SlideShare a Scribd company logo
1 of 15
L U I S A M I L A N O
C O M M U N I C A T I O N & T E C H N O L O G Y
P R O F E S S O R Y A N G
A P R I L 2 9 , 2 0 1 4
Cyber bullies Background and
Home life
Topic of Project
I have chosen to focus on the background and home
life of a cyber bully. Specifically, what drives an
individual to participate in bullying over the Internet.
In my research on this topic, I found that parental
influence and overall self-esteem plays a large role in
whether or not a child will participate in cyber
bullying. These are the main factors that I have seen
throughout my research and have focused on them the
most.
What is cyber bullying?
Cyber bullying is the action of harassing or
intimidating another over the Internet using media
technology such as cell phones, instant messaging,
email, chat rooms, or social networking sites such as,
Facebook or Twitter.
 Cyber bullying is all about feeling power and gaining a sense of
control
 Children may be seeking this power because they lack it else
where, such as, in the home, or with parents
Influences that can Cause Cyber bullying
 Poor home life
 Lack of parental control
 Poor role models
 Lack of warmth and comfort from parent figures
 Poor parenting styles
 Over-demanding and under-demanding parenting styles
 Traumatic childhood experiences
Parental Influence
When researching this topic I found that parental influence is a big part of
how a child becomes active in cyber bullying.
 Parenting styles often lead children to find pleasure or satisfaction in
mistreating others, in many cases, children become bullies to gain a
sense of power
 When parents are over-demanding and give their child no say in what
happens in the household, children feel restricted and lose their sense
of autonomy. They can then regain this sense of autonomy by
dominating their peers.
 Children look at their parents as role models and therefore are likely to
imitate what their parents do
 If a child has grown up in a home with poor child rearing and bad influences, they are
likely to carry this sort of behavior over into their school life and other aspects of life
Parental Influence
 Parenting styles that emphasize demands over
parent-to-child affection can indirectly encourage
bullying behavior
 Without parental emotional rewards to guide a
child’s behavior, the child will seek external rewards
 The feeling at demanding respect through cyber
bullying can artificially substitute parental warmth
Home Life Influence
 How children grow up at home plays a huge role in
determining how one becomes a cyber bully
 Children who have the need to gain control over their peers
often are acting out a need that is unfulfilled at home
 In children who gain little attention in the home, even
negative attention from adult figures, such as teachers can be
rewarding
 Kids that may be suffering from abuse or from not having
their needs met at school or at home are prone to cyber
bullying
 Often children who are dealing with difficult situations at
home, such as divorce can be another factor for children to
participate in cyber bullying
 Between 2-16% of the population under 18 cyber bullies
others
Home Life Influence
 Homes that are lacking effective and positive parental
supervision may create an environment that produces
children with bullying-like tendencies
 Homes where alcohol abuse exists causes an elevated risk
of bullying behaviors in children
 A lack of consistent consequences and parenting within
the household can also lead children to exhibit bullying
behaviors
 Sometimes parental encouragement can be taken the
wrong way by a child and they think it is okay to use
hurtful words to others to stick up for themselves over
the Internet
Over-demanding Parenting Styles
 Parents who use an overbearing parenting style
restrict their child’s autonomy and feeling of control
over their situation
 A child who feels limited at home may use this frustration out
on others by cyber bullying and gaining a sense of power
