SlideShare uma empresa Scribd logo
1 de 19
 
 
[object Object],[object Object],[object Object],[object Object]
Why investigate? - Por qué investigar? •  Incidence world-wide is increasing. •  More detailed research is required to reveal the full extent of the problem. •  Causal factors should be investigated (familial, cultural, etc.). •  Consequences can be tragic, resulting in death from suicide or murder. •  Coping strategies for victims need to be developed. •  Intervention strategies for bullies need to be developed.
Overview – Visión general A survey was conducted at Lavalla Catholic College. It was found that cyber-bullying was occurring, with both girls and boys being victims and perpetrators. Mobile phones and the Internet were being used .
Cyber-bullies in action! — Acoso en la net en plena acción! (Simulation only)
 
Introduction – Introducción There is a limited amount of research on cyber-bullying, with a variety of findings. It appears that the incidence of cyber-bullying is increasing world-wide: •  The incidence of victims ranges from 7% in the United States (2004) to 29% in Canada & China (2007). •  The incidence of bullies ranges from 11% in Australia (2005) to 19% in Canada & China (2007).
Numerous authors express the need for educating adults and consulting youth in order to devise intervention strategies. Purpose of the current research :   to expand current body of findings with the view of developing helping strategies for victims and prevention strategies for potential bullies.
Method – Metodologia 136 students aged 14 to 18 years participated by completing a self-administered survey. There were 14 items on the questionnaire designed to identify victims, bullies and the more common forms of cyber-bullying.
Sample Question (Victim) Have you received a nasty, deliberately hurtful text message on your mobile phone? A.  never  B.  once or twice C.  three to five times  D.  more than five times Sample Question (Bully) Have you posted mean, nasty or embarrassing information, pictures or videos about someone on an Internet site (e.g. MySpace) ? A.  never  B.  once or twice C.  three to five times  D.  more than five times Total confidentiality was maintained to encourage honest responses.
Results – Resultados •  The incidence of victims was 1:4 •  The incidence of bullies was approximately 1:7 •  Boys have been bullied in more ways than girls •  More photos or videos about boys have been sent to mobile phones
Una pregunta para usted:  What is the most common form of bullying? Answer:  Enoph elibom a ot gnigassem- txet ( Una pista:  Read back-to-front! )
Conclusions – Conclusiónes The incidence of cyber-bullying among students was significant: During the previous three to four months 25% had been victims and 14% admitted to being perpetrators. Coping strategies for victims and intervention practices for bullies need to be implemented .
 
Future directions – Hacia dondé vamos •  More global research to identify the full extent of the problem. •  Identification of reasons why teenagers engage in covert aggression. •  Education of older generation for intervention purposes. •  Consultation with youth on how to combat the problem. •  Development of cyber-safety policies including legislation. •  Devising intervention strategies to reduce psychological harm for victims and victim bullies. •  Identifying factors that lead to bullying so that the activities of bullies may be redirected to more pro-social behaviour.
References – Referencias Bamford, A. (2004). Cyber-bullying.  AHISA Pastoral Care National Conference, Melbourne, Australia . anne.bamford@uts.edu.au Campbell, M. (2005). Cyber-bullying: An old problem in a new guise?  Australian Journal of Guidance and Counselling 15 (1) , 68-76 Child Health Promotion Research Unit (2007): http://chpru.ecu.edu.au/research/current/cyber-bullying.php
References – Referencias Li, Q. (2007). Bullying in the new playground: Research into cyberbullying and cyber victimisation.  Australasian Journal of Educational Technology, 23 (4) , 435-454 Ybarra, M.L., & Mitchell, K.J. (2004). Youth engaging in online harassment: Associations with caregiver-child relationships, Internet use, and personal characteristics.  Journal of Adolescence, 27 , 319-336
Acknowledgements Sponsorship thanks:  Village Cinemas  (Morwell),  Edith Cowan University ,  Trafalgar Lions Club A personal thank you to  Melissa Epstein  of Edith Cowan University for her interest and support. Thank you also to  Colin Purrington  for his amusing and excellent article on how to design a scientific poster: Purrington, C.B. (2006).  Advice on designing scientific posters . http://www.swarthmore.edu/NatSci/cpurrin1/posteradvice.htm. Accessed 06/03/2008  

Mais conteúdo relacionado

Mais procurados

rashid. new commincation tech
rashid. new commincation techrashid. new commincation tech
rashid. new commincation tech
abdi rashid
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Scott Mills
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
Dustianne North
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
Dustianne North
 
