SlideShare una empresa de Scribd logo
1 de 48
“Hanging Out”
digital health and safety
What
We
Are
Doing
Now
Social media and information overload
Americans now consume three times the information they did in 1960.
The Societal Consequences
Protecting Your Digital Health
• Critical thinking
• Career and reputation
• Emotional & physical
health
• Personal safety
Critical Thinking – Digital Literacy
Professor Rheingold is a visiting lecturer in Stanford University’s Department
of Communication where he teaches two courses, "Digital Journalism" and
"Virtual Communities and Social Media".
http://www.youtube.com/watch?v=lbRYkria
JXM
Critical Thinking
Developing Healthy Internet Skepticism
Baloney Detection Kit
http://www.michaelshermer.com/2001/11/baloney-detection/
What does your Online
Reputation say about you?
http://www.microsoft.com/showcase/en/us/details/96179773-76fc-407f-b945-
ae828f872ba7
In December of 2009, Microsoft released statistics from
a survey that they commissioned which drastically
topped those numbers, stating that 79% of hiring
managers and job recruiters in the United States
reviewed online information about job applicants,
while 70% of those surveyed said that they’ve
rejected applicants based on their findings.
How Social Media ‘Mistakes’
Impact Getting Hired or Fired
Many employers use social networking sites along with personal blogs to look for
what they call “digital dirt” We wondered what types of online content would
actually affect an employer’s decision on either hiring or firing an
employee. Here’s a breakdown of what Microsoft found in the same
aforementioned study:
1. Concerns about the candidate’s lifestyle 58%
2. Inappropriate comments and text written by the candidate 56%
3. Unsuitable photos, videos and information 55%
4. Inappropriate comments or text written by friends and relatives 43%
5. Comments criticizing previous employers, coworkers or clients 40%
6. Inappropriate comments or text written by colleagues or work acquaintances 40%
7. Membership in certain groups and networks 35%
8. Discovered that information the candidate shared was false 30%
9. Poor communication skills displayed online 27%
10. Concern about the candidate’s financial background 16%
SOURCE:
http://www.safetyweb.com/online-reputation-guide-for-college-students#mistakes
Personal Safety
Visit these sites at your own risk!
A Gateway for Dangerous Behavior?
http://omegle.com/
http://www.chatroulette.com/
Chat Roulette
Cyber Bullying and Social Isolation
A Father’s Emotional Plea
How Social Media Is Helping
Defeat Cyber Bullying
With MTV launching Draw Your Line, a visualization tool that encourages
young people to take action against digital abuse and share these actions
and tips with others. The tool is part of A Thin Line, an organization
dedicated to decreasing digital abuse and bullying, and protecting children
and young adults from the dangers of an increasingly online world.
Visit: http://www.athinline.org/drawyourline
“It's important to note that blaming technology for horrendous, violent displays of homophobia
or racism or simple meanness lets adults like parents and teachers absolve themselves of the
responsibility to raise kids free from these evils. “ ~ Anil Dash
“There is a statistically significant weak positive relationship between home access to a computer
or time spent online and whether or not students tease others.”
Barbara Lacey, “Social aggression: A study of Internet harassment”
“The authors fail to adequately summarize and analyze the data from the various studies, many of
which appear on Internet web sites rather than in peer-reviewed journals. The few tables of data
are uninformative and presented without statistical analysis.”
The American Journal of Psychiatry Book Review of: Cyber Bullying: Bullying in the Digital Age
“The results show that almost 54% of the students were victims of traditional bullying and over a
quarter of them had been cyber-bullied. Almost one in three students had bullied others in the
traditional form, and almost 15% had bullied others using electronic communication tools. ”
Qing L i, “New bottle but old wine: A research of cyberbullying in schools”
Does Social Media Cause Bullying?
Can Anonymity Breed Irresponsibility
The problem, say Formspring's critics, is the site offers a perfect haven for
cyberbulllying.
The recent suicide of 15-year-old Pheobe Prince has drawn attention to the
