SlideShare a Scribd company logo
Cyberbullying

                                   1

 Cyberbullying by Marian Merritt
What is Cyberbullying?
                                                         An
     willful and
                                              aggressive, intentiona
 repeated harm
      inflicted                                act carried out by a
                                                      group or
    through the
                                                 individual, using
       use of
                                                electronic forms of
 computers, cel
                                               contact, repeatedly
  l phones, and
                                              and over time agains
        other
                                               a victim who cannot
     electronic
     devices.1                                 easily defend him or
                                                      herself.


   1.   Hinduja & Patchin 2010
   2.   Smith, Mahdavi, Carvalho et al 2008
            Cyberbullying by Marian Merritt                    2
Cyberbullying – Two phases
• 1990’s “flaming” and “trolling”; AIM, rapid
  internet adoption
    – Term “cyberbullying” first appears in print, 1998
• 2000’s – Web 2.0 and social media like
  MySpace, Facebook, Twitter
    – SMS becomes popular
    – Rapid growth of mobile tech esp. smartphones




Cyberbullying by Marian Merritt                           3
How Common is Cyberbullying?
• National Crime Victim Survey (2010) – 6% cyberbullying victims
  vs. 28% school bullying victims
• Review of research to get an average:
    – 24% of kids are cyberbullying victim
    – 17% admit to being the bully
• 50% of both victims and bullies experience offline bullying
• Offline bullies more than twice as likely to be both target and
  perp of online bullying
• Victims of offline bullying are 2.7 times more likely to be
  cyberbullying victim



Cyberbullying by Marian Merritt                                     4
How Common is Cyberbullying?
• National Crime Victim Survey (2010) – 6% cyberbullying victims
  vs. 28% school bullying victims
• Review of research to get an average:
    – 24% of kids are cyberbullying victim
    – 17% admit to being the bully
• 50% of both victims and bullies experience offline bullying
• Offline bullies more than twice as likely to be both target and
  perp of online bullying
• Victims of offline bullying are 2.7 times more likely to be
  cyberbullying victim



Cyberbullying by Marian Merritt                                     5
Offline Bullying and Online Bullying Closely
Connected
• National Crime Victim Survey (2010) – 6% cyberbullying victims
  vs. 28% school bullying victims
• Review of research to get an average:
    – 24% of kids are cyberbullying victim
    – 17% admit to being the bully
• 50% of both victims and bullies experience offline bullying
• Offline bullies more than twice as likely to be both target and
  perp of online bullying
• Victims of offline bullying are 2.7 times more likely to be
  cyberbullying victim



Cyberbullying by Marian Merritt                                     6
Being Both Target and Bully are Common
• National Crime Victim Survey (2010) – 6% cyberbullying victims
  vs. 28% school bullying victims
• Review of research to get an average:
    – 24% of kids are cyberbullying victim
    – 17% admit to being the bully
• 50% of both victims and bullies experience offline bullying
• Offline bullies more than twice as likely to be both target and
  perp of online bullying
• Victims of offline bullying are 2.7 times more likely to be
  cyberbullying victim



Cyberbullying by Marian Merritt                                     7
Cyberbullying and Bullying Roles
• Bully – can be popular, high status, others are not; may come from
  families with conflict, life changes, little supervision, low self-esteem
    – Bullies hang out with other bullies
    – If bullying seem as norm, more become bullies
• Target/Victim – may also be poorly adjusted to school
• Bully/Victim – especially relational bullying (gossip, exclusion)
    – Easily and negatively influenced by peers
    – Hostility, aggression – may be more at risk than other groups
    – Social anxiety issues
• Bystander (both active and inactive) –
    – 90% ignore cyberbullying in social networks
    – Those who defend victim – high social status, positive social expectations,
      have more empathy
• Non-involved