 Parents using overly controlling parenting styles can reduce
the possibility of bullying by giving more respect to their
children in rule-setting
Under-demanding Parenting Styles
 Parents who put little constrain on their children
 Lack of limiting settings can result in a child not
understanding or respecting others’ autonomy
 A child from an undemanding family might not
know what social limits are and can cross the line
 Lack of attention received in the family situation
causes a child to act inappropriately in other
settings, such as cyberspace, as a cry for help
 A child gains negative attention from others, but still
it is still better than no attention at all to that child
Lack of Warmth
 Children failing to gain positive support when
they’ve performed well or behaved well
 Without parental emotional rewards to guide a
child’s behavior, the child will seek external rewards
 Children may find rewards by cyber bullying, to gain
power and peer respect
 Participating in cyber bullying can substitute
parental warmth
Conclusion
 Parenting styles play a large role in how a child
becomes a cyber bully
 Poor parenting can lead to cyber bullying to gain power and to
feel better about their own situation
 If parents are mean and do not show sympathy for their
children, their children will think this is a proper way of
treating others as well
 Children look up to their parents as role models, if the parents
have poor parenting styles then the child will pick up poor
habits from them
Conclusion
 Home life also has a huge influence on a child’s
behavior
 If a child lacks attention or the help they need they may feel
that bullying over the Internet is a outlet for them to obtain
this feeling of power or sense of autonomy that is taken away
inside the household
 A poor home life can consist of alcoholic and abusive parents,
which can lead a child to have the wrong impression on how to
treat others properly
Work Cited
Barnes, S.B. (2003). Computer-mediated communication: Human-to-human communication across the
internet (pp. 256-264). Boston, MA: Allyn and Bacon.
Erdur-Baker, Özgür. "Cyberbullying And Its Correlation To Traditional Bullying, Gender And Frequent And Risky
Usage Of Internet-Mediated Communication Tools.”New Media & Society 12.1 (2010): 109-125.
Communication & Mass Media Complete. Web. 29 Apr. 2014.
Farrell, Laura C. "The Role Of Cyber And Face-To-Face Verbal Bullying On Adolescent Victims." Journal Of The
Communication, Speech & Theatre Association Of North Dakota 25.(2012): 25-36. Communication
& Mass Media Complete. Web. 29 Apr. 2014.
Festl, Ruth, and Thorsten Quandt. "Social Relations And Cyberbullying: The Influence Of Individual And
Structural Attributes On Victimization And Perpetration Via The Internet." Human
Communication Research 39.1 (2013): 101-126. Communication & Mass Media Complete.
Web. 25 Apr. 2014.
Görzig, Anke, and Kjartan Ólafsson. "What Makes A Bully A Cyberbully? Unraveling The
Characteristics Of Cyberbullies Across Twenty-Five European Countries." Journal Of
Children & Media 7.1 (2013): 9-27. Communication & Mass Media Complete. Web. 25 Apr.
2014.
Hatter, Kathryn. "Parental Abuse Linked to Bullying." Everyday Life. Globalpost, n.d. Web. 27 Apr. 2014.
Work Cited
Lindsay, Megan, and Judy Krysik. "Online Harassment Among College Students."
Information, Communication & Society 15.5 (2012): 703-719. Communication &
Mass Media Complete. Web. 29 Apr. 2014.
Vandebosch, Heidi, and Katrien Van Cleemput. "Cyberbullies among Youngsters: Profiles of
Bullies and Victims." Sage Journals. N.p., n.d. Web. 20 Apr. 2014.
Verial, Damon. "Parental Influence & Bullying." Everyday Life. Demand Media, n.d. Web.
27 Apr. 2014.
"UMHS News Release." UMHS News Release. University of Michigan Health System, 7 Jan.
2002. Web. 27 Apr. 2014.
Erdur-Baker, Özgür. "Cyberbullying And Its Correlation To Traditional Bullying, Gender
And Frequent And Risky Usage Of Internet-Mediated Communication Tools."
New Media & Society 12.1 (2010): 109-125. Communication & Mass Media
Complete. Web. 29 Apr. 2014.

