SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Social Media Usage & the
Psychological Effects on Youth
Cyberbullying:
By Samantha Jaffe & Jessica Ryan
December 1, 2010
Raise your hand if you know
someone who
has been cyberbullied
in any way?
Research Questions
 What are the similarities and differences
in the motives behind bullying and
cyberbullying?
 What technologies are youth utilizing
when they cyberbully others?
 What are the psychological effects of
cyberbullying on youth?
Preview
 Traditional Bullying
 Cyberbullying
 Social Media Methods
 Psychological Effects
Traditional Bullying
 Definition:
– “persistent threatening and aggressive
behavior directed toward other people,
especially those who are smaller or
weaker”
– Debate on the word “Aggressive”
– Overt
Cyberbullying
 Definition:
– “forms of bullying that use electronic means such
as the Internet and mobile phones to aggressively
and intentionally harm someone” (Price &
Dalgelish, 2010, p.51).
 “Bullying on Steroids”
Methods of Cyberbullying
 Flaming: sending vulgar messages about a person to an online
group or directly to the person via email other text messaging
(Li, 2008, p.225)
 Online harrassment: repeatedly sending offensive messages
via email or other text messaging to a person (Li, 2008, p.225)
 Cyberstalking: online harassment that includes threats of harm
or is excessively intimidating (Li, 2008, p.225)
 Denigration (put-downs): Sending harmful, untrue, or cruel
statements about a person to other people or posting such
material online (Li, 2008, p.225)
Methods of Cyberbullying (cont’d)
 Masquerade (or Impersonation): pretending to be someone
else and sending or posting material that makes that person
look bad (Li, 2008, p.225)
 Outing: sending or posting material about a person that
contains sensitive, private, or embarrassing information,
including forwarding private messages or images (Li, 2008,
p.225)
 Trickery: tricking someone into revealing secrets or
embarrassing information and sharing that information with
others (Trolley & Hanel, 2010, p.39)
 Exclusion: cruelly excluding someone from an online group (Li,
2008, p.225)
Social Media Usage
 Mobile Phones
 Social Networking
Sites (SNSs)
Mobile Phones
 Most preferred
method
 Two to one 15 to 18
female students
preferred harrassing
victims by text
messaging over other
mediums such as e-
mail, websites, and
instant messaging
(Toppo, 2006, p.08d).
Mobile Phones
 Advertisements
 “Sexting”
– “Sending or forwarding nude, sexually
suggestive, or explicit pictures on a cell
phone or online” (Siegle, 2010, p.15).
Social Networking Sites
 About 55% of
American youths use
SNSs (Trolley &
Hanel, 2010, p.9).
 About 46% of female
participants reported
using SNSs when
cyberbullying (Trolley
& Hanel, 2010, p.55).
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Social Networking Sites
 Profile Creation
 Identity Performance
 “Imagined Audience”
 Online and Offline Relationships
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Psychological Effects
 Control Imbalance:
– Changing roles
 Associated Feelings:
– Anger
– Frustration
– Sadness
– Anxiety
– Depression
– Lower Self-esteem
Psychological Effects (cont’d)
Hinduja, S., & Patchin, J. W. (2010b)
Psychological Effects (cont’d)
 Emotional Intelligence:
– Understanding Emotions
 Psychological Immune System:
– “The higher the level of one’s emotional
intelligence, the healthier one’s psychological
immune system” (Plaford, 2006, p. 59).
 Social Capital
Conclusions
 Traditional bullying and Cyberbullying are
different
– Methods
– Time and Space
– Covert vs Overt
 Increased Technology Usage
 Decreased Mental Health
 Limitations on Research
“It Gets Better” with Joe Biden
 http://www.youtube.com/watch?v=wcyXQJ

Weitere ähnliche Inhalte

Was ist angesagt? (18)

Curating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymityCurating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond Pseudonymity
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 
Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
What is cyberbullying
What is cyberbullyingWhat is cyberbullying
What is cyberbullying
 
Cyberbullying - FILM2601 project
Cyberbullying - FILM2601 projectCyberbullying - FILM2601 project
Cyberbullying - FILM2601 project
 
Cyberbullying2 - FILM260
Cyberbullying2 - FILM260Cyberbullying2 - FILM260
Cyberbullying2 - FILM260
 
Cyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima ShahCyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima Shah
 
To Comment Or Not To Comment
To Comment Or Not To CommentTo Comment Or Not To Comment
To Comment Or Not To Comment
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paper
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Polarization on social media
Polarization on social mediaPolarization on social media
Polarization on social media
 