Cyberbullying by Marian Merritt                                                     8
Vulnerable times and peak activities
• Cyberbullying peaks between ages 11 and 15
    – 9th grade is often the most active year
    •Cyberbullying peaks ages 11 - 15
• Changes in school due to the most active year
        •9th grade is often grade promotion
  – •Changes in school:to junior high; junior high to high school
     Moving from elementary
  – Kids•Elementary pecking order”
         “rearrange the to junior high; junior high to high
        school
• Changes due to a move to a new city or country
        •Kids “rearrange the pecking order”
  – New kid has to establish who they are; find friends
    •Changes due to a move
• Other events
    •Other events
  – Someone “dates” the wrongthe wrong person; or
        •Someone “dates” person; or breaks up
        breaks up
  – Jealousy due to accomplishments like sports, theater, grades
        •Jealousy due to accomplishments like
        sports, theater, academics
Cyberbullying by Marian Merritt                                     9
Forms of cyberbullying
• Mean messages in email, SMS, social networks
• Fake SNS profiles
• Forwarded images or messages
• Hacked SNS or email accounts
• Pretending to be someone else in a
  completely online romantic situation
    – “Catfishing”, Manti Te’o (at right)
    – Megan Meier
• Cyberbullying can start as traditional
  bullying, then continue online and vice versa
• Often referred to as “drama”, not
  cyberbullying


Cyberbullying by Marian Merritt                   10
Who is vulnerable to cyberbullying?

                   •LGBTQ
                   •Minorities, disabled, gifted, eve
                   n socio-economic differences
             YOU, YOUR FRIENDS time online
                   •Spending lots of AND

             CYBERBULLYING.
                   and sharing personal info
                   •Simply being “different “ can
                   make a child a target




 Cyberbullying by Marian Merritt                        11
Cyberbullying Can Lead to
Depression, Suicide
    – Note: suicide is a complex issue, rarely is cyberbullying the only cause

                           Ryan Halligan – 2003. Was tormented for being “gay”
                           despite only being 13 years old.

                           Megan Meier – 2006. A neighbor (adult) created a fake
                           profile of a cute boy to start an online friendship.



                           Tyler Clementi – 2010. His college roommate set up a spy
                           cam to record his date with a man.

                           Amanda Todd – 2012. Someone tried to blackmail her
                           with a partially nude photo she sent. Then the images
                           went viral.

Cyberbullying by Marian Merritt                                                       12
Latest Cyberbullying and Suicide Issue –
Slut Shaming

• Steubenville Ohio - assaulted and video and
  images went viral, Twitter messages of sexual
  abuse of unconscious girl. Girl prevailed in
  court (didn’t self-harm)
• Nova Scotia, Canada – Rehtaeh Parsons,
  assaulted and images were shared; she was
  cyberbullied and committed suicide when
  police wouldn’t pursue the case.
• Los Gatos, California – Audrie Pott, assaulted
  and images were shared. She was
  cyberbullied and committed suicide. Police
  now taking on case.

Cyberbullying by Marian Merritt                    13
Cyberbullying – Adult Bad Behavior
• University, workplace bullying and cyberbullying
• Political insults instead of debate
• Reporters hacking celebrity phones and voice mail




                                                      14

Cyberbullying by Marian Merritt
What happens to bullies and victims?
• Bullies:
    – Suicidal thoughts (usually just ideation, no action)
    – Involvement can lead to aggression in school (verbal and physical)
    – Can become involved in criminal activity as adults


• Victims:
    – Lower self esteem
    – Suicidal thoughts, especially for girls
    – School problems
    – Involvement can lead to aggression in school (verbal and physical)




