SlideShare uma empresa Scribd logo
1 de 40
Week 5
The Societal Consequences Digital Health ,[object Object],[object Object],[object Object],[object Object],[object Object]
Critical Thinking – Digital Literacy
 
 
Or simply…media that is created to be shared freely http://www.youtube.com/watch?v=MpIOClX1jPE&feature=related
A Gateway for Dangerous Behavior?
Visit these sites at your own risk!
http://omegle.com/ http://www.chatroulette.com/
Cyber Bullying and Social Isolation: Phoebe & Alexis
  Anonymity Breeds Irresponsibility The problem, say Formspring's critics, is the site offers a perfect haven for cyberbulllying. As the "Edumacation" blog puts it: "Anyone who works with young people can quickly point out that anonymity nearly always breeds irresponsibility." The recent suicide of 15-year-old Pheobe Prince has drawn attention to the problem of bullying in cyberspace because victims often have no idea who is tormenting them. A Boycott Formspring Group on Facebook claims almost 7,300 members.  http://www.dailyfinance.com/story/media/do-you-know-who-your-children-are-online-formsprings-raunchy-f/19452194/?a_dgi=aolshare_email  A young person speaks..then tribute http://www.youtube.com/watch?v=8lyYjZyeN80 http://www.youtube.com/watch?v=Q1Y5hH1ScY0&feature=related
Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
Teen internet use basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
What are teens doing online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
How else are teens connecting? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Concerns in Online Safety Sphere ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Online Harassment & Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
What makes online harassment & bullying different? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Pew Internet: Online Harassment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
01/30/11
Cyberbullying ,[object Object],[object Object],[object Object],[object Object],May 2010
Frequency of bullying victimization among 11-16 year olds May 2010 ( n =1,193) (Ybarra, 2009)
Online Harassment (2) ,[object Object],[object Object],[object Object],May 2010
Frequency of bullying victimization among 11-16 year olds   by environment May 2010 ( n =1,193) (Ybarra, 2009)
Online (or not) Harassment  ,[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Why should we worry? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Why should we worry (2)? ,[object Object],[object Object],[object Object],[object Object],May 2010
Overlap of cyberbullying & internet victimization May 2010 (Ybarra, 2010)
Differences between cyberbullying & internet harassment ,[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Cell phone-based harassment ,[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
01/30/11
Sending Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Receiving Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object],May 2010
Sexting Scenarios ,[object Object],[object Object],[object Object],May 2010
Element of coercion for some sexting ,[object Object],May 2010
Summary ,[object Object],[object Object],[object Object],[object Object],May 2010
Final Thoughts ,[object Object],[object Object],[object Object],[object Object],May 2010
Thirty-two percent of online teens have experienced some form of harassment via the Internet, a problem also known as "cyberbullying." According to recent data, 15% of online teens have had private material forwarded without permission, 13% have received threatening messages and 6% have had embarrassing photos posted without permission.
 

Mais conteúdo relacionado

Mais procurados

Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2larsselect
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Presentation2
Presentation2Presentation2
Presentation2bdonaghy
 
Cyberbullying slidedeck
Cyberbullying slidedeckCyberbullying slidedeck
Cyberbullying slidedeckbyau1111
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
The Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims AndThe Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims Andso_f1y
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 

Mais procurados (20)

Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Presentation2
Presentation2Presentation2
Presentation2
 
Cyberbullying slidedeck
Cyberbullying slidedeckCyberbullying slidedeck
Cyberbullying slidedeck
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
The Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims AndThe Impact Of Cyberbullying On Its Victims And
The Impact Of Cyberbullying On Its Victims And
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 

Destaque

Technology, Teaching, Learning and Assessment Matrix
Technology, Teaching, Learning and Assessment MatrixTechnology, Teaching, Learning and Assessment Matrix
Technology, Teaching, Learning and Assessment MatrixDavid Peter
 
Concept and mind mapping
Concept and mind mappingConcept and mind mapping
Concept and mind mappingHarish B
 
