SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Lars Soderberg
Communication & Technology 250
Research Question
How prevelent is cyber bullying among
teenagers?
What is Cyber Bullying?
• “Willful and repeated harm inflicted through
the use of computers, cell phones, and other
electronic devices.” (Schrock & Boyd, 2011, p.
374)
• Stereotypical widespread problem
• Anonymity
– Private Messages, use of social media, doesn’t
have to be done at school (Farrell, 2012, p.26)
Power of Cyber Bullying
• Growth of the internet
• Permanent posts
• Deadly effects
– Depression, suicide, etc. (Cloud, 2010)
• Fast publicity of message (Ringrose, 2011, p.
133)
• Anonymity
– Mystery regarding the root of the message  lack
of control (Ringrose, 2011, p. 132)
Cyber Bullying Outlets
• Social Media
– Facebook, Twitter, MySpace, etc.
• Email
• Blogs / Websites (Vandebosch & Van
Cleemput, 2009, p. 1)
• Text Messaging
• Instant Messaging
– AIM, iMessage, etc.
“The youngsters who perpetrate acts of cyber
bullying have, in many cases, also experienced
cyber bullying as victims or bystanders and vice
versa.” (Vandebosch & Van Cleemput, 2009,
p.22)
Causes of Cyber Bullying
• The internet is a very liberating platform
• Easier establishment of social relationships
• Anonymity
– The identity of the bully is often secret (Erdur-
Baker, 2012, p. 111)
– Provides adoption of “a more aggressive persona”.
(Erdur-Baker, 2012, p. 110)
Causes continued…
• Easy access to technology (Farrell, 2012, p.26)
• Increased time spent online spent by
teenagers
– Age of identity exploration (Megan, 2012, p. 703)
Types of Cyber Bullying
• Direct involvement of the victim
– Viruses, internet / mobile bullying, social exclusion
(Vandebosch & Van Cleemput, 2009, p. 5)
• Initial lack of involvement by the victim
– Online anonymity, internet / mobile bullying
(Vandebosch & Van Cleemput, 2009, p. 5)
A Cyber Bully’s Effectiveness
• Hyperpersonal communication
– The ambiguity of messages online may cause
under/over dramatization of messages (Farrell,
2012, p.28)
• Channel expansion theory
– The level of knowledge in regards to a channel,
message topic, context, and source will determine
the level of effectiveness (Farrell, 2012, p.28)
Exposure to Cyber Bullying
• 72% of 18-29 year olds use social networking
cites (Megan, 2012, p. 703)
• 15.8% of young adults in a study (596 people
ages 14-22) reported cyber-bullying compared
to 12.3% of adolescents (Megan, 2012, p. 705)
• In the study, 15.6% of harassing messages
came from someone unknown to the victim
(Megan, 2012, p. 712)
Exposure continued…
• School survey (177 7th graders)
– 14.5% reported to being cyber bullies
– 24.9% reported to being victims of cyber bullying
• Online study (500 teenagers aged 11-15)
(Vandebosch & Van Cleemput, 2009, p. 7)
– 32% sent anonymous harassing emails
– 29% sent harassing messages
Kristensen and Smith Study
• (Vandebosch & Van Cleemput, 2009, p. 16-18)
– 44.8% knew their bully offline
– Half didn’t know their bully
– 14.1% were bullied by someone they only knew
online
– Experienced one form of offensive behavior orver
the internet / phone over the last 3 motnhs
• 61.9% reported to being victims
• 52.5% reported to being perpetrators
• 76.3% reported to being bystanders
Exposure Results
• Cyber bullying is different from case to case
• Traditional bullies and victimization online
(Vandebosch & Van Cleemput, 2009, p. 11)
• Lack of responsibility by student body
Cyber Bully Profile
• Cyber Bullies
– High self image
– Social competence
– High relationship
between traditional
and online bully
– Lack of surveillance by
parents
Victim Profile
• Victims
– Girls were more likely to be the victim
(Ringrose, 2011, 122)
– Higher relationship between a strictly online
relationship with their bully
– Tend to be victims of traditional bullying as
well
– High internet dependency
– Not socially competent
Ybarra Study
• (Vandebosch & Van Cleemput, 2009, p. 10)
– Males who reported as being depressed were
eight times more likely to report being a victim
“Ybarra identified both the amount of internet use
and the use of messenger programs as most
important predictors for the experience with cyber
bullying as a victim among females.” (Vandebosch &
Van Cleemput, 2009, p. 10)
Li Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 1/3 of “youngsters” bullied in school were also
cyber bullies
– 1/3 of “youngsters” reported their bullying in
school to backfire online and result in
victimization
– Majority of victims were females (p. 10)
– Strong correlation between cyber bullies and
cyber bully victims
Patchin & Hinduja Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 42.5% of cyber bully victims were frustrated
– 40% of victims were angry
– 17% felt sad
Conclusion
• Cyber bullying is evident among teenagers
– Amount of internet use
• Different devices are used
• Age is a factor
• Its’ presence varies on a case to case basis
• More research is needed

Weitere ähnliche Inhalte

Was ist angesagt?

