SlideShare une entreprise Scribd logo
1  sur  18
Social Media Usage & the
Psychological Effects on Youth
Cyberbullying:
By Samantha Jaffe & Jessica Ryan
December 1, 2010
Raise your hand if you know
someone who
has been cyberbullied
in any way?
Research Questions
 What are the similarities and differences
in the motives behind bullying and
cyberbullying?
 What technologies are youth utilizing
when they cyberbully others?
 What are the psychological effects of
cyberbullying on youth?
Preview
 Traditional Bullying
 Cyberbullying
 Social Media Methods
 Psychological Effects
Traditional Bullying
 Definition:
– “persistent threatening and aggressive
behavior directed toward other people,
especially those who are smaller or
weaker”
– Debate on the word “Aggressive”
– Overt
Cyberbullying
 Definition:
– “forms of bullying that use electronic means such
as the Internet and mobile phones to aggressively
and intentionally harm someone” (Price &
Dalgelish, 2010, p.51).
 “Bullying on Steroids”
Methods of Cyberbullying
 Flaming: sending vulgar messages about a person to an online
group or directly to the person via email other text messaging
(Li, 2008, p.225)
 Online harrassment: repeatedly sending offensive messages
via email or other text messaging to a person (Li, 2008, p.225)
 Cyberstalking: online harassment that includes threats of harm
or is excessively intimidating (Li, 2008, p.225)
 Denigration (put-downs): Sending harmful, untrue, or cruel
statements about a person to other people or posting such
material online (Li, 2008, p.225)
Methods of Cyberbullying (cont’d)
 Masquerade (or Impersonation): pretending to be someone
else and sending or posting material that makes that person
look bad (Li, 2008, p.225)
 Outing: sending or posting material about a person that
contains sensitive, private, or embarrassing information,
including forwarding private messages or images (Li, 2008,
p.225)
 Trickery: tricking someone into revealing secrets or
embarrassing information and sharing that information with
others (Trolley & Hanel, 2010, p.39)
 Exclusion: cruelly excluding someone from an online group (Li,
2008, p.225)
Social Media Usage
 Mobile Phones
 Social Networking
Sites (SNSs)
Mobile Phones
 Most preferred
method
 Two to one 15 to 18
female students
preferred harrassing
victims by text
messaging over other
mediums such as e-
mail, websites, and
instant messaging
(Toppo, 2006, p.08d).
Mobile Phones
 Advertisements
 “Sexting”
– “Sending or forwarding nude, sexually
suggestive, or explicit pictures on a cell
phone or online” (Siegle, 2010, p.15).
Social Networking Sites
 About 55% of
American youths use
SNSs (Trolley &
Hanel, 2010, p.9).
 About 46% of female
participants reported
using SNSs when
cyberbullying (Trolley
& Hanel, 2010, p.55).
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Social Networking Sites
 Profile Creation
 Identity Performance
 “Imagined Audience”
 Online and Offline Relationships
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Psychological Effects
 Control Imbalance:
– Changing roles
 Associated Feelings:
– Anger
– Frustration
– Sadness
– Anxiety
– Depression
– Lower Self-esteem
Psychological Effects (cont’d)
Hinduja, S., & Patchin, J. W. (2010b)
Psychological Effects (cont’d)
 Emotional Intelligence:
– Understanding Emotions
 Psychological Immune System:
– “The higher the level of one’s emotional
intelligence, the healthier one’s psychological
immune system” (Plaford, 2006, p. 59).
 Social Capital
Conclusions
 Traditional bullying and Cyberbullying are
different
– Methods
– Time and Space
– Covert vs Overt
 Increased Technology Usage
 Decreased Mental Health
 Limitations on Research
“It Gets Better” with Joe Biden
 http://www.youtube.com/watch?v=wcyXQJ

Contenu connexe

Tendances

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
drogt1mm
 
Cyberbullying - FILM2601 project
Cyberbullying - FILM2601 projectCyberbullying - FILM2601 project
Cyberbullying - FILM2601 project
Ilana Solomons
 
Cyberbullying2 - FILM260
Cyberbullying2 - FILM260Cyberbullying2 - FILM260
Cyberbullying2 - FILM260
Ilana Solomons
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
danderson688
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
Cameron Piening
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
bmcdade
 

Tendances (18)

Curating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond PseudonymityCurating Networked Presence: Beyond Pseudonymity
Curating Networked Presence: Beyond Pseudonymity
 
NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 
Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)Bullying in the Workplace (#WVUCommMOOC)
Bullying in the Workplace (#WVUCommMOOC)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
What is cyberbullying
What is cyberbullyingWhat is cyberbullying
What is cyberbullying
 
Cyberbullying - FILM2601 project
Cyberbullying - FILM2601 projectCyberbullying - FILM2601 project
Cyberbullying - FILM2601 project
 
Cyberbullying2 - FILM260
Cyberbullying2 - FILM260Cyberbullying2 - FILM260
Cyberbullying2 - FILM260
 
Cyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima ShahCyber Bullying - Computer Science | Mahima Shah
Cyber Bullying - Computer Science | Mahima Shah
 
To Comment Or Not To Comment
To Comment Or Not To CommentTo Comment Or Not To Comment
To Comment Or Not To Comment
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paper
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Polarization on social media
Polarization on social mediaPolarization on social media
Polarization on social media
 