Counterpoint on Anti-Techology
Counterpoint on Anti-TechologyCounterpoint on Anti-Techology
Counterpoint on Anti-Techology
Lisa Lam-Wilson
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains
Dustianne North
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pa21raym
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
bmcdade
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
mjsmith2505
 

Mais procurados (20)

Trends in Teen Communication: Opportunities and Challenges for Public Health ...
Trends in Teen Communication: Opportunities and Challenges for Public Health ...Trends in Teen Communication: Opportunities and Challenges for Public Health ...
Trends in Teen Communication: Opportunities and Challenges for Public Health ...
 
rashid. new commincation tech
rashid. new commincation techrashid. new commincation tech
rashid. new commincation tech
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
 
Counterpoint on Anti-Techology
Counterpoint on Anti-TechologyCounterpoint on Anti-Techology
Counterpoint on Anti-Techology
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Effects of Technology on Young Adults
Effects of Technology on Young AdultsEffects of Technology on Young Adults
Effects of Technology on Young Adults
 
Children’s use of online technologies
Children’s use of online technologiesChildren’s use of online technologies
Children’s use of online technologies
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Flipbook
FlipbookFlipbook
Flipbook
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Issues of language and frequency in measuring cyberbullying: Data from the Gr...
Issues of language and frequency in measuring cyberbullying: Data from the Gr...Issues of language and frequency in measuring cyberbullying: Data from the Gr...
Issues of language and frequency in measuring cyberbullying: Data from the Gr...
 

Destaque (20)

Lecc 9 Com Polit Y Propaganda
Lecc 9 Com Polit Y PropagandaLecc 9 Com Polit Y Propaganda
Lecc 9 Com Polit Y Propaganda
 
Revised Podcast
Revised PodcastRevised Podcast
Revised Podcast
 
Webquest
WebquestWebquest
Webquest
 
Ruths Letter
Ruths LetterRuths Letter
Ruths Letter
 
Tribusdejefes
TribusdejefesTribusdejefes
Tribusdejefes
 
Projekty Kieszewicz Salon
Projekty Kieszewicz SalonProjekty Kieszewicz Salon
Projekty Kieszewicz Salon
 
Concursodedisfraces
ConcursodedisfracesConcursodedisfraces
Concursodedisfraces
 
3ºPeriodo
3ºPeriodo3ºPeriodo
3ºPeriodo
 
Anticonceptivo
AnticonceptivoAnticonceptivo
Anticonceptivo
 
Med Media Inscripciones
Med Media InscripcionesMed Media Inscripciones
Med Media Inscripciones
 
Lecc 6 Introd A Com Sg Xx
Lecc 6 Introd A Com Sg XxLecc 6 Introd A Com Sg Xx
Lecc 6 Introd A Com Sg Xx
 
Algoritmo
AlgoritmoAlgoritmo
Algoritmo
 
Pa Slidesluizt6m3
Pa Slidesluizt6m3Pa Slidesluizt6m3
Pa Slidesluizt6m3
 
AereopùEr..
AereopùEr..AereopùEr..
AereopùEr..
 
PresentacióN1
PresentacióN1PresentacióN1
PresentacióN1
 
Webquest Descriptive Statistics of the NCAA
Webquest Descriptive Statistics of the NCAAWebquest Descriptive Statistics of the NCAA
Webquest Descriptive Statistics of the NCAA
 
Queespene
QueespeneQueespene
Queespene
 
Confluenciadegenialidades
ConfluenciadegenialidadesConfluenciadegenialidades
Confluenciadegenialidades
 
Que Lado Del Cerebro Usas
Que Lado Del Cerebro UsasQue Lado Del Cerebro Usas
Que Lado Del Cerebro Usas
 
Charlie Brown
Charlie BrownCharlie Brown
Charlie Brown
 

Semelhante a Mexico Presentation[1]

Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
joellemurphey
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
Meghan.V
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
larsselect
 
AKhhcdatmif1dOriginal articl.docx
AKhhcdatmif1dOriginal articl.docxAKhhcdatmif1dOriginal articl.docx
AKhhcdatmif1dOriginal articl.docx
simonlbentley59018
 

Semelhante a Mexico Presentation[1] (20)

Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 
A comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national surveyA comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national survey
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
AKhhcdatmif1dOriginal articl.docx
AKhhcdatmif1dOriginal articl.docxAKhhcdatmif1dOriginal articl.docx
AKhhcdatmif1dOriginal articl.docx
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Online harassment and cyber-bullying within the school context
Online harassment and cyber-bullying within the school contextOnline harassment and cyber-bullying within the school context
Online harassment and cyber-bullying within the school context
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Mexico Presentation[1]

  • 1.  
  • 2.  
  • 3.
  • 4. Why investigate? - Por qué investigar? • Incidence world-wide is increasing. • More detailed research is required to reveal the full extent of the problem. • Causal factors should be investigated (familial, cultural, etc.). • Consequences can be tragic, resulting in death from suicide or murder. • Coping strategies for victims need to be developed. • Intervention strategies for bullies need to be developed.
  • 5. Overview – Visión general A survey was conducted at Lavalla Catholic College. It was found that cyber-bullying was occurring, with both girls and boys being victims and perpetrators. Mobile phones and the Internet were being used .
  • 6. Cyber-bullies in action! — Acoso en la net en plena acción! (Simulation only)
  • 7.  
  • 8. Introduction – Introducción There is a limited amount of research on cyber-bullying, with a variety of findings. It appears that the incidence of cyber-bullying is increasing world-wide: • The incidence of victims ranges from 7% in the United States (2004) to 29% in Canada & China (2007). • The incidence of bullies ranges from 11% in Australia (2005) to 19% in Canada & China (2007).
  • 9. Numerous authors express the need for educating adults and consulting youth in order to devise intervention strategies. Purpose of the current research : to expand current body of findings with the view of developing helping strategies for victims and prevention strategies for potential bullies.
  • 10. Method – Metodologia 136 students aged 14 to 18 years participated by completing a self-administered survey. There were 14 items on the questionnaire designed to identify victims, bullies and the more common forms of cyber-bullying.
  • 11. Sample Question (Victim) Have you received a nasty, deliberately hurtful text message on your mobile phone? A. never B. once or twice C. three to five times D. more than five times Sample Question (Bully) Have you posted mean, nasty or embarrassing information, pictures or videos about someone on an Internet site (e.g. MySpace) ? A. never B. once or twice C. three to five times D. more than five times Total confidentiality was maintained to encourage honest responses.
  • 12. Results – Resultados • The incidence of victims was 1:4 • The incidence of bullies was approximately 1:7 • Boys have been bullied in more ways than girls • More photos or videos about boys have been sent to mobile phones
  • 13. Una pregunta para usted: What is the most common form of bullying? Answer: Enoph elibom a ot gnigassem- txet ( Una pista: Read back-to-front! )
  • 14. Conclusions – Conclusiónes The incidence of cyber-bullying among students was significant: During the previous three to four months 25% had been victims and 14% admitted to being perpetrators. Coping strategies for victims and intervention practices for bullies need to be implemented .
  • 15.  
  • 16. Future directions – Hacia dondé vamos • More global research to identify the full extent of the problem. • Identification of reasons why teenagers engage in covert aggression. • Education of older generation for intervention purposes. • Consultation with youth on how to combat the problem. • Development of cyber-safety policies including legislation. • Devising intervention strategies to reduce psychological harm for victims and victim bullies. • Identifying factors that lead to bullying so that the activities of bullies may be redirected to more pro-social behaviour.
  • 17. References – Referencias Bamford, A. (2004). Cyber-bullying. AHISA Pastoral Care National Conference, Melbourne, Australia . anne.bamford@uts.edu.au Campbell, M. (2005). Cyber-bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling 15 (1) , 68-76 Child Health Promotion Research Unit (2007): http://chpru.ecu.edu.au/research/current/cyber-bullying.php
  • 18. References – Referencias Li, Q. (2007). Bullying in the new playground: Research into cyberbullying and cyber victimisation. Australasian Journal of Educational Technology, 23 (4) , 435-454 Ybarra, M.L., & Mitchell, K.J. (2004). Youth engaging in online harassment: Associations with caregiver-child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27 , 319-336
  • 19. Acknowledgements Sponsorship thanks: Village Cinemas (Morwell), Edith Cowan University , Trafalgar Lions Club A personal thank you to Melissa Epstein of Edith Cowan University for her interest and support. Thank you also to Colin Purrington for his amusing and excellent article on how to design a scientific poster: Purrington, C.B. (2006). Advice on designing scientific posters . http://www.swarthmore.edu/NatSci/cpurrin1/posteradvice.htm. Accessed 06/03/2008