SlideShare a Scribd company logo
1 of 24
Cybergrooming –
Risk factors, coping strategies and
 associations with cyberbullying
           Dipl. Päd. Sebastian Wachs
        Acknowledgment: Prof. Dr. K.D. Wolf




 International Conference on Cyberbullying,
               Paris, June 2012
Overview




•   Background
•   Method
•   Results
•   Conclusions/Outlook




            International Conference on Cyberbullying, Paris, June 2012
Background of the Study




    International Conference on Cyberbullying, Paris, June 2012
Background


Cybergrooming (CYBGR)

“Establishing a trust-based relationship between
minors and usually adults using ICTs to
systematically solicit and exploit the minors for
sexual purposes.” (Wachs, Wolf and Pan, in review)




             International Conference on Cyberbullying, Paris, June 2012
Background


Research Questions

 RQ1: Which factors shape the risk to become
 a victim of CYBGR?
 RQ2: Are cyberbullied students more likely to be
 cybergroomed?
 RQ3: How students cope with CYBGR and
 which strategy seems to be effective?

             International Conference on Cyberbullying, Paris, June 2012
Background

 Associations between CYBGR and CYBB

                                                         • Use of ICTs
                                                         • Repetition
                                                         • Intentional
                                                            aggressive acts
    Cybergrooming                                        • Social
                                                        Cyberbullying
                                                            Relationship
                                                         • Imbalance of
                                                            power
                                                          • Role Association?

             International Conference on Cyberbullying, Paris, June 2012
Method




International Conference on Cyberbullying, Paris, June 2012
Method


 Participants

• Self-reports from 518 students
• 5th to 10th Grades (11-17 yr) from 4 German
  schools
• 49.0 % of the participants was male and
  50.8 % was female; 0.2 % did not answer
• from a region with a high proportion of
  immigrant families, and a relatively poor
  urban economic situation.
           International Conference on Cyberbullying, Paris, June 2012
Method


Procedure
• Online Survey
• Computer Assisted Personal Interview
• participants sat at a PC in
  school computer rooms
  and entered the answers




          International Conference on Cyberbullying, Paris, June 2012
Method

Questionnaire
‘A cybergroomer is a person who is at least 7 years
older than you and who you know over a longer time
exclusively through online communication. At the
beginning, the cybergroomer seems to be interested in
your daily life problems, but after a certain time s/he
appears to be interested in sexual topics and in the
exchange of sexual fantasies and/or nude material
(pictures or video chats).’ Used Definition



               International Conference on Cyberbullying, Paris, June 2012
Method

Questionnaire
‘How often did you have contact with a
cybergroomer within the last twelve
month?’


Never   Once a   Once a              Once a             Several
        year     month               week               times a
                                                        week




                 International Conference on Cyberbullying, Paris, June 2012
Method

Questionnaire
Items for assessing (cyber-)bullying and coping
strategies partly following the ‘Mobbing Questionnaire
for students' (Jäger et al. 2007)
Cyberbullying    4 Items each                 Never, Once or twice, Twice or
                 side                         thrice, About once a week or
                                              Several times a week
Coping           10 Items                     Yes, A little bit, Almost no, No
Strategies
ICTs Usage and   access to PC or Internet at home, ownership of mobile
Access           phone or smartphone, amount of ICTs usage


                  International Conference on Cyberbullying, Paris, June 2012
Results




International Conference on Cyberbullying, Paris, June 2012
Results

 Prevalence Rate                                Victims of CYBGR: 6.5 %
                                                         (n=34)

                                                                4.6 %


                                                                                          10.4 %
79%                                     21%             1.9 %



                                                                 4.3 %


                                                    once a year                      once a month
At least once a year      Never                     once a week                      several times a week
                       International Conference on Cyberbullying, Paris, June 2012
Results

          Prevalence rate for CYBGR is
          significantly…

                     higher for girls (8.7% vs. 4.3%), t(514) = 3.28, p = .001.


                            lower for adolescents who are not willing to
                            meet strangers (4.4% vs. 15.5%), t(514) = 4.91,
                            p = <.001.

                                     lower for adolescents who do not discuss
                                     problems with strangers (5.6% vs.
                                     11.4%), t(514) = 3.93, p < .001.




          International Conference on Cyberbullying, Paris, June 2012
Results

    RQ 1: Which factors shape the risk to be
               cybergroomed?