Cyberbullying by Marian Merritt                                            15
Responding to Cyberbullying
• Don’t teach “don’t tattle”
    – Most commonly taught to boys, children of color, special ed students
    – Adopt “authoritative parenting” style
• Not common for teens to report, but it is increasing
    – Unless violence is involved
    – Schools must implement policy, provide safe reporting
    – Perception of teacher support can increase reporting
    – Students who report bullying are less likely to be bullied again
• Efforts to change school social norms show promise in reducing
  bullying
• Adults can be trained, parents need to consider bullying of
  concern
Cyberbullying by Marian Merritt                                              16
Responses
• Promote kindness online
• Limit your time online and don’t “overshare”
• If you are attacked, don’t respond:
    – Report it to the website, if against policy
    – Save a copy in case the issue continues
    – If threatened, contact law enforcement
• Feeling overwhelmed or attacked?
    – Avoid the website or environment
    – Get offline, go outside, change scenery




Cyberbullying by Marian Merritt                     17
Help! I’ve Been Cyberbullied. What do I do?
• Don’t respond – step away from computer, mobile phone, etc.
    – Each incident in one environment can move to another environment,
      including face to face bullying
• Who can you report it to?
    – Does your school have a policy? A reporting hotline? A trusted teacher?
    – Can you report abuse to the website or the service?
    – Do your parents understand cyberbullying? Can you talk to them?
    – Is there a non-profit you can call? A trained older teen mentor?
• Keep a copy of everything
    – If violence is threatened, contact police
• Seek counseling if you can

Cyberbullying by Marian Merritt                                                 18
Preparing Children for Bystander Role
• Teach children empathy
    – put yourself in target/victim’s place
• Promote kindness online
• Train school student leaders how to reply
    – Reporting can come from those with social status and high moral compass
• If children witness online hate:
    – Show them how to reach out to the target, how to handle it
    – Don’t engage with the bully or their parents




Cyberbullying by Marian Merritt                                             19
Other Actions
• Whole school approach to educate and train to respond
    – Create reporting system, emphasize intervention in student conflict
    – Students need to feel connected, part of the school and to believe they
      will be treated fairly
    – Offer respect and support to those who speak up
    – Avoid the “one off” cyberbullying assembly approach, seek “SEL” or social
      – emotional learning programs to foster key skills
• Teach empathy
• Parents should seek training from the school
    – Provide counseling to children involved in bullying
• Emphasize the positive side of the internet


Cyberbullying by Marian Merritt                                                 20
Resources
• Research and Websites:
    –   Bullying in a Networked Era – cyberbullying research summary from Harvard
    –   www.cyberbullying.us – website of researchers Hinduja and Patchin
    –   www.Stopbullying.gov – White House website against all bullying
    –   www.Bornthiswayfoundation.org – Lady Gaga’s initiative to empower youth

• Books:
    – Cyberslammed, Stephens and Nair
    – Cyberbullying; Bullying in the Digital Age, Kowalski, Limber and Agatson
    – Cyberbullying and Cyberthreats, Willard

• Training programs:
    – ADL’s Cyber Ally program
    – Steps to Respect
    – Olweus Bullying Prevention Program

Cyberbullying by Marian Merritt                                                     21
Thank you!
    Marian Merritt
    Norton Internet Safety Advocate
    marian@norton.com


    Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
    implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Cyberbullying by Marian Merritt                                                                                                                                                       22

More Related Content

What's hot

Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
Rene Ge
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
CarlosE15
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
griehl
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible Solutions
JericoDiola
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentationmitchell_shannon
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
Khy Amigable
 

What's hot (20)

Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible SolutionsCyberbullyng: Causes, Effects, and Possible Solutions
Cyberbullyng: Causes, Effects, and Possible Solutions
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 

Viewers also liked

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marisol Herrera
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
Josie Fraser
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesisnone
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
josiebrookeday
 
Media bullying presentation
Media bullying presentationMedia bullying presentation
Media bullying presentation
nehanda123
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
Andy Jeter
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
Pew Research Center's Internet & American Life Project
 
Cyberbullying research
Cyberbullying researchCyberbullying research
Cyberbullying researcha2cole13
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Bullying6961
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Dynamic code generation in Perl
Dynamic code generation in PerlDynamic code generation in Perl
Dynamic code generation in Perl
Marian Marinov
 
