refer to the parents, step-parents, and legal guardians of participating adolescents. Cyberhate refers to hateful and biased contents that are expressed online and via information and communication technologies. Our findings are...
Article
Full-text available
Online surveys have become a popular way to collect data. However, response rates are low, specifically for online intercept-based surveys, which can be as low as 1%. This raises questions about the accuracy of the inferences based on these results. Furthermore, it is difficult to compare the characteristics and behavior of the responders and nonre...
Article
Full-text available
This article provides detailed evidence about the installers of online security software on personal computers according to differences among clusters of countries and various other country characteristics. The study presents unique data based on real installations around the world. The data are based on a large-scale quantitative study ( N = 18,72...
Chapter
This chapter focuses on the role of information and communication technologies (ICT) in children's and adolescents’ psychological, social, and physical well-being. Though we primarily focus on the impact on well-being, we put emphasis on the depiction of the complex relationships among ICT use, well-being, and other influential factors. This is ill...
Article
Smartphone authentication is becoming a cornerstone security component, so it is necessary to have methods that are usable and secure to ensure adequate protection, especially for mobile banking. Though biometric authentication seems to be perceived as very usable by users, there is a lack of research to compare smartphone-based fingerprint verific...
Article
Full-text available
Little attention has been given to whether country of origin as well as perceptions of severity impact adolescents’ attributions for public and private face-to-face and cyber victimization. The objective of the present study was to examine the role of medium (face-to-face, cyber), setting (public, private), and perceptions of severity in adolescent...
Article
Adolescents commonly make new social connections online that sometimes result in face-to-face meetings. Despite potential benefits, risk-focused discourse dominates public debates and shapes information shared by sources important for adolescents—news media, preventive programs, peers, parents, and teachers. Our study examines how information about...
Article
Smartphones have recently become a major target for cybercriminals due to large amounts of sensitive data and credentials being stored on the devices. To protect themselves against cyberthreats, users can employ a range of security behaviors. Although research has largely focused on computer security, relatively little is known about personal smart...
Article
Full-text available
This study focuses on the effect of cyberostracism on social networking sites. Based on the temporal need-threat model of ostracism, we examined a) reflexive reactions, specifically worsened mood and threats to the four fundamental needs (i.e., belongingness, self-esteem, meaningful existence, and control), and b) reflective reactions, in the form...
Article
Home users of information and communication technologies are often the target of online attacks. At the same time they tend to lack the knowledge and skills to effectively protect themselves. Families with children are in a particularly difficult position since parents are responsible not only for their own digital safety, but of their children’s t...
Article
Objectives Adolescents who deal with more emotional problems have been found to seek escape online, and struggle with excessive internet use (EIU). Poor social relationships have been linked with emotional problems. The current study investigated positive family and school relationships as protective factors against emotional problems and a prefere...
Article
Full-text available
A considerable amount of adolescents’ interpersonal communication takes place online. Adolescents use the internet to interact with friends and family, but also with people who were previously unknown to them. This study focuses on two types of interactions with unknown people from the internet: online communication and offline face-to-face meeting...
Technical Report
Full-text available
This report describes the results of testing of authentication methods and applications for smartphones, including the methodology that was used. We want to determine the authentication methods that are perceived as secure and user-friendly by the end users, and which methods users would prefer. This technical report may be of interest to security...
Technical Report
Full-text available
This report presents the findings from a survey of children aged 9–16 from 19 European countries. The data were collected between autumn 2017 and summer 2019 from 25,101 children by national teams from the EU Kids Online network. A theoretical model and a common methodology to guide this work was developed during four phases of the network’s work,...
Article
This study focuses on two strategies for online parental mediation: active mediation (sharing and discussing activities with children) and monitoring (checking the children’s internet activity after use). Previous studies have shown the importance of respondents’ and children’s characteristics regarding mediation strategies. Using a socioecological...
Article
Full-text available
15 The aim of this study was to examine the role of publicity (private versus public) and medium (face-to-face versus cyber) in adolescents' coping strategies for hypothetical victimization, while also considering culture. Participants were adolescents from China, Cyprus, the Czech Republic, India, Japan, and the United States. The study also contr...
