SlideShare uma empresa Scribd logo
1 de 24
Lars Soderberg
Communication & Technology 250
Research Question
Why do teenagers use cyber bullying as a form
of communication?
What is Cyber Bullying?
• “Willful and repeated harm inflicted through
the use of computers, cell phones, and other
electronic devices.” (Schrock & Boyd, 2011, p.
374)
• Stereotypical widespread problem
• Anonymity
– Private Messages, use of social media, doesn’t
have to be done at school (Farrell, 2012, p.26)
Power of Cyber Bullying
• Growth of the internet
• Permanent posts
• Deadly effects
– Depression, suicide, etc. (Cloud, 2010)
• Fast publicity of message (Ringrose, 2011, p.
133)
• Anonymity
– Mystery regarding the root of the message  lack
of control (Ringrose, 2011, p. 132)
Cyber Bullying Outlets
• Social Media
– Facebook, Twitter, MySpace, etc.
• Email
• Blogs / Websites (Vandebosch & Van
Cleemput, 2009, p. 1)
• Text Messaging
• Instant Messaging
– AIM, iMessage, etc.
“The youngsters who perpetrate acts of cyber
bullying have, in many cases, also experienced
cyber bullying as victims or bystanders and vice
versa.” (Vandebosch & Van Cleemput, 2009,
p.22)
Types of Cyber Bullying
• Direct involvement of the victim
– Viruses, internet / mobile bullying, social exclusion
(Vandebosch & Van Cleemput, 2009, p. 5)
• Initial lack of involvement by the victim
– Online anonymity, internet / mobile bullying
(Vandebosch & Van Cleemput, 2009, p. 5)
A Cyber Bully’s Effectiveness
• Hyperpersonal communication
– The ambiguity of messages online may cause
under/over dramatization of messages (Farrell,
2012, p.28)
• Channel expansion theory
– The level of knowledge in regards to a channel,
message topic, context, and source will determine
the level of effectiveness (Farrell, 2012, p.28)
Exposure to Cyber Bullying
• 72% of 18-29 year olds use social networking
cites (Megan, 2012, p. 703)
• 15.8% of young adults in a study (596 people
ages 14-22) reported cyber-bullying compared
to 12.3% of adolescents (Megan, 2012, p. 705)
• In the study, 15.6% of harassing messages
came from someone unknown to the victim
(Megan, 2012, p. 712)
Exposure continued…
• School survey (177 7th graders)
– 14.5% reported to being cyber bullies
– 24.9% reported to being victims of cyber bullying
• Online study (500 teenagers aged 11-15)
(Vandebosch & Van Cleemput, 2009, p. 7)
– 32% sent anonymous harassing emails
– 29% sent harassing messages
Exposure Results
• Cyber bullying is different from case to case
• Traditional bullies and victimization online
(Vandebosch & Van Cleemput, 2009, p. 11)
• Lack of responsibility by student body
Victim Profile
• Victims
– Girls were more likely to be the victim
(Ringrose, 2011, 122)
– Higher relationship between a strictly online
relationship with their bully
– Tend to be victims of traditional bullying as
well
– High internet dependency
– Not socially competent
Kristensen and Smith Study
• (Vandebosch & Van Cleemput, 2009, p. 16-18)
– 44.8% knew their bully offline
– Half didn’t know their bully
– 14.1% were bullied by someone they only knew
online
– Experienced one form of offensive behavior orver
the internet / phone over the last 3 motnhs
• 61.9% reported to being victims
• 52.5% reported to being perpetrators
• 76.3% reported to being bystanders
Ybarra Study
• (Vandebosch & Van Cleemput, 2009, p. 10)
– Males who reported as being depressed were
eight times more likely to report being a victim
“Ybarra identified both the amount of internet use
and the use of messenger programs as most
important predictors for the experience with cyber
bullying as a victim among females.” (Vandebosch &
Van Cleemput, 2009, p. 10)
Li Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 1/3 of “youngsters” bullied in school were also
cyber bullies
– 1/3 of “youngsters” reported their bullying in
school to backfire online and result in
victimization
– Majority of victims were females (p. 10)
– Strong correlation between cyber bullies and
cyber bully victims
Patchin & Hinduja Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 42.5% of cyber bully victims were frustrated
– 40% of victims were angry
– 17% felt sad
Causes of Cyber Bullying
• The internet is a very liberating platform
• Easier establishment of social relationships
• Anonymity
– The identity of the bully is often secret (Erdur-
Baker, 2012, p. 111)
– Provides adoption of “a more aggressive persona”.
(Erdur-Baker, 2012, p. 110)
Causes continued…
• Easy access to technology (Farrell, 2012, p.26)
• Increased time spent online spent by
teenagers
– Age of identity exploration (Megan, 2012, p. 703)
Cyber Bully Profile
• Cyber Bullies
– High self image
– Social competence
– High relationship
between traditional
and online bully
– Lack of surveillance by
parents
Final Thoughts
• Cyber bullying is evident among teenagers
– Strong correlation between traditional and cyber bullies
• Cyber bullies tend to be victims as well  motivation
• Amount of internet use in combination with lack of
parental supervision show Cyber Bullying trends
• Victims seek security online  anonymity
• Age matters
• Boys vs. Girls
– Gender tendencies vary by study
• Cyber Bullies seek popularity  power
– Also can respond to events at school
Conclusion
• Bullying varies on a case to case basis
– Increasing use of the Internet is problematic
– Reasons vary
• A more clear cut definition of Cyber Bullying is
needed
– Too much room for dispute
• More research is needed
– Motives
• More studies
– Consequences
• How effective they are in regards to deterrence
Further Research
What communicative factors determine the
presence of Cyber Bullying among teenagers?
Are there any new mediums for Cyber Bullying?
How successful are current consequences at
deterring Cyber Bullying?
What is the best method of communication in order
to prevent Cyber Bullying?
Fun Links!
• http://www.statecollege.com/news/local-
news/cyberbullying-a-mobile-problem,1458938/
– Cyber Bulling on your mobile phone
• http://cyberbullying.us/
– Cyber Bullying information
• http://www.stopbullying.gov/cyberbullying/
– Cyber Bullying prevention tips & informaton
• http://www.today.com/tech/new-home-cyberbullying-
yik-yak-gossip-app-takes-high-schools-2D79597218
– New form of social media associated with Cyber Bullying
• http://magicvalley.com/news/local/schools-teens-
fight-cyberbullying/article_f45101aa-cdc4-11e3-9910-
0019bb2963f4.html
– Teenagers fight against Cyber Bullying