Cyberbullying, Sexting and Social Networking
Cyberbullying, Sexting and Social NetworkingCyberbullying, Sexting and Social Networking
Cyberbullying, Sexting and Social Networking
arkimmelman
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
srubart
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Responses to classical liberalism
Responses to classical liberalismResponses to classical liberalism
Responses to classical liberalismAshlynRye
 

Viewers also liked (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesis
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Media bullying presentation
Media bullying presentationMedia bullying presentation
Media bullying presentation
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Cyberbullying research
Cyberbullying researchCyberbullying research
Cyberbullying research
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Dynamic code generation in Perl
Dynamic code generation in PerlDynamic code generation in Perl
Dynamic code generation in Perl
 
Cyberbullying, Sexting and Social Networking
Cyberbullying, Sexting and Social NetworkingCyberbullying, Sexting and Social Networking
Cyberbullying, Sexting and Social Networking
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Responses to classical liberalism
Responses to classical liberalismResponses to classical liberalism
Responses to classical liberalism
 

Similar to Cyberbullying by Marian Merritt, Norton Internet Safety Advocate

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
FeliciaDixon5
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
Gail Rebuck
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
kelsietune
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
jessy0121
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
anwidener
 
Vickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingVickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingvictoriapp
 
Digital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageDigital Citizens: It Takes a Village
Digital Citizens: It Takes a Village
Martin Cisneros
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
Marian Merritt
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
 
Cyber Psychology & Cyberbullying
Cyber Psychology & CyberbullyingCyber Psychology & Cyberbullying
Cyber Psychology & Cyberbullying
Warren Blumenfeld
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
Dobby12
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Brian Markle
 
2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying preventioneverettwebmaster
 

Similar to Cyberbullying by Marian Merritt, Norton Internet Safety Advocate (20)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Vickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingVickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullying
 
Digital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageDigital Citizens: It Takes a Village
Digital Citizens: It Takes a Village
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyber Psychology & Cyberbullying
Cyber Psychology & CyberbullyingCyber Psychology & Cyberbullying
Cyber Psychology & Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention
 

More from Marian Merritt

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
Marian Merritt
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
Marian Merritt
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
Marian Merritt
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime reportMarian Merritt
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kids
Marian Merritt
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
School presentation
School presentationSchool presentation
School presentation
Marian Merritt
 

More from Marian Merritt (10)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kids
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
School presentation
School presentationSchool presentation
School presentation
 

Recently uploaded

Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
gobogo3542
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
foismail170
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
LukeRoyak
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
GokulnathMbbs
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
Manu Mitra
 
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
taexnic
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
Dr. Mary Askew
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Dirk Spencer Corporate Recruiter LION
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
AlinaseFaith
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
harikrishnahari6276
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 

Recently uploaded (20)

Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
 
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 

Cyberbullying by Marian Merritt, Norton Internet Safety Advocate

  • 1. Cyberbullying 1 Cyberbullying by Marian Merritt
  • 2. What is Cyberbullying? An willful and aggressive, intentiona repeated harm inflicted act carried out by a group or through the individual, using use of electronic forms of computers, cel contact, repeatedly l phones, and and over time agains other a victim who cannot electronic devices.1 easily defend him or herself. 1. Hinduja & Patchin 2010 2. Smith, Mahdavi, Carvalho et al 2008 Cyberbullying by Marian Merritt 2
  • 3. Cyberbullying – Two phases • 1990’s “flaming” and “trolling”; AIM, rapid internet adoption – Term “cyberbullying” first appears in print, 1998 • 2000’s – Web 2.0 and social media like MySpace, Facebook, Twitter – SMS becomes popular – Rapid growth of mobile tech esp. smartphones Cyberbullying by Marian Merritt 3
  • 4. How Common is Cyberbullying? • National Crime Victim Survey (2010) – 6% cyberbullying victims vs. 28% school bullying victims • Review of research to get an average: – 24% of kids are cyberbullying victim – 17% admit to being the bully • 50% of both victims and bullies experience offline bullying • Offline bullies more than twice as likely to be both target and perp of online bullying • Victims of offline bullying are 2.7 times more likely to be cyberbullying victim Cyberbullying by Marian Merritt 4
  • 5. How Common is Cyberbullying? • National Crime Victim Survey (2010) – 6% cyberbullying victims vs. 28% school bullying victims • Review of research to get an average: – 24% of kids are cyberbullying victim – 17% admit to being the bully • 50% of both victims and bullies experience offline bullying • Offline bullies more than twice as likely to be both target and perp of online bullying • Victims of offline bullying are 2.7 times more likely to be cyberbullying victim Cyberbullying by Marian Merritt 5
  • 6. Offline Bullying and Online Bullying Closely Connected • National Crime Victim Survey (2010) – 6% cyberbullying victims vs. 28% school bullying victims • Review of research to get an average: – 24% of kids are cyberbullying victim – 17% admit to being the bully • 50% of both victims and bullies experience offline bullying • Offline bullies more than twice as likely to be both target and perp of online bullying • Victims of offline bullying are 2.7 times more likely to be cyberbullying victim Cyberbullying by Marian Merritt 6
  • 7. Being Both Target and Bully are Common • National Crime Victim Survey (2010) – 6% cyberbullying victims vs. 28% school bullying victims • Review of research to get an average: – 24% of kids are cyberbullying victim – 17% admit to being the bully • 50% of both victims and bullies experience offline bullying • Offline bullies more than twice as likely to be both target and perp of online bullying • Victims of offline bullying are 2.7 times more likely to be cyberbullying victim Cyberbullying by Marian Merritt 7
  • 8. Cyberbullying and Bullying Roles • Bully – can be popular, high status, others are not; may come from families with conflict, life changes, little supervision, low self-esteem – Bullies hang out with other bullies – If bullying seem as norm, more become bullies • Target/Victim – may also be poorly adjusted to school • Bully/Victim – especially relational bullying (gossip, exclusion) – Easily and negatively influenced by peers – Hostility, aggression – may be more at risk than other groups – Social anxiety issues • Bystander (both active and inactive) – – 90% ignore cyberbullying in social networks – Those who defend victim – high social status, positive social expectations, have more empathy • Non-involved Cyberbullying by Marian Merritt 8
  • 9. Vulnerable times and peak activities • Cyberbullying peaks between ages 11 and 15 – 9th grade is often the most active year •Cyberbullying peaks ages 11 - 15 • Changes in school due to the most active year •9th grade is often grade promotion – •Changes in school:to junior high; junior high to high school Moving from elementary – Kids•Elementary pecking order” “rearrange the to junior high; junior high to high school • Changes due to a move to a new city or country •Kids “rearrange the pecking order” – New kid has to establish who they are; find friends •Changes due to a move • Other events •Other events – Someone “dates” the wrongthe wrong person; or •Someone “dates” person; or breaks up breaks up – Jealousy due to accomplishments like sports, theater, grades •Jealousy due to accomplishments like sports, theater, academics Cyberbullying by Marian Merritt 9
  • 10. Forms of cyberbullying • Mean messages in email, SMS, social networks • Fake SNS profiles • Forwarded images or messages • Hacked SNS or email accounts • Pretending to be someone else in a completely online romantic situation – “Catfishing”, Manti Te’o (at right) – Megan Meier • Cyberbullying can start as traditional bullying, then continue online and vice versa • Often referred to as “drama”, not cyberbullying Cyberbullying by Marian Merritt 10
  • 11. Who is vulnerable to cyberbullying? •LGBTQ •Minorities, disabled, gifted, eve n socio-economic differences YOU, YOUR FRIENDS time online •Spending lots of AND CYBERBULLYING. and sharing personal info •Simply being “different “ can make a child a target Cyberbullying by Marian Merritt 11
