SlideShare a Scribd company logo
1 of 24
Lars Soderberg
Communication & Technology 250
Research Question
Why do teenagers use cyber bullying as a form
of communication?
What is Cyber Bullying?
• “Willful and repeated harm inflicted through
the use of computers, cell phones, and other
electronic devices.” (Schrock & Boyd, 2011, p.
374)
• Stereotypical widespread problem
• Anonymity
– Private Messages, use of social media, doesn’t
have to be done at school (Farrell, 2012, p.26)
Power of Cyber Bullying
• Growth of the internet
• Permanent posts
• Deadly effects
– Depression, suicide, etc. (Cloud, 2010)
• Fast publicity of message (Ringrose, 2011, p.
133)
• Anonymity
– Mystery regarding the root of the message  lack
of control (Ringrose, 2011, p. 132)
Cyber Bullying Outlets
• Social Media
– Facebook, Twitter, MySpace, etc.
• Email
• Blogs / Websites (Vandebosch & Van
Cleemput, 2009, p. 1)
• Text Messaging
• Instant Messaging
– AIM, iMessage, etc.
“The youngsters who perpetrate acts of cyber
bullying have, in many cases, also experienced
cyber bullying as victims or bystanders and vice
versa.” (Vandebosch & Van Cleemput, 2009,
p.22)
Types of Cyber Bullying
• Direct involvement of the victim
– Viruses, internet / mobile bullying, social exclusion
(Vandebosch & Van Cleemput, 2009, p. 5)
• Initial lack of involvement by the victim
– Online anonymity, internet / mobile bullying
(Vandebosch & Van Cleemput, 2009, p. 5)
A Cyber Bully’s Effectiveness
• Hyperpersonal communication
– The ambiguity of messages online may cause
under/over dramatization of messages (Farrell,
2012, p.28)
• Channel expansion theory
– The level of knowledge in regards to a channel,
message topic, context, and source will determine
the level of effectiveness (Farrell, 2012, p.28)
Exposure to Cyber Bullying
• 72% of 18-29 year olds use social networking
cites (Megan, 2012, p. 703)
• 15.8% of young adults in a study (596 people
ages 14-22) reported cyber-bullying compared
to 12.3% of adolescents (Megan, 2012, p. 705)
• In the study, 15.6% of harassing messages
came from someone unknown to the victim
(Megan, 2012, p. 712)
Exposure continued…
• School survey (177 7th graders)
– 14.5% reported to being cyber bullies
– 24.9% reported to being victims of cyber bullying
• Online study (500 teenagers aged 11-15)
(Vandebosch & Van Cleemput, 2009, p. 7)
– 32% sent anonymous harassing emails
– 29% sent harassing messages
Exposure Results
• Cyber bullying is different from case to case
• Traditional bullies and victimization online
(Vandebosch & Van Cleemput, 2009, p. 11)
• Lack of responsibility by student body
Victim Profile
• Victims
– Girls were more likely to be the victim
(Ringrose, 2011, 122)
– Higher relationship between a strictly online
relationship with their bully
– Tend to be victims of traditional bullying as
well
– High internet dependency
– Not socially competent
Kristensen and Smith Study
• (Vandebosch & Van Cleemput, 2009, p. 16-18)
– 44.8% knew their bully offline
– Half didn’t know their bully
– 14.1% were bullied by someone they only knew
online
– Experienced one form of offensive behavior orver
the internet / phone over the last 3 motnhs
• 61.9% reported to being victims
• 52.5% reported to being perpetrators
• 76.3% reported to being bystanders
Ybarra Study
• (Vandebosch & Van Cleemput, 2009, p. 10)
– Males who reported as being depressed were
eight times more likely to report being a victim
“Ybarra identified both the amount of internet use
and the use of messenger programs as most
important predictors for the experience with cyber
bullying as a victim among females.” (Vandebosch &
Van Cleemput, 2009, p. 10)
Li Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 1/3 of “youngsters” bullied in school were also
cyber bullies
– 1/3 of “youngsters” reported their bullying in
school to backfire online and result in
victimization
– Majority of victims were females (p. 10)
– Strong correlation between cyber bullies and
cyber bully victims
Patchin & Hinduja Study
• (Vandebosch & Van Cleemput, 2009, p. 11)
– 42.5% of cyber bully victims were frustrated
– 40% of victims were angry
– 17% felt sad
Causes of Cyber Bullying
• The internet is a very liberating platform
• Easier establishment of social relationships
• Anonymity
– The identity of the bully is often secret (Erdur-
Baker, 2012, p. 111)
– Provides adoption of “a more aggressive persona”.
(Erdur-Baker, 2012, p. 110)
Causes continued…
• Easy access to technology (Farrell, 2012, p.26)
• Increased time spent online spent by
teenagers
– Age of identity exploration (Megan, 2012, p. 703)
Cyber Bully Profile
• Cyber Bullies
– High self image
– Social competence
– High relationship
between traditional
and online bully
– Lack of surveillance by
parents
Final Thoughts
• Cyber bullying is evident among teenagers
– Strong correlation between traditional and cyber bullies
• Cyber bullies tend to be victims as well  motivation
• Amount of internet use in combination with lack of
parental supervision show Cyber Bullying trends
• Victims seek security online  anonymity
• Age matters
• Boys vs. Girls
– Gender tendencies vary by study
• Cyber Bullies seek popularity  power
– Also can respond to events at school
Conclusion
• Bullying varies on a case to case basis
– Increasing use of the Internet is problematic
– Reasons vary
• A more clear cut definition of Cyber Bullying is
needed
– Too much room for dispute
• More research is needed
– Motives
• More studies
– Consequences
• How effective they are in regards to deterrence
Further Research
What communicative factors determine the
presence of Cyber Bullying among teenagers?
Are there any new mediums for Cyber Bullying?
How successful are current consequences at
deterring Cyber Bullying?
What is the best method of communication in order
to prevent Cyber Bullying?
Fun Links!
• http://www.statecollege.com/news/local-
news/cyberbullying-a-mobile-problem,1458938/
– Cyber Bulling on your mobile phone
• http://cyberbullying.us/
– Cyber Bullying information
• http://www.stopbullying.gov/cyberbullying/
– Cyber Bullying prevention tips & informaton
• http://www.today.com/tech/new-home-cyberbullying-
yik-yak-gossip-app-takes-high-schools-2D79597218
– New form of social media associated with Cyber Bullying
• http://magicvalley.com/news/local/schools-teens-
fight-cyberbullying/article_f45101aa-cdc4-11e3-9910-
0019bb2963f4.html
– Teenagers fight against Cyber Bullying