Mais conteúdo relacionado

Mais procurados

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesSwapnil Shahade
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and CyberbullyingIsobar Australia
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 

Mais procurados (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 

Destaque

Bullying and Violence Prevention Presentation
Bullying and Violence Prevention PresentationBullying and Violence Prevention Presentation
Bullying and Violence Prevention PresentationSafeAndCaring
 
Bullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint PresentationBullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint PresentationJohn M. Rinaldi
 
Violence - Bullying
Violence - BullyingViolence - Bullying
Violence - BullyingGreg
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpointgmtango
 
Anti Bully and prevention of bullying
Anti Bully and prevention of bullyingAnti Bully and prevention of bullying
Anti Bully and prevention of bullyingJess560960
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationdreamingmoi
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1itunaschool
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 

Destaque (15)

Bullying and Violence Prevention Presentation
Bullying and Violence Prevention PresentationBullying and Violence Prevention Presentation
Bullying and Violence Prevention Presentation
 
Bullying
BullyingBullying
Bullying
 
Bullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint PresentationBullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint Presentation
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Violence - Bullying
Violence - BullyingViolence - Bullying
Violence - Bullying
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Bullying in schools
Bullying in schoolsBullying in schools
Bullying in schools
 
Anti Bully and prevention of bullying
Anti Bully and prevention of bullyingAnti Bully and prevention of bullying
Anti Bully and prevention of bullying
 
Bullying
BullyingBullying
Bullying
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 

Semelhante a Cyber bullying powerpoint round 2

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyinglarsselect
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsLori Mitchell
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdfJioAhuja
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxjoellemurphey
 

Semelhante a Cyber bullying powerpoint round 2 (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate Students
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Mexico Presentation[1]
Mexico Presentation[1]Mexico Presentation[1]
Mexico Presentation[1]
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
 

Último

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Cyber bullying powerpoint round 2