  • 12. Cyberbullying Can Lead to Depression, Suicide – Note: suicide is a complex issue, rarely is cyberbullying the only cause Ryan Halligan – 2003. Was tormented for being “gay” despite only being 13 years old. Megan Meier – 2006. A neighbor (adult) created a fake profile of a cute boy to start an online friendship. Tyler Clementi – 2010. His college roommate set up a spy cam to record his date with a man. Amanda Todd – 2012. Someone tried to blackmail her with a partially nude photo she sent. Then the images went viral. Cyberbullying by Marian Merritt 12
  • 13. Latest Cyberbullying and Suicide Issue – Slut Shaming • Steubenville Ohio - assaulted and video and images went viral, Twitter messages of sexual abuse of unconscious girl. Girl prevailed in court (didn’t self-harm) • Nova Scotia, Canada – Rehtaeh Parsons, assaulted and images were shared; she was cyberbullied and committed suicide when police wouldn’t pursue the case. • Los Gatos, California – Audrie Pott, assaulted and images were shared. She was cyberbullied and committed suicide. Police now taking on case. Cyberbullying by Marian Merritt 13
  • 14. Cyberbullying – Adult Bad Behavior • University, workplace bullying and cyberbullying • Political insults instead of debate • Reporters hacking celebrity phones and voice mail 14 Cyberbullying by Marian Merritt
  • 15. What happens to bullies and victims? • Bullies: – Suicidal thoughts (usually just ideation, no action) – Involvement can lead to aggression in school (verbal and physical) – Can become involved in criminal activity as adults • Victims: – Lower self esteem – Suicidal thoughts, especially for girls – School problems – Involvement can lead to aggression in school (verbal and physical) Cyberbullying by Marian Merritt 15
  • 16. Responding to Cyberbullying • Don’t teach “don’t tattle” – Most commonly taught to boys, children of color, special ed students – Adopt “authoritative parenting” style • Not common for teens to report, but it is increasing – Unless violence is involved – Schools must implement policy, provide safe reporting – Perception of teacher support can increase reporting – Students who report bullying are less likely to be bullied again • Efforts to change school social norms show promise in reducing bullying • Adults can be trained, parents need to consider bullying of concern Cyberbullying by Marian Merritt 16
  • 17. Responses • Promote kindness online • Limit your time online and don’t “overshare” • If you are attacked, don’t respond: – Report it to the website, if against policy – Save a copy in case the issue continues – If threatened, contact law enforcement • Feeling overwhelmed or attacked? – Avoid the website or environment – Get offline, go outside, change scenery Cyberbullying by Marian Merritt 17
  • 18. Help! I’ve Been Cyberbullied. What do I do? • Don’t respond – step away from computer, mobile phone, etc. – Each incident in one environment can move to another environment, including face to face bullying • Who can you report it to? – Does your school have a policy? A reporting hotline? A trusted teacher? – Can you report abuse to the website or the service? – Do your parents understand cyberbullying? Can you talk to them? – Is there a non-profit you can call? A trained older teen mentor? • Keep a copy of everything – If violence is threatened, contact police • Seek counseling if you can Cyberbullying by Marian Merritt 18
  • 19. Preparing Children for Bystander Role • Teach children empathy – put yourself in target/victim’s place • Promote kindness online • Train school student leaders how to reply – Reporting can come from those with social status and high moral compass • If children witness online hate: – Show them how to reach out to the target, how to handle it – Don’t engage with the bully or their parents Cyberbullying by Marian Merritt 19
  • 20. Other Actions • Whole school approach to educate and train to respond – Create reporting system, emphasize intervention in student conflict – Students need to feel connected, part of the school and to believe they will be treated fairly – Offer respect and support to those who speak up – Avoid the “one off” cyberbullying assembly approach, seek “SEL” or social – emotional learning programs to foster key skills • Teach empathy • Parents should seek training from the school – Provide counseling to children involved in bullying • Emphasize the positive side of the internet Cyberbullying by Marian Merritt 20
  • 21. Resources • Research and Websites: – Bullying in a Networked Era – cyberbullying research summary from Harvard – www.cyberbullying.us – website of researchers Hinduja and Patchin – www.Stopbullying.gov – White House website against all bullying – www.Bornthiswayfoundation.org – Lady Gaga’s initiative to empower youth • Books: – Cyberslammed, Stephens and Nair – Cyberbullying; Bullying in the Digital Age, Kowalski, Limber and Agatson – Cyberbullying and Cyberthreats, Willard • Training programs: – ADL’s Cyber Ally program – Steps to Respect – Olweus Bullying Prevention Program Cyberbullying by Marian Merritt 21
  • 22. Thank you! Marian Merritt Norton Internet Safety Advocate marian@norton.com Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Cyberbullying by Marian Merritt 22

