SlideShare a Scribd company logo
Cyberbullying What the research is telling us… Amanda Lenhart NAAG: Year of the Child Summit May 13, 2009 Philadelphia, PA
Sources & Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teen internet use basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are teens doing online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How else are teens connecting? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concerns in Online Safety Sphere ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Harassment & Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
What makes online harassment & bullying different? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pew Internet: Online Harassment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberbullying ,[object Object],[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
Online Harassment (2) ,[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds   by environment ( n =1,193) (Ybarra, 2009)
Online (or not) Harassment  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry (2)? ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Final Thoughts ,[object Object],[object Object],[object Object],[object Object]
THANK YOU Amanda Lenhart Pew Internet & American Life Project [email_address] http://www.pewinternet.org

More Related Content

What's hot

Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
Memorial University
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
Pew Research Center's Internet & American Life Project
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
tackleglass54
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
ringw1sl
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Quirky Kid
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
Melissa
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
sus22
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Qazi Anwar
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Amir Shokri
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
AJ Tivol
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
Via Christi Health
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
Suna Gurol
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
damarissepulveda
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 

What's hot (20)

Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 

Viewers also liked

Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)frncsm13
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesisnone
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingdsansford
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
John_Gowland
 
Textual analysis of CYBERBULLY
Textual analysis of CYBERBULLYTextual analysis of CYBERBULLY
Textual analysis of CYBERBULLYtroalfe
 
Teens and Libraries: A Media Literacy Perspective
Teens and Libraries: A Media Literacy PerspectiveTeens and Libraries: A Media Literacy Perspective
Teens and Libraries: A Media Literacy Perspective
Renee Hobbs
 
Teen literacy
Teen literacyTeen literacy
Teen literacy
Olga Selivanova
 
News Literacy PSA Project - JEA Fall Conference 2013
News Literacy PSA Project - JEA Fall Conference 2013News Literacy PSA Project - JEA Fall Conference 2013
News Literacy PSA Project - JEA Fall Conference 2013
Waterford Kettering High School
 
Olweus bully prevention master
Olweus bully prevention masterOlweus bully prevention master
Olweus bully prevention master
Miles Erdly
 
Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
brlewis1971
 
Types of Bullying
Types of BullyingTypes of Bullying
Types of Bullying
Robyne Francis-Darville
 
Teens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network SitesTeens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network Sites
Pew Research Center's Internet & American Life Project
 
Media literacy introduction
Media literacy introductionMedia literacy introduction
Media literacy introductiongeepatty
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Arniel Ping
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marisol Herrera
 
Chapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesChapter 2-Realated literature and Studies
Chapter 2-Realated literature and Studies
Mercy Daracan
 

Viewers also liked (20)

Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesis
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Textual analysis of CYBERBULLY
Textual analysis of CYBERBULLYTextual analysis of CYBERBULLY
Textual analysis of CYBERBULLY
 
Teens and Libraries: A Media Literacy Perspective
Teens and Libraries: A Media Literacy PerspectiveTeens and Libraries: A Media Literacy Perspective
Teens and Libraries: A Media Literacy Perspective
 
Teen literacy
Teen literacyTeen literacy
Teen literacy
 
News Literacy PSA Project - JEA Fall Conference 2013
News Literacy PSA Project - JEA Fall Conference 2013News Literacy PSA Project - JEA Fall Conference 2013
News Literacy PSA Project - JEA Fall Conference 2013
 
Olweus bully prevention master
Olweus bully prevention masterOlweus bully prevention master
Olweus bully prevention master
 
Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
 
Types of Bullying
Types of BullyingTypes of Bullying
Types of Bullying
 
Kes buli
Kes buliKes buli
Kes buli
 
Teens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network SitesTeens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network Sites
 
Digital and media_literacy_a_plan_of_action
Digital and media_literacy_a_plan_of_actionDigital and media_literacy_a_plan_of_action
Digital and media_literacy_a_plan_of_action
 
Media literacy introduction
Media literacy introductionMedia literacy introduction
Media literacy introduction
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Chapter 2-Realated literature and Studies
Chapter 2-Realated literature and StudiesChapter 2-Realated literature and Studies
Chapter 2-Realated literature and Studies
 

Similar to Cyberbullying: What the research is telling us…

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
Larry Magid
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
sepulvedamd
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
Anne Collier
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 

Similar to Cyberbullying: What the research is telling us… (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Week 5
Week 5Week 5
Week 5
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth developmentInternet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth development
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyberbullying and adolescent mental health
Cyberbullying and adolescent mental healthCyberbullying and adolescent mental health
Cyberbullying and adolescent mental health
 
A comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national surveyA comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national survey
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Linkages between violent exposures in new media and violent behavior: Finding...
Linkages between violent exposures in new media and violent behavior: Finding...Linkages between violent exposures in new media and violent behavior: Finding...
Linkages between violent exposures in new media and violent behavior: Finding...
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
 
Youth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truthsYouth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truths
 
Sexual solicitation and harassment on the Internet and the mental health of y...
Sexual solicitation and harassment on the Internet and the mental health of y...Sexual solicitation and harassment on the Internet and the mental health of y...
Sexual solicitation and harassment on the Internet and the mental health of y...
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Pitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital agePitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital age
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Violence on the Internet: How many youth are really looking?
Violence on the Internet: How many youth are really looking?Violence on the Internet: How many youth are really looking?
Violence on the Internet: How many youth are really looking?
 

More from Pew Research Center's Internet & American Life Project

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
Pew Research Center's Internet & American Life Project
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
Pew Research Center's Internet & American Life Project
 
Trust, Facts, Democracy
Trust, Facts, DemocracyTrust, Facts, Democracy
Skills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 FactsSkills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 Facts
Pew Research Center's Internet & American Life Project
 
The future of technology
The future of technologyThe future of technology
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
Education in the age of fake news and disputed facts
Education in the age of fake news and disputed factsEducation in the age of fake news and disputed facts
Education in the age of fake news and disputed facts
Pew Research Center's Internet & American Life Project
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
Pew Research Center's Internet & American Life Project
 
The new landscape of facts and trust
The new landscape of facts and trustThe new landscape of facts and trust
The new landscape of facts and trust
Pew Research Center's Internet & American Life Project
 
The secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries addressThe secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries address
Pew Research Center's Internet & American Life Project
 
How People Fit Libraries Into Their Lives
How People Fit Libraries Into Their LivesHow People Fit Libraries Into Their Lives
How People Fit Libraries Into Their Lives
Pew Research Center's Internet & American Life Project
 
The New Age of Politics and Media
The New Age of Politics and MediaThe New Age of Politics and Media
Digital Divides – Feeding America
Digital Divides – Feeding AmericaDigital Divides – Feeding America
Digital Divides – Feeding America
Pew Research Center's Internet & American Life Project
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
Pew Research Center's Internet & American Life Project
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
Pew Research Center's Internet & American Life Project
 
How the public grades libraries – and uses libraries
How the public grades libraries – and uses librariesHow the public grades libraries – and uses libraries
How the public grades libraries – and uses libraries
Pew Research Center's Internet & American Life Project
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
Pew Research Center's Internet & American Life Project
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
Pew Research Center's Internet & American Life Project
 

More from Pew Research Center's Internet & American Life Project (20)

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Trust, Facts, Democracy
Trust, Facts, DemocracyTrust, Facts, Democracy
Trust, Facts, Democracy
 
Skills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 FactsSkills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 Facts
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
Online Harassment 2017
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 
Education in the age of fake news and disputed facts
Education in the age of fake news and disputed factsEducation in the age of fake news and disputed facts
Education in the age of fake news and disputed facts
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
The new landscape of facts and trust
The new landscape of facts and trustThe new landscape of facts and trust
The new landscape of facts and trust
 
The secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries addressThe secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries address
 
How People Fit Libraries Into Their Lives
How People Fit Libraries Into Their LivesHow People Fit Libraries Into Their Lives
How People Fit Libraries Into Their Lives
 
The New Age of Politics and Media
The New Age of Politics and MediaThe New Age of Politics and Media
The New Age of Politics and Media
 
Digital Divides – Feeding America
Digital Divides – Feeding AmericaDigital Divides – Feeding America
Digital Divides – Feeding America
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
How the public grades libraries – and uses libraries
How the public grades libraries – and uses librariesHow the public grades libraries – and uses libraries
How the public grades libraries – and uses libraries
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Cyberbullying: What the research is telling us…

  • 1. Cyberbullying What the research is telling us… Amanda Lenhart NAAG: Year of the Child Summit May 13, 2009 Philadelphia, PA
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
  • 13.
  • 14. Frequency of bullying victimization among 11-16 year olds by environment ( n =1,193) (Ybarra, 2009)
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. THANK YOU Amanda Lenhart Pew Internet & American Life Project [email_address] http://www.pewinternet.org

Editor's Notes

  1. Hello, my name is Amanda Lenhart, and I’m a Senior Research Specialist with the Pew Internet & American Life Project. I’m going to start off with some scene setting materials, because I think context is extremely important, particularly when we’re talking about safety and young people. I think sometimes data points in this realm get taken out of context, but in order for us to create the most effective and targeted solutions, we have to know the exact nature of the problem.