About
50
Publications
23,157
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
955
Citations
Citations since 2017
Introduction
Lenka Dedkova currently works at the Institute for Interdisciplinary Research Team on Internet and Society, Masaryk University. Lenka does research in Social Psychology and Media Psychology.
Additional affiliations
July 2012 - present
Publications
Publications (50)
To ensure their children's safety online, parents can utilize number of strategies, including active and restrictive parental mediation. Active mediation encompasses parents discussing and advising children about safe usage of the internet, whereas restrictive mediation means limiting children's internet usage. Both strategies aim to affect childre...
Research of face-to-face meetings between adolescents and people met online stands on untested assumptions that these meetings are uniform, and adolescents attend them to expand their social circle. It is also unclear what makes such meetings pleasant or unpleasant. This study examined meetings of 611 Czech adolescents (age 11–16, Mage = 14.04, SD...
Information and communication technologies (ICTs) have become commonplace in adolescents’ lives, and they have grown in importance during the COVID-19 pandemic, when online communication became standard for many parts of life. This brings the need for developmental psychology to revise and update its theories for these new societal challenges. It i...
This study investigated the role of medium (face-to-face, cyber) and publicity (public, private) in adolescents’ perceptions of severity and coping strategies (i.e., avoidant, ignoring, helplessness, social support seeking, retaliation) for victimization, while accounting for gender and cultural values. There were 3,432 adolescents (ages 11-15, 49%...
This report presents findings about Czech adolescents’ cyberhate experiences and their caregivers’ knowledge. Caregivers refer to the parents, step-parents, and legal guardians of participating adolescents. Cyberhate refers to hateful and biased contents that are expressed online and via information and communication technologies. Our findings are...
Online surveys have become a popular way to collect data. However, response rates are low, specifically for online intercept-based surveys, which can be as low as 1%. This raises questions about the accuracy of the inferences based on these results. Furthermore, it is difficult to compare the characteristics and behavior of the responders and nonre...
This article provides detailed evidence about the installers of online security software on personal computers according to differences among clusters of countries and various other country characteristics. The study presents unique data based on real installations around the world. The data are based on a large-scale quantitative study ( N = 18,72...
This chapter focuses on the role of information and communication technologies (ICT) in children's and adolescents’ psychological, social, and physical well-being. Though we primarily focus on the impact on well-being, we put emphasis on the depiction of the complex relationships among ICT use, well-being, and other influential factors. This is ill...
Smartphone authentication is becoming a cornerstone security component, so it is necessary to have methods that are usable and secure to ensure adequate protection, especially for mobile banking. Though biometric authentication seems to be perceived as very usable by users, there is a lack of research to compare smartphone-based fingerprint verific...
Little attention has been given to whether country of origin as well as perceptions of severity impact adolescents’ attributions for public and private face-to-face and cyber victimization. The objective of the present study was to examine the role of medium (face-to-face, cyber), setting (public, private), and perceptions of severity in adolescent...
Adolescents commonly make new social connections online that sometimes result in face-to-face meetings. Despite potential benefits, risk-focused discourse dominates public debates and shapes information shared by sources important for adolescents—news media, preventive programs, peers, parents, and teachers. Our study examines how information about...
Smartphones have recently become a major target for cybercriminals due to large amounts of sensitive data and credentials being stored on the devices. To protect themselves against cyberthreats, users can employ a range of security behaviors. Although research has largely focused on computer security, relatively little is known about personal smart...
This study focuses on the effect of cyberostracism on social networking sites. Based on the temporal need-threat model of ostracism, we examined a) reflexive reactions, specifically worsened mood and threats to the four fundamental needs (i.e., belongingness, self-esteem, meaningful existence, and control), and b) reflective reactions, in the form...
Home users of information and communication technologies are often the target of online attacks. At the same time they tend to lack the knowledge and skills to effectively protect themselves. Families with children are in a particularly difficult position since parents are responsible not only for their own digital safety, but of their children’s t...
Objectives
Adolescents who deal with more emotional problems have been found to seek escape online, and struggle with excessive internet use (EIU). Poor social relationships have been linked with emotional problems. The current study investigated positive family and school relationships as protective factors against emotional problems and a prefere...
A considerable amount of adolescents’ interpersonal communication takes place online. Adolescents use the internet to interact with friends and family, but also with people who were previously unknown to them. This study focuses on two types of interactions with unknown people from the internet: online communication and offline face-to-face meeting...