Editor's Notes

  1. Definition from Hinduja and Patching (cyberbullying.us): is when someone repeatedly makes fun of another person online or repeatedly picks on another person through email or text message or when someone posts something online about another person that they don’t like.” 20% of over 4400 randomly selected 11-18 year old students in 2010 have been a victim at some point in their life. In review of 35 papers, average was 24% victim/17% cyberbully (admit to engaging in the activity). School bullying is still more prevalent. Trend is not up or down; more kids are coming forward than before. Only ¼ tell an adult. ½ of cyberbullying victims and bullies experience offline bullying (Ybarra and Mitchell 2004)Offline bullies are more than twice as likely to be both targets and perps of online bullying (Hinduja and Patchin 2008)
  2. Note that cyberbullying occurs on any device, platform or online environment that allows users to create messages, images, accounts, etc. No one environment is worse than another, it all comes down to the users and their intentions. Typically, the target needs to experience the actions more than one time but some individuals are more resilient than others. What injures one person may be more tolerated by another. For this reason it is important for youth to learn empathy and be willing to admit mistakes.
  3. AIM is AOL instant messenger“According to the findings of a study.., cyberbullying is growing.” , Canberra Times 18 Nov. 12/1, 1998
  4. Various studies have range of results. It depends if you do a study online, where more likely respondent is an online user. There is a connection between spending a lot of time online and online victimizationBest studies are across whole random sample populations but that is expensive
  5. Lower than in person bullying but anonymity, easy of committing act, increase likelihood of attempt
  6. National Crime Victim Survey (2010) – 6% cyberbullying victims vs. 28% school bullying victimsReview of research to get an average: 24% of kids are cyberbullying victim17% admit to being the bully50% of both victims and bullies experience offline bullying Offline bullies more than twice as likely to be both target and perp of online bullyingVictims of offline bullying are 2.7 times more likely to be cyberbullying victimSources: www.cyberbullying.us dataBerkman report Bullying in a Networked Era: A Literature Review:Target/victims:40% of kids are being bullied both on/offline31% just offline15% just onlineBullies:14% say they bully at school; 6% do it just online (Ybarra: 2012)
  7. Canadian study 2011: (Mishna) CORRECTEDThis is one study’s data showing how easily someone can take on both roles. 30% of kids were either a bully or a target. But 26% were both. For a total of over 56% involved in bullying in some role. She indicates current research is trending lower.
  8. Roles are defined in study (Cook 2003)Other set of terms: bully, assistant, reinforcer, defender, and onlooker (Salmivalli 2011)Bully/victims – easily and negatively influenced by peer groupBully info (Cook, 2010)Some studies show both perpetrating and being victim of cyberybulling predict each other. (Walrave 2010)Social anxiety issues: Juvenon 2003
  9. Bullying peaks in middle school, worst is transition from elementary to middle. Cyberbullying goes on a little longer. (Pelligrini)Based the study of 1,318 European youth, researchers found that attitude toward bullying is a strongpredictor of involvement, as about 25% of teens who do not “reject” cyberbullying are approximatelyfour times more likely to engage in it (Walrave and Heirman, 2010, p. 44).
  10. SMS most popular form (slightly) over email and social networks. Less visible, more direct. Easy to be anonymous.