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingkntrainer
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingSuphaphonP
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620mccready95
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Bullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityBullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityQuest Coaching
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 

Was ist angesagt? (19)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityBullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-Integrity
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Ähnlich wie Cyber Bullying

Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2larsselect
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationWendinda
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 

Ähnlich wie Cyber Bullying (20)

Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Week 5
Week 5Week 5
Week 5
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 

Kürzlich hochgeladen

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Kürzlich hochgeladen (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Cyber Bullying

  • 2. Research Question How prevelent is cyber bullying among teenagers?
  • 3. What is Cyber Bullying? • “Willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.” (Schrock & Boyd, 2011, p. 374) • Stereotypical widespread problem • Anonymity – Private Messages, use of social media, doesn’t have to be done at school (Farrell, 2012, p.26)
  • 4.
  • 5. Power of Cyber Bullying • Growth of the internet • Permanent posts • Deadly effects – Depression, suicide, etc. (Cloud, 2010) • Fast publicity of message (Ringrose, 2011, p. 133) • Anonymity – Mystery regarding the root of the message  lack of control (Ringrose, 2011, p. 132)
  • 6. Cyber Bullying Outlets • Social Media – Facebook, Twitter, MySpace, etc. • Email • Blogs / Websites (Vandebosch & Van Cleemput, 2009, p. 1) • Text Messaging • Instant Messaging – AIM, iMessage, etc.
  • 7. “The youngsters who perpetrate acts of cyber bullying have, in many cases, also experienced cyber bullying as victims or bystanders and vice versa.” (Vandebosch & Van Cleemput, 2009, p.22)
  • 8. Causes of Cyber Bullying • The internet is a very liberating platform • Easier establishment of social relationships • Anonymity – The identity of the bully is often secret (Erdur- Baker, 2012, p. 111) – Provides adoption of “a more aggressive persona”. (Erdur-Baker, 2012, p. 110)
  • 9. Causes continued… • Easy access to technology (Farrell, 2012, p.26) • Increased time spent online spent by teenagers – Age of identity exploration (Megan, 2012, p. 703)
  • 10. Types of Cyber Bullying • Direct involvement of the victim – Viruses, internet / mobile bullying, social exclusion (Vandebosch & Van Cleemput, 2009, p. 5) • Initial lack of involvement by the victim – Online anonymity, internet / mobile bullying (Vandebosch & Van Cleemput, 2009, p. 5)
  • 11. A Cyber Bully’s Effectiveness • Hyperpersonal communication – The ambiguity of messages online may cause under/over dramatization of messages (Farrell, 2012, p.28) • Channel expansion theory – The level of knowledge in regards to a channel, message topic, context, and source will determine the level of effectiveness (Farrell, 2012, p.28)
  • 12. Exposure to Cyber Bullying • 72% of 18-29 year olds use social networking cites (Megan, 2012, p. 703) • 15.8% of young adults in a study (596 people ages 14-22) reported cyber-bullying compared to 12.3% of adolescents (Megan, 2012, p. 705) • In the study, 15.6% of harassing messages came from someone unknown to the victim (Megan, 2012, p. 712)
  • 13. Exposure continued… • School survey (177 7th graders) – 14.5% reported to being cyber bullies – 24.9% reported to being victims of cyber bullying • Online study (500 teenagers aged 11-15) (Vandebosch & Van Cleemput, 2009, p. 7) – 32% sent anonymous harassing emails – 29% sent harassing messages
  • 14. Kristensen and Smith Study • (Vandebosch & Van Cleemput, 2009, p. 16-18) – 44.8% knew their bully offline – Half didn’t know their bully – 14.1% were bullied by someone they only knew online – Experienced one form of offensive behavior orver the internet / phone over the last 3 motnhs • 61.9% reported to being victims • 52.5% reported to being perpetrators • 76.3% reported to being bystanders
  • 15. Exposure Results • Cyber bullying is different from case to case • Traditional bullies and victimization online (Vandebosch & Van Cleemput, 2009, p. 11) • Lack of responsibility by student body
  • 16. Cyber Bully Profile • Cyber Bullies – High self image – Social competence – High relationship between traditional and online bully – Lack of surveillance by parents
  • 17. Victim Profile • Victims – Girls were more likely to be the victim (Ringrose, 2011, 122) – Higher relationship between a strictly online relationship with their bully – Tend to be victims of traditional bullying as well – High internet dependency – Not socially competent
  • 18. Ybarra Study • (Vandebosch & Van Cleemput, 2009, p. 10) – Males who reported as being depressed were eight times more likely to report being a victim “Ybarra identified both the amount of internet use and the use of messenger programs as most important predictors for the experience with cyber bullying as a victim among females.” (Vandebosch & Van Cleemput, 2009, p. 10)
  • 19. Li Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 1/3 of “youngsters” bullied in school were also cyber bullies – 1/3 of “youngsters” reported their bullying in school to backfire online and result in victimization – Majority of victims were females (p. 10) – Strong correlation between cyber bullies and cyber bully victims
  • 20. Patchin & Hinduja Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 42.5% of cyber bully victims were frustrated – 40% of victims were angry – 17% felt sad
  • 21. Conclusion • Cyber bullying is evident among teenagers – Amount of internet use • Different devices are used • Age is a factor • Its’ presence varies on a case to case basis • More research is needed