SlideShare ist ein Scribd-Unternehmen logo
1 von 71
Social Media & Technology:
New Opportunities & Benefits
& New Challenges
Faye Mishna, Professor & Dean
McCain Family Chair in Child & Family
October 29, 2013
Technology is in their OS
 Cyber world has exploded & created a new social
environment
 Unprecedented opportunities for youth to communicate with
others in & out of their face-to-face networks

Text
Messaging

Twitter

Email

YouTube

Social
Networking

Webcams

Tumblr

Blogs

…& is always advancing…
Technology is in their OS
 970 million unique Facebook visitors worldwide
 160 million unique Twitter visitors worldwide
(Google 2011a,b)

Text
Messaging

Twitter

Email

YouTube

Social
Networking

Webcams

Tumblr

Blogs
Context of Social Media World
 Dramatic technological advances have forever
changed how we communicate & interact
 Children & youth are sophisticated users of technology
 Youth acquire technological competence much faster
than their parents
 The risks of new technology are heightened by this
disparity in knowledge
 Youth seek social connections, information, personal
assistance, entertainment online (Mishna et al., 2012)
Technology is in their OS
Technology is in
their OS
Magazine is a Broken iPad
Technology is in their OS

98%
95%
85%

of Canadian youth use cyber
technology daily
of teenagers use e-mail

of youth use Instant Messaging

 Youth are digital natives (Palfrey & Gasser, 2008; Prensky, 2001)
 They have never known a world without technology
(Valcke, Bonte, De Wever, & Rots, 2010)
Technology is in their OS

93%
63%
75%
88%

of American youth 12-17 go online
occasionally
of American youth 12-17 go
online daily

of American youth own a cell phone
of these youth text message

(Lenhart, Purcell, Smith, & Zichuhr, 2010)
Complexity of the Online Experience
 Regardless of the communication medium, relationships
are central & complex
 Features of technology create additional complexities
in social relationships
– Often & spontaneous
– Fewer social & contextual cues
• May decrease sensitivity & empathy
– Perception of anonymity
Navigating the Social Media World
 Developmental characteristics make children
/ youth unprepared for freedom of online
world (Liau, Khoo, & Ang, 2008)
 Young people need guidance to make the
best choices using information &
communication technology (Suniti Bhat, 2008)
Social Media World: Benefits

 Unprecedented opportunities for
communication, learning & self-exploration

 Access to crucial resources such as support
– Informal
– Formal
Social Media World: Benefits
 Most online interactions positive/neutral
 Can reduce social isolation, normalize feelings of
distress
 Explore identities not supported in school
• “Marginalized”/“vulnerable” groups
• e.g., LGBTQ, chronic illness, “invisible
disability”
(Whitlock et al., 2006)
Social Media World: Risks
 Bullying
 Sexual solicitation or victimization
 Exposure to harmful material
 Pornography, violent images, hate messages

 When child feels safe (home, room)
 Those affected (youth) know much more about
technology use than those who should protect
(parents, educators)
Defining Cyber Bullying
 No universal definition
 Use of information & communication
technology to cause harm to another
person [any device]
 Criteria: intent to cause harm,
target, power imbalance
 Includes behaviours to spread
rumours, hurt / threaten others, or
sexually harass
Cyber Bullying: Repetition
Complex
 Occurring in public domain, by its
very nature involves repetition
 Material (e.g., email, text, pictures)
can be viewed far & wide
 Can be distributed by perpetrator &
by anyone with access

 Can be difficult or impossible for
victimized child/youth to eliminate
Overlap with Traditional Bullying
 Youth who bully or are bullied offline are
more likely to bully or be bullied online
 Young people who are at greatest risk
of victimization in the cyber world are
also at greatest risk in the offline world
Prevalence of Cyber Bullying
 Typically ranges from 10 to 35% (Agatston, Kowalski, &
Limber, 2007; Hinduja & Patchin, 2008; Kowalski & Limber, 2007; Kowalski et al., 2008;
Li, 2007; Williams & Guerra, 2007)

 Some estimates are much higher, up to 72%
(Hoff & Mitchell, 2008; Juvonen & Gross, 2008; Mishna et al., 2010; Raskauskas &
Stoltz, 2007)
What Makes Cyber Bullying Unique?
 Engagement with the social media world is constant
 Therefore transcends the boundaries of time & space
 Difficult to escape, because technology follows children
& youth everywhere
 “non-stop bullying”
 Can impact young people above & beyond the effects of
traditional bullying
Biased-Based Cyber Bullying
 Hate-inspired electronic harassment based on
actual or perceived social identities
 Based on societal discrimination & inequity
 Conditions fostering bullying of marginalized
youth appear across all levels of social
ecology, including the cyber level
Mental Health Implications
 Can be devastating
 Growing concern for parents,
educators & society
“Like 1000 paper
cuts eating away
at your soul”

 Can affect many areas of a
child’s or youth’s life
Shame & Humiliation
 Little research on role of shame & humiliation in bullying

 Humiliation as a result of being bullied associated with
devastating consequences
 Humiliation is one of the critical factors that precipitate
suicidal ideation due to relationship problems
 Feelings of humiliation, which can be brought about by
repeated bullying, can increase thoughts of self-annihilation
 Nature of cyber world can intensify shame/humiliation
Disclosure

 Tendency for victimized children &
youth not to tell adults
 More risks than benefits
 Can be painful
 Self-blame
 May only tell when bullying
becomes unbearable
 Significant damage already done
 May disclose to friends
 Pressure on peers to manage
loyalty dilemmas
Disclosure
 Symptoms & difficulties related
to bullying experiences may
go unnoticed by child / youth &
others in their world
 Failure to recognize link
between problems & trauma
 Can be damaging
 Can invalidate youth’s
subjective experiences
Disclosure
 Not telling is more problematic
among marginalized children &
youth
 More victimization
 Less support
 e.g., LGBTQ, racialized,
newcomers, learning disabilities
Why Children are Reluctant To
Report Bullying & Cyber Bullying
 Fear technology will be taken away
 Don’t want to make a “big deal”
 Believe they can/should handle
on their own
 Often don’t label it “bullying”
 Code of silence among children
 Fear of retaliation
 Shame
 Lack of confidence in adults’ ability
to help
Adult Responses
 Is child listened to? believed & validated?
 Or, is child held responsible?
 Critical to listen & validate child’s experience
of victimization
Ineffective Responses
 Minimizing concerns
 Disbelieving victimized individual
 Blaming victimized individual
 Reacting in ways that place
victimized individual at more risk
Telling Parents: Focus Groups
 Students said they do not tell
their parents / adults
 Main reasons
• Fear losing computer
privileges
• Believe adults would not find
evidence of cyber bullying or
be able to identify aggressor
• Fear telling would exacerbate
cyber bullying
• Worry that the adult would
advise them to “ignore it”
Bullying as a Traumatic
Experience
 Impact of bullying is
often under estimated
 Traumatic impact of
bullying is minimized
 Bullying may also have a
traumatic impact on
bystanders
Funded by

