SlideShare uma empresa Scribd logo
1 de 18
Social Media Usage & the
Psychological Effects on Youth
Cyberbullying:
By Samantha Jaffe & Jessica Ryan
December 1, 2010
Raise your hand if you know
someone who
has been cyberbullied
in any way?
Research Questions
 What are the similarities and differences
in the motives behind bullying and
cyberbullying?
 What technologies are youth utilizing
when they cyberbully others?
 What are the psychological effects of
cyberbullying on youth?
Preview
 Traditional Bullying
 Cyberbullying
 Social Media Methods
 Psychological Effects
Traditional Bullying
 Definition:
– “persistent threatening and aggressive
behavior directed toward other people,
especially those who are smaller or
weaker”
– Debate on the word “Aggressive”
– Overt
Cyberbullying
 Definition:
– “forms of bullying that use electronic means such
as the Internet and mobile phones to aggressively
and intentionally harm someone” (Price &
Dalgelish, 2010, p.51).
 “Bullying on Steroids”
Methods of Cyberbullying
 Flaming: sending vulgar messages about a person to an online
group or directly to the person via email other text messaging
(Li, 2008, p.225)
 Online harrassment: repeatedly sending offensive messages
via email or other text messaging to a person (Li, 2008, p.225)
 Cyberstalking: online harassment that includes threats of harm
or is excessively intimidating (Li, 2008, p.225)
 Denigration (put-downs): Sending harmful, untrue, or cruel
statements about a person to other people or posting such
material online (Li, 2008, p.225)
Methods of Cyberbullying (cont’d)
 Masquerade (or Impersonation): pretending to be someone
else and sending or posting material that makes that person
look bad (Li, 2008, p.225)
 Outing: sending or posting material about a person that
contains sensitive, private, or embarrassing information,
including forwarding private messages or images (Li, 2008,
p.225)
 Trickery: tricking someone into revealing secrets or
embarrassing information and sharing that information with
others (Trolley & Hanel, 2010, p.39)
 Exclusion: cruelly excluding someone from an online group (Li,
2008, p.225)
Social Media Usage
 Mobile Phones
 Social Networking
Sites (SNSs)
Mobile Phones
 Most preferred
method
 Two to one 15 to 18
female students
preferred harrassing
victims by text
messaging over other
mediums such as e-
mail, websites, and
instant messaging
(Toppo, 2006, p.08d).
Mobile Phones
 Advertisements
 “Sexting”
– “Sending or forwarding nude, sexually
suggestive, or explicit pictures on a cell
phone or online” (Siegle, 2010, p.15).
Social Networking Sites
 About 55% of
American youths use
SNSs (Trolley &
Hanel, 2010, p.9).
 About 46% of female
participants reported
using SNSs when
cyberbullying (Trolley
& Hanel, 2010, p.55).
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Social Networking Sites
 Profile Creation
 Identity Performance
 “Imagined Audience”
 Online and Offline Relationships
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Psychological Effects
 Control Imbalance:
– Changing roles
 Associated Feelings:
– Anger
– Frustration
– Sadness
– Anxiety
– Depression
– Lower Self-esteem
Psychological Effects (cont’d)
Hinduja, S., & Patchin, J. W. (2010b)
Psychological Effects (cont’d)
 Emotional Intelligence:
– Understanding Emotions
 Psychological Immune System:
– “The higher the level of one’s emotional
intelligence, the healthier one’s psychological
immune system” (Plaford, 2006, p. 59).
 Social Capital
Conclusions
 Traditional bullying and Cyberbullying are
different
– Methods
– Time and Space
– Covert vs Overt
 Increased Technology Usage
 Decreased Mental Health
 Limitations on Research
“It Gets Better” with Joe Biden
 http://www.youtube.com/watch?v=wcyXQJ

Mais conteúdo relacionado

Mais procurados (18)

Curating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymityCurating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond Pseudonymity
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 
Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
What is cyberbullying
What is cyberbullyingWhat is cyberbullying
What is cyberbullying
 
Cyberbullying - FILM2601 project
Cyberbullying - FILM2601 projectCyberbullying - FILM2601 project
Cyberbullying - FILM2601 project
 
Cyberbullying2 - FILM260
Cyberbullying2 - FILM260Cyberbullying2 - FILM260
Cyberbullying2 - FILM260
 
Cyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima ShahCyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima Shah
 
To Comment Or Not To Comment
To Comment Or Not To CommentTo Comment Or Not To Comment
To Comment Or Not To Comment
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paper
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Polarization on social media
Polarization on social mediaPolarization on social media
Polarization on social media
 