Article
Full-text available
The purpose of this study was to examine the impact of publicity (private, public) and medium (face-to-face, cyber) on the associations between attributions (i.e., self-blame, aggressor-blame) and coping strategies (i.e., social support, retaliation, ignoring, helplessness) for hypothetical victimization scenarios among 3,442 adolescents (age range...
Article
While malicious software (malware) is designed to disrupt or damage computer systems, potentially unwanted applications (PUAs) combine useful features with less desirable ones, such as adware or spyware. Unlike anti-malware solutions, removing PUAs can be controversial, for both the PUA owners and also the users who might wish to accept the PUA fea...
Article
Full-text available
Beta testers are the first end users outside a software company to use its product. They have been used for decades and are rightly credited not only with finding and reporting bugs, but also with improving general product usability through their feedback and/or the ways they use the product. In this paper, we investigate whether beta testers repre...
Article
Bystanders in cyberaggresion can support the victim, join the aggressor, or remain passive. We examined how supportive and passive adolescent Czech cyberbystanders (N = 443, ages 12–18) differ in terms of individual characteristics, emotional responses, and contextual factors. The most substantial distinguishing factor between the two groups turned...
Article
Previous research on youths’ experiences with online strangers has mostly utilized quantitative designs which may result in the omission of important parts of the youths’ experiences and perceptions. In this qualitative study, we adopt a child-centred approach and focus on the children’s and adolescents’ experiences with unknown people from the Int...
Article
Although telling an adult can be effective at ending bullying, not all bullied children tell someone about their victimization. The aim of the current study was to examine: 1) if being bullied online and not telling anyone was associated with the perceived intensity and harm experienced from being bullied, 2) the reasons for not telling anyone, and...
Article
Full-text available
The purpose of this study was to examine the role of medium (face-to-face, cyber) and publicity (public, private) in perceptions of severity and emotional responses to victimization among adolescents from China, Cyprus, the Czech Republic, India, Japan, and the United States, while controlling for gender, individualism, and collectivism. There were...
Article
Full-text available
Dear researchers, colleagues, and readers interested in internet-related research, We are delighted to present the fourth and final issue of 2016, which comprises of seven articles that cover a variety of topics, theoretical perspectives, and methodological approaches. Besides an article from the U.S., the research presented in this issue is primar...
Article
Full-text available
The authors' aim was to investigate gender and cultural differences in the attributions used to determine causality for hypothetical public and private face-to-face and cyber victimization scenarios among 3,432 adolescents (age range = 11-15 years; 49% girls) from China, Cyprus, the Czech Republic, India, Japan, and the United States, while account...
Article
The aim of this study was to examine the role of publicity (private versus public) and medium (face-to-face versus cyber) in adolescents' coping strategies for hypothetical victimization, while also considering culture. Participants were adolescents from China, Cyprus, the Czech Republic, India, Japan, and the United States. The study also controll...
Article
Cyberaggression, and its' specific sub-type, cyberbullying, have become a widely debated and studied issues, but we still lack knowledge about cyberbystanders, whose reactions (or lack thereof) can play a crucial role. One of the important factors determining behavioral outcomes is cyberbystanders’ empathic response to the incident. Certain feature...
Article
This study examined the bystander effect in cyberbullying. Using self-reported data from 257 Czech respondents who had witnessed a cyberbullying attack, we tested whether provided help decreased with increased number of other bystanders. We controlled for several individual and contextual factors, including empathy, social self-efficacy, empathic r...
Article
This study focuses on two coping strategies in cyberbullying: talking to parents and talking to peers. The subsample of cyberbullying victims aged 9–16 (N = 1395; 59% female) from the EU Kids Online II project was analysed. We predicted talking to parents and peers according to mediation style, perceived harm, support-seeking tendencies, parental k...
Chapter
Full-text available
This chapter deals with the topic of face-to-face meetings with people known only from the internet. First, the popularized picture of online strangers as online pedophiles searching for children on the internet is presented and contradicted to empirical evidence from actual internet-initiated sexual crimes with minors. Next, the chapter focuses on...