Cyber Bullying Survey
- In partnership with TDSB & UJA Toronto
Board of Jewish Education
- 33 schools in Toronto
- 2186 students
- Grades 6 & 7, 10 & 11
Cyber Bullying
Survey
 Almost every household had a
computer
 2/3: 2 or more computers

 2/3 spend 2 or more hours on
computer
 Almost ½ use the computer in
a private place (e.g., bedroom)
Cyber Bullying
Survey
In last 3 months 50% of
students were bullied online






Called names/made to feel bad
Threatened
Spread rumours
Pretended to be the student
Sent others private pictures of
student
 Sent sexual pictures to student
that made them feel bad
 Asked to do something sexual that
student didn’t want to do
Cyber Bullying
Survey
In last 3 months 34% of
students bullied others online
 Called others names or made
them feel bad
 Threatened
 Spread rumours
 Pretended to be the person
 Sent private pictures of person
 Sent sexual pictures to person that
made them feel bad
 Asked person to do something
sexual they didn’t want to do
Who is Doing the
Cyber Bullying?
Myth of Anonymity
 Cyber bullying is
not anonymous
 Occurs in kids’
social worlds /
networks
Intent: Bullied vs.
those who bully
Current study: Motivations for Cyber Bullying:

A Longitudinal & Multi-Perspective Inquiry
Co-Investigators: Wendy Craig, Tanya Beran, Debra Pepler,
Judith Wiener, & Mona Khoury-Kassabri
Collaborator: David Johnston

Social Sciences & Humanities Research Council of Canada (SSHRC)
Current Study
 In partnership with the Toronto District
School Board
 3-year longitudinal study
 19 schools drawn randomly
• 682 students
• Grades 4, 7 & 10
 Children, their parents & teachers

 Representative of Toronto’s
ethnocultural diversity

Currently in year 2
Study Objectives
1. Explore students’ experiences & conceptions of
cyber bullying
2. Explore the definitions & views of cyber bullying of
parents & teachers
3. Explore how children & youth view the underlying
motivations for cyber bullying
4. Document the development, shifting roles, & rates
of cyber bullying victimization & perpetration
5. Identify risk & protective factors for involvement in
cyber bullying
Methodology
 Longitudinal multi-informant mixed
methods study
• Longitudinal quantitative design
• Grounded theory

 Preliminary findings
• Univariate & bivariate analysis of
survey results
• Chi-square test of significance in
bivariate relationships
Measures

 Demographic Form
 Cyber Usage Form
 Youth Self-Report, Child Behaviour
Checklist, Teacher Report Form
 Self-Perception Profile for Children
(SPCC) / Self-Perception Profile for
Adolescents (SPCA)
 Social Support Scale for Children /
Social Support Behaviors Scale
 Interviews with students, parents &
teachers
Demographics
 Female

60%

 Grade 4 = 24%

Male 40%
Grade 7 = 36%

Grade 10 = 40%

 65% of students were born in Canada


8% identified as having a disability

 Low need school
 Medium need school
 High need school

37%
23%
40%
Time Spent Online
For how long have you been going online
(years)?
 Grade 4 average = 3.5 years
 Grade 7 average = 5 years
 Grade 10 average = 6 years
 No significant difference by gender
Time Spent Online
How many hours a day do you go online?
 Grade 4 average = 2 hours

 Grade 7 average = 2.5 hours
 Grade 10 average = 4 hours
* No significant difference by gender
Percent of Students Who Reported
Victimization (last 30 days)
20%

15%

15%

Traditional
Bully Victim
10%

6%
5%

7%

Cyber Bully
Victim
3%

2%
1%

0%
Once or Twice Three or Four
Times

Every Day

*No significant difference by gender
Percent of Victimization by
Type of Bullying & Grade
50%
42%
40%
Traditional
Bully

30%
25%
20%
13%

13%

10%

Cyber Bully
12%
7%

0%
Grade 4

p<.001 for traditional bullying
p< .05 for cyber bullying

Grade 7

Grade 10
Percent of Students Witnessing Bullying
40%
31%

30%

20%

Traditional
Bully Witness
18%
15%

Cyber Bully
Witness

10%
4%

6%
2%

0%
Once or Twice

Three or Four
Times

Every Day

*No significant difference by gender
Percent of Students
Reporting Bullying Others
15%

10%
8%

5%
3%

0%

Traditional Bully

Cyber Bully

*No significant difference by grade or gender
Parent Reporting of Children’s
Cyber Bullying Involvement
Parents reported higher rates for
their children’s involvement in
cyber bullying
 14% of parents indicated their
child was cyber bullied

 7% of parents indicated their
child cyber bullied other(s)
Teacher Reporting of Students’
Cyber Bullying Involvement
How often does cyber bullying occur in the
grade you teach?
50%
40%

40%
28%
30%
19%

20%
11%
10%
2%
0%
Never

Rarely

Often

Very Often Don't Know
Teachers & Parents:
Views on Gender Differences
Teachers & parents were asked if they
thought one gender cyber bullied more
 46% of teachers responded YES
– Of those teachers, 100% thought
females cyber bullied more
 39% of parents responded YES
– Of those parents, 78% thought females
cyber bullied more
*No significant difference in student reported cyber bullying by gender
Overlap of Cyber & Traditional
Bullying Involvement
 74% of students who report being victims of
cyber bullying also report traditional bullying
victimization
 50% of students who report cyber bullying
others also report taking part in traditional
bullying others
Motivations for Cyber Bullying
Students were asked why they think
youth cyber bully
 Grade 4 top ranked statements:
1) It’s a way to feel powerful
2) Nobody knows who they are
3) Nobody sees them so they
don't feel ashamed
Motivations for Cyber Bullying
 Grade 7 top ranked statements:
1) It’s a way to feel powerful
2) Nobody sees them so don't feel
ashamed
3) It's easy to press “send”
 Grade 10 top ranked statements:
1) It’s a way to feel powerful
2) It's easy to press “send”
3) They can get away with it
Students in Distress
 Anticipated that a number of students would be
identified as “in distress”
 Protocol put in place to identify students needing
help; we make referrals to school social workers