50 Thinking prompts Mind Map
50 Thinking prompts Mind Map50 Thinking prompts Mind Map
50 Thinking prompts Mind MapPaul Foreman
 
MindMapping
MindMapping MindMapping
MindMapping 0508713
 
Drawing A Mind Map From Start To Finish
Drawing A Mind Map From Start To FinishDrawing A Mind Map From Start To Finish
Drawing A Mind Map From Start To FinishPaul Foreman
 
What is Mind Mapping? (English Version)
What is Mind Mapping? (English Version)What is Mind Mapping? (English Version)
What is Mind Mapping? (English Version)MindProject
 

Destaque (10)

Technology, Teaching, Learning and Assessment Matrix
Technology, Teaching, Learning and Assessment MatrixTechnology, Teaching, Learning and Assessment Matrix
Technology, Teaching, Learning and Assessment Matrix
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Mind mapping
Mind mapping Mind mapping
Mind mapping
 
Concept and mind mapping
Concept and mind mappingConcept and mind mapping
Concept and mind mapping
 
50 Thinking prompts Mind Map
50 Thinking prompts Mind Map50 Thinking prompts Mind Map
50 Thinking prompts Mind Map
 
MindMapping
MindMapping MindMapping
MindMapping
 
Drawing A Mind Map From Start To Finish
Drawing A Mind Map From Start To FinishDrawing A Mind Map From Start To Finish
Drawing A Mind Map From Start To Finish
 
Mind mapping.ppt final
Mind mapping.ppt finalMind mapping.ppt final
Mind mapping.ppt final
 
What is Mind Mapping? (English Version)
What is Mind Mapping? (English Version)What is Mind Mapping? (English Version)
What is Mind Mapping? (English Version)
 
MindMaps
MindMapsMindMaps
MindMaps
 

Semelhante a Week 5

Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011daniel_eukids
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1bmcdade
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 

Semelhante a Week 5 (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 
cyberworld
cyberworld cyberworld
cyberworld
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Internet experiences and exposures of children and adolescents: Implications ...
Internet experiences and exposures of children and adolescents: Implications ...Internet experiences and exposures of children and adolescents: Implications ...
Internet experiences and exposures of children and adolescents: Implications ...
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Presentation1
Presentation1Presentation1
Presentation1
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 

Mais de Ray Brannon

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedRay Brannon
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociologyRay Brannon
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Ray Brannon
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics Ray Brannon
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Ray Brannon
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to thinkRay Brannon
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Ray Brannon
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Ray Brannon
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story RevisedRay Brannon
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.Ray Brannon
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speechesRay Brannon
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body languageRay Brannon
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Ray Brannon
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study Ray Brannon
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsRay Brannon
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsRay Brannon
 

Mais de Ray Brannon (20)

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revised
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociology
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18
 
Stratification
Stratification Stratification
Stratification
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to think
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story Revised
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speeches
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body language
 
Get A Job 2016
Get A Job 2016Get A Job 2016
Get A Job 2016
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your Presentations
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tips
 