Article
Victims use social support seeking (SSS) to buffer the negative effects of cyberbullying. It is unknown whether cyber-victims’ perceptions of harm and having poor peer and parental relationships influence SSS. Using a sample of 451 cyberbullying-victims, aged 12-18, 68% girls, this study examined relationships of gender, harm, peer rejection, paren...
Article
Full-text available
Although the research on cyberbullying has increased dramatically in recent years, still little is known about how cyberbullying participant groups (i.e., cyberbullies, cybervictims, and cyberbully-victims) differ from one another. This study aims to discriminate between these groups at an individual and relational level by controlling for age and...
Article
The present study focuses on meeting online strangers face-to-face. This activity represents one of the least prevalent but also most feared online risks for youth. Due to the low number of youth experiencing upsetting meetings and the dominance of quantitative research designs in the area, the current state of knowledge does not provide a clear vi...
Article
Full-text available
The high editorial rejection rate means that half of the manuscripts were not of sufficient quality to go into the review process. We would like to decrease this number, and so we decided to list the typical reasons of editorial rejects below along with our recommendations for authors for lowering the chance of editorial rejection: The manuscript...
Article
Full-text available
Although cyberbullying is a well-studied online risk, little is known about the effectiveness of various coping strategies for its victims. Therefore, this study on 2,092 Czech children aged 12-18 examined which coping strategies were applied most often and to what extent victims of cyber aggression judged them to be effective. Effectiveness was me...
Book
Kniha představuje relativně nový společenský jev, jemuž se v současnosti dostává velké pozornosti ve školství, v médiích i v akademickém světě. Čtenář se seznámí s jevy, které s kyberšikanou souvisejí (agrese a agresivní chování), s rozdíly oproti tradiční (školní) šikaně a s tím, jak je tato nová forma šikany formována specifickým charakterem onli...
Conference Paper
In this study, we examined the self-disclosure of Czech adolescent members of purely online communities (N = 244). We analyzed the association between self-disclosure and the online disinhibition, disclosing behavior of other members, and the fear of misuse of published information (controlling for gender and age). Online disinhibition and members’...
Article
This study examined factors that increase or decrease the support a bystander offered to a victim of cyberbullying. Possible determinants of supportive behaviour were analyzed using a four-step hierarchical regression analysis on data from 156 Czech children (12–18 years old; M = 15.1; 54% females) who witnessed their schoolmates being victims of c...
Conference Paper
Full-text available
This article discusses children contacting new people online and going to face to face meetings with these people. Analyses of the EU Kids Online II project data (2009-2011) showed that older children, girls and more frequent, self-confident communicators are more likely to expand their social circle through contacting new people online. Meeting ne...

Network

Cited By

Projects

Projects (5)
Project
The project aims to develop a complex evidence-based theory depicting the impacts of technology usage on physical, psychological, and social well-being of adolescents aged 11 to 18. Innovative research methods based on the software using artificial intelligence will be developed. The FUTURE project will develop a complex integrative theory depicting the short- and long- term impacts of technology usage on adolescents’ physical, psychological, and social well-being. We will integrate theories from diverse fields, notably media studies, psychology, and health. The project will develop prospective models what will help to understand and predict future impacts of technology on well-being. The theory development will be based on empirical data from: 1) existing research 2) 3-wave longitudinal study 3) series of experimental studies 4) intense data collections with the support of innovative research tools.
Project
Digitisation is changing society. ICTs strongly impact children's and adolescents' wellbeing. In order to benefit from these, new skill sets are required. Research project ySKILLS wants to enhance and maximise long-term positive impact of the ICT environment. This project has received funding from the European Union’s Horizon 2020 Research & Innovation programme under Grant Agreement no. 870612. More information: www.yskills.eu
Project
Cyberpsychology: Journal of Psychosocial Research on Cyberspace is a web-based, peer-reviewed scholarly journal. The journal is focused on social science research about cyberspace. It brings psychosocial reflections of the impact of the Internet on people and society. The journal is interdisciplinary, publishing works written by scholars of psychology, media studies, communication science, sociology, political science, nursing, ICT security, organizational psychology and also other disciplines with relevance to psychosocial aspects of cyberspace.