SlideShare a Scribd company logo
1 of 24
Cybergrooming –
Risk factors, coping strategies and
 associations with cyberbullying
           Dipl. Päd. Sebastian Wachs
        Acknowledgment: Prof. Dr. K.D. Wolf




 International Conference on Cyberbullying,
               Paris, June 2012
Overview




•   Background
•   Method
•   Results
•   Conclusions/Outlook




            International Conference on Cyberbullying, Paris, June 2012
Background of the Study




    International Conference on Cyberbullying, Paris, June 2012
Background


Cybergrooming (CYBGR)

“Establishing a trust-based relationship between
minors and usually adults using ICTs to
systematically solicit and exploit the minors for
sexual purposes.” (Wachs, Wolf and Pan, in review)




             International Conference on Cyberbullying, Paris, June 2012
Background


Research Questions

 RQ1: Which factors shape the risk to become
 a victim of CYBGR?
 RQ2: Are cyberbullied students more likely to be
 cybergroomed?
 RQ3: How students cope with CYBGR and
 which strategy seems to be effective?

             International Conference on Cyberbullying, Paris, June 2012
Background

 Associations between CYBGR and CYBB

                                                         • Use of ICTs
                                                         • Repetition
                                                         • Intentional
                                                            aggressive acts
    Cybergrooming                                        • Social
                                                        Cyberbullying
                                                            Relationship
                                                         • Imbalance of
                                                            power
                                                          • Role Association?

             International Conference on Cyberbullying, Paris, June 2012
Method




International Conference on Cyberbullying, Paris, June 2012
Method


 Participants

• Self-reports from 518 students
• 5th to 10th Grades (11-17 yr) from 4 German
  schools
• 49.0 % of the participants was male and
  50.8 % was female; 0.2 % did not answer
• from a region with a high proportion of
  immigrant families, and a relatively poor
  urban economic situation.
           International Conference on Cyberbullying, Paris, June 2012
Method


Procedure
• Online Survey
• Computer Assisted Personal Interview
• participants sat at a PC in
  school computer rooms
  and entered the answers




          International Conference on Cyberbullying, Paris, June 2012
Method

Questionnaire
‘A cybergroomer is a person who is at least 7 years
older than you and who you know over a longer time
exclusively through online communication. At the
beginning, the cybergroomer seems to be interested in
your daily life problems, but after a certain time s/he
appears to be interested in sexual topics and in the
exchange of sexual fantasies and/or nude material
(pictures or video chats).’ Used Definition



               International Conference on Cyberbullying, Paris, June 2012
Method

Questionnaire
‘How often did you have contact with a
cybergroomer within the last twelve
month?’


Never   Once a   Once a              Once a             Several
        year     month               week               times a
                                                        week




                 International Conference on Cyberbullying, Paris, June 2012
Method

Questionnaire
Items for assessing (cyber-)bullying and coping
strategies partly following the ‘Mobbing Questionnaire
for students' (Jäger et al. 2007)
Cyberbullying    4 Items each                 Never, Once or twice, Twice or
                 side                         thrice, About once a week or
                                              Several times a week
Coping           10 Items                     Yes, A little bit, Almost no, No
Strategies
ICTs Usage and   access to PC or Internet at home, ownership of mobile
Access           phone or smartphone, amount of ICTs usage


                  International Conference on Cyberbullying, Paris, June 2012
Results




International Conference on Cyberbullying, Paris, June 2012
Results

 Prevalence Rate                                Victims of CYBGR: 6.5 %
                                                         (n=34)

                                                                4.6 %


                                                                                          10.4 %
79%                                     21%             1.9 %



                                                                 4.3 %


                                                    once a year                      once a month
At least once a year      Never                     once a week                      several times a week
                       International Conference on Cyberbullying, Paris, June 2012
Results

          Prevalence rate for CYBGR is
          significantly…

                     higher for girls (8.7% vs. 4.3%), t(514) = 3.28, p = .001.


                            lower for adolescents who are not willing to
                            meet strangers (4.4% vs. 15.5%), t(514) = 4.91,
                            p = <.001.

                                     lower for adolescents who do not discuss
                                     problems with strangers (5.6% vs.
                                     11.4%), t(514) = 3.93, p < .001.




          International Conference on Cyberbullying, Paris, June 2012
Results

    RQ 1: Which factors shape the risk to be
               cybergroomed?

    Willingness to discuss                                    Access to Internet at home
    problems with strangers                                   Ownership of mobile phone
   Willingness
 Coefficients to meet                        Ownership
                                       Estimate Std. of smartphone
                                                             t-
     strangers                                Amount of internet usage
                                                  Error      value
    Being cyberbullied
 (Intercept) ***                               0.041
                                          1.43 Access to PC at home
                                                             34.49
 Being cybervictim ***                    0.46    0.085      5.42
 Being a girl ***                         0.28    0.083      3.46
                         Migration background
 Not willing to meet strangers ***       -0.43    0.106      -4.10
F(3, 512) = 23.39, R2=0.12, p <  Grade
                                .001.          * p ≤ .05;** p ≤.01;*** p ≤.001
                                Gender
Tab 1: Model 1 (3 predictors) beta coefficients for standardized variables

                   International Conference on Cyberbullying, Paris, June 2012
Results

RQ 2: Are cyberbullied students more likely to
             be cybergroomed?

                  Variable                                  O.R.    C.I.
     Being a girl***                                        2.35 1.1–5.2
     Being cyberbullied***                                  1.75 1.2–2.4
     Not willing to meet strangers ***                      0.30 0.14–0.65
    *p ≤ .05; **p ≤.01; ***p ≤.001        95 % confidence interval
  Tab. 2: Results of simple binary logistic regression for Model 1


                  International Conference on Cyberbullying, Paris, June 2012
Results
RQ 3: How students cope with cybergrooming?
 The first three factors of
 variability summarise 62.1 %
 of the total inertia.
Results
 RQ 3: How students cope with cybergrooming?

    Coefficients                                       Estimate         Std.     t
                                                                        Error    value
    (Intercept)                                          1.43023 0.03734 38.305
    Cognitive-techn. Coping***                           0.33223 0.07537 4.408
    Being a girl***                                      0.32686 0.07514 4.350
    Being cyberbullied***                                0.32565 0.07812 4.168
    Not willing to meet strangers*                       -0.24815 0.09742 -2.547
    Aggressive Coping***                                 -0.76518 0.07775 -9.841
   F(2, 512) = 60.71, p < .001, = 0.19                * p ≤ .05; ** p ≤.01; *** p ≤.001

   Tab. 4: Model 2 (5 predictors) beta coefficients


                   International Conference on Cyberbullying, Paris, June 2012
Results
 RQ 3: How students cope with cybergrooming?

    Variable                                                     O.R.        C.I.
    Being a girl***                                              3.37        1.4–8.6
    Being Cyberbullied***                                        1.88        1.0–3.2
    Cognitive-techn. Coping***                                   1.48        0.8–2.4
    Willingness to meet strangers: No ***                        0.39        0.2–0.9
    Aggressive Coping***                                         0.30        0.2–0.5
   *p ≤ .05;** p ≤.01;*** p ≤.001                    95 % confidence interval
   Tab. 5: Results of simple binary logistic regression for Model 2

               International Conference on Cyberbullying, Paris, June 2012
Conclusions and
Outlook on future research




     International Conference on Cyberbullying, Paris, June 2012
Conclusion


• Identified risk factors: being a girl, willingness
  to meet strangers and being cyberbullied

• Coping strategies seem to make a difference:
   – aggressive coping protects and
   – technical-cognitive coping increases the risk



             International Conference on Cyberbullying, Paris, June 2012
Outlook future research



• Validated instruments with consistent
  definition, measuring and period of time
• Longitudinal studies (causality and directions)
• Special risk groups (LGBT and children with
  special needs) need more research attention
• Traditionally
  bullied, cyberbullied, cybergroomed?


            International Conference on Cyberbullying, Paris, June 2012
Thank you for your
attention!

Dipl. Päd. Sebastian Wachs
Division Education and Socialisation
University of Bremen, Germany
s.wachs@uni-bremen.de

             International Conference on Cyberbullying, Paris, June 2012

More Related Content

Similar to Cybergrooming Risk Factors and Effective Coping Strategies

Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...samhauck
 
Charles Wright SMAHRT Presentation
Charles Wright SMAHRT PresentationCharles Wright SMAHRT Presentation
Charles Wright SMAHRT PresentationHolly Gerla
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014D2L Barry
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Knowledge of Cyber Crime
Knowledge of Cyber CrimeKnowledge of Cyber Crime
Knowledge of Cyber CrimeSHUBHAM SINGH
 