 Unanticipated finding: the high number of students
“in distress” & the level of intensity of their distress
 Both significant & worrying
Students in Distress
 23% of students were identified as “in distress”
• Due to various issues, including bullying & cyber bullying
 67% Female/ 33% male
 52% of students in distress had told someone about the distress
 “Low Need School” students significantly less likely in distress
 Grade 10 “High Need School” girls more often in distress
 Males less likely to seek help from anyone for distress

 37% of students identified: suicidal thoughts /plans / attempts
Students in Distress
 48% of students in distress reported cyber &/or
traditional bullying involvement
 15% of students in distress had cyber bullying
involvement
 54% of students in distress required social work
assistance & were referred through the study
• 12.2% of the overall sample
 2/3 of students in distress who had received
professional assistance did not find it helpful
Students in Distress
 Students who appeared to be in high level of distress
commonly had bullying/cyber bullying involvement as
well as other sources of distress
• 56% of these students had bullying involvement of
some kind

 Females were more likely to appear to be in high level
of distress than males
 Preliminary analysis suggests high level of distress
correlated with not seeking help, not disclosing
distress to adults, & not requesting help through study
Disclosure & Distress: Reasons Students Don’t Tell
Protecting Self

Protecting Others

Advice/Help
Won’t Be Effective

From Emotional
Responses

From
Consequences

Protecting SelfImage & Sense
of Self

Protecting
Others’ Feelings

Protecting
Others from
Consequences

Advice/Help Won't be
Effective

• Fear of
Judgement
/what others
will think,
rejection,
anger, blame
• Doesn't want
problems
minimized
• Doesn't want
/ upsetting to
talk about it
• Don't/won't
listen
• Didn't want to
“make a big
deal”
• Family
doesn't talk
about /share
feelings

• Will get in
trouble, be
grounded
(e.g., for
cutting, for
bullying )

• Prides self
on being
independent

• Burden on
parents

• Doesn't
want to get
friends in
trouble

• They didn’t know what to
do - They don't
understand the cyber
world

• “Didn't
want to be
the one to
cause/ bring
the trouble”
to family

• Don't understand
student's
emotions/feelings

• Parents
taking away
technology

• Doesn't want
to be a
“burden” on
parents
• “Didn't want
to be the one
to cause /
bring the
trouble”

• Doesn't want
parents to feel
bad, blamed
• Doesn't want
to bother
other people
with own sad/
hard feelings

• They don't do anything
• Adults/resources & their
strategies are ineffective,
not helpful
• He/she won't be believed
The New Cyber World
 Cyber bullying
must be
understood in the
context of the
new cyber world
The Cyber World has
Tremendous Benefits
 Can be used for good & for ill
 Adults must recognize that the Internet
is a real & legitimate social world for
children & youth
 Adults must recognize that the Internet is
not a passing phase

 Must understand the cyber world &
importance for youth
 Must learn about sites children &
youth visit
What Can We Do?
Removing Access is
no Solution
 Losing computer or cell
phone access feels like
punishment to children &
youth
 Loss of connection with
their social world
Education & Training
 Adults require knowledge
about forms of cyber risk
• Education to help identify
& respond appropriately
 Should focus on safe use of
technology & harmful
consequences of risky
interactions
Minimizing Cyber
Risk & Ensuring
Cyber Safety
 Children, youth, & adults must
be aware of & understand
cyber risk
 There are risks that can be
minimized & addressed but
not totally removed
Addressing Social Ecology
 Must address problematic societal
norms & values
 Collaborate with others to change
attitudes that condone
violence, racism, homophobia
 Create opportunities for positive
contact among young people from
various groups
What Adults / Parents Can Do
 Adult supervision of technology challenging
 Especially with shift to handheld devices

 Parents faced with accepting their children’s
unavoidable autonomy in the cyber world, while
also trying to monitor their activities
 Must maintain open lines of communication

(Bumpus

& Werner, 2009)

 Must encourage young people to use information
& communication technologies in positive ways
What Adults / Parents Can Do
 Be supportive
 Parental support is associated with lower levels of cyber
bullying involvement (Wang et al., 2009)

 Supportive parenting involves
 Understanding youth’s perspectives & meaning of technology
in their social lives
 Taking a non-judgmental stance toward young people & the
social media world
 Becoming a safe haven for youth when troubling experiences
occur online
 Developing critical thinking skills & problem solving strategies
in partnership with children & youth
What Adults / Parents Can Do
 Create environments in which children & youth
feel safe disclosing cyber bullying
 Disclosure may be difficult because of fear of
losing technological privileges (Agatston et al., 2007; Cassidy et
al., 2009)

 Ability for youth to tell adults is critical as delaying
disclosure delays receiving help
Conclusions
 Cyber world is complex, pervasive, here to stay
 Overlap & distinctions between online & offline
bullying
 Cyber bullying can be devastating
 Adults must be supportive & accepting toward
youth regarding their technology use
 Adults must maintain open communication to
help youth with technology use & problems that
may arise

 Adults must be a safe haven & resource for
problem solving
 Develop / evaluate intervention & prevention
programs
Thank you!

Faye Mishna
f.mishna@utoronto.ca

Weitere ähnliche Inhalte

Was ist angesagt?

New Media Consumption: What You Need To Know
New Media Consumption: What You Need To KnowNew Media Consumption: What You Need To Know
New Media Consumption: What You Need To Knowjdavis76
 
Impact of social media on the future
Impact of social media on the futureImpact of social media on the future
Impact of social media on the futureMonir Hossen
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 
Cyberbullying in adolescent victims
Cyberbullying in adolescent victimsCyberbullying in adolescent victims
Cyberbullying in adolescent victimsMarcelo Pesallaccia
 
Madison and amber powerpoint
Madison and amber powerpointMadison and amber powerpoint
Madison and amber powerpointMadison Emelia
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperMeghan.V
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Societymrjsaldivar
 
Social media and young people's mental health and wellbeing
Social media and young people's mental health and wellbeingSocial media and young people's mental health and wellbeing
Social media and young people's mental health and wellbeingmResearcher
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saadsbaluch1
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentationguestb628c5
 

Was ist angesagt? (20)

New Media Consumption: What You Need To Know
New Media Consumption: What You Need To KnowNew Media Consumption: What You Need To Know
New Media Consumption: What You Need To Know
 
Impact of social media on the future
Impact of social media on the futureImpact of social media on the future
Impact of social media on the future
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
 
Cyberbullying in adolescent victims
Cyberbullying in adolescent victimsCyberbullying in adolescent victims
Cyberbullying in adolescent victims
 
Madison and amber powerpoint
Madison and amber powerpointMadison and amber powerpoint
Madison and amber powerpoint
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
 
