SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
 
 
[object Object],[object Object],[object Object],[object Object]
Why investigate? - Por qué investigar? •  Incidence world-wide is increasing. •  More detailed research is required to reveal the full extent of the problem. •  Causal factors should be investigated (familial, cultural, etc.). •  Consequences can be tragic, resulting in death from suicide or murder. •  Coping strategies for victims need to be developed. •  Intervention strategies for bullies need to be developed.
Overview – Visión general A survey was conducted at Lavalla Catholic College. It was found that cyber-bullying was occurring, with both girls and boys being victims and perpetrators. Mobile phones and the Internet were being used .
Cyber-bullies in action! — Acoso en la net en plena acción! (Simulation only)
 
Introduction – Introducción There is a limited amount of research on cyber-bullying, with a variety of findings. It appears that the incidence of cyber-bullying is increasing world-wide: •  The incidence of victims ranges from 7% in the United States (2004) to 29% in Canada & China (2007). •  The incidence of bullies ranges from 11% in Australia (2005) to 19% in Canada & China (2007).
Numerous authors express the need for educating adults and consulting youth in order to devise intervention strategies. Purpose of the current research :   to expand current body of findings with the view of developing helping strategies for victims and prevention strategies for potential bullies.
Method – Metodologia 136 students aged 14 to 18 years participated by completing a self-administered survey. There were 14 items on the questionnaire designed to identify victims, bullies and the more common forms of cyber-bullying.
Sample Question (Victim) Have you received a nasty, deliberately hurtful text message on your mobile phone? A.  never  B.  once or twice C.  three to five times  D.  more than five times Sample Question (Bully) Have you posted mean, nasty or embarrassing information, pictures or videos about someone on an Internet site (e.g. MySpace) ? A.  never  B.  once or twice C.  three to five times  D.  more than five times Total confidentiality was maintained to encourage honest responses.
Results – Resultados •  The incidence of victims was 1:4 •  The incidence of bullies was approximately 1:7 •  Boys have been bullied in more ways than girls •  More photos or videos about boys have been sent to mobile phones
Una pregunta para usted:  What is the most common form of bullying? Answer:  Enoph elibom a ot gnigassem- txet ( Una pista:  Read back-to-front! )
Conclusions – Conclusiónes The incidence of cyber-bullying among students was significant: During the previous three to four months 25% had been victims and 14% admitted to being perpetrators. Coping strategies for victims and intervention practices for bullies need to be implemented .
 
Future directions – Hacia dondé vamos •  More global research to identify the full extent of the problem. •  Identification of reasons why teenagers engage in covert aggression. •  Education of older generation for intervention purposes. •  Consultation with youth on how to combat the problem. •  Development of cyber-safety policies including legislation. •  Devising intervention strategies to reduce psychological harm for victims and victim bullies. •  Identifying factors that lead to bullying so that the activities of bullies may be redirected to more pro-social behaviour.
References – Referencias Bamford, A. (2004). Cyber-bullying.  AHISA Pastoral Care National Conference, Melbourne, Australia . anne.bamford@uts.edu.au Campbell, M. (2005). Cyber-bullying: An old problem in a new guise?  Australian Journal of Guidance and Counselling 15 (1) , 68-76 Child Health Promotion Research Unit (2007): http://chpru.ecu.edu.au/research/current/cyber-bullying.php
References – Referencias Li, Q. (2007). Bullying in the new playground: Research into cyberbullying and cyber victimisation.  Australasian Journal of Educational Technology, 23 (4) , 435-454 Ybarra, M.L., & Mitchell, K.J. (2004). Youth engaging in online harassment: Associations with caregiver-child relationships, Internet use, and personal characteristics.  Journal of Adolescence, 27 , 319-336
Acknowledgements Sponsorship thanks:  Village Cinemas  (Morwell),  Edith Cowan University ,  Trafalgar Lions Club A personal thank you to  Melissa Epstein  of Edith Cowan University for her interest and support. Thank you also to  Colin Purrington  for his amusing and excellent article on how to design a scientific poster: Purrington, C.B. (2006).  Advice on designing scientific posters . http://www.swarthmore.edu/NatSci/cpurrin1/posteradvice.htm. Accessed 06/03/2008  

Contenu connexe

Tendances

rashid. new commincation tech
rashid. new commincation techrashid. new commincation tech
rashid. new commincation techabdi rashid
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHScott Mills
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...Jim "Brodie" Brazell
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_textingDustianne North
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711Dustianne North
 
Counterpoint on Anti-Techology
Counterpoint on Anti-TechologyCounterpoint on Anti-Techology
Counterpoint on Anti-TechologyLisa Lam-Wilson
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrainsDustianne North
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpa21raym
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1bmcdade
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1mjsmith2505
 

Tendances (20)

Trends in Teen Communication: Opportunities and Challenges for Public Health ...
Trends in Teen Communication: Opportunities and Challenges for Public Health ...Trends in Teen Communication: Opportunities and Challenges for Public Health ...
Trends in Teen Communication: Opportunities and Challenges for Public Health ...
 