More Related Content

What's hot

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesSwapnil Shahade
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and CyberbullyingIsobar Australia
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 

Viewers also liked

Bullying and Violence Prevention Presentation
Bullying and Violence Prevention PresentationBullying and Violence Prevention Presentation
Bullying and Violence Prevention PresentationSafeAndCaring
 
Bullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint PresentationBullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint PresentationJohn M. Rinaldi
 
Violence - Bullying
Violence - BullyingViolence - Bullying
Violence - BullyingGreg
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpointgmtango
 
Anti Bully and prevention of bullying
Anti Bully and prevention of bullyingAnti Bully and prevention of bullying
Anti Bully and prevention of bullyingJess560960
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationdreamingmoi
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1itunaschool
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 

Viewers also liked (15)

Bullying and Violence Prevention Presentation
Bullying and Violence Prevention PresentationBullying and Violence Prevention Presentation
Bullying and Violence Prevention Presentation
 
Bullying
BullyingBullying
Bullying
 
Bullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint PresentationBullying Among Youth krh Powerpoint Presentation
Bullying Among Youth krh Powerpoint Presentation
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Violence - Bullying
Violence - BullyingViolence - Bullying
Violence - Bullying
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Bullying in schools
Bullying in schoolsBullying in schools
Bullying in schools
 
Anti Bully and prevention of bullying
Anti Bully and prevention of bullyingAnti Bully and prevention of bullying
Anti Bully and prevention of bullying
 
Bullying
BullyingBullying
Bullying
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 

Similar to Cyber bullying powerpoint round 2

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyinglarsselect
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsLori Mitchell
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdfJioAhuja
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxjoellemurphey
 

Similar to Cyber bullying powerpoint round 2 (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate Students
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Mexico Presentation[1]
Mexico Presentation[1]Mexico Presentation[1]
Mexico Presentation[1]
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
 

Recently uploaded

Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the lifeNitinDeodare
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxnuriaiuzzolino1
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Mark Carrigan
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointELaRue0
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 

Recently uploaded (20)

Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptx
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 

