SlideShare a Scribd company logo
1 of 29
Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
Sources & Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teen internet use basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are teens doing online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How else are teens connecting? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concerns in Online Safety Sphere ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Harassment & Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
What makes online harassment & bullying different? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pew Internet: Online Harassment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Cyberbullying ,[object Object],[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
Online Harassment (2) ,[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds   by environment ( n =1,193) (Ybarra, 2009)
Online (or not) Harassment  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry (2)? ,[object Object],[object Object],[object Object],[object Object]
Overlap of cyberbullying & internet victimization (Ybarra, 2010)
Differences between cyberbullying & internet harassment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cell phone-based harassment ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Sending Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Receiving Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sexting Scenarios ,[object Object],[object Object],[object Object]
Element of coercion for some sexting ,[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Final Thoughts ,[object Object],[object Object],[object Object],[object Object]
THANK YOU Amanda Lenhart Pew Internet & American Life Project http://www.pewinternet.org Twitter: @amanda_lenhart

More Related Content

What's hot

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 

Similar to Cyberbullying 2010: What the Research Tells Us

Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011daniel_eukids
 

Similar to Cyberbullying 2010: What the Research Tells Us (20)

Week 5
Week 5Week 5
Week 5
 
Internet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth developmentInternet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth development
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Cyberbullying and adolescent mental health
Cyberbullying and adolescent mental healthCyberbullying and adolescent mental health
Cyberbullying and adolescent mental health
 
Digital adolescence: Myths and truths about growing up with technology
Digital adolescence: Myths and truths about growing up with technologyDigital adolescence: Myths and truths about growing up with technology
Digital adolescence: Myths and truths about growing up with technology
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Youth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truthsYouth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truths
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011
 
Pitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital agePitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital age
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
cyberworld
cyberworld cyberworld
cyberworld
 

More from Pew Research Center's Internet & American Life Project

More from Pew Research Center's Internet & American Life Project (20)

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Trust, Facts, Democracy
Trust, Facts, DemocracyTrust, Facts, Democracy
Trust, Facts, Democracy
 
Skills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 FactsSkills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 Facts
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
Online Harassment 2017
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 
Education in the age of fake news and disputed facts
Education in the age of fake news and disputed factsEducation in the age of fake news and disputed facts
Education in the age of fake news and disputed facts
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
The new landscape of facts and trust
The new landscape of facts and trustThe new landscape of facts and trust
The new landscape of facts and trust
 
The secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries addressThe secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries address
 
How People Fit Libraries Into Their Lives
How People Fit Libraries Into Their LivesHow People Fit Libraries Into Their Lives
How People Fit Libraries Into Their Lives
 
The New Age of Politics and Media
The New Age of Politics and MediaThe New Age of Politics and Media
The New Age of Politics and Media
 
Digital Divides – Feeding America
Digital Divides – Feeding AmericaDigital Divides – Feeding America
Digital Divides – Feeding America
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
How the public grades libraries – and uses libraries
How the public grades libraries – and uses librariesHow the public grades libraries – and uses libraries
How the public grades libraries – and uses libraries
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Cyberbullying 2010: What the Research Tells Us

  • 1. Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.  
  • 12.
  • 13. Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
  • 14.
  • 15. Frequency of bullying victimization among 11-16 year olds by environment ( n =1,193) (Ybarra, 2009)
  • 16.
  • 17.
  • 18.
  • 19. Overlap of cyberbullying & internet victimization (Ybarra, 2010)
  • 20.
  • 21.
  • 22.  
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. THANK YOU Amanda Lenhart Pew Internet & American Life Project http://www.pewinternet.org Twitter: @amanda_lenhart