    Willingness to discuss                                    Access to Internet at home
    problems with strangers                                   Ownership of mobile phone
   Willingness
 Coefficients to meet                        Ownership
                                       Estimate Std. of smartphone
                                                             t-
     strangers                                Amount of internet usage
                                                  Error      value
    Being cyberbullied
 (Intercept) ***                               0.041
                                          1.43 Access to PC at home
                                                             34.49
 Being cybervictim ***                    0.46    0.085      5.42
 Being a girl ***                         0.28    0.083      3.46
                         Migration background
 Not willing to meet strangers ***       -0.43    0.106      -4.10
F(3, 512) = 23.39, R2=0.12, p <  Grade
                                .001.          * p ≤ .05;** p ≤.01;*** p ≤.001
                                Gender
Tab 1: Model 1 (3 predictors) beta coefficients for standardized variables

                   International Conference on Cyberbullying, Paris, June 2012
Results

RQ 2: Are cyberbullied students more likely to
             be cybergroomed?

                  Variable                                  O.R.    C.I.
     Being a girl***                                        2.35 1.1–5.2
     Being cyberbullied***                                  1.75 1.2–2.4
     Not willing to meet strangers ***                      0.30 0.14–0.65
    *p ≤ .05; **p ≤.01; ***p ≤.001        95 % confidence interval
  Tab. 2: Results of simple binary logistic regression for Model 1


                  International Conference on Cyberbullying, Paris, June 2012
Results
RQ 3: How students cope with cybergrooming?
 The first three factors of
 variability summarise 62.1 %
 of the total inertia.
Results
 RQ 3: How students cope with cybergrooming?

    Coefficients                                       Estimate         Std.     t
                                                                        Error    value
    (Intercept)                                          1.43023 0.03734 38.305
    Cognitive-techn. Coping***                           0.33223 0.07537 4.408
    Being a girl***                                      0.32686 0.07514 4.350
    Being cyberbullied***                                0.32565 0.07812 4.168
    Not willing to meet strangers*                       -0.24815 0.09742 -2.547
    Aggressive Coping***                                 -0.76518 0.07775 -9.841
   F(2, 512) = 60.71, p < .001, = 0.19                * p ≤ .05; ** p ≤.01; *** p ≤.001

   Tab. 4: Model 2 (5 predictors) beta coefficients


                   International Conference on Cyberbullying, Paris, June 2012
Results
 RQ 3: How students cope with cybergrooming?

    Variable                                                     O.R.        C.I.
    Being a girl***                                              3.37        1.4–8.6
    Being Cyberbullied***                                        1.88        1.0–3.2
    Cognitive-techn. Coping***                                   1.48        0.8–2.4
    Willingness to meet strangers: No ***                        0.39        0.2–0.9
    Aggressive Coping***                                         0.30        0.2–0.5
   *p ≤ .05;** p ≤.01;*** p ≤.001                    95 % confidence interval
   Tab. 5: Results of simple binary logistic regression for Model 2

               International Conference on Cyberbullying, Paris, June 2012
Conclusions and
Outlook on future research




     International Conference on Cyberbullying, Paris, June 2012
Conclusion


• Identified risk factors: being a girl, willingness
  to meet strangers and being cyberbullied

• Coping strategies seem to make a difference:
   – aggressive coping protects and
   – technical-cognitive coping increases the risk



             International Conference on Cyberbullying, Paris, June 2012
Outlook future research



• Validated instruments with consistent
  definition, measuring and period of time
• Longitudinal studies (causality and directions)
• Special risk groups (LGBT and children with
  special needs) need more research attention
• Traditionally
  bullied, cyberbullied, cybergroomed?


            International Conference on Cyberbullying, Paris, June 2012
Thank you for your
attention!

Dipl. Päd. Sebastian Wachs
Division Education and Socialisation
University of Bremen, Germany
s.wachs@uni-bremen.de

             International Conference on Cyberbullying, Paris, June 2012

More Related Content

Similar to Cybergrooming Risk Factors and Effective Coping Strategies

Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...samhauck
 
Charles Wright SMAHRT Presentation
Charles Wright SMAHRT PresentationCharles Wright SMAHRT Presentation
Charles Wright SMAHRT PresentationHolly Gerla
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014D2L Barry
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Knowledge of Cyber Crime
Knowledge of Cyber CrimeKnowledge of Cyber Crime
Knowledge of Cyber CrimeSHUBHAM SINGH
 
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...MediaSmarts | HabiloMédias
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Megan Bednar
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningMirXahid1
 
Cyber Bullying- JPWMC
Cyber Bullying- JPWMCCyber Bullying- JPWMC
Cyber Bullying- JPWMCcrulien
 
cyberbullying detection seminar.pdf
cyberbullying detection seminar.pdfcyberbullying detection seminar.pdf
cyberbullying detection seminar.pdfAkshay712352
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingFoegenR
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safetyemilyensign
 

Similar to Cybergrooming Risk Factors and Effective Coping Strategies (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...Cyberbullying:  A Technology Issue Affecting Adolescents and What Needs to Be...
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be...
 