Fys rp
Fys rpFys rp
Fys rp
 

Ähnlich wie Cyberbullying jaffe ryan

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100justwatts3
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word mickietanger
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sitesGerard1990
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesRob Jewitt
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxhartrobert670
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)parsonsmaddy1
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...MohinderSingh78
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]William Kritsonis
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Societymrjsaldivar
 

Ähnlich wie Cyberbullying jaffe ryan (20)

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Sm
SmSm
Sm
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100
 
Week 5
Week 5Week 5
Week 5
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Cyberbullying jaffe ryan

  • 1. Social Media Usage & the Psychological Effects on Youth Cyberbullying: By Samantha Jaffe & Jessica Ryan December 1, 2010
  • 2. Raise your hand if you know someone who has been cyberbullied in any way?
  • 3. Research Questions  What are the similarities and differences in the motives behind bullying and cyberbullying?  What technologies are youth utilizing when they cyberbully others?  What are the psychological effects of cyberbullying on youth?
  • 4. Preview  Traditional Bullying  Cyberbullying  Social Media Methods  Psychological Effects
  • 5. Traditional Bullying  Definition: – “persistent threatening and aggressive behavior directed toward other people, especially those who are smaller or weaker” – Debate on the word “Aggressive” – Overt
  • 6. Cyberbullying  Definition: – “forms of bullying that use electronic means such as the Internet and mobile phones to aggressively and intentionally harm someone” (Price & Dalgelish, 2010, p.51).  “Bullying on Steroids”
  • 7. Methods of Cyberbullying  Flaming: sending vulgar messages about a person to an online group or directly to the person via email other text messaging (Li, 2008, p.225)  Online harrassment: repeatedly sending offensive messages via email or other text messaging to a person (Li, 2008, p.225)  Cyberstalking: online harassment that includes threats of harm or is excessively intimidating (Li, 2008, p.225)  Denigration (put-downs): Sending harmful, untrue, or cruel statements about a person to other people or posting such material online (Li, 2008, p.225)
  • 8. Methods of Cyberbullying (cont’d)  Masquerade (or Impersonation): pretending to be someone else and sending or posting material that makes that person look bad (Li, 2008, p.225)  Outing: sending or posting material about a person that contains sensitive, private, or embarrassing information, including forwarding private messages or images (Li, 2008, p.225)  Trickery: tricking someone into revealing secrets or embarrassing information and sharing that information with others (Trolley & Hanel, 2010, p.39)  Exclusion: cruelly excluding someone from an online group (Li, 2008, p.225)
  • 9. Social Media Usage  Mobile Phones  Social Networking Sites (SNSs)
  • 10. Mobile Phones  Most preferred method  Two to one 15 to 18 female students preferred harrassing victims by text messaging over other mediums such as e- mail, websites, and instant messaging (Toppo, 2006, p.08d).
  • 11. Mobile Phones  Advertisements  “Sexting” – “Sending or forwarding nude, sexually suggestive, or explicit pictures on a cell phone or online” (Siegle, 2010, p.15).
  • 12. Social Networking Sites  About 55% of American youths use SNSs (Trolley & Hanel, 2010, p.9).  About 46% of female participants reported using SNSs when cyberbullying (Trolley & Hanel, 2010, p.55). QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 13. Social Networking Sites  Profile Creation  Identity Performance  “Imagined Audience”  Online and Offline Relationships QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 14. Psychological Effects  Control Imbalance: – Changing roles  Associated Feelings: – Anger – Frustration – Sadness – Anxiety – Depression – Lower Self-esteem
  • 15. Psychological Effects (cont’d) Hinduja, S., & Patchin, J. W. (2010b)
  • 16. Psychological Effects (cont’d)  Emotional Intelligence: – Understanding Emotions  Psychological Immune System: – “The higher the level of one’s emotional intelligence, the healthier one’s psychological immune system” (Plaford, 2006, p. 59).  Social Capital
  • 17. Conclusions  Traditional bullying and Cyberbullying are different – Methods – Time and Space – Covert vs Overt  Increased Technology Usage  Decreased Mental Health  Limitations on Research
  • 18. “It Gets Better” with Joe Biden  http://www.youtube.com/watch?v=wcyXQJ

Hinweis der Redaktion

  1. Jessica & Samantha
  2. Jessica--- Into: Raise your hand if… Personal experience
  3. Samantha
  4. Samantha
  5. Samantha- Quote about it doubly dangerous beceause if left unattended it can rapidly escalate into en more serious violence and abuse. Overt easily seen
  6. Jessica
  7. Jessica
  8. Jessica
  9. Jessica
  10. Jessica
  11. Jessica
  12. Jessica
  13. Less than 13% remained in the their roles.
  14. Samantha Traditionaol bullying happens at school, neightboorhood, Viturally at any time- so different devides. Increased- more access, and tech, knowledge.
  15. Jessica - 35-59