SlideShare una empresa de Scribd logo
1 de 29
Cyberbullying What the research is telling us… Amanda Lenhart NetSmartz Working Group May 6, 2010 Washington, DC
Sources & Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teen internet use basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are teens doing online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How else are teens connecting? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concerns in Online Safety Sphere ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Harassment & Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
What makes online harassment & bullying different? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pew Internet: Online Harassment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Cyberbullying ,[object Object],[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
Online Harassment (2) ,[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds   by environment ( n =1,193) (Ybarra, 2009)
Online (or not) Harassment  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry (2)? ,[object Object],[object Object],[object Object],[object Object]
Overlap of cyberbullying & internet victimization (Ybarra, 2010)
Differences between cyberbullying & internet harassment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cell phone-based harassment ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Sending Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Receiving Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sexting Scenarios ,[object Object],[object Object],[object Object]
Element of coercion for some sexting ,[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Final Thoughts ,[object Object],[object Object],[object Object],[object Object]
THANK YOU Amanda Lenhart Pew Internet & American Life Project [email_address] http://www.pewinternet.org Twitter: @amanda_lenhart

Más contenido relacionado

La actualidad más candente

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsYTH
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationWendinda
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagersMiss Perfect
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Larry Magid
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperMeghan.V
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 

La actualidad más candente (20)

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Week 5
Week 5Week 5
Week 5
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagers
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 

Destacado

Appsworld - Mobilize your SharePoint with WinWire
Appsworld - Mobilize your SharePoint with WinWireAppsworld - Mobilize your SharePoint with WinWire
Appsworld - Mobilize your SharePoint with WinWireWinWire Technologies Inc
 
Advanced Portfolio Evaluation
Advanced Portfolio EvaluationAdvanced Portfolio Evaluation
Advanced Portfolio EvaluationTreySongz
 
周斯泽工业设计作品
周斯泽工业设计作品周斯泽工业设计作品
周斯泽工业设计作品size zhou
 
R2Innovations / Keosys Medical Imaging : IT solutions for medical imaging
R2Innovations / Keosys Medical Imaging : IT solutions for medical imagingR2Innovations / Keosys Medical Imaging : IT solutions for medical imaging
R2Innovations / Keosys Medical Imaging : IT solutions for medical imagingRemmelt76
 

Destacado (8)

Appsworld - Mobilize your SharePoint with WinWire
Appsworld - Mobilize your SharePoint with WinWireAppsworld - Mobilize your SharePoint with WinWire
Appsworld - Mobilize your SharePoint with WinWire
 
Puntosmetodo
PuntosmetodoPuntosmetodo
Puntosmetodo
 
Advanced Portfolio Evaluation
Advanced Portfolio EvaluationAdvanced Portfolio Evaluation
Advanced Portfolio Evaluation
 
Sp insights by vineet 3-17
Sp insights by vineet 3-17Sp insights by vineet 3-17
Sp insights by vineet 3-17
 
Adobe air
Adobe airAdobe air
Adobe air
 
周斯泽工业设计作品
周斯泽工业设计作品周斯泽工业设计作品
周斯泽工业设计作品
 
Modernize Your SharePoint Environment
Modernize Your SharePoint EnvironmentModernize Your SharePoint Environment
Modernize Your SharePoint Environment
 
R2Innovations / Keosys Medical Imaging : IT solutions for medical imaging
R2Innovations / Keosys Medical Imaging : IT solutions for medical imagingR2Innovations / Keosys Medical Imaging : IT solutions for medical imaging
R2Innovations / Keosys Medical Imaging : IT solutions for medical imaging
 

Similar a Cyberbullying

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011daniel_eukids
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1bmcdade
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullyingJisc RSC East Midlands
 

Similar a Cyberbullying (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Internet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth developmentInternet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth development
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
 
Digital adolescence: Myths and truths about growing up with technology
Digital adolescence: Myths and truths about growing up with technologyDigital adolescence: Myths and truths about growing up with technology
Digital adolescence: Myths and truths about growing up with technology
 
Cyberbullying and adolescent mental health
Cyberbullying and adolescent mental healthCyberbullying and adolescent mental health
Cyberbullying and adolescent mental health
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Youth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truthsYouth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truths
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011
 
Pitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital agePitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital age
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 

Cyberbullying

  • 1. Cyberbullying What the research is telling us… Amanda Lenhart NetSmartz Working Group May 6, 2010 Washington, DC
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.  
  • 12.
  • 13. Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
  • 14.
  • 15. Frequency of bullying victimization among 11-16 year olds by environment ( n =1,193) (Ybarra, 2009)
  • 16.
  • 17.
  • 18.
  • 19. Overlap of cyberbullying & internet victimization (Ybarra, 2010)
  • 20.
  • 21.
  • 22.  
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. THANK YOU Amanda Lenhart Pew Internet & American Life Project [email_address] http://www.pewinternet.org Twitter: @amanda_lenhart