Social media and young people's mental health and wellbeing
Social media and young people's mental health and wellbeingSocial media and young people's mental health and wellbeing
Social media and young people's mental health and wellbeing
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Social Media
Social MediaSocial Media
Social Media
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Use of Social Media among Adolescents
Use of Social Media among AdolescentsUse of Social Media among Adolescents
Use of Social Media among Adolescents
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saad
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Internet experiences and exposures of children and adolescents: Implications ...
Internet experiences and exposures of children and adolescents: Implications ...Internet experiences and exposures of children and adolescents: Implications ...
Internet experiences and exposures of children and adolescents: Implications ...
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentation
 

Andere mochten auch

Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Scott Mills
 
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Scott Mills
 
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsLawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsScott Mills
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Scott Mills
 
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya #SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya Scott Mills
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
 
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Scott Mills
 
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...Scott Mills
 
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisStopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisScott Mills
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsScott Mills
 
@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011Scott Mills
 
Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Scott Mills
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...Scott Mills
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Scott Mills
 
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...Scott Mills
 
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Scott Mills
 
Carta organisasi
Carta organisasiCarta organisasi
Carta organisasimokwcmok
 
Deskolados
Deskolados Deskolados
Deskolados zbs2011
 

Andere mochten auch (20)

Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
 
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
 
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsLawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
 
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya #SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
 
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
 
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisStopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In Schools
 
@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011
 
Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
 
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
 
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
 
Carta organisasi
Carta organisasiCarta organisasi
Carta organisasi
 
Evaluation question 3
Evaluation question 3Evaluation question 3
Evaluation question 3
 
Media swag
Media swagMedia swag
Media swag
 
Deskolados
Deskolados Deskolados
Deskolados
 

Ähnlich wie Safe Community Partnership October 2013 Social Media & Technology

Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parentingbermandry
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCrisAnnChattoII
 
Impact of social media on the future of childhood
Impact of social media on the future of childhoodImpact of social media on the future of childhood
Impact of social media on the future of childhoodratna1958
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105CarolRusch1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxLaticiaGrissomzz
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and YouthKhadija Parween
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreportDustianne North
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 

Ähnlich wie Safe Community Partnership October 2013 Social Media & Technology (20)

Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptx
 
Impact of social media on the future of childhood
Impact of social media on the future of childhoodImpact of social media on the future of childhood
Impact of social media on the future of childhood
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreport
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Directed research 050114_EmpathyinDigital
Directed research 050114_EmpathyinDigitalDirected research 050114_EmpathyinDigital
Directed research 050114_EmpathyinDigital
 

Mehr von Scott Mills

Beyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyBeyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyScott Mills
 
Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Scott Mills
 
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38Scott Mills
 
Social Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsSocial Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsScott Mills
 
Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight Scott Mills
 
Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Scott Mills
 
Crime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksCrime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksScott Mills
 
Promote Crime Stoppers International
Promote Crime Stoppers InternationalPromote Crime Stoppers International
Promote Crime Stoppers InternationalScott Mills
 
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...Scott Mills
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple..."Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...Scott Mills
 
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...Scott Mills
 

Mehr von Scott Mills (12)

Beyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyBeyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media Strategy
 
Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"
 
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
 
Social Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsSocial Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott Mills
 
Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight
 
Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011
 
Crime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksCrime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talks
 
Promote Crime Stoppers International
Promote Crime Stoppers InternationalPromote Crime Stoppers International
Promote Crime Stoppers International
 
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple..."Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
 
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
 

Kürzlich hochgeladen

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Safe Community Partnership October 2013 Social Media & Technology

  • 1. Social Media & Technology: New Opportunities & Benefits & New Challenges Faye Mishna, Professor & Dean McCain Family Chair in Child & Family October 29, 2013
  • 2. Technology is in their OS  Cyber world has exploded & created a new social environment  Unprecedented opportunities for youth to communicate with others in & out of their face-to-face networks Text Messaging Twitter Email YouTube Social Networking Webcams Tumblr Blogs …& is always advancing…
  • 3. Technology is in their OS  970 million unique Facebook visitors worldwide  160 million unique Twitter visitors worldwide (Google 2011a,b) Text Messaging Twitter Email YouTube Social Networking Webcams Tumblr Blogs
  • 4. Context of Social Media World  Dramatic technological advances have forever changed how we communicate & interact  Children & youth are sophisticated users of technology  Youth acquire technological competence much faster than their parents  The risks of new technology are heightened by this disparity in knowledge  Youth seek social connections, information, personal assistance, entertainment online (Mishna et al., 2012)
  • 5. Technology is in their OS
  • 7. Magazine is a Broken iPad
  • 8. Technology is in their OS 98% 95% 85% of Canadian youth use cyber technology daily of teenagers use e-mail of youth use Instant Messaging  Youth are digital natives (Palfrey & Gasser, 2008; Prensky, 2001)  They have never known a world without technology (Valcke, Bonte, De Wever, & Rots, 2010)
  • 9. Technology is in their OS 93% 63% 75% 88% of American youth 12-17 go online occasionally of American youth 12-17 go online daily of American youth own a cell phone of these youth text message (Lenhart, Purcell, Smith, & Zichuhr, 2010)
  • 10. Complexity of the Online Experience  Regardless of the communication medium, relationships are central & complex  Features of technology create additional complexities in social relationships – Often & spontaneous – Fewer social & contextual cues • May decrease sensitivity & empathy – Perception of anonymity
  • 11. Navigating the Social Media World  Developmental characteristics make children / youth unprepared for freedom of online world (Liau, Khoo, & Ang, 2008)  Young people need guidance to make the best choices using information & communication technology (Suniti Bhat, 2008)
  • 12. Social Media World: Benefits  Unprecedented opportunities for communication, learning & self-exploration  Access to crucial resources such as support – Informal – Formal
  • 13. Social Media World: Benefits  Most online interactions positive/neutral  Can reduce social isolation, normalize feelings of distress  Explore identities not supported in school • “Marginalized”/“vulnerable” groups • e.g., LGBTQ, chronic illness, “invisible disability” (Whitlock et al., 2006)
  • 14. Social Media World: Risks  Bullying  Sexual solicitation or victimization  Exposure to harmful material  Pornography, violent images, hate messages  When child feels safe (home, room)  Those affected (youth) know much more about technology use than those who should protect (parents, educators)
  • 15. Defining Cyber Bullying  No universal definition  Use of information & communication technology to cause harm to another person [any device]  Criteria: intent to cause harm, target, power imbalance  Includes behaviours to spread rumours, hurt / threaten others, or sexually harass
  • 16. Cyber Bullying: Repetition Complex  Occurring in public domain, by its very nature involves repetition  Material (e.g., email, text, pictures) can be viewed far & wide  Can be distributed by perpetrator & by anyone with access  Can be difficult or impossible for victimized child/youth to eliminate
  • 17. Overlap with Traditional Bullying  Youth who bully or are bullied offline are more likely to bully or be bullied online  Young people who are at greatest risk of victimization in the cyber world are also at greatest risk in the offline world
  • 18. Prevalence of Cyber Bullying  Typically ranges from 10 to 35% (Agatston, Kowalski, & Limber, 2007; Hinduja & Patchin, 2008; Kowalski & Limber, 2007; Kowalski et al., 2008; Li, 2007; Williams & Guerra, 2007)  Some estimates are much higher, up to 72% (Hoff & Mitchell, 2008; Juvonen & Gross, 2008; Mishna et al., 2010; Raskauskas & Stoltz, 2007)
  • 19. What Makes Cyber Bullying Unique?  Engagement with the social media world is constant  Therefore transcends the boundaries of time & space  Difficult to escape, because technology follows children & youth everywhere  “non-stop bullying”  Can impact young people above & beyond the effects of traditional bullying
  • 20. Biased-Based Cyber Bullying  Hate-inspired electronic harassment based on actual or perceived social identities  Based on societal discrimination & inequity  Conditions fostering bullying of marginalized youth appear across all levels of social ecology, including the cyber level
  • 21. Mental Health Implications  Can be devastating  Growing concern for parents, educators & society “Like 1000 paper cuts eating away at your soul”  Can affect many areas of a child’s or youth’s life
  • 22. Shame & Humiliation  Little research on role of shame & humiliation in bullying  Humiliation as a result of being bullied associated with devastating consequences  Humiliation is one of the critical factors that precipitate suicidal ideation due to relationship problems  Feelings of humiliation, which can be brought about by repeated bullying, can increase thoughts of self-annihilation  Nature of cyber world can intensify shame/humiliation
  • 23. Disclosure  Tendency for victimized children & youth not to tell adults  More risks than benefits  Can be painful  Self-blame  May only tell when bullying becomes unbearable  Significant damage already done  May disclose to friends  Pressure on peers to manage loyalty dilemmas
  • 24. Disclosure  Symptoms & difficulties related to bullying experiences may go unnoticed by child / youth & others in their world  Failure to recognize link between problems & trauma  Can be damaging  Can invalidate youth’s subjective experiences
  • 25. Disclosure  Not telling is more problematic among marginalized children & youth  More victimization  Less support  e.g., LGBTQ, racialized, newcomers, learning disabilities
  • 26. Why Children are Reluctant To Report Bullying & Cyber Bullying  Fear technology will be taken away  Don’t want to make a “big deal”  Believe they can/should handle on their own  Often don’t label it “bullying”  Code of silence among children  Fear of retaliation  Shame  Lack of confidence in adults’ ability to help
  • 27. Adult Responses  Is child listened to? believed & validated?  Or, is child held responsible?  Critical to listen & validate child’s experience of victimization
  • 28. Ineffective Responses  Minimizing concerns  Disbelieving victimized individual  Blaming victimized individual  Reacting in ways that place victimized individual at more risk
  • 29. Telling Parents: Focus Groups  Students said they do not tell their parents / adults  Main reasons • Fear losing computer privileges • Believe adults would not find evidence of cyber bullying or be able to identify aggressor • Fear telling would exacerbate cyber bullying • Worry that the adult would advise them to “ignore it”
  • 30. Bullying as a Traumatic Experience  Impact of bullying is often under estimated  Traumatic impact of bullying is minimized  Bullying may also have a traumatic impact on bystanders
  • 31. Funded by Cyber Bullying Survey - In partnership with TDSB & UJA Toronto Board of Jewish Education - 33 schools in Toronto - 2186 students - Grades 6 & 7, 10 & 11
  • 32. Cyber Bullying Survey  Almost every household had a computer  2/3: 2 or more computers  2/3 spend 2 or more hours on computer  Almost ½ use the computer in a private place (e.g., bedroom)
  • 33. Cyber Bullying Survey In last 3 months 50% of students were bullied online      Called names/made to feel bad Threatened Spread rumours Pretended to be the student Sent others private pictures of student  Sent sexual pictures to student that made them feel bad  Asked to do something sexual that student didn’t want to do
  • 34. Cyber Bullying Survey In last 3 months 34% of students bullied others online  Called others names or made them feel bad  Threatened  Spread rumours  Pretended to be the person  Sent private pictures of person  Sent sexual pictures to person that made them feel bad  Asked person to do something sexual they didn’t want to do
  • 35. Who is Doing the Cyber Bullying?
  • 36. Myth of Anonymity  Cyber bullying is not anonymous  Occurs in kids’ social worlds / networks
  • 38. Current study: Motivations for Cyber Bullying: A Longitudinal & Multi-Perspective Inquiry Co-Investigators: Wendy Craig, Tanya Beran, Debra Pepler, Judith Wiener, & Mona Khoury-Kassabri Collaborator: David Johnston Social Sciences & Humanities Research Council of Canada (SSHRC)
  • 39. Current Study  In partnership with the Toronto District School Board  3-year longitudinal study  19 schools drawn randomly • 682 students • Grades 4, 7 & 10  Children, their parents & teachers  Representative of Toronto’s ethnocultural diversity Currently in year 2
  • 40. Study Objectives 1. Explore students’ experiences & conceptions of cyber bullying 2. Explore the definitions & views of cyber bullying of parents & teachers 3. Explore how children & youth view the underlying motivations for cyber bullying 4. Document the development, shifting roles, & rates of cyber bullying victimization & perpetration 5. Identify risk & protective factors for involvement in cyber bullying