problem of bullying in cyberspace because victims often have no idea who is
tormenting them. A Boycott Formspring Group on Facebook claims almost
7,300 members.
http://www.dailyfinance.com/story/media/do-you-know-who-your-children-
are-online-formsprings-raunchy-f/19452194/?a_dgi=aolshare_email
http://www.twloha.com/blog/some-thoughts-boycotting-formspring-in-1/
A Generational View of
FormSpring/Facebook Bullying
A Thoughtful Response
http://www.facebook.com/notes/to-write-love-on-her-arms/some-thoughts-on-boycotting-
formspring-in-response-to-the-suicide-of-alexis-pilk/373781774657
Cyberbullying
What the research is telling us…
Amanda Lenhart
Youth Online Safety Working Group
May 6, 2010
Washington, DC
May 2010 24
Teen internet use basics
• 93% of teens 12-17 go online
• 63% of online teens go online daily
• 89% of online teens go online from home, and most
of them go online from home most often
• 77% of teen go online at school
• 71% go online from friends or relatives house
• 60% go online from a library
• 27% go online on their mobile phone
• 76% of households with teens go online via
broadband, 10% via dial up, and 12% do not have
access at home.
May 2010 25
What are teens doing online?
• 94% go online to do research for school assignments; 48% do so on a
typical day.
• 81% go to websites about movies, TV shows, music groups, or sports
stars
• 64% of online teens have created some kind of content online
• 62% go online to get news
• 57% have watched a video on a video-sharing site like YouTube or
GoogleVideo
• 55% go online to get information about a college, university or other
school that they are thinking about attending.
• 48% have bought something online like books, clothes or music
• 31% have looked online for health, dieting or physical fitness
information; 17% have looked online for sensitive health information
May 2010 26
How else are teens connecting?
• 75% of teens have a cell phone
– No gender or race/ethnic differences in ownership
– 50% of teens with phones talk to friends daily
– 54% of teens send text messages daily
– 27% use their phone to go online
• 73% of teens use an online social network site
– 37% of SNS users send messages through social networks daily
• 80% of teens have a game console
• 51% of teens have a portable gaming device
– Teens connect and interact with others online through games
May 2010 27
Concerns in Online Safety Sphere
• Inappropriate contact
– Strangers
– Bullies
• Inappropriate content
– Accidental Exposure
– Deliberate Exposure
May 2010 28
Bullying
Olweus (1993)
“A person is bullied when he or she is exposed, repeatedly and over time, to
negative actions on the part of one or more other persons, and he or she has
difficulty defending himself or herself."
This definition includes three important components:
1. Bullying is aggressive behavior that involves unwanted, negative actions.
2. Bullying involves a pattern of behavior repeated over time
3. Bullying involves an imbalance of power or strength.”
Bullying
– Physical
– Relational/Verbal
-Internet
May 2010 29
Online Harassment &
Cyberbullying
• Online harassment: aggressive behavior,
“harm doing,” insults, denigration,
impersonation, exclusion, outing,
activities associated with hacking –
stealing information, breaking into
accounts, damaging websites, profiles
etc. (Willard, 2006)
• Cyberbullying: online harassment that is
– repeated over time
May 2010 30
What makes online harassment &
bullying different?
• Technology is vehicle
• Persistence of content
– Editable, alterable
• Distributability of content
– Speed
– Breadth
• Dis-inhibition over computer-mediated communication
• Invasive
May 2010 31
Pew Internet: Online Harassment
• 32% of online teens have experienced one of the
following forms of online harassment:
– 15% of teens reported having private material (IM,
txt, email) forwarded without permission
– 13% had received threatening messages
– 13% said someone had spread a rumor about them
online
– 6% had someone post an embarrassing picture of
them online without permission
(Lenhart,
2007)
• 26% of teens have been harassed via their cell phones
either by voice or text
(Lenhart,
3/18/2022 32
May 2010 33
Cyberbullying
• Other research shows prevalence of cyberbullying or online harassment
between 9% and 33% of youth ages 10-18. (Wolak et al, 2007, Ybarra et al,
2007)
• Much of the difference is definitional and depends on how the question
was asked. Specific activities often yield higher levels of response than