Week 5

  • 2.
  • 3. Critical Thinking – Digital Literacy
  • 4.  
  • 5.  
  • 6. Or simply…media that is created to be shared freely http://www.youtube.com/watch?v=MpIOClX1jPE&feature=related
  • 7. A Gateway for Dangerous Behavior?
  • 8. Visit these sites at your own risk!
  • 10. Cyber Bullying and Social Isolation: Phoebe & Alexis
  • 11. Anonymity Breeds Irresponsibility The problem, say Formspring's critics, is the site offers a perfect haven for cyberbulllying. As the "Edumacation" blog puts it: "Anyone who works with young people can quickly point out that anonymity nearly always breeds irresponsibility." The recent suicide of 15-year-old Pheobe Prince has drawn attention to the problem of bullying in cyberspace because victims often have no idea who is tormenting them. A Boycott Formspring Group on Facebook claims almost 7,300 members. http://www.dailyfinance.com/story/media/do-you-know-who-your-children-are-online-formsprings-raunchy-f/19452194/?a_dgi=aolshare_email A young person speaks..then tribute http://www.youtube.com/watch?v=8lyYjZyeN80 http://www.youtube.com/watch?v=Q1Y5hH1ScY0&feature=related
  • 12. Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23. Frequency of bullying victimization among 11-16 year olds May 2010 ( n =1,193) (Ybarra, 2009)
  • 24.
  • 25. Frequency of bullying victimization among 11-16 year olds by environment May 2010 ( n =1,193) (Ybarra, 2009)
  • 26.
  • 27.
  • 28.
  • 29. Overlap of cyberbullying & internet victimization May 2010 (Ybarra, 2010)
  • 30.
  • 31.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Thirty-two percent of online teens have experienced some form of harassment via the Internet, a problem also known as "cyberbullying." According to recent data, 15% of online teens have had private material forwarded without permission, 13% have received threatening messages and 6% have had embarrassing photos posted without permission.
  • 40.  