  • 41. Methodology  Longitudinal multi-informant mixed methods study • Longitudinal quantitative design • Grounded theory  Preliminary findings • Univariate & bivariate analysis of survey results • Chi-square test of significance in bivariate relationships
  • 42. Measures  Demographic Form  Cyber Usage Form  Youth Self-Report, Child Behaviour Checklist, Teacher Report Form  Self-Perception Profile for Children (SPCC) / Self-Perception Profile for Adolescents (SPCA)  Social Support Scale for Children / Social Support Behaviors Scale  Interviews with students, parents & teachers
  • 43. Demographics  Female 60%  Grade 4 = 24% Male 40% Grade 7 = 36% Grade 10 = 40%  65% of students were born in Canada  8% identified as having a disability  Low need school  Medium need school  High need school 37% 23% 40%
  • 44. Time Spent Online For how long have you been going online (years)?  Grade 4 average = 3.5 years  Grade 7 average = 5 years  Grade 10 average = 6 years  No significant difference by gender
  • 45. Time Spent Online How many hours a day do you go online?  Grade 4 average = 2 hours  Grade 7 average = 2.5 hours  Grade 10 average = 4 hours * No significant difference by gender
  • 46. Percent of Students Who Reported Victimization (last 30 days) 20% 15% 15% Traditional Bully Victim 10% 6% 5% 7% Cyber Bully Victim 3% 2% 1% 0% Once or Twice Three or Four Times Every Day *No significant difference by gender
  • 47. Percent of Victimization by Type of Bullying & Grade 50% 42% 40% Traditional Bully 30% 25% 20% 13% 13% 10% Cyber Bully 12% 7% 0% Grade 4 p<.001 for traditional bullying p< .05 for cyber bullying Grade 7 Grade 10
  • 48. Percent of Students Witnessing Bullying 40% 31% 30% 20% Traditional Bully Witness 18% 15% Cyber Bully Witness 10% 4% 6% 2% 0% Once or Twice Three or Four Times Every Day *No significant difference by gender
  • 49. Percent of Students Reporting Bullying Others 15% 10% 8% 5% 3% 0% Traditional Bully Cyber Bully *No significant difference by grade or gender
  • 50. Parent Reporting of Children’s Cyber Bullying Involvement Parents reported higher rates for their children’s involvement in cyber bullying  14% of parents indicated their child was cyber bullied  7% of parents indicated their child cyber bullied other(s)
  • 51. Teacher Reporting of Students’ Cyber Bullying Involvement How often does cyber bullying occur in the grade you teach? 50% 40% 40% 28% 30% 19% 20% 11% 10% 2% 0% Never Rarely Often Very Often Don't Know
  • 52. Teachers & Parents: Views on Gender Differences Teachers & parents were asked if they thought one gender cyber bullied more  46% of teachers responded YES – Of those teachers, 100% thought females cyber bullied more  39% of parents responded YES – Of those parents, 78% thought females cyber bullied more *No significant difference in student reported cyber bullying by gender
  • 53. Overlap of Cyber & Traditional Bullying Involvement  74% of students who report being victims of cyber bullying also report traditional bullying victimization  50% of students who report cyber bullying others also report taking part in traditional bullying others
  • 54. Motivations for Cyber Bullying Students were asked why they think youth cyber bully  Grade 4 top ranked statements: 1) It’s a way to feel powerful 2) Nobody knows who they are 3) Nobody sees them so they don't feel ashamed
  • 55. Motivations for Cyber Bullying  Grade 7 top ranked statements: 1) It’s a way to feel powerful 2) Nobody sees them so don't feel ashamed 3) It's easy to press “send”  Grade 10 top ranked statements: 1) It’s a way to feel powerful 2) It's easy to press “send” 3) They can get away with it
  • 56. Students in Distress  Anticipated that a number of students would be identified as “in distress”  Protocol put in place to identify students needing help; we make referrals to school social workers  Unanticipated finding: the high number of students “in distress” & the level of intensity of their distress  Both significant & worrying
  • 57. Students in Distress  23% of students were identified as “in distress” • Due to various issues, including bullying & cyber bullying  67% Female/ 33% male  52% of students in distress had told someone about the distress  “Low Need School” students significantly less likely in distress  Grade 10 “High Need School” girls more often in distress  Males less likely to seek help from anyone for distress  37% of students identified: suicidal thoughts /plans / attempts
  • 58. Students in Distress  48% of students in distress reported cyber &/or traditional bullying involvement  15% of students in distress had cyber bullying involvement  54% of students in distress required social work assistance & were referred through the study • 12.2% of the overall sample  2/3 of students in distress who had received professional assistance did not find it helpful
  • 59. Students in Distress  Students who appeared to be in high level of distress commonly had bullying/cyber bullying involvement as well as other sources of distress • 56% of these students had bullying involvement of some kind  Females were more likely to appear to be in high level of distress than males  Preliminary analysis suggests high level of distress correlated with not seeking help, not disclosing distress to adults, & not requesting help through study
  • 60. Disclosure & Distress: Reasons Students Don’t Tell Protecting Self Protecting Others Advice/Help Won’t Be Effective From Emotional Responses From Consequences Protecting SelfImage & Sense of Self Protecting Others’ Feelings Protecting Others from Consequences Advice/Help Won't be Effective • Fear of Judgement /what others will think, rejection, anger, blame • Doesn't want problems minimized • Doesn't want / upsetting to talk about it • Don't/won't listen • Didn't want to “make a big deal” • Family doesn't talk about /share feelings • Will get in trouble, be grounded (e.g., for cutting, for bullying ) • Prides self on being independent • Burden on parents • Doesn't want to get friends in trouble • They didn’t know what to do - They don't understand the cyber world • “Didn't want to be the one to cause/ bring the trouble” to family • Don't understand student's emotions/feelings • Parents taking away technology • Doesn't want to be a “burden” on parents • “Didn't want to be the one to cause / bring the trouble” • Doesn't want parents to feel bad, blamed • Doesn't want to bother other people with own sad/ hard feelings • They don't do anything • Adults/resources & their strategies are ineffective, not helpful • He/she won't be believed
  • 61. The New Cyber World  Cyber bullying must be understood in the context of the new cyber world
  • 62. The Cyber World has Tremendous Benefits  Can be used for good & for ill  Adults must recognize that the Internet is a real & legitimate social world for children & youth  Adults must recognize that the Internet is not a passing phase  Must understand the cyber world & importance for youth  Must learn about sites children & youth visit
  • 63. What Can We Do? Removing Access is no Solution  Losing computer or cell phone access feels like punishment to children & youth  Loss of connection with their social world
  • 64. Education & Training  Adults require knowledge about forms of cyber risk • Education to help identify & respond appropriately  Should focus on safe use of technology & harmful consequences of risky interactions
  • 65. Minimizing Cyber Risk & Ensuring Cyber Safety  Children, youth, & adults must be aware of & understand cyber risk  There are risks that can be minimized & addressed but not totally removed
  • 66. Addressing Social Ecology  Must address problematic societal norms & values  Collaborate with others to change attitudes that condone violence, racism, homophobia  Create opportunities for positive contact among young people from various groups
  • 67. What Adults / Parents Can Do  Adult supervision of technology challenging  Especially with shift to handheld devices  Parents faced with accepting their children’s unavoidable autonomy in the cyber world, while also trying to monitor their activities  Must maintain open lines of communication (Bumpus & Werner, 2009)  Must encourage young people to use information & communication technologies in positive ways
  • 68. What Adults / Parents Can Do  Be supportive  Parental support is associated with lower levels of cyber bullying involvement (Wang et al., 2009)  Supportive parenting involves  Understanding youth’s perspectives & meaning of technology in their social lives  Taking a non-judgmental stance toward young people & the social media world  Becoming a safe haven for youth when troubling experiences occur online  Developing critical thinking skills & problem solving strategies in partnership with children & youth
  • 69. What Adults / Parents Can Do  Create environments in which children & youth feel safe disclosing cyber bullying  Disclosure may be difficult because of fear of losing technological privileges (Agatston et al., 2007; Cassidy et al., 2009)  Ability for youth to tell adults is critical as delaying disclosure delays receiving help
  • 70. Conclusions  Cyber world is complex, pervasive, here to stay  Overlap & distinctions between online & offline bullying  Cyber bullying can be devastating  Adults must be supportive & accepting toward youth regarding their technology use  Adults must maintain open communication to help youth with technology use & problems that may arise  Adults must be a safe haven & resource for problem solving  Develop / evaluate intervention & prevention programs