More Related Content

What's hot

Psy492 M7 As2 L Manila
Psy492 M7 As2 L ManilaPsy492 M7 As2 L Manila
Psy492 M7 As2 L Manilalindamanila
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying projectJoannaNieves
 
Cyberbullying- Schools and Parents working together
Cyberbullying- Schools and Parents working togetherCyberbullying- Schools and Parents working together
Cyberbullying- Schools and Parents working togetherSilvia Rosenthal Tolisano
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymousccastronovo
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 
Bullying presentation pps 6022
Bullying presentation pps 6022Bullying presentation pps 6022
Bullying presentation pps 6022JannyFernandez
 
RENTOY Presentations Seminars 1 and 2
RENTOY Presentations Seminars 1 and 2RENTOY Presentations Seminars 1 and 2
RENTOY Presentations Seminars 1 and 2Mann Rentoy
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 
Bullying, Adolescent, Social Patterns And Problems
Bullying, Adolescent, Social Patterns And ProblemsBullying, Adolescent, Social Patterns And Problems
Bullying, Adolescent, Social Patterns And Problemsbrooke88
 
Parenting for Character
Parenting for CharacterParenting for Character
Parenting for CharacterMann Rentoy
 

What's hot (19)

Technology and vulnerable users tink palmer (1)
Technology and vulnerable users   tink palmer (1)Technology and vulnerable users   tink palmer (1)
Technology and vulnerable users tink palmer (1)
 
Psy492 M7 As2 L Manila
Psy492 M7 As2 L ManilaPsy492 M7 As2 L Manila
Psy492 M7 As2 L Manila
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying project
 
Cyberbullying- Schools and Parents working together
Cyberbullying- Schools and Parents working togetherCyberbullying- Schools and Parents working together
Cyberbullying- Schools and Parents working together
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymous
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
Tink palmer
Tink palmerTink palmer
Tink palmer
 
Bullying presentation pps 6022
Bullying presentation pps 6022Bullying presentation pps 6022
Bullying presentation pps 6022
 
RENTOY Presentations Seminars 1 and 2
RENTOY Presentations Seminars 1 and 2RENTOY Presentations Seminars 1 and 2
RENTOY Presentations Seminars 1 and 2
 
Social Media & Teens
Social Media & TeensSocial Media & Teens
Social Media & Teens
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
G & D Ch. 16
G & D Ch. 16G & D Ch. 16
G & D Ch. 16
 
Erikson and bronfenbrenner
Erikson and bronfenbrennerErikson and bronfenbrenner
Erikson and bronfenbrenner
 
Kiane Mari Romero
Kiane Mari RomeroKiane Mari Romero
Kiane Mari Romero
 
Bullying, Adolescent, Social Patterns And Problems
Bullying, Adolescent, Social Patterns And ProblemsBullying, Adolescent, Social Patterns And Problems
Bullying, Adolescent, Social Patterns And Problems
 
Parenting for Character
Parenting for CharacterParenting for Character
Parenting for Character
 

Viewers also liked

Linworth road church
Linworth road churchLinworth road church
Linworth road churchDale Weaver
 
Naturalizirana epistemologija
Naturalizirana epistemologijaNaturalizirana epistemologija
Naturalizirana epistemologijaIva Arnaut
 
Instagram in the social sphere
Instagram in the social sphereInstagram in the social sphere
Instagram in the social spheregregalingig
 
Visual Analysis of Massive Web Session Data
Visual Analysis of Massive Web Session DataVisual Analysis of Massive Web Session Data
Visual Analysis of Massive Web Session Databigdataviz_bay
 
Donetsk - Borderland to the USSR
Donetsk - Borderland to the USSRDonetsk - Borderland to the USSR
Donetsk - Borderland to the USSREdward Kosheluk
 
PostNords Förpackningsguide
PostNords FörpackningsguidePostNords Förpackningsguide
PostNords FörpackningsguidePontus Brohult
 
Ukraine's New President: Europe Is Our Greater Homeland
Ukraine's New President: Europe Is Our Greater HomelandUkraine's New President: Europe Is Our Greater Homeland
Ukraine's New President: Europe Is Our Greater HomelandEdward Kosheluk
 
Extracting Intelligence from Big Data
Extracting Intelligence from Big DataExtracting Intelligence from Big Data
Extracting Intelligence from Big Databigdataviz_bay
 