Charles Wright SMAHRT Presentation
Charles Wright SMAHRT PresentationCharles Wright SMAHRT Presentation
Charles Wright SMAHRT Presentation
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Knowledge of Cyber Crime
Knowledge of Cyber CrimeKnowledge of Cyber Crime
Knowledge of Cyber Crime
 
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
Young Canadians in a Wired World, Phase III: Cyberbullying: Dealing with Onli...
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Youth of Turkey online
Youth of Turkey onlineYouth of Turkey online
Youth of Turkey online
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
 
Cyber Bullying- JPWMC
Cyber Bullying- JPWMCCyber Bullying- JPWMC
Cyber Bullying- JPWMC
 
cyberbullying detection seminar.pdf
cyberbullying detection seminar.pdfcyberbullying detection seminar.pdf
cyberbullying detection seminar.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safety
 

Recently uploaded

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Recently uploaded (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

Cybergrooming Risk Factors and Effective Coping Strategies

  • 1. Cybergrooming – Risk factors, coping strategies and associations with cyberbullying Dipl. Päd. Sebastian Wachs Acknowledgment: Prof. Dr. K.D. Wolf International Conference on Cyberbullying, Paris, June 2012
  • 2. Overview • Background • Method • Results • Conclusions/Outlook International Conference on Cyberbullying, Paris, June 2012
  • 3. Background of the Study International Conference on Cyberbullying, Paris, June 2012
  • 4. Background Cybergrooming (CYBGR) “Establishing a trust-based relationship between minors and usually adults using ICTs to systematically solicit and exploit the minors for sexual purposes.” (Wachs, Wolf and Pan, in review) International Conference on Cyberbullying, Paris, June 2012
  • 5. Background Research Questions RQ1: Which factors shape the risk to become a victim of CYBGR? RQ2: Are cyberbullied students more likely to be cybergroomed? RQ3: How students cope with CYBGR and which strategy seems to be effective? International Conference on Cyberbullying, Paris, June 2012
  • 6. Background Associations between CYBGR and CYBB • Use of ICTs • Repetition • Intentional aggressive acts Cybergrooming • Social Cyberbullying Relationship • Imbalance of power • Role Association? International Conference on Cyberbullying, Paris, June 2012
  • 7. Method International Conference on Cyberbullying, Paris, June 2012
  • 8. Method Participants • Self-reports from 518 students • 5th to 10th Grades (11-17 yr) from 4 German schools • 49.0 % of the participants was male and 50.8 % was female; 0.2 % did not answer • from a region with a high proportion of immigrant families, and a relatively poor urban economic situation. International Conference on Cyberbullying, Paris, June 2012
  • 9. Method Procedure • Online Survey • Computer Assisted Personal Interview • participants sat at a PC in school computer rooms and entered the answers International Conference on Cyberbullying, Paris, June 2012
  • 10. Method Questionnaire ‘A cybergroomer is a person who is at least 7 years older than you and who you know over a longer time exclusively through online communication. At the beginning, the cybergroomer seems to be interested in your daily life problems, but after a certain time s/he appears to be interested in sexual topics and in the exchange of sexual fantasies and/or nude material (pictures or video chats).’ Used Definition International Conference on Cyberbullying, Paris, June 2012
  • 11. Method Questionnaire ‘How often did you have contact with a cybergroomer within the last twelve month?’ Never Once a Once a Once a Several year month week times a week International Conference on Cyberbullying, Paris, June 2012
  • 12. Method Questionnaire Items for assessing (cyber-)bullying and coping strategies partly following the ‘Mobbing Questionnaire for students' (Jäger et al. 2007) Cyberbullying 4 Items each Never, Once or twice, Twice or side thrice, About once a week or Several times a week Coping 10 Items Yes, A little bit, Almost no, No Strategies ICTs Usage and access to PC or Internet at home, ownership of mobile Access phone or smartphone, amount of ICTs usage International Conference on Cyberbullying, Paris, June 2012
