SlideShare a Scribd company logo
Lars Soderberg
Communication & Technology 250
Research Question
How prevelent is cyber bullying among
teenagers?
What is Cyber Bullying?
• “Willful and repeated harm inflicted through
the use of computers, cell phones, and other
electronic devices.” (Schrock & Boyd, 2011, p.
374)
• Stereotypical widespread problem
• Anonymity
– Private Messages, use of social media, doesn’t
have to be done at school (Farrell, 2012, p.26)
Power of Cyber Bullying
• Growth of the internet
• Permanent posts
• Deadly effects
– Depression, suicide, etc. (Cloud, 2010)
• Fast publicity of message (Ringrose, 2011, p.
133)
• Anonymity
– Mystery regarding the root of the message  lack
of control (Ringrose, 2011, p. 132)
Cyber Bullying Outlets
• Social Media
– Facebook, Twitter, MySpace, etc.
• Email
• Blogs / Websites (Vandebosch & Van
Cleemput, 2009, p. 1)
• Text Messaging
• Instant Messaging
– AIM, iMessage, etc.
“The youngsters who perpetrate acts of cyber
bullying have, in many cases, also experienced
cyber bullying as victims or bystanders and vice
versa.” (Vandebosch & Van Cleemput, 2009,
p.22)
Causes of Cyber Bullying
• The internet is a very liberating platform
• Easier establishment of social relationships
• Anonymity
– The identity of the bully is often secret (Erdur-
Baker, 2012, p. 111)
– Provides adoption of “a more aggressive persona”.
(Erdur-Baker, 2012, p. 110)
Causes continued…
• Easy access to technology (Farrell, 2012, p.26)
• Increased time spent online spent by
teenagers
– Age of identity exploration (Megan, 2012, p. 703)
Types of Cyber Bullying
• Direct involvement of the victim
– Viruses, internet / mobile bullying, social exclusion
(Vandebosch & Van Cleemput, 2009, p. 5)
• Initial lack of involvement by the victim
– Online anonymity, internet / mobile bullying
(Vandebosch & Van Cleemput, 2009, p. 5)
A Cyber Bully’s Effectiveness
• Hyperpersonal communication
– The ambiguity of messages online may cause
under/over dramatization of messages (Farrell,
2012, p.28)
• Channel expansion theory
– The level of knowledge in regards to a channel,
message topic, context, and source will determine
the level of effectiveness (Farrell, 2012, p.28)
Exposure to Cyber Bullying
• 72% of 18-29 year olds use social networking
cites (Megan, 2012, p. 703)
• 15.8% of young adults in a study (596 people
ages 14-22) reported cyber-bullying compared
to 12.3% of adolescents (Megan, 2012, p. 705)
• In the study, 15.6% of harassing messages
came from someone unknown to the victim
(Megan, 2012, p. 712)
Exposure continued…
• School survey (177 7th graders)
– 14.5% reported to being cyber bullies
– 24.9% reported to being victims of cyber bullying
• Online study (500 teenagers aged 11-15)
(Vandebosch & Van Cleemput, 2009, p. 7)
– 32% sent anonymous harassing emails
– 29% sent harassing messages
Kristensen and Smith Study
• (Vandebosch & Van Cleemput, 2009, p. 16-18)
– 44.8% knew their bully offline
– Half didn’t know their bully
– 14.1% were bullied by someone they only knew
online
– Experienced one form of offensive behavior orver
the internet / phone over the last 3 motnhs
• 61.9% reported to being victims
• 52.5% reported to being perpetrators
• 76.3% reported to being bystanders
Exposure Results
• Cyber bullying is different from case to case
• Traditional bullies and victimization online
(Vandebosch & Van Cleemput, 2009, p. 11)
• Lack of responsibility by student body
Cyber Bully Profile
• Cyber Bullies
– High self image
– Social competence
– High relationship
between traditional
and online bully
– Lack of surveillance by
parents
Victim Profile
• Victims
– Girls were more likely to be the victim
(Ringrose, 2011, 122)
– Higher relationship between a strictly online
relationship with their bully
– Tend to be victims of traditional bullying as
well
– High internet dependency
– Not socially competent
Ybarra Study
• (Vandebosch & Van Cleemput, 2009, p. 10)
– Males who reported as being depressed were
eight times more likely to report being a victim
“Ybarra identified both the amount of internet use
and the use of messenger programs as most
important predictors for the experience with cyber
bullying as a victim among females.” (Vandebosch &
Van Cleemput, 2009, p. 10)
Li Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 1/3 of “youngsters” bullied in school were also
cyber bullies
– 1/3 of “youngsters” reported their bullying in
school to backfire online and result in
victimization
– Majority of victims were females (p. 10)
– Strong correlation between cyber bullies and
cyber bully victims
Patchin & Hinduja Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 42.5% of cyber bully victims were frustrated
– 40% of victims were angry
– 17% felt sad
Conclusion
• Cyber bullying is evident among teenagers
– Amount of internet use
• Different devices are used
• Age is a factor
• Its’ presence varies on a case to case basis
• More research is needed

More Related Content

What's hot

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingkntrainer
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingSuphaphonP
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620mccready95
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Bullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityBullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityQuest Coaching
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 

What's hot (19)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-IntegrityBullying, Cyber-bullying & Cyber-Integrity
Bullying, Cyber-bullying & Cyber-Integrity
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Similar to Cyber Bullying

Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2larsselect
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationWendinda
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 

Similar to Cyber Bullying (20)

Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Week 5
Week 5Week 5
Week 5
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 

Recently uploaded

NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxRaedMohamed3
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 

Recently uploaded (20)

NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 

Cyber Bullying

  • 2. Research Question How prevelent is cyber bullying among teenagers?
  • 3. What is Cyber Bullying? • “Willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.” (Schrock & Boyd, 2011, p. 374) • Stereotypical widespread problem • Anonymity – Private Messages, use of social media, doesn’t have to be done at school (Farrell, 2012, p.26)
  • 4.
  • 5. Power of Cyber Bullying • Growth of the internet • Permanent posts • Deadly effects – Depression, suicide, etc. (Cloud, 2010) • Fast publicity of message (Ringrose, 2011, p. 133) • Anonymity – Mystery regarding the root of the message  lack of control (Ringrose, 2011, p. 132)
  • 6. Cyber Bullying Outlets • Social Media – Facebook, Twitter, MySpace, etc. • Email • Blogs / Websites (Vandebosch & Van Cleemput, 2009, p. 1) • Text Messaging • Instant Messaging – AIM, iMessage, etc.
  • 7. “The youngsters who perpetrate acts of cyber bullying have, in many cases, also experienced cyber bullying as victims or bystanders and vice versa.” (Vandebosch & Van Cleemput, 2009, p.22)
  • 8. Causes of Cyber Bullying • The internet is a very liberating platform • Easier establishment of social relationships • Anonymity – The identity of the bully is often secret (Erdur- Baker, 2012, p. 111) – Provides adoption of “a more aggressive persona”. (Erdur-Baker, 2012, p. 110)
  • 9. Causes continued… • Easy access to technology (Farrell, 2012, p.26) • Increased time spent online spent by teenagers – Age of identity exploration (Megan, 2012, p. 703)
  • 10. Types of Cyber Bullying • Direct involvement of the victim – Viruses, internet / mobile bullying, social exclusion (Vandebosch & Van Cleemput, 2009, p. 5) • Initial lack of involvement by the victim – Online anonymity, internet / mobile bullying (Vandebosch & Van Cleemput, 2009, p. 5)
  • 11. A Cyber Bully’s Effectiveness • Hyperpersonal communication – The ambiguity of messages online may cause under/over dramatization of messages (Farrell, 2012, p.28) • Channel expansion theory – The level of knowledge in regards to a channel, message topic, context, and source will determine the level of effectiveness (Farrell, 2012, p.28)
  • 12. Exposure to Cyber Bullying • 72% of 18-29 year olds use social networking cites (Megan, 2012, p. 703) • 15.8% of young adults in a study (596 people ages 14-22) reported cyber-bullying compared to 12.3% of adolescents (Megan, 2012, p. 705) • In the study, 15.6% of harassing messages came from someone unknown to the victim (Megan, 2012, p. 712)
  • 13. Exposure continued… • School survey (177 7th graders) – 14.5% reported to being cyber bullies – 24.9% reported to being victims of cyber bullying • Online study (500 teenagers aged 11-15) (Vandebosch & Van Cleemput, 2009, p. 7) – 32% sent anonymous harassing emails – 29% sent harassing messages
  • 14. Kristensen and Smith Study • (Vandebosch & Van Cleemput, 2009, p. 16-18) – 44.8% knew their bully offline – Half didn’t know their bully – 14.1% were bullied by someone they only knew online – Experienced one form of offensive behavior orver the internet / phone over the last 3 motnhs • 61.9% reported to being victims • 52.5% reported to being perpetrators • 76.3% reported to being bystanders
  • 15. Exposure Results • Cyber bullying is different from case to case • Traditional bullies and victimization online (Vandebosch & Van Cleemput, 2009, p. 11) • Lack of responsibility by student body
  • 16. Cyber Bully Profile • Cyber Bullies – High self image – Social competence – High relationship between traditional and online bully – Lack of surveillance by parents
  • 17. Victim Profile • Victims – Girls were more likely to be the victim (Ringrose, 2011, 122) – Higher relationship between a strictly online relationship with their bully – Tend to be victims of traditional bullying as well – High internet dependency – Not socially competent
  • 18. Ybarra Study • (Vandebosch & Van Cleemput, 2009, p. 10) – Males who reported as being depressed were eight times more likely to report being a victim “Ybarra identified both the amount of internet use and the use of messenger programs as most important predictors for the experience with cyber bullying as a victim among females.” (Vandebosch & Van Cleemput, 2009, p. 10)
  • 19. Li Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 1/3 of “youngsters” bullied in school were also cyber bullies – 1/3 of “youngsters” reported their bullying in school to backfire online and result in victimization – Majority of victims were females (p. 10) – Strong correlation between cyber bullies and cyber bully victims
  • 20. Patchin & Hinduja Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 42.5% of cyber bully victims were frustrated – 40% of victims were angry – 17% felt sad
  • 21. Conclusion • Cyber bullying is evident among teenagers – Amount of internet use • Different devices are used • Age is a factor • Its’ presence varies on a case to case basis • More research is needed