rashid. new commincation tech
rashid. new commincation techrashid. new commincation tech
rashid. new commincation tech
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
 
Counterpoint on Anti-Techology
Counterpoint on Anti-TechologyCounterpoint on Anti-Techology
Counterpoint on Anti-Techology
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Effects of Technology on Young Adults
Effects of Technology on Young AdultsEffects of Technology on Young Adults
Effects of Technology on Young Adults
 
Children’s use of online technologies
Children’s use of online technologiesChildren’s use of online technologies
Children’s use of online technologies
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Flipbook
FlipbookFlipbook
Flipbook
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Issues of language and frequency in measuring cyberbullying: Data from the Gr...
Issues of language and frequency in measuring cyberbullying: Data from the Gr...Issues of language and frequency in measuring cyberbullying: Data from the Gr...
Issues of language and frequency in measuring cyberbullying: Data from the Gr...
 

En vedette

Lecc 9 Com Polit Y Propaganda
Lecc 9 Com Polit Y PropagandaLecc 9 Com Polit Y Propaganda
Lecc 9 Com Polit Y Propagandajesustimoteo
 
Revised Podcast
Revised PodcastRevised Podcast
Revised PodcastLtgyalan
 
Ruths Letter
Ruths LetterRuths Letter
Ruths Lettergthamban
 
Concursodedisfraces
ConcursodedisfracesConcursodedisfraces
Concursodedisfracesguest8fbc37
 
3ºPeriodo
3ºPeriodo3ºPeriodo
3ºPeriodoMariob
 
Med Media Inscripciones
Med Media InscripcionesMed Media Inscripciones
Med Media Inscripcionesshanad82
 
Lecc 6 Introd A Com Sg Xx
Lecc 6 Introd A Com Sg XxLecc 6 Introd A Com Sg Xx
Lecc 6 Introd A Com Sg Xxjesustimoteo
 
Algoritmo
AlgoritmoAlgoritmo
Algoritmodayanib
 
Pa Slidesluizt6m3
Pa Slidesluizt6m3Pa Slidesluizt6m3
Pa Slidesluizt6m3Iva Pavan
 
AereopùEr..
AereopùEr..AereopùEr..
AereopùEr..linkdeku
 
Webquest Descriptive Statistics of the NCAA
Webquest Descriptive Statistics of the NCAAWebquest Descriptive Statistics of the NCAA
Webquest Descriptive Statistics of the NCAAsrthomas
 
Que Lado Del Cerebro Usas
Que Lado Del Cerebro UsasQue Lado Del Cerebro Usas
Que Lado Del Cerebro Usasguest8fbc37
 
Charlie Brown
Charlie BrownCharlie Brown
Charlie Brownemaryniak
 

En vedette (20)

Lecc 9 Com Polit Y Propaganda
Lecc 9 Com Polit Y PropagandaLecc 9 Com Polit Y Propaganda
Lecc 9 Com Polit Y Propaganda
 
Revised Podcast
Revised PodcastRevised Podcast
Revised Podcast
 
Webquest
WebquestWebquest
Webquest
 
Ruths Letter
Ruths LetterRuths Letter
Ruths Letter
 
Tribusdejefes
TribusdejefesTribusdejefes
Tribusdejefes
 
Projekty Kieszewicz Salon
Projekty Kieszewicz SalonProjekty Kieszewicz Salon
Projekty Kieszewicz Salon
 
Concursodedisfraces
ConcursodedisfracesConcursodedisfraces
Concursodedisfraces
 
3ºPeriodo
3ºPeriodo3ºPeriodo
3ºPeriodo
 
Anticonceptivo
AnticonceptivoAnticonceptivo
Anticonceptivo
 
Med Media Inscripciones
Med Media InscripcionesMed Media Inscripciones
Med Media Inscripciones
 
Lecc 6 Introd A Com Sg Xx
Lecc 6 Introd A Com Sg XxLecc 6 Introd A Com Sg Xx
Lecc 6 Introd A Com Sg Xx
 
Algoritmo
AlgoritmoAlgoritmo
Algoritmo
 
Pa Slidesluizt6m3
Pa Slidesluizt6m3Pa Slidesluizt6m3
Pa Slidesluizt6m3
 
AereopùEr..
AereopùEr..AereopùEr..
AereopùEr..
 