Hinweis der Redaktion

  1. The majority of youth have access to informationInternet &amp; communication technologies (Mishna, Cook, Gadalla, Daciuk, &amp; Solomon, 2010)Giving young people unprecedented opportunities to communicate with others both in &amp; out of their face-to-face social networks (Gross, 2004).
  2. Technology is in their “Operating Systems” (OS) American youth spend an astounding seven hours each day involved with media, often through forums such as social networking and video sites (Rideout et al., 2010). 95% of American youth between 12 and 17 years go online, 80% of whom use social media sites such as Facebook, Myspace and Twitter, often on a daily basis The current generation of children and youth, often called digital natives (Palfrey &amp; Gasser, 2008;Prenskky, 2001), has never experienced a world without technology (Valcke, Bonte, De Wever, &amp; Rots, 2010).
  3. The developmental stages of childhood and adolescence are characterized by dependency, growth, and change; these characteristics are in stark contrast to the independence afforded by the online world (Liau, Khoo, &amp; Ang, 2008). Without guidance, young people may not be able to make the best choices when utilizing communication technologies (SunitiBhat, 2008).
  4. Unprecedented opportunities for communication, learning &amp; self-exploration (Blais, Craig, Pepler, &amp; Connolly, 2008; Brown, Jackson, &amp; Cassidy, 2006; Gross, 2004; Lenhart &amp; Madden, 2007; Media Awareness Network, 2005; Wolak, Mitchell, &amp; Finkelhor, 2003)Access to crucial resources such as social support [informal &amp; formal] (Elwell, Grogan, &amp; Coulson, 2010; Valkenburg &amp; Peter, 2007)
  5. A universal definition of cyber bullying does not exist. The use of communication &amp; information technology to cause harm to another person (Patchin &amp; Hinduja, 2012)Criteria: intent to cause harm, target, power imbalance (Smith del Barrio, &amp; Tokunaga, in press).Can include various behaviours to spread rumours, hurt or threaten others, or to sexually harass (Hinduja &amp; Patchin, 2008; Mishna et al., 2010)
  6. Occurring in public domain, by its very nature involves repetitionMaterial (i.e., email, text, pictures) can be viewed far &amp; wideCan be distributed by perpetrator &amp; by anyone with access (Campbell, 2005; Slonje &amp; Smith, 2008)Can be difficult or impossible for victimized child or youth to eliminate (Wolak, Mitchell, &amp; Finkelhor, 2007)
  7. Youth who bully or are bullied offline are more likely to bully or be bullied online (Hinduja &amp; Patchin, 2008; Juvonen &amp; Gross, 2008; Tynes, Reynold, &amp; Greenfield, 2004)Young people who are at greatest risk of victimization in the cyber world are those who are also at greatest risk in the offline world (Willard, 2010)
  8. Variability likely due to inconsistent definitions of cyber bullying, use of different samples and methodologies.
  9. Engagement with the social media world is constant, and therefore cyber bullying transcends the boundaries of time and space (Bauman, 2009). It is difficult to escape, because technology follows children &amp; youth everywhere (Kowalski et al., 2008; Slonje &amp; Smith, 2008)Can impact young people above &amp; beyond the effects of traditional bullying (Blais, 2008; Campbell, 2005; Hinduja &amp; Patchin, 2009; Kowalski et al., 2008; Slonje &amp; Smith, 2008; Willard, 2007)
  10. Very little research has directly examined the role of shame in bullying (Menesini &amp; Camodeca, 2008). The majority of the extant research has been conducted in a few countries, including Spain &amp; Italy (Menesini et al., 2003; Menesini &amp; Camodeca, 2008), Australia (Ahmed, 2006), &amp; Bangladesh (Ahmed &amp; Braithwaite, 2006).Menesini &amp; colleagues (2003) conducted parallel studies in three European cities: 1 in Spain &amp; 2 in Italy, to examine the role of shame &amp; guilt in relation to bullying situations. 121 children between 9-11 were assigned to 1 of 3 status groups based on peer nominations: bully, victim, or outsider. Children were told a fictional story about bullying, &amp; were then asked to put themselves in the role of the bully &amp; describe their feelings of responsibility (shame &amp; guilt) &amp; disengagement (indifference &amp; pride). The researchers recognized cross-cultural differences within their sample, as children from different parts of Europe displayed varying degrees of disengagement. Specifically, when compared to children from Spain, children from the south part of Italy revealed an attitude of higher disengagement towards the bully, as they exhibited a lack of negative emotions in response to the bullying behaviour, &amp; a sense of satisfaction with their actions (Menesini et al., 2003). Ahmed’s (2006) study in Australia found that children manage their shame differently, depending on their role in bullying experiences. Children who bully were found to displace their shame by externalizing blame and anger, with little acceptance of wrong-doing. Conversely, children who are victims of bullying tended to internalize their shame, resulting in overwhelming feelings of rejection in which they did not feel that others considered them worthy. Ahmed &amp; Braithwaite (2006) found an association between shame management &amp; bullying behaviours within the cultural context of Bangladesh, in their study which examined the relationships among forgiveness, reconciliation, shame &amp; school bullying. Parental forgiveness &amp; reconciliation were important factors in this study, as parents were regarded as the child’s most significant authority figure. The researchers hypothesized that forgiveness &amp; reconciliation would be associated with shame management abilities, &amp; thus, linked to bullying. Data were collected from 1, 875 Bangladeshi adolescents in grades 7-10 using the Life at School Survey. Results indicated that high shame acknowledgment (e.g., accepting responsibility, making amends) was associated with less bullying, whereas high shame displacement (e.g., using anger or blaming others) was associated with more bullying. Because the aforementioned findings are specific to particular countries, it is unclear what role culture may have played in relation to shame &amp; bullying, as culture may affect shame differently. Bedford &amp; Hwang (2003) examined the emotions of guilt &amp; shame in Chinese culture compared to American culture. They described a differential sensitivity to shame for the Chinese culture, whereby Chinese individuals are sensitive to feeling shame from the actions or lack of actions of others. There is therefore a need for further research to examine the role of shame in bullying including the cultural determinants related to shame. Because bullying occurs throughout the world, it is imperative to examine the role of culture, particularly as it relates to shame in bullying.Humiliation, defined as, “feelings of disgrace &amp; public disparagement that may shatter a youngster’s healthy sense of narcissism &amp; sense of identity, and loss of a basic sense of one’s worthwhileness” (Pfeffer, 1990, pp. 81), has also been linked to bullying. Research indicates that humiliation as a result of being bullied has been associated with devastating consequences (Stillon, 1994). Indeed, Pfeffer (1990) contends that humiliation is one of the critical factors that precipitate suicidal ideation due to relationship problems.Pfeffer (1990) argues that feelings of humiliation, which can be brought about by repeated bullying, are a “powerful force to increase thoughts of self-annihilation” (pg. 81).