Fys rp
Fys rpFys rp
Fys rp
 

Similaire à Cyberbullying jaffe ryan

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
Amit Sheth
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
mickietanger
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
Gerard1990
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
Rob Jewitt
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
hartrobert670
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
MohinderSingh78
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
mrjsaldivar
 

Similaire à Cyberbullying jaffe ryan (20)

Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Sm
SmSm
Sm
 
Social media paper fys 100
Social media paper fys 100Social media paper fys 100
Social media paper fys 100
 
Week 5
Week 5Week 5
Week 5
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docxBibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
BibliographyClark, C. S. (1995). Sex, Violence and the Media.docx
 
Debate research paper (fys)
Debate research paper (fys)Debate research paper (fys)
Debate research paper (fys)
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
 
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
Hendricks, la velle cyber bullying nfjca v1 n1 2012[posted)]
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Teens And Their New Society
Teens And Their New SocietyTeens And Their New Society
Teens And Their New Society
 

Dernier

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyberbullying jaffe ryan

  • 1. Social Media Usage & the Psychological Effects on Youth Cyberbullying: By Samantha Jaffe & Jessica Ryan December 1, 2010
  • 2. Raise your hand if you know someone who has been cyberbullied in any way?
  • 3. Research Questions  What are the similarities and differences in the motives behind bullying and cyberbullying?  What technologies are youth utilizing when they cyberbully others?  What are the psychological effects of cyberbullying on youth?
  • 4. Preview  Traditional Bullying  Cyberbullying  Social Media Methods  Psychological Effects
  • 5. Traditional Bullying  Definition: – “persistent threatening and aggressive behavior directed toward other people, especially those who are smaller or weaker” – Debate on the word “Aggressive” – Overt
  • 6. Cyberbullying  Definition: – “forms of bullying that use electronic means such as the Internet and mobile phones to aggressively and intentionally harm someone” (Price & Dalgelish, 2010, p.51).  “Bullying on Steroids”
  • 7. Methods of Cyberbullying  Flaming: sending vulgar messages about a person to an online group or directly to the person via email other text messaging (Li, 2008, p.225)  Online harrassment: repeatedly sending offensive messages via email or other text messaging to a person (Li, 2008, p.225)  Cyberstalking: online harassment that includes threats of harm or is excessively intimidating (Li, 2008, p.225)  Denigration (put-downs): Sending harmful, untrue, or cruel statements about a person to other people or posting such material online (Li, 2008, p.225)
  • 8. Methods of Cyberbullying (cont’d)  Masquerade (or Impersonation): pretending to be someone else and sending or posting material that makes that person look bad (Li, 2008, p.225)  Outing: sending or posting material about a person that contains sensitive, private, or embarrassing information, including forwarding private messages or images (Li, 2008, p.225)  Trickery: tricking someone into revealing secrets or embarrassing information and sharing that information with others (Trolley & Hanel, 2010, p.39)  Exclusion: cruelly excluding someone from an online group (Li, 2008, p.225)
  • 9. Social Media Usage  Mobile Phones  Social Networking Sites (SNSs)
  • 10. Mobile Phones  Most preferred method  Two to one 15 to 18 female students preferred harrassing victims by text messaging over other mediums such as e- mail, websites, and instant messaging (Toppo, 2006, p.08d).
  • 11. Mobile Phones  Advertisements  “Sexting” – “Sending or forwarding nude, sexually suggestive, or explicit pictures on a cell phone or online” (Siegle, 2010, p.15).
  • 12. Social Networking Sites  About 55% of American youths use SNSs (Trolley & Hanel, 2010, p.9).  About 46% of female participants reported using SNSs when cyberbullying (Trolley & Hanel, 2010, p.55). QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 13. Social Networking Sites  Profile Creation  Identity Performance  “Imagined Audience”  Online and Offline Relationships QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
  • 14. Psychological Effects  Control Imbalance: – Changing roles  Associated Feelings: – Anger – Frustration – Sadness – Anxiety – Depression – Lower Self-esteem
  • 15. Psychological Effects (cont’d) Hinduja, S., & Patchin, J. W. (2010b)
  • 16. Psychological Effects (cont’d)  Emotional Intelligence: – Understanding Emotions  Psychological Immune System: – “The higher the level of one’s emotional intelligence, the healthier one’s psychological immune system” (Plaford, 2006, p. 59).  Social Capital
  • 17. Conclusions  Traditional bullying and Cyberbullying are different – Methods – Time and Space – Covert vs Overt  Increased Technology Usage  Decreased Mental Health  Limitations on Research
  • 18. “It Gets Better” with Joe Biden  http://www.youtube.com/watch?v=wcyXQJ

Notes de l'éditeur

  1. Jessica & Samantha
  2. Jessica--- Into: Raise your hand if… Personal experience
  3. Samantha
  4. Samantha
  5. Samantha- Quote about it doubly dangerous beceause if left unattended it can rapidly escalate into en more serious violence and abuse. Overt easily seen
  6. Jessica
  7. Jessica
  8. Jessica
  9. Jessica
  10. Jessica
  11. Jessica
  12. Jessica
  13. Less than 13% remained in the their roles.
  14. Samantha Traditionaol bullying happens at school, neightboorhood, Viturally at any time- so different devides. Increased- more access, and tech, knowledge.
  15. Jessica - 35-59