Big Data Visualization Problem in IT Management
Big Data Visualization Problem in IT ManagementBig Data Visualization Problem in IT Management
Big Data Visualization Problem in IT Managementbigdataviz_bay
 
The Eastern Front: Russian occupation of Eastern Ukraine.
The Eastern Front: Russian occupation of Eastern Ukraine.The Eastern Front: Russian occupation of Eastern Ukraine.
The Eastern Front: Russian occupation of Eastern Ukraine.Edward Kosheluk
 
Interactive Latency in Big Data Visualization
Interactive Latency in Big Data VisualizationInteractive Latency in Big Data Visualization
Interactive Latency in Big Data Visualizationbigdataviz_bay
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualizationbigdataviz_bay
 
Big data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at KitwareBig data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at Kitwarebigdataviz_bay
 
engineering economy solution manual sullivan 15th ed
engineering economy solution manual sullivan 15th edengineering economy solution manual sullivan 15th ed
engineering economy solution manual sullivan 15th edDiego Fung
 
Theory and Design for Mechanical Measurements solutions manual Figliola 4th ed
Theory and Design for Mechanical Measurements solutions manual Figliola 4th edTheory and Design for Mechanical Measurements solutions manual Figliola 4th ed
Theory and Design for Mechanical Measurements solutions manual Figliola 4th edDiego Fung
 

Viewers also liked (18)

Linworth road church
Linworth road churchLinworth road church
Linworth road church
 
Jimenez ruiz 4
Jimenez ruiz 4Jimenez ruiz 4
Jimenez ruiz 4
 
Naturalizirana epistemologija
Naturalizirana epistemologijaNaturalizirana epistemologija
Naturalizirana epistemologija
 
Instagram in the social sphere
Instagram in the social sphereInstagram in the social sphere
Instagram in the social sphere
 
Visual Analysis of Massive Web Session Data
Visual Analysis of Massive Web Session DataVisual Analysis of Massive Web Session Data
Visual Analysis of Massive Web Session Data
 
Donetsk - Borderland to the USSR
Donetsk - Borderland to the USSRDonetsk - Borderland to the USSR
Donetsk - Borderland to the USSR
 
PostNords Förpackningsguide
PostNords FörpackningsguidePostNords Förpackningsguide
PostNords Förpackningsguide
 
Ukraine's New President: Europe Is Our Greater Homeland
Ukraine's New President: Europe Is Our Greater HomelandUkraine's New President: Europe Is Our Greater Homeland
Ukraine's New President: Europe Is Our Greater Homeland
 
Extracting Intelligence from Big Data
Extracting Intelligence from Big DataExtracting Intelligence from Big Data
Extracting Intelligence from Big Data
 
Part 2 comm
Part 2 comm Part 2 comm
Part 2 comm
 
Big Data Visualization Problem in IT Management
Big Data Visualization Problem in IT ManagementBig Data Visualization Problem in IT Management
Big Data Visualization Problem in IT Management
 
The Eastern Front: Russian occupation of Eastern Ukraine.
The Eastern Front: Russian occupation of Eastern Ukraine.The Eastern Front: Russian occupation of Eastern Ukraine.
The Eastern Front: Russian occupation of Eastern Ukraine.
 
Interactive Latency in Big Data Visualization
Interactive Latency in Big Data VisualizationInteractive Latency in Big Data Visualization
Interactive Latency in Big Data Visualization
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
CTO ENARM - NEUMO
CTO ENARM - NEUMOCTO ENARM - NEUMO
CTO ENARM - NEUMO
 
Big data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at KitwareBig data visualization frameworks and applications at Kitware
Big data visualization frameworks and applications at Kitware
 
engineering economy solution manual sullivan 15th ed
engineering economy solution manual sullivan 15th edengineering economy solution manual sullivan 15th ed
engineering economy solution manual sullivan 15th ed
 