Notas do Editor

  1. ACCOUNT INFORMATION. TO DOWNLOAD AND INSTALL Paltalk YOU MUST BE AT LEAST EIGHTEEN (18) YEARS OF AGE. THERE ARE CERTAIN AREAS ON Paltalk THAT CONTAIN ADULT OR MATURE CONTENT. ACCORDINGLY, YOU REPRESENT THAT YOU ARE AT LEAST EIGHTEEN (18) YEARS OF AGE TO USE THOSE AREAS. NO ONE UNDER THE AGE OF THIRTEEN (13) IS PERMITTED TO USE Paltalk. NO ONE BETWEEN THE AGES OF THIRTEEN (13) AND EIGHTEEN (18) MAY USE Paltalk WITHOUT ADULT SUPERVISION. PARENTS AND GUARDIANS ASSUME ALL LIABILITY AND RESPONSIBILITY FOR THE USE OF THEIR ACCOUNTS BY OTHER PERSONS, INLCLUDING BUT NOT LIMITED TO USE OF THEIR ACCOUNTS BY PERSONS UNDER EIGHTEEN (18) YEARS OF AGE. ANY USER FOUND TO BE UNDER THE AGE OF THIRTEEN (13) OR PERMITTING USE OF Paltalk BY A PERSON UNDER THE AGE OF THIRTEEN (13), MAY HAVE HIS OR HER ACCOUNT SUSPENDED OR TERMINATED WITH OR WITHOUT NOTICE AND OTHER ACTIONS MAY ALSO BE TAKEN. IF A CHILD UNDER THIRTEEN (13) HAS ACCESS TO YOUR COMPUTER, DO NOT SAVE YOUR Paltalk PASSWORD; THIS WILL RESTRICT THE CHILD AND ANY UNAUTHORIZED USER FROM USING YOUR ACCOUNT. IN ADDITION, WE STRONGLY RECOMMEND THAT YOU CHECK REGULARLY TO SEE IF ANY NEW, UNAUTHORIZED ACCOUNTS HAVE BEEN CREATED UNDER YOUR Paltalk ACCOUNT. TO DELETE ANY * Profile We store information that we collect through cookies, log files, clear gifs, to create a “profile” of your preferences. We tie your personally identifiable information, and your purchasing history, to information in the profile, in order to provide tailored promotions and marketing offers and to improve the content of the site for you. We do not share your profile with other third parties without your consent. Paltalk is the sole owner of the information collected on Paltalk.com. Paltalk collects personally identifiable information from our users at several different points on our Web site or through our downloaded software.
  2. In order for us to create the most effective and targeted solutions, we have to know the exact nature of the problem.
  3. Library access and CELL PHONE ACCESS is particularly important to African American, and to a lesser extent English-Speaking Hispanic students. One quarter of low income teens (HHI under $30K) and 25% of African American teens say they go online most often from school, compared to 15% of online teens overall. Fewer low SES and African American teens go online daily 53% of af-am, vs 67% of white teens 75% of high income teens go online daily, compared to 39% of low SES teens. Slight decrease in teens going online from home since we first asked – broader use/access and also wide variety of access points/mobile access.
  4. Not just email, IM, but social networks, mobile devices and gaming platforms are all used to connect, talk and interact with others. And thus also may become platforms for bullying, too. This is where teens are - particularly outside of school - online, connected to each other by various means at all times.
  5. Online safety concerns breakdown roughly into two parts – concerns over harmful contact and concern over harmful content. What we’re focusing on here today is online CONTACT, rather than content and specifically, online bullying aka cyberbullying.
  6. Definition of bullying downloaded from http://olweus.org/public/bullying.page on May 12, 2009 and is also contained in Dan Olweus’ 1993 book “Bullying at School”: Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993
  7. Source: Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Online – identity can be shrouded. Youth who are physically bullied can/do retaliate online. Can be hard to determine who instigated and where. These are the “bully-victims” and the “instigator-victims.” Other definitions of cyberbullying used in major research projects on the topic: “ willful use of the Internet as a technological medium through which harm or discomfort is intentionally and repeatedly inflicted through indirect aggression that targets a specific person or group of persons.” (Williams and Guerra, 2007) “ an overt, intentional act of aggression towards another person online” (19% of young and regular internet users reported experiencing this) (Ybarra, & Mitchell, 2004) “ Willful and repeated harm inflicted through the medium of electronic text.” (Patchin & Hinduja, 2006)
  8. Invasive – computer and the internet bring the bullying into the sphere of the home, and cell phones, which are generally personal devices carried everywhere, mean that the bullying never stops.
  9. Pew data is measuring online harassment, as our questions did not ask about repetition or power imbalance. 15% had private comm forwarded with out permission 13% had a rumor spread about them 13% received a threatening message or comm 6% had embarrassing picture posted w/out permission Limitations: we missed a big one Missing spoofed/faked profile But Teens are also endlessly creative when it comes to bullying (and many other things) e.g., Text bombing=when a person sends 1000 of texts to one number… can be difficult to block, must pay for each text – can run up $100s in bills & makes it impossible to receive communication from others. Bullying in games – e.g., killing a player’s character quickly and repeatedly so gamer can’t play the game. Sources in this slide: Lenhart, A. (2007) Cyberbullying. Pew Internet & American Life Project, Washington, DC. http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Lenhart, A., et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  10. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx p. 86
  11. 9% data point is from: Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 33% data point is from: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156. Data unclear on likelihood of victims knowing perpetrator – 45-89% say they know who is harassing them. No major differences in SES, race/ethnicity, parent education in likelihood of being harassed online. (Pew 2007 data)
  12. Slide source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  13. Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Worth noting: Journal of Adolescent Health December 2007 issue has a special issue entirely devoted to research on Cyberbullying. Other research points to girls as more likely victims, or to boys and girls experiencing online bullying and harassment equally. (Wolak et al, 2007) – answers here not 100% conclusive. Ybarra data suggests that bullying does happen more at school than online. See following slide…
  14. Source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  15. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007 Dec;41(6 Suppl 1):S42-50. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.
  16. These are the “concurrent psychosocial problems” from Ybarra’s work. Source info for statements above: (see previous slides or bibliography for full cites) Bullying is broadly associated with: School violence – (Olweus, 2009 website ) Delinquency – (Hinduja & Patchin, 2007) Suicidal ideation (Hinduja & Patchin, in press @ Archives of Suicide Research) Depression and other psychological problems (Ybarra, 2007, Wolak, 2007) Substance abuse (Ybarra, 2007, Wolak, 2007) Delinquency / School avoidance (Hinduja & Patchin, 2007) Weapon-carrying (Nansel, 2003) Poor parent/caregiver relationships/offline victimization (Ybarra, 2007, Wolak, 2006)
  17. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177.
  18. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  19. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  20. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  21. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  22. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  23. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  24. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  25. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx