SlideShare uma empresa Scribd logo
1 de 18
Social Media Usage & the
Psychological Effects on Youth
Cyberbullying:
By Samantha Jaffe & Jessica Ryan
December 1, 2010
Raise your hand if you know
someone who
has been cyberbullied
in any way?
Research Questions
 What are the similarities and differences
in the motives behind bullying and
cyberbullying?
 What technologies are youth utilizing
when they cyberbully others?
 What are the psychological effects of
cyberbullying on youth?
Preview
 Traditional Bullying
 Cyberbullying
 Social Media Methods
 Psychological Effects
Traditional Bullying
 Definition:
– “persistent threatening and aggressive
behavior directed toward other people,
especially those who are smaller or
weaker”
– Debate on the word “Aggressive”
– Overt
Cyberbullying
 Definition:
– “forms of bullying that use electronic means such
as the Internet and mobile phones to aggressively
and intentionally harm someone” (Price &
Dalgelish, 2010, p.51).
 “Bullying on Steroids”
Methods of Cyberbullying
 Flaming: sending vulgar messages about a person to an online
group or directly to the person via email other text messaging
(Li, 2008, p.225)
 Online harrassment: repeatedly sending offensive messages
via email or other text messaging to a person (Li, 2008, p.225)
 Cyberstalking: online harassment that includes threats of harm
or is excessively intimidating (Li, 2008, p.225)
 Denigration (put-downs): Sending harmful, untrue, or cruel
statements about a person to other people or posting such
material online (Li, 2008, p.225)
Methods of Cyberbullying (cont’d)
 Masquerade (or Impersonation): pretending to be someone
else and sending or posting material that makes that person
look bad (Li, 2008, p.225)
 Outing: sending or posting material about a person that
contains sensitive, private, or embarrassing information,
including forwarding private messages or images (Li, 2008,
p.225)
 Trickery: tricking someone into revealing secrets or
embarrassing information and sharing that information with
others (Trolley & Hanel, 2010, p.39)
 Exclusion: cruelly excluding someone from an online group (Li,
2008, p.225)
Social Media Usage
 Mobile Phones
 Social Networking
Sites (SNSs)
Mobile Phones
 Most preferred
method
 Two to one 15 to 18
female students
preferred harrassing
victims by text
messaging over other
mediums such as e-
mail, websites, and
instant messaging
(Toppo, 2006, p.08d).
Mobile Phones
 Advertisements
 “Sexting”
– “Sending or forwarding nude, sexually
suggestive, or explicit pictures on a cell
phone or online” (Siegle, 2010, p.15).
Social Networking Sites
 About 55% of
American youths use
SNSs (Trolley &
Hanel, 2010, p.9).
 About 46% of female
participants reported
using SNSs when
cyberbullying (Trolley
& Hanel, 2010, p.55).
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Social Networking Sites
 Profile Creation
 Identity Performance
 “Imagined Audience”
 Online and Offline Relationships
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Psychological Effects
 Control Imbalance:
– Changing roles
 Associated Feelings:
– Anger
– Frustration
– Sadness
– Anxiety
– Depression
– Lower Self-esteem
Psychological Effects (cont’d)
Hinduja, S., & Patchin, J. W. (2010b)
Psychological Effects (cont’d)
 Emotional Intelligence:
– Understanding Emotions
 Psychological Immune System:
– “The higher the level of one’s emotional
intelligence, the healthier one’s psychological
immune system” (Plaford, 2006, p. 59).
 Social Capital
Conclusions
 Traditional bullying and Cyberbullying are
different
– Methods
– Time and Space
– Covert vs Overt
 Increased Technology Usage
 Decreased Mental Health
 Limitations on Research
“It Gets Better” with Joe Biden
 http://www.youtube.com/watch?v=wcyXQJ

Mais conteúdo relacionado

Mais procurados

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
drogt1mm
 
Cyberbullying - FILM2601 project
Cyberbullying - FILM2601 projectCyberbullying - FILM2601 project
Cyberbullying - FILM2601 project
Ilana Solomons
 
Cyberbullying2 - FILM260
Cyberbullying2 - FILM260Cyberbullying2 - FILM260
Cyberbullying2 - FILM260
Ilana Solomons
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
danderson688
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
Cameron Piening
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
bmcdade
 

Mais procurados (18)

Curating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymityCurating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond Pseudonymity
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 
Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
What is cyberbullying
What is cyberbullyingWhat is cyberbullying
What is cyberbullying
 
Cyberbullying - FILM2601 project
Cyberbullying - FILM2601 projectCyberbullying - FILM2601 project
Cyberbullying - FILM2601 project
 
Cyberbullying2 - FILM260
Cyberbullying2 - FILM260Cyberbullying2 - FILM260
Cyberbullying2 - FILM260
 
Cyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima ShahCyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima Shah
 