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...MediaSmarts | HabiloMédias
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Megan Bednar
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningMirXahid1
 
Cyber Bullying- JPWMC
Cyber Bullying- JPWMCCyber Bullying- JPWMC
Cyber Bullying- JPWMCcrulien
 
cyberbullying detection seminar.pdf
cyberbullying detection seminar.pdfcyberbullying detection seminar.pdf
cyberbullying detection seminar.pdfAkshay712352
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingFoegenR
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safetyemilyensign
 

Similar to Cybergrooming Risk Factors and Effective Coping Strategies (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
 
Charles Wright SMAHRT Presentation
Charles Wright SMAHRT PresentationCharles Wright SMAHRT Presentation
Charles Wright SMAHRT Presentation
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Knowledge of Cyber Crime
Knowledge of Cyber CrimeKnowledge of Cyber Crime
Knowledge of Cyber Crime
 
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Youth of Turkey online
Youth of Turkey onlineYouth of Turkey online
Youth of Turkey online
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
 
Cyber Bullying- JPWMC
Cyber Bullying- JPWMCCyber Bullying- JPWMC
Cyber Bullying- JPWMC
 
cyberbullying detection seminar.pdf
cyberbullying detection seminar.pdfcyberbullying detection seminar.pdf
cyberbullying detection seminar.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safety
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Cybergrooming Risk Factors and Effective Coping Strategies