Editor's Notes

  1. In order for us to create the most effective and targeted solutions, we have to know the exact nature of the problem.
  2. Patchwork of research – different definitions of cyberbullying make cross-study comparisons difficult. Methods vary considerably – each has something to tell us.
  3. Library access and CELL PHONE ACCESS is particularly important to African American, and to a lesser extent English-Speaking Hispanic students. One quarter of low income teens (HHI under $30K) and 25% of African American teens say they go online most often from school, compared to 15% of online teens overall. Fewer low SES and African American teens go online daily 53% of af-am, vs 67% of white teens 75% of high income teens go online daily, compared to 39% of low SES teens. Slight decrease in teens going online from home since we first asked – broader use/access and also wide variety of access points/mobile access.
  4. Not just email, IM, but social networks, mobile devices and gaming platforms are all used to connect, talk and interact with others. And thus also may become platforms for bullying, too. This is where teens are - particularly outside of school - online, connected to each other by various means at all times.
  5. Online safety concerns breakdown roughly into two parts – concerns over harmful contact and concern over harmful content. What we’re focusing on here today is online CONTACT, rather than content and specifically, online bullying aka cyberbullying.
  6. Definition of bullying downloaded from http://olweus.org/public/bullying.page on May 12, 2009 and is also contained in Dan Olweus’ 1993 book “Bullying at School”: Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993
  7. Source: Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Online – identity can be shrouded. Youth who are physically bullied can/do retaliate online. Can be hard to determine who instigated and where. These are the “bully-victims” and the “instigator-victims.” Other definitions of cyberbullying used in major research projects on the topic: “willful use of the Internet as a technological medium through which harm or discomfort is intentionally and repeatedly inflicted through indirect aggression that targets a specific person or group of persons.” (Williams and Guerra, 2007) “an overt, intentional act of aggression towards another person online” (19% of young and regular internet users reported experiencing this) (Ybarra, & Mitchell, 2004) “Willful and repeated harm inflicted through the medium of electronic text.” (Patchin & Hinduja, 2006)
  8. Invasive – computer and the internet bring the bullying into the sphere of the home, and cell phones, which are generally personal devices carried everywhere, mean that the bullying never stops.
  9. Pew data is measuring online harassment, as our questions did not ask about repetition or power imbalance. 15% had private comm forwarded with out permission 13% had a rumor spread about them 13% received a threatening message or comm 6% had embarrassing picture posted w/out permission Limitations: we missed a big one Missing spoofed/faked profile But Teens are also endlessly creative when it comes to bullying (and many other things) e.g., Text bombing=when a person sends 1000 of texts to one number… can be difficult to block, must pay for each text – can run up $100s in bills & makes it impossible to receive communication from others. Bullying in games – e.g., killing a player’s character quickly and repeatedly so gamer can’t play the game. Sources in this slide: Lenhart, A. (2007) Cyberbullying. Pew Internet & American Life Project, Washington, DC. http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Lenhart, A., et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  10. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx p. 86
  11. 9% data point is from: Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 33% data point is from: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156. Data unclear on likelihood of victims knowing perpetrator – 45-89% say they know who is harassing them. No major differences in SES, race/ethnicity, parent education in likelihood of being harassed online. (Pew 2007 data)
  12. Slide source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  13. Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Worth noting: Journal of Adolescent Health December 2007 issue has a special issue entirely devoted to research on Cyberbullying. Other research points to girls as more likely victims, or to boys and girls experiencing online bullying and harassment equally. (Wolak et al, 2007) – answers here not 100% conclusive. Ybarra data suggests that bullying does happen more at school than online. See following slide…
  14. Source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  15. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007 Dec;41(6 Suppl 1):S42-50. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.
  16. These are the “concurrent psychosocial problems” from Ybarra’s work. Source info for statements above: (see previous slides or bibliography for full cites) Bullying is broadly associated with: School violence – (Olweus, 2009 website ) Delinquency – (Hinduja & Patchin, 2007) Suicidal ideation (Hinduja & Patchin, in press @ Archives of Suicide Research) Depression and other psychological problems (Ybarra, 2007, Wolak, 2007) Substance abuse (Ybarra, 2007, Wolak, 2007) Delinquency / School avoidance (Hinduja & Patchin, 2007) Weapon-carrying (Nansel, 2003) Poor parent/caregiver relationships/offline victimization (Ybarra, 2007, Wolak, 2006)
  17. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177.
  18. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  19. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  20. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  21. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  22. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  23. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  24. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  25. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  26. Bibliography: Burgess-Proctor A, Patchin JW, and Hinduja S. Cyberbullying and Online Harassment: Reconceptualizing the victimization of adolescent girls in V. Garcia and J. Clifford [Eds.]. Female crime victims: Reality reconsidered . Upper Saddle River, NJ: Prentice Hall. 2008 Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156 Hinduja S and Patchin JW. Offline Consequences of Online Victimization: School Violence and Delinquency. J School Violence 2007;6(3): 89-112 Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org. Lenhart, A. Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. (2009) http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx Lenhart, A et al. Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC.(2010) http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx Nansel TR, Overpeck M, Pilla RS et al. Bullying behaviors among U.S. youth: Prevalence and association with psychological adjustment. JAMA 2001;285: 2094-2100. Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993. Material downloaded from http://olweus.org/public/bullying.page on May 11, 2009. Palfrey J, Sacco D, boyd d, Debonis D. Enhancing Child Online Safety: Final Report of the Internet Safety Technical Taskforce to the multi-state working group on social networking of United States Attorneys General. Berkman Center for Internet & Society at Harvard University:Cambridge, MA. December 31, 2008. pp. 22-28. Available online at http://cyber.law.harvard.edu/publications/2009/ISTTF_Final_Report Patchin JW and Hinduja S. Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying. Youth Violence and Juvenile Justice 2006;4: 148-169. Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Williams KR and Guerra NG. Prevalence and Predictors of Internet Bullying. J Adolescent Health. 2007 Dec: 41 S14-S21. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Ybarra M, Espelage DL, Mitchell KJ. The Co-occurrence of Internet Harassment and Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators. J Adolescent Health 2007: 41: S31-S41 Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007a Dec:41(6 Suppl 1):S42-50. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.