Fys rp
Fys rpFys rp
Fys rp
 

Semelhante a Cyberbullying jaffe ryan

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100justwatts3
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word mickietanger
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sitesGerard1990
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesRob Jewitt
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxhartrobert670
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)parsonsmaddy1
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...MohinderSingh78
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]William Kritsonis
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Societymrjsaldivar
 

Semelhante a Cyberbullying jaffe ryan (20)

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Sm
SmSm
Sm
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100
 
Week 5
Week 5Week 5
Week 5
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Cyberbullying jaffe ryan

  • 1. Social Media Usage & the Psychological Effects on Youth Cyberbullying: By Samantha Jaffe & Jessica Ryan December 1, 2010
  • 2. Raise your hand if you know someone who has been cyberbullied in any way?
  • 3. Research Questions  What are the similarities and differences in the motives behind bullying and cyberbullying?  What technologies are youth utilizing when they cyberbully others?  What are the psychological effects of cyberbullying on youth?
  • 4. Preview  Traditional Bullying  Cyberbullying  Social Media Methods  Psychological Effects
  • 5. Traditional Bullying  Definition: – “persistent threatening and aggressive behavior directed toward other people, especially those who are smaller or weaker” – Debate on the word “Aggressive” – Overt
  • 6. Cyberbullying  Definition: – “forms of bullying that use electronic means such as the Internet and mobile phones to aggressively and intentionally harm someone” (Price & Dalgelish, 2010, p.51).  “Bullying on Steroids”
  • 7. Methods of Cyberbullying  Flaming: sending vulgar messages about a person to an online group or directly to the person via email other text messaging (Li, 2008, p.225)  Online harrassment: repeatedly sending offensive messages via email or other text messaging to a person (Li, 2008, p.225)  Cyberstalking: online harassment that includes threats of harm or is excessively intimidating (Li, 2008, p.225)  Denigration (put-downs): Sending harmful, untrue, or cruel statements about a person to other people or posting such material online (Li, 2008, p.225)
  • 8. Methods of Cyberbullying (cont’d)  Masquerade (or Impersonation): pretending to be someone else and sending or posting material that makes that person look bad (Li, 2008, p.225)  Outing: sending or posting material about a person that contains sensitive, private, or embarrassing information, including forwarding private messages or images (Li, 2008, p.225)  Trickery: tricking someone into revealing secrets or embarrassing information and sharing that information with others (Trolley & Hanel, 2010, p.39)  Exclusion: cruelly excluding someone from an online group (Li, 2008, p.225)
  • 9. Social Media Usage  Mobile Phones  Social Networking Sites (SNSs)
  • 10. Mobile Phones  Most preferred method  Two to one 15 to 18 female students preferred harrassing victims by text messaging over other mediums such as e- mail, websites, and instant messaging (Toppo, 2006, p.08d).
  • 11. Mobile Phones  Advertisements  “Sexting” – “Sending or forwarding nude, sexually suggestive, or explicit pictures on a cell phone or online” (Siegle, 2010, p.15).
  • 12. Social Networking Sites  About 55% of American youths use SNSs (Trolley & Hanel, 2010, p.9).  About 46% of female participants reported using SNSs when cyberbullying (Trolley & Hanel, 2010, p.55). QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 13. Social Networking Sites  Profile Creation  Identity Performance  “Imagined Audience”  Online and Offline Relationships QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 14. Psychological Effects  Control Imbalance: – Changing roles  Associated Feelings: – Anger – Frustration – Sadness – Anxiety – Depression – Lower Self-esteem
  • 15. Psychological Effects (cont’d) Hinduja, S., & Patchin, J. W. (2010b)
  • 16. Psychological Effects (cont’d)  Emotional Intelligence: – Understanding Emotions  Psychological Immune System: – “The higher the level of one’s emotional intelligence, the healthier one’s psychological immune system” (Plaford, 2006, p. 59).  Social Capital
  • 17. Conclusions  Traditional bullying and Cyberbullying are different – Methods – Time and Space – Covert vs Overt  Increased Technology Usage  Decreased Mental Health  Limitations on Research
  • 18. “It Gets Better” with Joe Biden  http://www.youtube.com/watch?v=wcyXQJ

Notas do Editor

  1. Jessica & Samantha
  2. Jessica--- Into: Raise your hand if… Personal experience
  3. Samantha
  4. Samantha
  5. Samantha- Quote about it doubly dangerous beceause if left unattended it can rapidly escalate into en more serious violence and abuse. Overt easily seen
  6. Jessica
  7. Jessica
  8. Jessica
  9. Jessica
  10. Jessica
  11. Jessica
  12. Jessica
  13. Less than 13% remained in the their roles.
  14. Samantha Traditionaol bullying happens at school, neightboorhood, Viturally at any time- so different devides. Increased- more access, and tech, knowledge.
  15. Jessica - 35-59