  • 1. Cybergrooming – Risk factors, coping strategies and associations with cyberbullying Dipl. Päd. Sebastian Wachs Acknowledgment: Prof. Dr. K.D. Wolf International Conference on Cyberbullying, Paris, June 2012
  • 2. Overview • Background • Method • Results • Conclusions/Outlook International Conference on Cyberbullying, Paris, June 2012
  • 3. Background of the Study International Conference on Cyberbullying, Paris, June 2012
  • 4. Background Cybergrooming (CYBGR) “Establishing a trust-based relationship between minors and usually adults using ICTs to systematically solicit and exploit the minors for sexual purposes.” (Wachs, Wolf and Pan, in review) International Conference on Cyberbullying, Paris, June 2012
  • 5. Background Research Questions RQ1: Which factors shape the risk to become a victim of CYBGR? RQ2: Are cyberbullied students more likely to be cybergroomed? RQ3: How students cope with CYBGR and which strategy seems to be effective? International Conference on Cyberbullying, Paris, June 2012
  • 6. Background Associations between CYBGR and CYBB • Use of ICTs • Repetition • Intentional aggressive acts Cybergrooming • Social Cyberbullying Relationship • Imbalance of power • Role Association? International Conference on Cyberbullying, Paris, June 2012
  • 7. Method International Conference on Cyberbullying, Paris, June 2012
  • 8. Method Participants • Self-reports from 518 students • 5th to 10th Grades (11-17 yr) from 4 German schools • 49.0 % of the participants was male and 50.8 % was female; 0.2 % did not answer • from a region with a high proportion of immigrant families, and a relatively poor urban economic situation. International Conference on Cyberbullying, Paris, June 2012
  • 9. Method Procedure • Online Survey • Computer Assisted Personal Interview • participants sat at a PC in school computer rooms and entered the answers International Conference on Cyberbullying, Paris, June 2012
  • 10. Method Questionnaire ‘A cybergroomer is a person who is at least 7 years older than you and who you know over a longer time exclusively through online communication. At the beginning, the cybergroomer seems to be interested in your daily life problems, but after a certain time s/he appears to be interested in sexual topics and in the exchange of sexual fantasies and/or nude material (pictures or video chats).’ Used Definition International Conference on Cyberbullying, Paris, June 2012
  • 11. Method Questionnaire ‘How often did you have contact with a cybergroomer within the last twelve month?’ Never Once a Once a Once a Several year month week times a week International Conference on Cyberbullying, Paris, June 2012
  • 12. Method Questionnaire Items for assessing (cyber-)bullying and coping strategies partly following the ‘Mobbing Questionnaire for students' (Jäger et al. 2007) Cyberbullying 4 Items each Never, Once or twice, Twice or side thrice, About once a week or Several times a week Coping 10 Items Yes, A little bit, Almost no, No Strategies ICTs Usage and access to PC or Internet at home, ownership of mobile Access phone or smartphone, amount of ICTs usage International Conference on Cyberbullying, Paris, June 2012
  • 13. Results International Conference on Cyberbullying, Paris, June 2012
  • 14. Results Prevalence Rate Victims of CYBGR: 6.5 % (n=34) 4.6 % 10.4 % 79% 21% 1.9 % 4.3 % once a year once a month At least once a year Never once a week several times a week International Conference on Cyberbullying, Paris, June 2012
  • 15. Results Prevalence rate for CYBGR is significantly… higher for girls (8.7% vs. 4.3%), t(514) = 3.28, p = .001. lower for adolescents who are not willing to meet strangers (4.4% vs. 15.5%), t(514) = 4.91, p = <.001. lower for adolescents who do not discuss problems with strangers (5.6% vs. 11.4%), t(514) = 3.93, p < .001. International Conference on Cyberbullying, Paris, June 2012
  • 16. Results RQ 1: Which factors shape the risk to be cybergroomed?  Willingness to discuss  Access to Internet at home  problems with strangers  Ownership of mobile phone  Willingness Coefficients to meet  Ownership Estimate Std. of smartphone t- strangers  Amount of internet usage Error value  Being cyberbullied (Intercept) ***  0.041 1.43 Access to PC at home 34.49 Being cybervictim *** 0.46 0.085 5.42 Being a girl *** 0.28 0.083 3.46  Migration background Not willing to meet strangers *** -0.43 0.106 -4.10 F(3, 512) = 23.39, R2=0.12, p <  Grade .001. * p ≤ .05;** p ≤.01;*** p ≤.001  Gender Tab 1: Model 1 (3 predictors) beta coefficients for standardized variables International Conference on Cyberbullying, Paris, June 2012
  • 17. Results RQ 2: Are cyberbullied students more likely to be cybergroomed? Variable O.R. C.I. Being a girl*** 2.35 1.1–5.2 Being cyberbullied*** 1.75 1.2–2.4 Not willing to meet strangers *** 0.30 0.14–0.65 *p ≤ .05; **p ≤.01; ***p ≤.001 95 % confidence interval Tab. 2: Results of simple binary logistic regression for Model 1 International Conference on Cyberbullying, Paris, June 2012
  • 18. Results RQ 3: How students cope with cybergrooming? The first three factors of variability summarise 62.1 % of the total inertia.
  • 19. Results RQ 3: How students cope with cybergrooming? Coefficients Estimate Std. t Error value (Intercept) 1.43023 0.03734 38.305 Cognitive-techn. Coping*** 0.33223 0.07537 4.408 Being a girl*** 0.32686 0.07514 4.350 Being cyberbullied*** 0.32565 0.07812 4.168 Not willing to meet strangers* -0.24815 0.09742 -2.547 Aggressive Coping*** -0.76518 0.07775 -9.841 F(2, 512) = 60.71, p < .001, = 0.19 * p ≤ .05; ** p ≤.01; *** p ≤.001 Tab. 4: Model 2 (5 predictors) beta coefficients International Conference on Cyberbullying, Paris, June 2012
  • 20. Results RQ 3: How students cope with cybergrooming? Variable O.R. C.I. Being a girl*** 3.37 1.4–8.6 Being Cyberbullied*** 1.88 1.0–3.2 Cognitive-techn. Coping*** 1.48 0.8–2.4 Willingness to meet strangers: No *** 0.39 0.2–0.9 Aggressive Coping*** 0.30 0.2–0.5 *p ≤ .05;** p ≤.01;*** p ≤.001 95 % confidence interval Tab. 5: Results of simple binary logistic regression for Model 2 International Conference on Cyberbullying, Paris, June 2012
  • 21. Conclusions and Outlook on future research International Conference on Cyberbullying, Paris, June 2012
  • 22. Conclusion • Identified risk factors: being a girl, willingness to meet strangers and being cyberbullied • Coping strategies seem to make a difference: – aggressive coping protects and – technical-cognitive coping increases the risk International Conference on Cyberbullying, Paris, June 2012
  • 23. Outlook future research • Validated instruments with consistent definition, measuring and period of time • Longitudinal studies (causality and directions) • Special risk groups (LGBT and children with special needs) need more research attention • Traditionally bullied, cyberbullied, cybergroomed? International Conference on Cyberbullying, Paris, June 2012
  • 24. Thank you for your attention! Dipl. Päd. Sebastian Wachs Division Education and Socialisation University of Bremen, Germany s.wachs@uni-bremen.de International Conference on Cyberbullying, Paris, June 2012