This report describes the results of testing of authentication methods and applications for smartphones, including the methodology that was used. We want to determine the authentication methods that are perceived as secure and user-friendly by the end users, and which methods users would prefer. This technical report may be of interest to security...
This report presents the findings from a survey of children aged 9–16 from 19 European countries. The data were collected between autumn 2017 and summer 2019 from 25,101 children by national teams from the EU Kids Online network.
A theoretical model and a common methodology to guide this work was developed during four phases of the network’s work,...
This study focuses on two strategies for online parental mediation: active mediation (sharing and discussing activities with children) and monitoring (checking the children’s internet activity after use). Previous studies have shown the importance of respondents’ and children’s characteristics regarding mediation strategies. Using a socioecological...
15 The aim of this study was to examine the role of publicity (private versus public) and medium (face-to-face versus cyber) in adolescents' coping strategies for hypothetical victimization, while also considering culture. Participants were adolescents from China, Cyprus, the Czech Republic, India, Japan, and the United States. The study also contr...
The purpose of this study was to examine the impact of publicity (private, public) and medium (face-to-face, cyber) on the associations between attributions (i.e., self-blame, aggressor-blame) and coping strategies (i.e., social support, retaliation, ignoring, helplessness) for hypothetical victimization scenarios among 3,442 adolescents (age range...
While malicious software (malware) is designed to disrupt or damage computer systems, potentially unwanted applications (PUAs) combine useful features with less desirable ones, such as adware or spyware. Unlike anti-malware solutions, removing PUAs can be controversial, for both the PUA owners and also the users who might wish to accept the PUA fea...
Beta testers are the first end users outside a software company to use its product. They have been used for decades and are rightly credited not only with finding and reporting bugs, but also with improving general product usability through their feedback and/or the ways they use the product. In this paper, we investigate whether beta testers repre...
Bystanders in cyberaggresion can support the victim, join the aggressor, or remain passive. We examined how supportive and passive adolescent Czech cyberbystanders (N = 443, ages 12–18) differ in terms of individual characteristics, emotional responses, and contextual factors. The most substantial distinguishing factor between the two groups turned...
Previous research on youths’ experiences with online strangers has mostly utilized quantitative designs which may result in the omission of important parts of the youths’ experiences and perceptions. In this qualitative study, we adopt a child-centred approach and focus on the children’s and adolescents’ experiences with unknown people from the Int...
Although telling an adult can be effective at ending bullying, not all bullied children tell someone about their victimization. The aim of the current study was to examine: 1) if being bullied online and not telling anyone was associated with the perceived intensity and harm experienced from being bullied, 2) the reasons for not telling anyone, and...
The purpose of this study was to examine the role of medium (face-to-face, cyber) and publicity (public, private) in perceptions of severity and emotional responses to victimization among adolescents from China, Cyprus, the Czech Republic, India, Japan, and the United States, while controlling for gender, individualism, and collectivism. There were...
Dear researchers, colleagues, and readers interested in internet-related research, We are delighted to present the fourth and final issue of 2016, which comprises of seven articles that cover a variety of topics, theoretical perspectives, and methodological approaches. Besides an article from the U.S., the research presented in this issue is primar...
The authors' aim was to investigate gender and cultural differences in the attributions used to determine causality for hypothetical public and private face-to-face and cyber victimization scenarios among 3,432 adolescents (age range = 11-15 years; 49% girls) from China, Cyprus, the Czech Republic, India, Japan, and the United States, while account...
The aim of this study was to examine the role of publicity (private versus public) and medium (face-to-face versus cyber) in adolescents' coping strategies for hypothetical victimization, while also considering culture. Participants were adolescents from China, Cyprus, the Czech Republic, India, Japan, and the United States. The study also controll...
Cyberaggression, and its' specific sub-type, cyberbullying, have become a widely debated and studied issues, but we still lack knowledge about cyberbystanders, whose reactions (or lack thereof) can play a crucial role. One of the important factors determining behavioral outcomes is cyberbystanders’ empathic response to the incident. Certain feature...
This study examined the bystander effect in cyberbullying. Using self-reported data from 257 Czech respondents who had witnessed a cyberbullying attack, we tested whether provided help decreased with increased number of other bystanders. We controlled for several individual and contextual factors, including empathy, social self-efficacy, empathic r...