Theory and Design for Mechanical Measurements solutions manual Figliola 4th ed
Theory and Design for Mechanical Measurements solutions manual Figliola 4th edTheory and Design for Mechanical Measurements solutions manual Figliola 4th ed
Theory and Design for Mechanical Measurements solutions manual Figliola 4th ed
 

Similar to Part 2 comm

1Parental and Peer InfluenceCornelia SmithProfesso
1Parental and Peer InfluenceCornelia SmithProfesso1Parental and Peer InfluenceCornelia SmithProfesso
1Parental and Peer InfluenceCornelia SmithProfessoTatianaMajor22
 
Effects of lack of after school programs for children 2Effec.docx
Effects of lack of after school programs for children 2Effec.docxEffects of lack of after school programs for children 2Effec.docx
Effects of lack of after school programs for children 2Effec.docxjack60216
 
Cyberbullying 2.4
Cyberbullying 2.4Cyberbullying 2.4
Cyberbullying 2.4boslek
 
Indsicipline among the youth, ways to curb it effect and causes.
Indsicipline among the youth, ways to curb it effect and causes.Indsicipline among the youth, ways to curb it effect and causes.
Indsicipline among the youth, ways to curb it effect and causes.Emmanuel Hanson
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
Nspcc - Domestic Abuse
Nspcc - Domestic AbuseNspcc - Domestic Abuse
Nspcc - Domestic AbuseTom Rahilly
 
13Parenting_Styles_and_Family_Structure.ppt
13Parenting_Styles_and_Family_Structure.ppt13Parenting_Styles_and_Family_Structure.ppt
13Parenting_Styles_and_Family_Structure.pptWmuia
 
Group Project: Peers
Group Project: PeersGroup Project: Peers
Group Project: PeersNia Stovall
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingBarry Caplin
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
The Effects of the Internet on Students.pdf
The Effects of the Internet on Students.pdfThe Effects of the Internet on Students.pdf
The Effects of the Internet on Students.pdfAhmadTariq64
 
Peer Relationships.ppt
Peer Relationships.pptPeer Relationships.ppt
Peer Relationships.pptLarry195181
 
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...
The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...Theresa Lowry-Lehnen
 

Similar to Part 2 comm (20)

Don't be invisible
Don't be invisibleDon't be invisible
Don't be invisible
 
1Parental and Peer InfluenceCornelia SmithProfesso
1Parental and Peer InfluenceCornelia SmithProfesso1Parental and Peer InfluenceCornelia SmithProfesso
1Parental and Peer InfluenceCornelia SmithProfesso
 
Essay On Parents
Essay On ParentsEssay On Parents
Essay On Parents
 
Effects of lack of after school programs for children 2Effec.docx
Effects of lack of after school programs for children 2Effec.docxEffects of lack of after school programs for children 2Effec.docx
Effects of lack of after school programs for children 2Effec.docx
 
early childhood (2)
early childhood (2)early childhood (2)
early childhood (2)
 
essay done.pdf
essay done.pdfessay done.pdf
essay done.pdf
 
English
EnglishEnglish
English
 
Cyberbullying 2.4
Cyberbullying 2.4Cyberbullying 2.4
Cyberbullying 2.4
 
Indsicipline among the youth, ways to curb it effect and causes.
Indsicipline among the youth, ways to curb it effect and causes.Indsicipline among the youth, ways to curb it effect and causes.
Indsicipline among the youth, ways to curb it effect and causes.
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Nspcc - Domestic Abuse
Nspcc - Domestic AbuseNspcc - Domestic Abuse
Nspcc - Domestic Abuse
 
13Parenting_Styles_and_Family_Structure.ppt
13Parenting_Styles_and_Family_Structure.ppt13Parenting_Styles_and_Family_Structure.ppt
13Parenting_Styles_and_Family_Structure.ppt
 