blanket definitions.
• Mid-teens (ages 14-17) is the age of greatest prevalence of online
harassment & bullying (Pew, 2007, Hinduja & Patchin, 2008)
• Perpetrators of online bullying (similar to offline bullying) are generally the
same age as their victim. (Wolak, 2007)
May 2010 34
Frequency of bullying victimization among 11-16 year
olds
62%
27%
5%
3% 3%
Never
Less often than monthly
Once or twice a month
Once or twice a week
Everyday
(n=1,193)
(Ybarra, 2009)
May 2010 35
Online Harassment (2)
• Girls, particularly older girls, report more online
harassment; 38% of all online girls reported
experiencing some type of harassment (Pew, 2007)
• Social network users are also more likely to report
online harassment – 39% of SNS users have
experience it. (Pew, 2007)
• But most teens (67%) think bullying & harassment
happens more OFFLINE. (Pew, 2007)
May 2010 36
Frequency of bullying victimization among 11-
16 year olds by environment
(n=1,193)
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
School Internet Cell phone text
messaging
To and from school Some other place
Everyday
Once or twice a week
Once or twice a month
Less often than monthly
Never
(Ybarra, 2009)
May 2010 37
Online (or not) Harassment
• School is by far the most common place youth report being
bullied (31%) versus elsewhere (e.g., 13% online)
• The prevalence rate of Internet harassment (both perpetration
and victimization) appears to be stable (2006-2008).
• The majority (59%) of Internet harassment comes from other
minors
• Youth who report being harassed online report a myriad of
concurrent psychosocial problems offline, too
Source: Michele Ybarra & colleagues work
on the 2005 Youth Internet Safety
Survey fielded by UNH CCRC & 2007-
2008 Growing up with Media research
May 2010 38
Why should we worry?
• Bullying is broadly associated with:
– School violence
– Delinquency
– Suicidal ideation
• Bullied teens (and often bullies
themselves) have higher levels of:
– Depression and other psychological
problems
– Substance abuse
May 2010 39
Why should we worry (2)?
• Some research suggests that significant portions of
teens aren’t bothered by online harassment or
bullying
• Research suggests that 1/3 of teens (34%) are
distressed by online harassment. (Wolak et al, 2007)
– Distressed = “Extremely or very upset or afraid”
• Teens who are high internet users are more likely to
be distressed (Wolak, 2007)
Draw Your Line – MTV
http://www.athinline.org/drawyourline
May 2010 41
Overlap of cyberbullying & internet
victimization
(Ybarra, 2010)
May 2010 42
Differences between cyberbullying
& internet harassment
Cyberbullying is not more common than Internet
harassment
• On average (between 2007-2008): 37% were harassed,
14% were bullied online in the past year
Cyberbullying is not more damaging than Internet
harassment
• Among those cyberbullied, 15% report being very /
extremely upset
• Among those harassed, between 17-34% report being
very / extremely upset
May 2010 43
Cell phone-based harassment
• 75% of teens have cell phones
• 54% of all teens text message daily
• 26% have been harassed through their cell phone by voice
calls or text messages
• 47% have sent a text message they regretted sending
• And then there’s sexting – which is
generally not a form of harassment
itself, but when the images are shared,
can lead to harassment and bullying.
3/18/2022 44
May 2010 45
Sending Sexts
• No difference by gender
• Oldest teens most likely to have sent
– 8% of 17 year olds
– 4% of 12 year olds
• 17% who pay for all the costs of the phone send
sexts vs. 3% of others
May 2010 46
Receiving Sexts
• Again, no gender differences and increases by age
– 4% of 12 year olds
– 20% of 16 year olds
– 30% of 17 year olds
May 2010 47
Sexting Scenarios
1. Between two romantic partners, as a part of,
instead of, or as a prelude to sex – never
leaves couple
2. Between two romantic partners – but shared
with others
3. Between two people where at least one would
like to be in a relationship – shows interest
May 2010 48
Element of coercion for some sexting
“When I was about 14-15 years old, I received/sent these types
of pictures. Boys usually ask for them or start that type of
conversation. My boyfriend, or someone I really liked asked
for them. And I felt like if I didn’t do it, they wouldn’t continue
to talk to me. At the time, it was no big deal. But now looking
back it was definitely inappropriate and over the line.”
17 year old girl