This study focuses on two coping strategies in cyberbullying: talking to parents and talking to peers. The subsample of cyberbullying victims aged 9–16 (N = 1395; 59% female) from the EU Kids Online II project was analysed. We predicted talking to parents and peers according to mediation style, perceived harm, support-seeking tendencies, parental k...
This chapter deals with the topic of face-to-face meetings with people known
only from the internet. First, the popularized picture of online strangers as
online pedophiles searching for children on the internet is presented and
contradicted to empirical evidence from actual internet-initiated sexual crimes
with minors. Next, the chapter focuses on...
Victims use social support seeking (SSS) to buffer the negative effects of cyberbullying. It is unknown whether cyber-victims’ perceptions of harm and having poor peer and parental relationships influence SSS. Using a sample of 451 cyberbullying-victims, aged 12-18, 68% girls, this study examined relationships of gender, harm, peer rejection, paren...
Although the research on cyberbullying has increased dramatically in recent years, still little is known about how cyberbullying participant groups (i.e., cyberbullies, cybervictims, and cyberbully-victims) differ from one another. This study aims to discriminate between these groups at an individual and relational level by controlling for age and...
The present study focuses on meeting online strangers face-to-face. This activity represents one of the least prevalent but also most feared online risks for youth. Due to the low number of youth experiencing upsetting meetings and the dominance of quantitative research designs in the area, the current state of knowledge does not provide a clear vi...
The high editorial rejection rate means that half of the manuscripts were not of sufficient quality to go into the review process. We would like to decrease this number, and so we decided to list the typical reasons of editorial rejects below along with our recommendations for authors for lowering the chance of editorial rejection:
The manuscript...
Although cyberbullying is a well-studied online risk, little is known about the effectiveness of various coping strategies for its victims. Therefore, this study on 2,092 Czech children aged 12-18 examined which coping strategies were applied most often and to what extent victims of cyber aggression judged them to be effective. Effectiveness was me...
Kniha představuje relativně nový společenský jev, jemuž se v současnosti dostává velké pozornosti ve školství, v médiích i v akademickém světě. Čtenář se seznámí s jevy, které s kyberšikanou souvisejí (agrese a agresivní chování), s rozdíly oproti tradiční (školní) šikaně a s tím, jak je tato nová forma šikany formována specifickým charakterem onli...
In this study, we examined the self-disclosure of Czech adolescent members of purely online communities (N = 244). We analyzed the association between self-disclosure and the online disinhibition, disclosing behavior of other members, and the fear of misuse of published information (controlling for gender and age). Online disinhibition and members’...
This study examined factors that increase or decrease the support a bystander offered to a victim of cyberbullying. Possible determinants of supportive behaviour were analyzed using a four-step hierarchical regression analysis on data from 156 Czech children (12–18 years old; M = 15.1; 54% females) who witnessed their schoolmates being victims of c...
This article discusses children contacting new people online and going to face to face meetings with these people. Analyses of the EU Kids Online II project data (2009-2011) showed that older children, girls and more frequent, self-confident communicators are more likely to expand their social circle through contacting new people online. Meeting ne...
Projects
Projects (5)
The project aims to develop a complex evidence-based theory depicting the impacts of technology usage on physical, psychological, and social well-being of adolescents aged 11 to 18. Innovative research methods based on the software using artificial intelligence will be developed.
The FUTURE project will develop a complex integrative theory depicting the short- and long- term impacts of technology usage on adolescents’ physical, psychological, and social well-being. We will integrate theories from diverse fields, notably media studies, psychology, and health. The project will develop prospective models what will help to understand and predict future impacts of technology on well-being. The theory development will be based on empirical data from:
1) existing research
2) 3-wave longitudinal study
3) series of experimental studies
4) intense data collections with the support of innovative research tools.
Digitisation is changing society. ICTs strongly impact children's and adolescents' wellbeing. In order to benefit from these, new skill sets are required. Research project ySKILLS wants to enhance and maximise long-term positive impact of the ICT environment.
This project has received funding from the European Union’s Horizon 2020 Research & Innovation programme under Grant Agreement no. 870612.
More information: www.yskills.eu
Cyberpsychology: Journal of Psychosocial Research on Cyberspace is a web-based, peer-reviewed scholarly journal. The journal is focused on social science research about cyberspace. It brings psychosocial reflections of the impact of the Internet on people and society. The journal is interdisciplinary, publishing works written by scholars of psychology, media studies, communication science, sociology, political science, nursing, ICT security, organizational psychology and also other disciplines with relevance to psychosocial aspects of cyberspace.