  • 13. Results International Conference on Cyberbullying, Paris, June 2012
  • 14. Results Prevalence Rate Victims of CYBGR: 6.5 % (n=34) 4.6 % 10.4 % 79% 21% 1.9 % 4.3 % once a year once a month At least once a year Never once a week several times a week International Conference on Cyberbullying, Paris, June 2012
  • 15. Results Prevalence rate for CYBGR is significantly… higher for girls (8.7% vs. 4.3%), t(514) = 3.28, p = .001. lower for adolescents who are not willing to meet strangers (4.4% vs. 15.5%), t(514) = 4.91, p = <.001. lower for adolescents who do not discuss problems with strangers (5.6% vs. 11.4%), t(514) = 3.93, p < .001. International Conference on Cyberbullying, Paris, June 2012
  • 16. Results RQ 1: Which factors shape the risk to be cybergroomed?  Willingness to discuss  Access to Internet at home  problems with strangers  Ownership of mobile phone  Willingness Coefficients to meet  Ownership Estimate Std. of smartphone t- strangers  Amount of internet usage Error value  Being cyberbullied (Intercept) ***  0.041 1.43 Access to PC at home 34.49 Being cybervictim *** 0.46 0.085 5.42 Being a girl *** 0.28 0.083 3.46  Migration background Not willing to meet strangers *** -0.43 0.106 -4.10 F(3, 512) = 23.39, R2=0.12, p <  Grade .001. * p ≤ .05;** p ≤.01;*** p ≤.001  Gender Tab 1: Model 1 (3 predictors) beta coefficients for standardized variables International Conference on Cyberbullying, Paris, June 2012
  • 17. Results RQ 2: Are cyberbullied students more likely to be cybergroomed? Variable O.R. C.I. Being a girl*** 2.35 1.1–5.2 Being cyberbullied*** 1.75 1.2–2.4 Not willing to meet strangers *** 0.30 0.14–0.65 *p ≤ .05; **p ≤.01; ***p ≤.001 95 % confidence interval Tab. 2: Results of simple binary logistic regression for Model 1 International Conference on Cyberbullying, Paris, June 2012
  • 18. Results RQ 3: How students cope with cybergrooming? The first three factors of variability summarise 62.1 % of the total inertia.
  • 19. Results RQ 3: How students cope with cybergrooming? Coefficients Estimate Std. t Error value (Intercept) 1.43023 0.03734 38.305 Cognitive-techn. Coping*** 0.33223 0.07537 4.408 Being a girl*** 0.32686 0.07514 4.350 Being cyberbullied*** 0.32565 0.07812 4.168 Not willing to meet strangers* -0.24815 0.09742 -2.547 Aggressive Coping*** -0.76518 0.07775 -9.841 F(2, 512) = 60.71, p < .001, = 0.19 * p ≤ .05; ** p ≤.01; *** p ≤.001 Tab. 4: Model 2 (5 predictors) beta coefficients International Conference on Cyberbullying, Paris, June 2012
  • 20. Results RQ 3: How students cope with cybergrooming? Variable O.R. C.I. Being a girl*** 3.37 1.4–8.6 Being Cyberbullied*** 1.88 1.0–3.2 Cognitive-techn. Coping*** 1.48 0.8–2.4 Willingness to meet strangers: No *** 0.39 0.2–0.9 Aggressive Coping*** 0.30 0.2–0.5 *p ≤ .05;** p ≤.01;*** p ≤.001 95 % confidence interval Tab. 5: Results of simple binary logistic regression for Model 2 International Conference on Cyberbullying, Paris, June 2012
  • 21. Conclusions and Outlook on future research International Conference on Cyberbullying, Paris, June 2012
  • 22. Conclusion • Identified risk factors: being a girl, willingness to meet strangers and being cyberbullied • Coping strategies seem to make a difference: – aggressive coping protects and – technical-cognitive coping increases the risk International Conference on Cyberbullying, Paris, June 2012
  • 23. Outlook future research • Validated instruments with consistent definition, measuring and period of time • Longitudinal studies (causality and directions) • Special risk groups (LGBT and children with special needs) need more research attention • Traditionally bullied, cyberbullied, cybergroomed? International Conference on Cyberbullying, Paris, June 2012
  • 24. Thank you for your attention! Dipl. Päd. Sebastian Wachs Division Education and Socialisation University of Bremen, Germany s.wachs@uni-bremen.de International Conference on Cyberbullying, Paris, June 2012