Group Project: Peers
Group Project: PeersGroup Project: Peers
Group Project: Peers
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
The Effects of the Internet on Students.pdf
The Effects of the Internet on Students.pdfThe Effects of the Internet on Students.pdf
The Effects of the Internet on Students.pdf
 
Peer Relationships.ppt
Peer Relationships.pptPeer Relationships.ppt
Peer Relationships.ppt
 
Bullying In School Essay
Bullying In School EssayBullying In School Essay
Bullying In School Essay
 
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...
The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...The Psychology of Bullying.  Statistics & Societal Response Ireland. By There...
The Psychology of Bullying. Statistics & Societal Response Ireland. By There...
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Part 2 comm

  • 1. L U I S A M I L A N O C O M M U N I C A T I O N & T E C H N O L O G Y P R O F E S S O R Y A N G A P R I L 2 9 , 2 0 1 4 Cyber bullies Background and Home life
  • 2. Topic of Project I have chosen to focus on the background and home life of a cyber bully. Specifically, what drives an individual to participate in bullying over the Internet. In my research on this topic, I found that parental influence and overall self-esteem plays a large role in whether or not a child will participate in cyber bullying. These are the main factors that I have seen throughout my research and have focused on them the most.
  • 3. What is cyber bullying? Cyber bullying is the action of harassing or intimidating another over the Internet using media technology such as cell phones, instant messaging, email, chat rooms, or social networking sites such as, Facebook or Twitter.  Cyber bullying is all about feeling power and gaining a sense of control  Children may be seeking this power because they lack it else where, such as, in the home, or with parents
  • 4. Influences that can Cause Cyber bullying  Poor home life  Lack of parental control  Poor role models  Lack of warmth and comfort from parent figures  Poor parenting styles  Over-demanding and under-demanding parenting styles  Traumatic childhood experiences
  • 5. Parental Influence When researching this topic I found that parental influence is a big part of how a child becomes active in cyber bullying.  Parenting styles often lead children to find pleasure or satisfaction in mistreating others, in many cases, children become bullies to gain a sense of power  When parents are over-demanding and give their child no say in what happens in the household, children feel restricted and lose their sense of autonomy. They can then regain this sense of autonomy by dominating their peers.  Children look at their parents as role models and therefore are likely to imitate what their parents do  If a child has grown up in a home with poor child rearing and bad influences, they are likely to carry this sort of behavior over into their school life and other aspects of life
  • 6. Parental Influence  Parenting styles that emphasize demands over parent-to-child affection can indirectly encourage bullying behavior  Without parental emotional rewards to guide a child’s behavior, the child will seek external rewards  The feeling at demanding respect through cyber bullying can artificially substitute parental warmth
  • 7. Home Life Influence  How children grow up at home plays a huge role in determining how one becomes a cyber bully  Children who have the need to gain control over their peers often are acting out a need that is unfulfilled at home  In children who gain little attention in the home, even negative attention from adult figures, such as teachers can be rewarding  Kids that may be suffering from abuse or from not having their needs met at school or at home are prone to cyber bullying  Often children who are dealing with difficult situations at home, such as divorce can be another factor for children to participate in cyber bullying  Between 2-16% of the population under 18 cyber bullies others
  • 8. Home Life Influence  Homes that are lacking effective and positive parental supervision may create an environment that produces children with bullying-like tendencies  Homes where alcohol abuse exists causes an elevated risk of bullying behaviors in children  A lack of consistent consequences and parenting within the household can also lead children to exhibit bullying behaviors  Sometimes parental encouragement can be taken the wrong way by a child and they think it is okay to use hurtful words to others to stick up for themselves over the Internet