  11. Factors that may inhibit children from telling include: secrecy, powerlessness, blaming him or herself, fear of retaliation, child vulnerabilities, fear of losing the relationship if the aggressor was a friend, &amp; not expecting adults to be helpful Low rates of disclosure are not exclusive to bullying Individuals of all ages may underreport experiences of abuse, trauma or victimization because of difficulties associated with disclosure
  12. The impact of bullying may be masked by other problems such as refusal to attend school or depression or anxiety (Luis, 2004, as cited in Dyer &amp; Teggart, 2007) Symptoms &amp; difficulties related to bullying experiences may go unrecognized by the child or youth &amp; others in their world. Despite differences, the work with survivors of childhood abuse can inform practitioners with respect to bullying (Herman, 1992; van derKolk, McFarlane, &amp; Weisaeth, 1996; Walrath, Ybarra, Sheenan, Holden, &amp; Burns, 2006) The failure to recognize the link between problems &amp; a person’s trauma can further damage &amp; invalidate an individual’s subjective experiences (Herman, 1992). When asked about their bullying experiences, it is not uncommon for a child or youth to dismiss the effects with comments such as, “it doesn’t happen much,” “it happens less than it used to,” “it doesn’t bother me,” or “I’m used to it.”These children and youth may have incorporated the bullying experience into their sense of self &amp; consequently may not attribute their difficulties such as depression, anxiety or low self-esteem to their victimization.
  13. Not only do sexual minority students report more bullying &amp; sexual harassment then their heterosexual peers (Saewyc et al., 2007), but limited evidence suggests these youth lack supportive family, friends &amp; teachers (Warwich et al., 2001; Williams et al., 2005) &amp; that they experience more victimization &amp; isolation in their families &amp; in schools (Garofalo et al., 1998)
  14. Social workers play an important role in helping parents &amp; educators understand &amp; respond to the children’s perspectives &amp; feelings; it is critical that adults listen to &amp; validate the child’s experience of victimization, because failure to do so can lead to the child feeling traumatized (Stolorow and Atwood 1992), to doubting their own feelings &amp; views &amp; to stop telling adults about their victimization
  15. It has been documented that bystanders can experience traumatic reactions similar to those of the victimized children or youth (Boney-McCoy &amp; Finkelhor, 1995; Janson &amp; Hazler, 2004)
  16. The most popular choices for intervention were tell school, monitor computer use, use blocking software. Few parents would encourage their child to bully back, take the computer away, or do nothing.
  17. Overall24% reporting traditional bully victimization10% reporting cyber bully victimization. *No significant difference by level of school need for cyber bullying victimization;however, significant difference (p&lt;.001) in reported traditional bullying victimization by level of school needReported victimization in high need school is about half (15%) of reported rates in medium (31%) and low need schools (28%). *No significant difference by origin of birth or grades obtained
  18. Chi-square significant at p&lt;.001 for traditional bullying and p&lt;.05 for cyber bullying.
  19. Overall, 52% reporting witnessing traditional bullying; 24% reporting witnessing cyber bullying.*No significant difference by grade for witnessing cyber bullyingHowever, significant difference (p&lt;.01) in witnessing traditional bullying by gradegrade 4 (55%), grade 7 (61%) and grade 10 (44%). *No significant difference by origin of birth,grades obtained, or level of school need.
  20. *No significant difference by level of school need for traditional bullyinghowever, significant difference (p&lt;.05) in cyber bullying by level of school needhigh need school (2%), medium school need (6%), low school need (1%). *No significant difference by origin of birth or grades obtained.
  21. ***In slide 20, it is noted that there are no significant difference in student reported cyber bullying by gender.
  22. OR ? You can present it in this way – 33% of traditional bullying victims also report cyber bullying victimization18% of traditional bullies also report taking part in cyber bullying
  23. Let’s first start by stressing that there is no single solution that will address cyber bullying; this problem must be approached in numerous ways, one of which is through parents Children &amp; youth are sophisticated users of technology and acquire technological competence much faster than parents (Agatston et al., 2007; Bjørnstad &amp; Ellingsen, 2004; Hinduja &amp; Patchin, 2009; Lange, 2007; Lenhart &amp; Madden, 2007; Livingstone &amp; Bober, 2004; Mesch, 2006; Palfrey &amp; Gasser, 2008) Youth keep up with constant and rapid technological advances, which further contributes to a clear and unmistakable generational divide between younger and older individuals (Livingstone, 2007). Many youth engage with communication devices without adult supervision and often without their parents’ knowledge (Livingstone &amp; Bober, 2004). Adult supervision of technology use is difficult, especially as technology has shifted from home desktop computers to handheld devices (Hinduja &amp; Patchin, 2008; Hoff &amp; Mitchell, 2008; Mishna et al., 2010) We must provide opportunities to ensure that youth develop safe and responsible online practices and behaviours
  24. We cannot blame technology. Cyber bullying is embedded in relationships. For the younger generation, relationships are embedded in the cyber world.
  25. Must learn appropriate responses to disclosure &amp; have effective strategies in place for addressing cyber bullying upon disclosure (Suniti Bhat, 2008)
  26. The cyber world is transformative.By being aware &amp; proactive, let’s make sure that we transform it as a force for good.The global expansion of ICT should not replace efforts to decisively combat global inequality &amp; systematic oppression Cyber civil rights framework: online violence against women is a civil rights issue, and it must be taken seriously.