Cyber bullying powerpoint round 2

  • 2. Research Question Why do teenagers use cyber bullying as a form of communication?
  • 3. What is Cyber Bullying? • “Willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.” (Schrock & Boyd, 2011, p. 374) • Stereotypical widespread problem • Anonymity – Private Messages, use of social media, doesn’t have to be done at school (Farrell, 2012, p.26)
  • 4.
  • 5. Power of Cyber Bullying • Growth of the internet • Permanent posts • Deadly effects – Depression, suicide, etc. (Cloud, 2010) • Fast publicity of message (Ringrose, 2011, p. 133) • Anonymity – Mystery regarding the root of the message  lack of control (Ringrose, 2011, p. 132)
  • 6. Cyber Bullying Outlets • Social Media – Facebook, Twitter, MySpace, etc. • Email • Blogs / Websites (Vandebosch & Van Cleemput, 2009, p. 1) • Text Messaging • Instant Messaging – AIM, iMessage, etc.
  • 7. “The youngsters who perpetrate acts of cyber bullying have, in many cases, also experienced cyber bullying as victims or bystanders and vice versa.” (Vandebosch & Van Cleemput, 2009, p.22)
  • 8. Types of Cyber Bullying • Direct involvement of the victim – Viruses, internet / mobile bullying, social exclusion (Vandebosch & Van Cleemput, 2009, p. 5) • Initial lack of involvement by the victim – Online anonymity, internet / mobile bullying (Vandebosch & Van Cleemput, 2009, p. 5)
  • 9. A Cyber Bully’s Effectiveness • Hyperpersonal communication – The ambiguity of messages online may cause under/over dramatization of messages (Farrell, 2012, p.28) • Channel expansion theory – The level of knowledge in regards to a channel, message topic, context, and source will determine the level of effectiveness (Farrell, 2012, p.28)
  • 10. Exposure to Cyber Bullying • 72% of 18-29 year olds use social networking cites (Megan, 2012, p. 703) • 15.8% of young adults in a study (596 people ages 14-22) reported cyber-bullying compared to 12.3% of adolescents (Megan, 2012, p. 705) • In the study, 15.6% of harassing messages came from someone unknown to the victim (Megan, 2012, p. 712)
  • 11. Exposure continued… • School survey (177 7th graders) – 14.5% reported to being cyber bullies – 24.9% reported to being victims of cyber bullying • Online study (500 teenagers aged 11-15) (Vandebosch & Van Cleemput, 2009, p. 7) – 32% sent anonymous harassing emails – 29% sent harassing messages
  • 12. Exposure Results • Cyber bullying is different from case to case • Traditional bullies and victimization online (Vandebosch & Van Cleemput, 2009, p. 11) • Lack of responsibility by student body
  • 13. Victim Profile • Victims – Girls were more likely to be the victim (Ringrose, 2011, 122) – Higher relationship between a strictly online relationship with their bully – Tend to be victims of traditional bullying as well – High internet dependency – Not socially competent
  • 14. Kristensen and Smith Study • (Vandebosch & Van Cleemput, 2009, p. 16-18) – 44.8% knew their bully offline – Half didn’t know their bully – 14.1% were bullied by someone they only knew online – Experienced one form of offensive behavior orver the internet / phone over the last 3 motnhs • 61.9% reported to being victims • 52.5% reported to being perpetrators • 76.3% reported to being bystanders
  • 15. Ybarra Study • (Vandebosch & Van Cleemput, 2009, p. 10) – Males who reported as being depressed were eight times more likely to report being a victim “Ybarra identified both the amount of internet use and the use of messenger programs as most important predictors for the experience with cyber bullying as a victim among females.” (Vandebosch & Van Cleemput, 2009, p. 10)
  • 16. Li Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 1/3 of “youngsters” bullied in school were also cyber bullies – 1/3 of “youngsters” reported their bullying in school to backfire online and result in victimization – Majority of victims were females (p. 10) – Strong correlation between cyber bullies and cyber bully victims
  • 17. Patchin & Hinduja Study • (Vandebosch & Van Cleemput, 2009, p. 11) – 42.5% of cyber bully victims were frustrated – 40% of victims were angry – 17% felt sad
  • 18. Causes of Cyber Bullying • The internet is a very liberating platform • Easier establishment of social relationships • Anonymity – The identity of the bully is often secret (Erdur- Baker, 2012, p. 111) – Provides adoption of “a more aggressive persona”. (Erdur-Baker, 2012, p. 110)
  • 19. Causes continued… • Easy access to technology (Farrell, 2012, p.26) • Increased time spent online spent by teenagers – Age of identity exploration (Megan, 2012, p. 703)
  • 20. Cyber Bully Profile • Cyber Bullies – High self image – Social competence – High relationship between traditional and online bully – Lack of surveillance by parents
  • 21. Final Thoughts • Cyber bullying is evident among teenagers – Strong correlation between traditional and cyber bullies • Cyber bullies tend to be victims as well  motivation • Amount of internet use in combination with lack of parental supervision show Cyber Bullying trends • Victims seek security online  anonymity • Age matters • Boys vs. Girls – Gender tendencies vary by study • Cyber Bullies seek popularity  power – Also can respond to events at school
  • 22. Conclusion • Bullying varies on a case to case basis – Increasing use of the Internet is problematic – Reasons vary • A more clear cut definition of Cyber Bullying is needed – Too much room for dispute • More research is needed – Motives • More studies – Consequences • How effective they are in regards to deterrence
  • 23. Further Research What communicative factors determine the presence of Cyber Bullying among teenagers? Are there any new mediums for Cyber Bullying? How successful are current consequences at deterring Cyber Bullying? What is the best method of communication in order to prevent Cyber Bullying?
  • 24. Fun Links! • http://www.statecollege.com/news/local- news/cyberbullying-a-mobile-problem,1458938/ – Cyber Bulling on your mobile phone • http://cyberbullying.us/ – Cyber Bullying information • http://www.stopbullying.gov/cyberbullying/ – Cyber Bullying prevention tips & informaton • http://www.today.com/tech/new-home-cyberbullying- yik-yak-gossip-app-takes-high-schools-2D79597218 – New form of social media associated with Cyber Bullying • http://magicvalley.com/news/local/schools-teens- fight-cyberbullying/article_f45101aa-cdc4-11e3-9910- 0019bb2963f4.html – Teenagers fight against Cyber Bullying