  • 2. Research Question Why do teenagers use cyber bullying as a form of communication?
  • 3. What is Cyber Bullying? • “Willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.” (Schrock & Boyd, 2011, p. 374) • Stereotypical widespread problem • Anonymity – Private Messages, use of social media, doesn’t have to be done at school (Farrell, 2012, p.26)
  • 4.
  • 5. Power of Cyber Bullying • Growth of the internet • Permanent posts • Deadly effects – Depression, suicide, etc. (Cloud, 2010) • Fast publicity of message (Ringrose, 2011, p. 133) • Anonymity – Mystery regarding the root of the message  lack of control (Ringrose, 2011, p. 132)
  • 6. Cyber Bullying Outlets • Social Media – Facebook, Twitter, MySpace, etc. • Email • Blogs / Websites (Vandebosch & Van Cleemput, 2009, p. 1) • Text Messaging • Instant Messaging – AIM, iMessage, etc.
  • 7. “The youngsters who perpetrate acts of cyber bullying have, in many cases, also experienced cyber bullying as victims or bystanders and vice versa.” (Vandebosch & Van Cleemput, 2009, p.22)
  • 8. Types of Cyber Bullying • Direct involvement of the victim – Viruses, internet / mobile bullying, social exclusion (Vandebosch & Van Cleemput, 2009, p. 5) • Initial lack of involvement by the victim – Online anonymity, internet / mobile bullying (Vandebosch & Van Cleemput, 2009, p. 5)
  • 9. A Cyber Bully’s Effectiveness • Hyperpersonal communication – The ambiguity of messages online may cause under/over dramatization of messages (Farrell, 2012, p.28) • Channel expansion theory – The level of knowledge in regards to a channel, message topic, context, and source will determine the level of effectiveness (Farrell, 2012, p.28)
  • 10. Exposure to Cyber Bullying • 72% of 18-29 year olds use social networking cites (Megan, 2012, p. 703) • 15.8% of young adults in a study (596 people ages 14-22) reported cyber-bullying compared to 12.3% of adolescents (Megan, 2012, p. 705) • In the study, 15.6% of harassing messages came from someone unknown to the victim (Megan, 2012, p. 712)
  • 11. Exposure continued… • School survey (177 7th graders) – 14.5% reported to being cyber bullies – 24.9% reported to being victims of cyber bullying • Online study (500 teenagers aged 11-15) (Vandebosch & Van Cleemput, 2009, p. 7) – 32% sent anonymous harassing emails – 29% sent harassing messages
  • 12. Exposure Results • Cyber bullying is different from case to case • Traditional bullies and victimization online (Vandebosch & Van Cleemput, 2009, p. 11) • Lack of responsibility by student body
  • 13. Victim Profile • Victims – Girls were more likely to be the victim (Ringrose, 2011, 122) – Higher relationship between a strictly online relationship with their bully – Tend to be victims of traditional bullying as well – High internet dependency – Not socially competent
  • 14. Kristensen and Smith Study • (Vandebosch & Van Cleemput, 2009, p. 16-18) – 44.8% knew their bully offline – Half didn’t know their bully – 14.1% were bullied by someone they only knew online – Experienced one form of offensive behavior orver the internet / phone over the last 3 motnhs • 61.9% reported to being victims • 52.5% reported to being perpetrators • 76.3% reported to being bystanders
  • 15. Ybarra Study • (Vandebosch & Van Cleemput, 2009, p. 10) – Males who reported as being depressed were eight times more likely to report being a victim “Ybarra identified both the amount of internet use and the use of messenger programs as most important predictors for the experience with cyber bullying as a victim among females.” (Vandebosch & Van Cleemput, 2009, p. 10)
  • 16. Li Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 1/3 of “youngsters” bullied in school were also cyber bullies – 1/3 of “youngsters” reported their bullying in school to backfire online and result in victimization – Majority of victims were females (p. 10) – Strong correlation between cyber bullies and cyber bully victims
  • 17. Patchin & Hinduja Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 42.5% of cyber bully victims were frustrated – 40% of victims were angry – 17% felt sad
  • 18. Causes of Cyber Bullying • The internet is a very liberating platform • Easier establishment of social relationships • Anonymity – The identity of the bully is often secret (Erdur- Baker, 2012, p. 111) – Provides adoption of “a more aggressive persona”. (Erdur-Baker, 2012, p. 110)
  • 19. Causes continued… • Easy access to technology (Farrell, 2012, p.26) • Increased time spent online spent by teenagers – Age of identity exploration (Megan, 2012, p. 703)
  • 20. Cyber Bully Profile • Cyber Bullies – High self image – Social competence – High relationship between traditional and online bully – Lack of surveillance by parents
  • 21. Final Thoughts • Cyber bullying is evident among teenagers – Strong correlation between traditional and cyber bullies • Cyber bullies tend to be victims as well  motivation • Amount of internet use in combination with lack of parental supervision show Cyber Bullying trends • Victims seek security online  anonymity • Age matters • Boys vs. Girls – Gender tendencies vary by study • Cyber Bullies seek popularity  power – Also can respond to events at school
  • 22. Conclusion • Bullying varies on a case to case basis – Increasing use of the Internet is problematic – Reasons vary • A more clear cut definition of Cyber Bullying is needed – Too much room for dispute • More research is needed – Motives • More studies – Consequences • How effective they are in regards to deterrence
  • 23. Further Research What communicative factors determine the presence of Cyber Bullying among teenagers? Are there any new mediums for Cyber Bullying? How successful are current consequences at deterring Cyber Bullying? What is the best method of communication in order to prevent Cyber Bullying?
  • 24. Fun Links! • http://www.statecollege.com/news/local- news/cyberbullying-a-mobile-problem,1458938/ – Cyber Bulling on your mobile phone • http://cyberbullying.us/ – Cyber Bullying information • http://www.stopbullying.gov/cyberbullying/ – Cyber Bullying prevention tips & informaton • http://www.today.com/tech/new-home-cyberbullying- yik-yak-gossip-app-takes-high-schools-2D79597218 – New form of social media associated with Cyber Bullying • http://magicvalley.com/news/local/schools-teens- fight-cyberbullying/article_f45101aa-cdc4-11e3-9910- 0019bb2963f4.html – Teenagers fight against Cyber Bullying