Cyber worlds


Published on

ETEC 510 Cyberbullying

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • is  bullying via electronic media primarily involves name-calling, threats, spreading rumors, sharing another person’s private information, social isolation, and exclusion.
  • Bullying can be manifest as direct acts of physical violence, or as indirect acts involving relational or social aggression suchas social exclusion, isolation, spreading rumors, or manipulation
  • Consequences of cyberbullying can include poor academic performance, school dropout, physical violence, and suicide, and it is a method of bullying that is frequently hidden from adults
  • 1. victims are more afraid of losing their computer orphone privileges than they are worried about emotional harm or harassmentfrom cyberbullies2. Many adults are unawareof cyberbullying occurring among adolescent students3. feel more alone and helpless
  • Cyberbullying is particularly difficult for parents and teachers to monitor because it can occur via various types of technology. These can include(a) cellular phones (e.g., phone calls, text messages, photo-mail, etc.), (b)Internet chat rooms, (c) e-mail, (d) Instant Messenger (IM), (e) online blogs (Web journals), (f) massive multiplayer online role-playing games (MMORPG), (g) social networking Web sites (e.g., MySpace and Facebook),and (h) video broadcasting Web sites (e.g., YouTube)
  • Participant: A. school . Urban public, N=700Ø71%  Asian/Pacific     Island decent. ØMiddle -> high SESB. School, Public Charter, N=160Ø6th & 8th gradersØA range of ethnicities, SES, academic C school. All-girls private, N= 230Ø82% Asian/Pacific Island descent.Ø Middle-> high SESMethod: 35-item survey (questionnaire)     based on Beran and Li (2005)    multiple choice, fill in the blank, and elicited descriptive Data Analysis:Cyber Victims of Bullying by Gender (Table 1) --Boys are more likely to be cyber bullies, and girls are more likely to be victimsFrequency of Victims, Bullies, and Cyberbullying Incidents by School (Table 2)Frequency of Cyberbullying by Grade Level (T3)Types of Technology Used the Most to Cyberbully (4)
  • We elaborate on each bullet. We can give an overview, we don’t need all the details. Perhaps choosing the most dramatic stats would sufice.
  • Correlation between frequencies of internet use and victimization   54% cyber victims and 56% of bullies use the internet daily28% non victims and 32% of non bullies use the internet daily     
  • Victims: 48% of the cyber victims (59 students) never identified their cyber bully 49% of the cyber victims said they were angry as a result of the cyberbullying44% of the cyber victims said they were sadness34% of the cyber victims said were embarrassment20% of the cyber victims said they were feeling afraid5% Confusion3%  Annoyance 2% Grades dropped due to their involvement in cyberbullying 
  • Bullying: 50% of bullies said they bullied students from other schools44% of bullies said they  cyberbullying one or more studentsthey knew from their school 2 respondents specifically indicated that they had cyberbullied a friend
  • In discussion of access we can make a connection to last week’s reading about filtering the internet etc. having parents monitor and be more vigilant of what’s happening.
  • Cyber worlds

    1. 1. Cyber Worlds: New Playgrounds for Bullying By Mark and Ratliffe (2011) CYBER- Lily Almaraz Carolina Bojorquez Erica Ussery Aileen Wang
    2. 2. Introduction Cyberbullying is defined as the intentional act of online/digital intimidation, embarrassment, or harassment.
    3. 3. Introduction (Cont’d) It’s deliberate and repeated acts of  Physical  Mental harm  Intimidation
    4. 4. Introduction (Cont’d 2) The power lies in anonymity Stronger vs. Weaker
    5. 5. Problem Statement Cyberbullying is a growing problem in the United States.  Hawaii is seeing a higher percentage of verbal harm committed through the Internet every year. Consequences of cyberbullying :  Poor academic performance  School dropout  Physical violence  Suicide
    6. 6. Purpose: "To access the extent of cyberbullying in Hawaii middle schools, the media used, the awareness students had of cyberbullying in ther peer group, and the relationships between technology use, grade level, and gender“. (Mark & Ratliffe, 2011)
    7. 7. The Facts about Cyberbullying 90% of Cyber- Victims don’t tell their parents Victims are more afraid of losing their tech privileges Victims feel alone and helpless It is difficult to monitor It is more common than we think Victims’ grades tend to drop Girls are victims more often It is often a friend
    8. 8. Why it is difficult to stop it…
    9. 9. The Study Participants: 247 Hawaiian middle school children Method: Survey with 4 sections 1. General technology use 2. Experiences of cyber victims 3. Experiences of cyber bullies 4. Cyberbullying awareness Data Analysis:  The Kruskal–Wallis  ANOVA
    10. 10. The Study (cont’d.) Results: Survey with 4 sections 1. General technology use 2. Experiences of cyber victims 3. Experiences of cyber bullies 4. Cyberbullying awareness
    11. 11. Results: Technology Access 96% with access to a computer with Internet  33% use it daily 88% own a cell phone  43% use it daily
    12. 12. ResultsTypes of Technology Used Extent of Cyberbullying Most prevalent:  Tends to increase in MySpace and Cell middle school Phones YouTube  Significant difference MMORPG between grade level and the frequency of incidents
    13. 13. Results: Characteristics of Cyberbullying 49% 44% 34% 20% 5% 2%
    14. 14. Results: Characteristics of Cyberbullying50% bullied students from other schools44% cyberbullying one or more students they knew from their school
    15. 15. Dicussion Cyberbullying in Middle Schools  Grade level changes in incidence  Gender differences  Differences among school types Access to Technology and New Technologies  Social Networks  MMORPGs