To Comment Or Not To Comment
To Comment Or Not To CommentTo Comment Or Not To Comment
To Comment Or Not To Comment
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paper
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Polarization on social media
Polarization on social mediaPolarization on social media
Polarization on social media
 
Fys rp
Fys rpFys rp
Fys rp
 

Semelhante a Cyberbullying jaffe ryan

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
Amit Sheth
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
mickietanger
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
Gerard1990
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
Rob Jewitt
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
hartrobert670
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
MohinderSingh78
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
mrjsaldivar
 

Semelhante a Cyberbullying jaffe ryan (20)

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Sm
SmSm
Sm
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100
 
Week 5
Week 5Week 5
Week 5
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Cyberbullying jaffe ryan

  • 1. Social Media Usage & the Psychological Effects on Youth Cyberbullying: By Samantha Jaffe & Jessica Ryan December 1, 2010
  • 2. Raise your hand if you know someone who has been cyberbullied in any way?
  • 3. Research Questions  What are the similarities and differences in the motives behind bullying and cyberbullying?  What technologies are youth utilizing when they cyberbully others?  What are the psychological effects of cyberbullying on youth?
  • 4. Preview  Traditional Bullying  Cyberbullying  Social Media Methods  Psychological Effects
  • 5. Traditional Bullying  Definition: – “persistent threatening and aggressive behavior directed toward other people, especially those who are smaller or weaker” – Debate on the word “Aggressive” – Overt
  • 6. Cyberbullying  Definition: – “forms of bullying that use electronic means such as the Internet and mobile phones to aggressively and intentionally harm someone” (Price & Dalgelish, 2010, p.51).  “Bullying on Steroids”
  • 7. Methods of Cyberbullying  Flaming: sending vulgar messages about a person to an online group or directly to the person via email other text messaging (Li, 2008, p.225)  Online harrassment: repeatedly sending offensive messages via email or other text messaging to a person (Li, 2008, p.225)  Cyberstalking: online harassment that includes threats of harm or is excessively intimidating (Li, 2008, p.225)  Denigration (put-downs): Sending harmful, untrue, or cruel statements about a person to other people or posting such material online (Li, 2008, p.225)
  • 8. Methods of Cyberbullying (cont’d)  Masquerade (or Impersonation): pretending to be someone else and sending or posting material that makes that person look bad (Li, 2008, p.225)  Outing: sending or posting material about a person that contains sensitive, private, or embarrassing information, including forwarding private messages or images (Li, 2008, p.225)  Trickery: tricking someone into revealing secrets or embarrassing information and sharing that information with others (Trolley & Hanel, 2010, p.39)  Exclusion: cruelly excluding someone from an online group (Li, 2008, p.225)
  • 9. Social Media Usage  Mobile Phones  Social Networking Sites (SNSs)
  • 10. Mobile Phones  Most preferred method  Two to one 15 to 18 female students preferred harrassing victims by text messaging over other mediums such as e- mail, websites, and instant messaging (Toppo, 2006, p.08d).
  • 11. Mobile Phones  Advertisements  “Sexting” – “Sending or forwarding nude, sexually suggestive, or explicit pictures on a cell phone or online” (Siegle, 2010, p.15).
  • 12. Social Networking Sites  About 55% of American youths use SNSs (Trolley & Hanel, 2010, p.9).  About 46% of female participants reported using SNSs when cyberbullying (Trolley & Hanel, 2010, p.55). QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 13. Social Networking Sites  Profile Creation  Identity Performance  “Imagined Audience”  Online and Offline Relationships QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 14. Psychological Effects  Control Imbalance: – Changing roles  Associated Feelings: – Anger – Frustration – Sadness – Anxiety – Depression – Lower Self-esteem
  • 15. Psychological Effects (cont’d) Hinduja, S., & Patchin, J. W. (2010b)
  • 16. Psychological Effects (cont’d)  Emotional Intelligence: – Understanding Emotions  Psychological Immune System: – “The higher the level of one’s emotional intelligence, the healthier one’s psychological immune system” (Plaford, 2006, p. 59).  Social Capital
  • 17. Conclusions  Traditional bullying and Cyberbullying are different – Methods – Time and Space – Covert vs Overt  Increased Technology Usage  Decreased Mental Health  Limitations on Research
  • 18. “It Gets Better” with Joe Biden  http://www.youtube.com/watch?v=wcyXQJ

Notas do Editor

  1. Jessica & Samantha
  2. Jessica--- Into: Raise your hand if… Personal experience
  3. Samantha
  4. Samantha
  5. Samantha- Quote about it doubly dangerous beceause if left unattended it can rapidly escalate into en more serious violence and abuse. Overt easily seen
  6. Jessica
  7. Jessica
  8. Jessica
  9. Jessica
  10. Jessica
  11. Jessica
  12. Jessica
  13. Less than 13% remained in the their roles.
  14. Samantha Traditionaol bullying happens at school, neightboorhood, Viturally at any time- so different devides. Increased- more access, and tech, knowledge.
  15. Jessica - 35-59