SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Social Media Usage & the
Psychological Effects on Youth
Cyberbullying:
By Samantha Jaffe & Jessica Ryan
December 1, 2010
Raise your hand if you know
someone who
has been cyberbullied
in any way?
Research Questions
 What are the similarities and differences
in the motives behind bullying and
cyberbullying?
 What technologies are youth utilizing
when they cyberbully others?
 What are the psychological effects of
cyberbullying on youth?
Preview
 Traditional Bullying
 Cyberbullying
 Social Media Methods
 Psychological Effects
Traditional Bullying
 Definition:
– “persistent threatening and aggressive
behavior directed toward other people,
especially those who are smaller or
weaker”
– Debate on the word “Aggressive”
– Overt
Cyberbullying
 Definition:
– “forms of bullying that use electronic means such
as the Internet and mobile phones to aggressively
and intentionally harm someone” (Price &
Dalgelish, 2010, p.51).
 “Bullying on Steroids”
Methods of Cyberbullying
 Flaming: sending vulgar messages about a person to an online
group or directly to the person via email other text messaging
(Li, 2008, p.225)
 Online harrassment: repeatedly sending offensive messages
via email or other text messaging to a person (Li, 2008, p.225)
 Cyberstalking: online harassment that includes threats of harm
or is excessively intimidating (Li, 2008, p.225)
 Denigration (put-downs): Sending harmful, untrue, or cruel
statements about a person to other people or posting such
material online (Li, 2008, p.225)
Methods of Cyberbullying (cont’d)
 Masquerade (or Impersonation): pretending to be someone
else and sending or posting material that makes that person
look bad (Li, 2008, p.225)
 Outing: sending or posting material about a person that
contains sensitive, private, or embarrassing information,
including forwarding private messages or images (Li, 2008,
p.225)
 Trickery: tricking someone into revealing secrets or
embarrassing information and sharing that information with
others (Trolley & Hanel, 2010, p.39)
 Exclusion: cruelly excluding someone from an online group (Li,
2008, p.225)
Social Media Usage
 Mobile Phones
 Social Networking
Sites (SNSs)
Mobile Phones
 Most preferred
method
 Two to one 15 to 18
female students
preferred harrassing
victims by text
messaging over other
mediums such as e-
mail, websites, and
instant messaging
(Toppo, 2006, p.08d).
Mobile Phones
 Advertisements
 “Sexting”
– “Sending or forwarding nude, sexually
suggestive, or explicit pictures on a cell
phone or online” (Siegle, 2010, p.15).
Social Networking Sites
 About 55% of
American youths use
SNSs (Trolley &
Hanel, 2010, p.9).
 About 46% of female
participants reported
using SNSs when
cyberbullying (Trolley
& Hanel, 2010, p.55).
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Social Networking Sites
 Profile Creation
 Identity Performance
 “Imagined Audience”
 Online and Offline Relationships
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Psychological Effects
 Control Imbalance:
– Changing roles
 Associated Feelings:
– Anger
– Frustration
– Sadness
– Anxiety
– Depression
– Lower Self-esteem
Psychological Effects (cont’d)
Hinduja, S., & Patchin, J. W. (2010b)
Psychological Effects (cont’d)
 Emotional Intelligence:
– Understanding Emotions
 Psychological Immune System:
– “The higher the level of one’s emotional
intelligence, the healthier one’s psychological
immune system” (Plaford, 2006, p. 59).
 Social Capital
Conclusions
 Traditional bullying and Cyberbullying are
different
– Methods
– Time and Space
– Covert vs Overt
 Increased Technology Usage
 Decreased Mental Health
 Limitations on Research
“It Gets Better” with Joe Biden
 http://www.youtube.com/watch?v=wcyXQJ

Weitere ähnliche Inhalte

Was ist angesagt? (18)

Curating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymityCurating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond Pseudonymity
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 
Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
What is cyberbullying
What is cyberbullyingWhat is cyberbullying
What is cyberbullying
 
Cyberbullying - FILM2601 project
Cyberbullying - FILM2601 projectCyberbullying - FILM2601 project
Cyberbullying - FILM2601 project
 
Cyberbullying2 - FILM260
Cyberbullying2 - FILM260Cyberbullying2 - FILM260
Cyberbullying2 - FILM260
 
Cyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima ShahCyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima Shah
 
To Comment Or Not To Comment
To Comment Or Not To CommentTo Comment Or Not To Comment
To Comment Or Not To Comment
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paper
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Polarization on social media
Polarization on social mediaPolarization on social media
Polarization on social media
 
Fys rp
Fys rpFys rp
Fys rp
 

Ähnlich wie Cyberbullying jaffe ryan

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100justwatts3
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word mickietanger
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sitesGerard1990
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesRob Jewitt
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxhartrobert670
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)parsonsmaddy1
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...MohinderSingh78
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]William Kritsonis
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Societymrjsaldivar
 