Más contenido relacionado

La actualidad más candente

Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Disadvantages of Social networking
Disadvantages of Social networkingDisadvantages of Social networking
Disadvantages of Social networkingdrshrikant2
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Online relationships - the future of friendship?
Online relationships - the future of friendship?Online relationships - the future of friendship?
Online relationships - the future of friendship?Katie Foss
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.megjanssen
 
Computer network and interent
Computer network and interentComputer network and interent
Computer network and interentTUC
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1mjsmith2505
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerD Boyer Consulting
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saadsbaluch1
 

La actualidad más candente (20)

Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Disadvantages of Social networking
Disadvantages of Social networkingDisadvantages of Social networking
Disadvantages of Social networking
 
M1 presentation2
M1 presentation2M1 presentation2
M1 presentation2
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Online relationships - the future of friendship?
Online relationships - the future of friendship?Online relationships - the future of friendship?
Online relationships - the future of friendship?
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Computer network and interent
Computer network and interentComputer network and interent
Computer network and interent
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Teens, Social Media and Privacy: Reputation management, third party access & ...
Teens, Social Media and Privacy:Reputation management, third party access & ...Teens, Social Media and Privacy:Reputation management, third party access & ...
Teens, Social Media and Privacy: Reputation management, third party access & ...
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyer
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saad
 

Destacado

northrop grumman Earnings Announcement 2007 4th
northrop grumman Earnings Announcement 2007 4th northrop grumman Earnings Announcement 2007 4th
northrop grumman Earnings Announcement 2007 4th finance8
 
american express 10-K Filings 2003
american express 10-K Filings 2003american express 10-K Filings 2003
american express 10-K Filings 2003finance8
 
hess 01/28/2009 Supplemental Earnings Information
hess 01/28/2009	Supplemental Earnings Informationhess 01/28/2009	Supplemental Earnings Information
hess 01/28/2009 Supplemental Earnings Informationfinance8
 
northrop grumman Slide Presentation 2007 3rd
northrop grumman  Slide Presentation 2007 3rdnorthrop grumman  Slide Presentation 2007 3rd
northrop grumman Slide Presentation 2007 3rdfinance8
 
northrop grumman Q3 08 Earnings Presentation
northrop grumman	Q3 08 Earnings Presentationnorthrop grumman	Q3 08 Earnings Presentation
northrop grumman Q3 08 Earnings Presentationfinance8
 
northrop grumman Earnings Announcement 2006 3rd
northrop grumman Earnings Announcement 2006 3rdnorthrop grumman Earnings Announcement 2006 3rd
northrop grumman Earnings Announcement 2006 3rdfinance8
 
Creating the Morgridge International Reading Center; IRA 2009, Phoenix
Creating the Morgridge International Reading Center; IRA 2009, PhoenixCreating the Morgridge International Reading Center; IRA 2009, Phoenix
Creating the Morgridge International Reading Center; IRA 2009, PhoenixSusan Wegmann
 

Destacado (9)

Analiza Kompetencji
Analiza KompetencjiAnaliza Kompetencji
Analiza Kompetencji
 
northrop grumman Earnings Announcement 2007 4th
northrop grumman Earnings Announcement 2007 4th northrop grumman Earnings Announcement 2007 4th
northrop grumman Earnings Announcement 2007 4th
 
american express 10-K Filings 2003
american express 10-K Filings 2003american express 10-K Filings 2003
american express 10-K Filings 2003
 
hess 01/28/2009 Supplemental Earnings Information
hess 01/28/2009	Supplemental Earnings Informationhess 01/28/2009	Supplemental Earnings Information
hess 01/28/2009 Supplemental Earnings Information
 
Museo Del Trajerosaperez
Museo Del TrajerosaperezMuseo Del Trajerosaperez
Museo Del Trajerosaperez
 
northrop grumman Slide Presentation 2007 3rd
northrop grumman  Slide Presentation 2007 3rdnorthrop grumman  Slide Presentation 2007 3rd
northrop grumman Slide Presentation 2007 3rd
 
northrop grumman Q3 08 Earnings Presentation
northrop grumman	Q3 08 Earnings Presentationnorthrop grumman	Q3 08 Earnings Presentation
northrop grumman Q3 08 Earnings Presentation
 
northrop grumman Earnings Announcement 2006 3rd
northrop grumman Earnings Announcement 2006 3rdnorthrop grumman Earnings Announcement 2006 3rd
northrop grumman Earnings Announcement 2006 3rd
 
Creating the Morgridge International Reading Center; IRA 2009, Phoenix
Creating the Morgridge International Reading Center; IRA 2009, PhoenixCreating the Morgridge International Reading Center; IRA 2009, Phoenix
Creating the Morgridge International Reading Center; IRA 2009, Phoenix
 

Similar a Digital Health and Safety Guide

Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1bmcdade
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105CarolRusch1
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 

Similar a Digital Health and Safety Guide (20)

Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Thurston
ThurstonThurston
Thurston
 