Notas del editor

  1. In order for us to create the most effective and targeted solutions, we have to know the exact nature of the problem.
  2. Patchwork of research – different definitions of cyberbullying make cross-study comparisons difficult. Methods vary considerably – each has something to tell us.
  3. Library access and CELL PHONE ACCESS is particularly important to African American, and to a lesser extent English-Speaking Hispanic students. One quarter of low income teens (HHI under $30K) and 25% of African American teens say they go online most often from school, compared to 15% of online teens overall. Fewer low SES and African American teens go online daily 53% of af-am, vs 67% of white teens 75% of high income teens go online daily, compared to 39% of low SES teens. Slight decrease in teens going online from home since we first asked – broader use/access and also wide variety of access points/mobile access.
  4. Not just email, IM, but social networks, mobile devices and gaming platforms are all used to connect, talk and interact with others. And thus also may become platforms for bullying, too. This is where teens are - particularly outside of school - online, connected to each other by various means at all times.
  5. Online safety concerns breakdown roughly into two parts – concerns over harmful contact and concern over harmful content. What we’re focusing on here today is online CONTACT, rather than content and specifically, online bullying aka cyberbullying.
  6. Definition of bullying downloaded from http://olweus.org/public/bullying.page on May 12, 2009 and is also contained in Dan Olweus’ 1993 book “Bullying at School”: Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993
  7. Source: Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Online – identity can be shrouded. Youth who are physically bullied can/do retaliate online. Can be hard to determine who instigated and where. These are the “bully-victims” and the “instigator-victims.” Other definitions of cyberbullying used in major research projects on the topic: “willful use of the Internet as a technological medium through which harm or discomfort is intentionally and repeatedly inflicted through indirect aggression that targets a specific person or group of persons.” (Williams and Guerra, 2007) “an overt, intentional act of aggression towards another person online” (19% of young and regular internet users reported experiencing this) (Ybarra, & Mitchell, 2004) “Willful and repeated harm inflicted through the medium of electronic text.” (Patchin & Hinduja, 2006)
  8. Invasive – computer and the internet bring the bullying into the sphere of the home, and cell phones, which are generally personal devices carried everywhere, mean that the bullying never stops.
  9. Pew data is measuring online harassment, as our questions did not ask about repetition or power imbalance. 15% had private comm forwarded with out permission 13% had a rumor spread about them 13% received a threatening message or comm 6% had embarrassing picture posted w/out permission Limitations: we missed a big one Missing spoofed/faked profile But Teens are also endlessly creative when it comes to bullying (and many other things) e.g., Text bombing=when a person sends 1000 of texts to one number… can be difficult to block, must pay for each text – can run up $100s in bills & makes it impossible to receive communication from others. Bullying in games – e.g., killing a player’s character quickly and repeatedly so gamer can’t play the game. Sources in this slide: Lenhart, A. (2007) Cyberbullying. Pew Internet & American Life Project, Washington, DC. http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Lenhart, A., et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  10. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx p. 86
  11. 9% data point is from: Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 33% data point is from: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156. Data unclear on likelihood of victims knowing perpetrator – 45-89% say they know who is harassing them. No major differences in SES, race/ethnicity, parent education in likelihood of being harassed online. (Pew 2007 data)
  12. Slide source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  13. Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Worth noting: Journal of Adolescent Health December 2007 issue has a special issue entirely devoted to research on Cyberbullying. Other research points to girls as more likely victims, or to boys and girls experiencing online bullying and harassment equally. (Wolak et al, 2007) – answers here not 100% conclusive. Ybarra data suggests that bullying does happen more at school than online. See following slide…
  14. Source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  15. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007 Dec;41(6 Suppl 1):S42-50. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.
  16. These are the “concurrent psychosocial problems” from Ybarra’s work. Source info for statements above: (see previous slides or bibliography for full cites) Bullying is broadly associated with: School violence – (Olweus, 2009 website ) Delinquency – (Hinduja & Patchin, 2007) Suicidal ideation (Hinduja & Patchin, in press @ Archives of Suicide Research) Depression and other psychological problems (Ybarra, 2007, Wolak, 2007) Substance abuse (Ybarra, 2007, Wolak, 2007) Delinquency / School avoidance (Hinduja & Patchin, 2007) Weapon-carrying (Nansel, 2003) Poor parent/caregiver relationships/offline victimization (Ybarra, 2007, Wolak, 2006)
  17. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177.
  18. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  19. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  20. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  21. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  22. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  23. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  24. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  25. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  26. Bibliography: Burgess-Proctor A, Patchin JW, and Hinduja S. Cyberbullying and Online Harassment: Reconceptualizing the victimization of adolescent girls in V. Garcia and J. Clifford [Eds.]. Female crime victims: Reality reconsidered . Upper Saddle River, NJ: Prentice Hall. 2008 Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156 Hinduja S and Patchin JW. Offline Consequences of Online Victimization: School Violence and Delinquency. J School Violence 2007;6(3): 89-112 Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org. Lenhart, A. Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. (2009) http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx Lenhart, A et al. Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC.(2010) http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx Nansel TR, Overpeck M, Pilla RS et al. Bullying behaviors among U.S. youth: Prevalence and association with psychological adjustment. JAMA 2001;285: 2094-2100. Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993. Material downloaded from http://olweus.org/public/bullying.page on May 11, 2009. Palfrey J, Sacco D, boyd d, Debonis D. Enhancing Child Online Safety: Final Report of the Internet Safety Technical Taskforce to the multi-state working group on social networking of United States Attorneys General. Berkman Center for Internet & Society at Harvard University:Cambridge, MA. December 31, 2008. pp. 22-28. Available online at http://cyber.law.harvard.edu/publications/2009/ISTTF_Final_Report Patchin JW and Hinduja S. Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying. Youth Violence and Juvenile Justice 2006;4: 148-169. Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Williams KR and Guerra NG. Prevalence and Predictors of Internet Bullying. J Adolescent Health. 2007 Dec: 41 S14-S21. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Ybarra M, Espelage DL, Mitchell KJ. The Co-occurrence of Internet Harassment and Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators. J Adolescent Health 2007: 41: S31-S41 Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007a Dec:41(6 Suppl 1):S42-50. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.