1,970
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Schoolchildren, governmentality and national e-safety policy discourse

References

  • Barnard-Wills, D. (2012). E-safety education: Young people, surveillance and responsibility. Criminology and Criminal Justice, 12(3), 239–255. doi:10.1177/1748895811432957
  • Bradbury, J. A. (1989). The policy implications of differing concepts of risk. Science, Technology and Human Values, 14(4), 380–399. doi:10.1177/016224398901400404
  • British Educational Communications and Technology Agency. (2005). E-safety: Developing whole-school policies to support effective practice. Coventry: Author.
  • British Educational Communications and Technology Agency. (2006). Safeguarding children in a digital world: Developing a strategic approach to e-safety. Coventry: Author.
  • British Educational Communications and Technology Agency. (2007a). Signposts to safety: Teaching e-safety at key stages 1 and 2. Coventry: Author.
  • British Educational Communications and Technology Agency. (2007b). Signposts to safety: Teaching e-safety at key stages 3 and 4. Coventry: Author.
  • British Educational Communications and Technology Agency. (2008). Safeguarding children in a digital world: Developing an LSCB e-safety strategy. Coventry: Author.
  • British Educational Communications and Technology Agency. (2009). AUPs in context: Establishing safe and responsible online behaviours. Coventry: Author.
  • British Educational Communications and Technology Agency. (2010). Safeguarding learners. Coventry: Author.
  • Buckingham, D. (2007). The impact of the media on children and young people with a particular focus on computer games and the Internet. Prepared for the Byron Review on Children and New Technology. Retrieved February 24, 2013, from http://dera.ioe.ac.uk/7363/
  • Byron Review. (2008). Safer children in a digital world: The report of the Byron Review. Nottingham, UK: The Department for Children, Schools and Families, and the Department for Culture, Media and Sport.
  • Byron Review. (2010). Do we have safer children in a digital world? A review of progress since the 2008 Byron Review. Nottingham, UK: The Department for Children, Schools and Families Publications.
  • Cranmer, S., Selwyn, N., & Potter, J. (2009). Exploring primary pupils’ experiences and understandings of ‘e-safety’. Education and Information Technologies, 14(2), 127–142. doi:10.1007/s10639-008-9083-7
  • Douglas, M., & Wildavsky, A. (1982). Risk and culture: An essay on the selection of technological and environmental dangers. Berkeley: University of California Press.
  • Fielding, M., & Prieto, M. (2002). The central place of student voice in democratic renewal: A Chilean case study. In M. Schweisfurth, L. Davies, & C. Harber (Eds.), Learning democracy and citizenship: International experiences (pp. 19–36). Oxford: Symposium Books.
  • Foucault, M. (1972). The archaeology of knowledge. London: Routledge.
  • Foucault, M. (1975, February 21). Des supplices aux cellules [The punishment cells] (interview with R.-P. Law). Le Monde, p. 9363.
  • Foucault, M. (1977). Discipline and punish: The birth of the prison. London: Allen Lane.
  • Foucault, M. (1978). The history of sexuality, vol. 1: An introduction. Harmondsworth: Penguin.
  • Foucault, M. (1981). The order of discourse. In R. Young (Ed.), Untying the text: A post-structuralist reader (pp. 48–79). London: Routledge.
  • Foucault, M. (1991). Politics and the study of discourse. In G. Burchell, C. Gordon, & P. Miller (Eds.), The Foucault effect (pp. 53–72). Chicago, IL: The University of Chicago Press.
  • Foucault, M. (1994). Governmentality. In J. Faubion (Ed.), Power: Essential works of Foucault 1954–1984 (pp. 201–222). London: Penguin.
  • Gutting, G. (2005). Foucault: A very short introduction. Oxford: Oxford University Press.
  • Handel, G., Spencer, C., & Frederick, E. (2007). Children and society: The sociology of children and childhood socialization. Los Angeles, CA: Roxbury.
  • Hope, A. (2007). Risk-taking, boundary-performance and intentional school Internet ‘misuse’. Discourse: Studies in the Cultural Politics of Education, 28(1), 87–99. doi:10.1080/01596300601073663
  • Hope, A. (2010). Seductions of risk and school cyberspace. Australasian Journal of Educational Technology, 26(5), 690–703.
  • Jenks, C. (1996). Childhood. New York, NY: Routledge.
  • Lawson, T., & Comber, C. (2000). Censorship, the Internet and schools: A new moral panic? The Curriculum Journal, 11(2), 273–285. doi:10.1080/09585170050045236
  • Livingstone, S. (2009). Children and the Internet: Great expectations, challenging realities.Oxford: Polity Press.
  • Livingstone, S., Kirwil, L., Ponte, C., & Staksrud, E. (2013). In their own words: What bothers children online? With the EU Kids Online Network. London: London School of Economics & Political Science.
  • McDonald, C. (2009). The importance of identity in policy: The case for and of children. Children and Society, 23(4), 241–251. doi:10.1111/j.1099-0860.2008.00170.x
  • McQuillan, H., & d'Haenens, L. (2009). Young people online: Gender and age influences. In S. Livingstone & L. Haddon (Eds.), Kids online: Opportunities and risks for children (pp. 95–106). Bristol: Policy Press.
  • Mills, S. (2003). Michel Foucault. Abingdon: Routledge.
  • Paton, P. (1979). Of power and prisons. In M. Morris & P. Patton (Eds.), Michel Foucault: Power/truth/strategy (pp. 109–146). Sydney: Feral.
  • Qvortrup, J. (1994). Childhood matters: An introduction. In J. Qvortrup, M. Bardy, G. Sgritta, & H. Wintersberger (Eds.), Childhood matters: Social theory, practice and politics (pp. 1–24). Aldershot: Avebury.
  • Taylor, D. (1998). Social identity and social policy: Engagements with postmodern theory. Journal of Social Policy, 27(3), 329–350. doi:10.1017/S0047279498005315
  • UK Council for Child Internet Safety. (2009). Click clever click safe: The first UK child Internet safety strategy. Nottingham: DCSF.
  • US Internet Safety Technical Task Force. (2008). Enhancing child safety and online technologies. Retrieved February 24, 2013, from http://cyber.law.harvard.edusites/cyber.law../ISTTF_Final_Report.pdf

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.