  • 9. Over-demanding Parenting Styles  Parents who use an overbearing parenting style restrict their child’s autonomy and feeling of control over their situation  A child who feels limited at home may use this frustration out on others by cyber bullying and gaining a sense of power  Parents using overly controlling parenting styles can reduce the possibility of bullying by giving more respect to their children in rule-setting
  • 10. Under-demanding Parenting Styles  Parents who put little constrain on their children  Lack of limiting settings can result in a child not understanding or respecting others’ autonomy  A child from an undemanding family might not know what social limits are and can cross the line  Lack of attention received in the family situation causes a child to act inappropriately in other settings, such as cyberspace, as a cry for help  A child gains negative attention from others, but still it is still better than no attention at all to that child
  • 11. Lack of Warmth  Children failing to gain positive support when they’ve performed well or behaved well  Without parental emotional rewards to guide a child’s behavior, the child will seek external rewards  Children may find rewards by cyber bullying, to gain power and peer respect  Participating in cyber bullying can substitute parental warmth
  • 12. Conclusion  Parenting styles play a large role in how a child becomes a cyber bully  Poor parenting can lead to cyber bullying to gain power and to feel better about their own situation  If parents are mean and do not show sympathy for their children, their children will think this is a proper way of treating others as well  Children look up to their parents as role models, if the parents have poor parenting styles then the child will pick up poor habits from them
  • 13. Conclusion  Home life also has a huge influence on a child’s behavior  If a child lacks attention or the help they need they may feel that bullying over the Internet is a outlet for them to obtain this feeling of power or sense of autonomy that is taken away inside the household  A poor home life can consist of alcoholic and abusive parents, which can lead a child to have the wrong impression on how to treat others properly
  • 14. Work Cited Barnes, S.B. (2003). Computer-mediated communication: Human-to-human communication across the internet (pp. 256-264). Boston, MA: Allyn and Bacon. Erdur-Baker, Özgür. "Cyberbullying And Its Correlation To Traditional Bullying, Gender And Frequent And Risky Usage Of Internet-Mediated Communication Tools.”New Media & Society 12.1 (2010): 109-125. Communication & Mass Media Complete. Web. 29 Apr. 2014. Farrell, Laura C. "The Role Of Cyber And Face-To-Face Verbal Bullying On Adolescent Victims." Journal Of The Communication, Speech & Theatre Association Of North Dakota 25.(2012): 25-36. Communication & Mass Media Complete. Web. 29 Apr. 2014. Festl, Ruth, and Thorsten Quandt. "Social Relations And Cyberbullying: The Influence Of Individual And Structural Attributes On Victimization And Perpetration Via The Internet." Human Communication Research 39.1 (2013): 101-126. Communication & Mass Media Complete. Web. 25 Apr. 2014. Görzig, Anke, and Kjartan Ólafsson. "What Makes A Bully A Cyberbully? Unraveling The Characteristics Of Cyberbullies Across Twenty-Five European Countries." Journal Of Children & Media 7.1 (2013): 9-27. Communication & Mass Media Complete. Web. 25 Apr. 2014. Hatter, Kathryn. "Parental Abuse Linked to Bullying." Everyday Life. Globalpost, n.d. Web. 27 Apr. 2014.
  • 15. Work Cited Lindsay, Megan, and Judy Krysik. "Online Harassment Among College Students." Information, Communication & Society 15.5 (2012): 703-719. Communication & Mass Media Complete. Web. 29 Apr. 2014. Vandebosch, Heidi, and Katrien Van Cleemput. "Cyberbullies among Youngsters: Profiles of Bullies and Victims." Sage Journals. N.p., n.d. Web. 20 Apr. 2014. Verial, Damon. "Parental Influence & Bullying." Everyday Life. Demand Media, n.d. Web. 27 Apr. 2014. "UMHS News Release." UMHS News Release. University of Michigan Health System, 7 Jan. 2002. Web. 27 Apr. 2014. Erdur-Baker, Özgür. "Cyberbullying And Its Correlation To Traditional Bullying, Gender And Frequent And Risky Usage Of Internet-Mediated Communication Tools." New Media & Society 12.1 (2010): 109-125. Communication & Mass Media Complete. Web. 29 Apr. 2014.