Ähnlich wie Cyberbullying jaffe ryan (20)

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Sm
SmSm
Sm
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100
 
Week 5
Week 5Week 5
Week 5
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
 

Kürzlich hochgeladen

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Kürzlich hochgeladen (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Cyberbullying jaffe ryan

  • 1. Social Media Usage & the Psychological Effects on Youth Cyberbullying: By Samantha Jaffe & Jessica Ryan December 1, 2010
  • 2. Raise your hand if you know someone who has been cyberbullied in any way?
  • 3. Research Questions  What are the similarities and differences in the motives behind bullying and cyberbullying?  What technologies are youth utilizing when they cyberbully others?  What are the psychological effects of cyberbullying on youth?
  • 4. Preview  Traditional Bullying  Cyberbullying  Social Media Methods  Psychological Effects
  • 5. Traditional Bullying  Definition: – “persistent threatening and aggressive behavior directed toward other people, especially those who are smaller or weaker” – Debate on the word “Aggressive” – Overt
  • 6. Cyberbullying  Definition: – “forms of bullying that use electronic means such as the Internet and mobile phones to aggressively and intentionally harm someone” (Price & Dalgelish, 2010, p.51).  “Bullying on Steroids”
  • 7. Methods of Cyberbullying  Flaming: sending vulgar messages about a person to an online group or directly to the person via email other text messaging (Li, 2008, p.225)  Online harrassment: repeatedly sending offensive messages via email or other text messaging to a person (Li, 2008, p.225)  Cyberstalking: online harassment that includes threats of harm or is excessively intimidating (Li, 2008, p.225)  Denigration (put-downs): Sending harmful, untrue, or cruel statements about a person to other people or posting such material online (Li, 2008, p.225)
  • 8. Methods of Cyberbullying (cont’d)  Masquerade (or Impersonation): pretending to be someone else and sending or posting material that makes that person look bad (Li, 2008, p.225)  Outing: sending or posting material about a person that contains sensitive, private, or embarrassing information, including forwarding private messages or images (Li, 2008, p.225)  Trickery: tricking someone into revealing secrets or embarrassing information and sharing that information with others (Trolley & Hanel, 2010, p.39)  Exclusion: cruelly excluding someone from an online group (Li, 2008, p.225)
  • 9. Social Media Usage  Mobile Phones  Social Networking Sites (SNSs)
  • 10. Mobile Phones  Most preferred method  Two to one 15 to 18 female students preferred harrassing victims by text messaging over other mediums such as e- mail, websites, and instant messaging (Toppo, 2006, p.08d).
  • 11. Mobile Phones  Advertisements  “Sexting” – “Sending or forwarding nude, sexually suggestive, or explicit pictures on a cell phone or online” (Siegle, 2010, p.15).
  • 12. Social Networking Sites  About 55% of American youths use SNSs (Trolley & Hanel, 2010, p.9).  About 46% of female participants reported using SNSs when cyberbullying (Trolley & Hanel, 2010, p.55). QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 13. Social Networking Sites  Profile Creation  Identity Performance  “Imagined Audience”  Online and Offline Relationships QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 14. Psychological Effects  Control Imbalance: – Changing roles  Associated Feelings: – Anger – Frustration – Sadness – Anxiety – Depression – Lower Self-esteem
  • 15. Psychological Effects (cont’d) Hinduja, S., & Patchin, J. W. (2010b)
  • 16. Psychological Effects (cont’d)  Emotional Intelligence: – Understanding Emotions  Psychological Immune System: – “The higher the level of one’s emotional intelligence, the healthier one’s psychological immune system” (Plaford, 2006, p. 59).  Social Capital
  • 17. Conclusions  Traditional bullying and Cyberbullying are different – Methods – Time and Space – Covert vs Overt  Increased Technology Usage  Decreased Mental Health  Limitations on Research
  • 18. “It Gets Better” with Joe Biden  http://www.youtube.com/watch?v=wcyXQJ

Hinweis der Redaktion

  1. Jessica & Samantha
  2. Jessica--- Into: Raise your hand if… Personal experience
  3. Samantha
  4. Samantha
  5. Samantha- Quote about it doubly dangerous beceause if left unattended it can rapidly escalate into en more serious violence and abuse. Overt easily seen
  6. Jessica
  7. Jessica
  8. Jessica
  9. Jessica
  10. Jessica
  11. Jessica
  12. Jessica
  13. Less than 13% remained in the their roles.
  14. Samantha Traditionaol bullying happens at school, neightboorhood, Viturally at any time- so different devides. Increased- more access, and tech, knowledge.
  15. Jessica - 35-59