Sm
SmSm
Sm
 

Más de Ray Brannon

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedRay Brannon
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociologyRay Brannon
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Ray Brannon
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics Ray Brannon
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Ray Brannon
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to thinkRay Brannon
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Ray Brannon
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Ray Brannon
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story RevisedRay Brannon
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.Ray Brannon
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speechesRay Brannon
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body languageRay Brannon
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Ray Brannon
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study Ray Brannon
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsRay Brannon
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsRay Brannon
 

Más de Ray Brannon (20)

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revised
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociology
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18
 
Stratification
Stratification Stratification
Stratification
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to think
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story Revised
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speeches
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body language
 
Get A Job 2016
Get A Job 2016Get A Job 2016
Get A Job 2016
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your Presentations
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tips
 

Digital Health and Safety Guide

  • 3. Social media and information overload Americans now consume three times the information they did in 1960.
  • 4. The Societal Consequences Protecting Your Digital Health • Critical thinking • Career and reputation • Emotional & physical health • Personal safety
  • 5. Critical Thinking – Digital Literacy
  • 6. Professor Rheingold is a visiting lecturer in Stanford University’s Department of Communication where he teaches two courses, "Digital Journalism" and "Virtual Communities and Social Media". http://www.youtube.com/watch?v=lbRYkria JXM
  • 7. Critical Thinking Developing Healthy Internet Skepticism Baloney Detection Kit http://www.michaelshermer.com/2001/11/baloney-detection/
  • 8. What does your Online Reputation say about you? http://www.microsoft.com/showcase/en/us/details/96179773-76fc-407f-b945- ae828f872ba7
  • 9. In December of 2009, Microsoft released statistics from a survey that they commissioned which drastically topped those numbers, stating that 79% of hiring managers and job recruiters in the United States reviewed online information about job applicants, while 70% of those surveyed said that they’ve rejected applicants based on their findings.
  • 10. How Social Media ‘Mistakes’ Impact Getting Hired or Fired Many employers use social networking sites along with personal blogs to look for what they call “digital dirt” We wondered what types of online content would actually affect an employer’s decision on either hiring or firing an employee. Here’s a breakdown of what Microsoft found in the same aforementioned study: 1. Concerns about the candidate’s lifestyle 58% 2. Inappropriate comments and text written by the candidate 56% 3. Unsuitable photos, videos and information 55% 4. Inappropriate comments or text written by friends and relatives 43% 5. Comments criticizing previous employers, coworkers or clients 40% 6. Inappropriate comments or text written by colleagues or work acquaintances 40% 7. Membership in certain groups and networks 35% 8. Discovered that information the candidate shared was false 30% 9. Poor communication skills displayed online 27% 10. Concern about the candidate’s financial background 16% SOURCE: http://www.safetyweb.com/online-reputation-guide-for-college-students#mistakes
  • 11. Personal Safety Visit these sites at your own risk!
  • 12. A Gateway for Dangerous Behavior?
  • 15. Cyber Bullying and Social Isolation
  • 17. How Social Media Is Helping Defeat Cyber Bullying With MTV launching Draw Your Line, a visualization tool that encourages young people to take action against digital abuse and share these actions and tips with others. The tool is part of A Thin Line, an organization dedicated to decreasing digital abuse and bullying, and protecting children and young adults from the dangers of an increasingly online world. Visit: http://www.athinline.org/drawyourline
  • 18.
  • 19. “It's important to note that blaming technology for horrendous, violent displays of homophobia or racism or simple meanness lets adults like parents and teachers absolve themselves of the responsibility to raise kids free from these evils. “ ~ Anil Dash “There is a statistically significant weak positive relationship between home access to a computer or time spent online and whether or not students tease others.” Barbara Lacey, “Social aggression: A study of Internet harassment” “The authors fail to adequately summarize and analyze the data from the various studies, many of which appear on Internet web sites rather than in peer-reviewed journals. The few tables of data are uninformative and presented without statistical analysis.” The American Journal of Psychiatry Book Review of: Cyber Bullying: Bullying in the Digital Age “The results show that almost 54% of the students were victims of traditional bullying and over a quarter of them had been cyber-bullied. Almost one in three students had bullied others in the traditional form, and almost 15% had bullied others using electronic communication tools. ” Qing L i, “New bottle but old wine: A research of cyberbullying in schools” Does Social Media Cause Bullying?