PresentacióN1
PresentacióN1PresentacióN1
PresentacióN1
 
Webquest Descriptive Statistics of the NCAA
Webquest Descriptive Statistics of the NCAAWebquest Descriptive Statistics of the NCAA
Webquest Descriptive Statistics of the NCAA
 
Queespene
QueespeneQueespene
Queespene
 
Confluenciadegenialidades
ConfluenciadegenialidadesConfluenciadegenialidades
Confluenciadegenialidades
 
Que Lado Del Cerebro Usas
Que Lado Del Cerebro UsasQue Lado Del Cerebro Usas
Que Lado Del Cerebro Usas
 
Charlie Brown
Charlie BrownCharlie Brown
Charlie Brown
 

Similaire à Mexico Presentation[1]

Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Josie Fraser
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperMeghan.V
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105CarolRusch1
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2larsselect
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Alan Bruce
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16VannaSchrader3
 

Similaire à Mexico Presentation[1] (20)

Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 
A comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national surveyA comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national survey
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Online harassment and cyber-bullying within the school context
Online harassment and cyber-bullying within the school contextOnline harassment and cyber-bullying within the school context
Online harassment and cyber-bullying within the school context
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Dernier

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 

Dernier (20)

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 

Mexico Presentation[1]

  • 1.  
  • 2.  
  • 3.
  • 4. Why investigate? - Por qué investigar? • Incidence world-wide is increasing. • More detailed research is required to reveal the full extent of the problem. • Causal factors should be investigated (familial, cultural, etc.). • Consequences can be tragic, resulting in death from suicide or murder. • Coping strategies for victims need to be developed. • Intervention strategies for bullies need to be developed.
  • 5. Overview – Visión general A survey was conducted at Lavalla Catholic College. It was found that cyber-bullying was occurring, with both girls and boys being victims and perpetrators. Mobile phones and the Internet were being used .
  • 6. Cyber-bullies in action! — Acoso en la net en plena acción! (Simulation only)
  • 7.  
  • 8. Introduction – Introducción There is a limited amount of research on cyber-bullying, with a variety of findings. It appears that the incidence of cyber-bullying is increasing world-wide: • The incidence of victims ranges from 7% in the United States (2004) to 29% in Canada & China (2007). • The incidence of bullies ranges from 11% in Australia (2005) to 19% in Canada & China (2007).
  • 9. Numerous authors express the need for educating adults and consulting youth in order to devise intervention strategies. Purpose of the current research : to expand current body of findings with the view of developing helping strategies for victims and prevention strategies for potential bullies.
  • 10. Method – Metodologia 136 students aged 14 to 18 years participated by completing a self-administered survey. There were 14 items on the questionnaire designed to identify victims, bullies and the more common forms of cyber-bullying.
  • 11. Sample Question (Victim) Have you received a nasty, deliberately hurtful text message on your mobile phone? A. never B. once or twice C. three to five times D. more than five times Sample Question (Bully) Have you posted mean, nasty or embarrassing information, pictures or videos about someone on an Internet site (e.g. MySpace) ? A. never B. once or twice C. three to five times D. more than five times Total confidentiality was maintained to encourage honest responses.
  • 12. Results – Resultados • The incidence of victims was 1:4 • The incidence of bullies was approximately 1:7 • Boys have been bullied in more ways than girls • More photos or videos about boys have been sent to mobile phones
  • 13. Una pregunta para usted: What is the most common form of bullying? Answer: Enoph elibom a ot gnigassem- txet ( Una pista: Read back-to-front! )
  • 14. Conclusions – Conclusiónes The incidence of cyber-bullying among students was significant: During the previous three to four months 25% had been victims and 14% admitted to being perpetrators. Coping strategies for victims and intervention practices for bullies need to be implemented .
  • 15.  
  • 16. Future directions – Hacia dondé vamos • More global research to identify the full extent of the problem. • Identification of reasons why teenagers engage in covert aggression. • Education of older generation for intervention purposes. • Consultation with youth on how to combat the problem. • Development of cyber-safety policies including legislation. • Devising intervention strategies to reduce psychological harm for victims and victim bullies. • Identifying factors that lead to bullying so that the activities of bullies may be redirected to more pro-social behaviour.
  • 17. References – Referencias Bamford, A. (2004). Cyber-bullying. AHISA Pastoral Care National Conference, Melbourne, Australia . anne.bamford@uts.edu.au Campbell, M. (2005). Cyber-bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling 15 (1) , 68-76 Child Health Promotion Research Unit (2007): http://chpru.ecu.edu.au/research/current/cyber-bullying.php
  • 18. References – Referencias Li, Q. (2007). Bullying in the new playground: Research into cyberbullying and cyber victimisation. Australasian Journal of Educational Technology, 23 (4) , 435-454 Ybarra, M.L., & Mitchell, K.J. (2004). Youth engaging in online harassment: Associations with caregiver-child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27 , 319-336
  • 19. Acknowledgements Sponsorship thanks: Village Cinemas (Morwell), Edith Cowan University , Trafalgar Lions Club A personal thank you to Melissa Epstein of Edith Cowan University for her interest and support. Thank you also to Colin Purrington for his amusing and excellent article on how to design a scientific poster: Purrington, C.B. (2006). Advice on designing scientific posters . http://www.swarthmore.edu/NatSci/cpurrin1/posteradvice.htm. Accessed 06/03/2008