  11. Some research shows that the more a child uses a cell phone, the more likely they are to bully and be bullied. It’s likely just lack of impulse control in both area. http://www.zdnet.com/blog/igeneration/cyberbullying-increases-in-line-with-mobile-phone-usage-infographic/14713Lesbian, Gay youth: http://news.cnet.com/8301-27083_3-10466220-247.html 1 in 2 kids report cyberbullying; (Hinduja/Patchin report 73% of LGBTQ kids are targets of bullying at some point; 63% for hetero youth. 36% targets of cyberbullying for LGBTQ kids compared to 20% for hetero). National Crime study shows 90% of LGBT youth are harassedThose who spend most time online, in chat or social networks and posting personal informatoin– increased risk of victimization80% of kids with learning disabilities are targets of school bullying: http://www.cec.sped.org/AM/Template.cfm?Section=Home&CAT=none&TEMPLATE=/CM/ContentDisplay.cfm&CONTENTID=1008567% of gifted kids hit by bullying. (same article as above)Often if you ask your child directly about cyberbullying they will deny, deny ,deny. By the time a child tells their parents, it’s getting very serious. Often the school can’t do much or the child perceives it made things worse. I’ve heard of schools bringing the target and bullies together in a meeting to “resolve their differences”. Since bullying is often about power, that method just can’t work. Neither does a once a year assembly where we chant no bullies. So what do you do?
  12. Other cases, criminal rape investigation in steubenville oh. Kids are cyberbullying the victim who is standing up for herself. Similar case but different outcome is the girl in Canada, Rehtaeh Parsons, who was raped, photos taken of her victimization by fellow teens. The photos were shared and she still wasn’t able to get the boys convicted forthe rape or the photos. She commited suicide.
  13. Common elements:Alcohol used to render the victim incapable of stopping the assault. Photos/videos taken are then shared. Boys and girls involved in sharing the images. Victim is later blamed for what happened to her. Even moving to a new city doesn’t stop the attacks online. Law enforcement reaction can make a difference to the victim in terms of empowering or furthering the victimization. Parents often unaware of what is going on until the damage is really critical.
  14. 25% of adults in the workforce are victims of bullying.  C. Bradshaw did some research specifically with school personnel too, and found 22% of teachers + report getting bullied at the work place. 2004 University study found 60% of undergraduates had witnessed harassment (off and online) of peers.In Graduate school, 62% self report peer mistreatment behavior (because highly competitive, pressure, stress. ) 14% was specifically online.
  15. Persistently aggressive bullies are more likely to be convicted of crimes than non-involved peopleCrime stat: Farrington 2011Suicidal thoughts: Patchin and Hinduja 2010; girl victims, Klomek 2011victims of cyberbullying may experience academic“disturbances” (including reduced grades, increased absences and truancy, cutting class, detentions,and suspensions), “psychosocial” or “affective” problems (including social anxiety, reduced selfesteem,and emotional distress, sadness, or anger targeted at bullies and/or bullying acts), and “social”problems (including detachment, hostility, and delinquency) (Tokunaga, 2010).5.3.3Especially for gender and bias related bullying, impact is more severeMore absences, lower gradesMore bullying, less attachment to a school, possibly leading to dropping out
  16. “don’t tattle” research – Davis & Nixon 2012“authoritative” - Gregory Cornell 2012 these parents set high expectations and provide guidelines but be nurturing and responsiveViolence – Petrosino 2010Reporting, teacher support Elliot Cornell 2010Reduced repeat bullying – Gregory et al 2010Swearer 2010 – social norms research