  • 20. Can Anonymity Breed Irresponsibility The problem, say Formspring's critics, is the site offers a perfect haven for cyberbulllying. The recent suicide of 15-year-old Pheobe Prince has drawn attention to the problem of bullying in cyberspace because victims often have no idea who is tormenting them. A Boycott Formspring Group on Facebook claims almost 7,300 members. http://www.dailyfinance.com/story/media/do-you-know-who-your-children- are-online-formsprings-raunchy-f/19452194/?a_dgi=aolshare_email http://www.twloha.com/blog/some-thoughts-boycotting-formspring-in-1/
  • 21. A Generational View of FormSpring/Facebook Bullying
  • 23. Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
  • 24. May 2010 24 Teen internet use basics • 93% of teens 12-17 go online • 63% of online teens go online daily • 89% of online teens go online from home, and most of them go online from home most often • 77% of teen go online at school • 71% go online from friends or relatives house • 60% go online from a library • 27% go online on their mobile phone • 76% of households with teens go online via broadband, 10% via dial up, and 12% do not have access at home.
  • 25. May 2010 25 What are teens doing online? • 94% go online to do research for school assignments; 48% do so on a typical day. • 81% go to websites about movies, TV shows, music groups, or sports stars • 64% of online teens have created some kind of content online • 62% go online to get news • 57% have watched a video on a video-sharing site like YouTube or GoogleVideo • 55% go online to get information about a college, university or other school that they are thinking about attending. • 48% have bought something online like books, clothes or music • 31% have looked online for health, dieting or physical fitness information; 17% have looked online for sensitive health information
  • 26. May 2010 26 How else are teens connecting? • 75% of teens have a cell phone – No gender or race/ethnic differences in ownership – 50% of teens with phones talk to friends daily – 54% of teens send text messages daily – 27% use their phone to go online • 73% of teens use an online social network site – 37% of SNS users send messages through social networks daily • 80% of teens have a game console • 51% of teens have a portable gaming device – Teens connect and interact with others online through games
  • 27. May 2010 27 Concerns in Online Safety Sphere • Inappropriate contact – Strangers – Bullies • Inappropriate content – Accidental Exposure – Deliberate Exposure
  • 28. May 2010 28 Bullying Olweus (1993) “A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself." This definition includes three important components: 1. Bullying is aggressive behavior that involves unwanted, negative actions. 2. Bullying involves a pattern of behavior repeated over time 3. Bullying involves an imbalance of power or strength.” Bullying – Physical – Relational/Verbal -Internet
  • 29. May 2010 29 Online Harassment & Cyberbullying • Online harassment: aggressive behavior, “harm doing,” insults, denigration, impersonation, exclusion, outing, activities associated with hacking – stealing information, breaking into accounts, damaging websites, profiles etc. (Willard, 2006) • Cyberbullying: online harassment that is – repeated over time
  • 30. May 2010 30 What makes online harassment & bullying different? • Technology is vehicle • Persistence of content – Editable, alterable • Distributability of content – Speed – Breadth • Dis-inhibition over computer-mediated communication • Invasive
  • 31. May 2010 31 Pew Internet: Online Harassment • 32% of online teens have experienced one of the following forms of online harassment: – 15% of teens reported having private material (IM, txt, email) forwarded without permission – 13% had received threatening messages – 13% said someone had spread a rumor about them online – 6% had someone post an embarrassing picture of them online without permission (Lenhart, 2007) • 26% of teens have been harassed via their cell phones either by voice or text (Lenhart,
  • 33. May 2010 33 Cyberbullying • Other research shows prevalence of cyberbullying or online harassment between 9% and 33% of youth ages 10-18. (Wolak et al, 2007, Ybarra et al, 2007) • Much of the difference is definitional and depends on how the question was asked. Specific activities often yield higher levels of response than blanket definitions. • Mid-teens (ages 14-17) is the age of greatest prevalence of online harassment & bullying (Pew, 2007, Hinduja & Patchin, 2008) • Perpetrators of online bullying (similar to offline bullying) are generally the same age as their victim. (Wolak, 2007)
  • 34. May 2010 34 Frequency of bullying victimization among 11-16 year olds 62% 27% 5% 3% 3% Never Less often than monthly Once or twice a month Once or twice a week Everyday (n=1,193) (Ybarra, 2009)
  • 35. May 2010 35 Online Harassment (2) • Girls, particularly older girls, report more online harassment; 38% of all online girls reported experiencing some type of harassment (Pew, 2007) • Social network users are also more likely to report online harassment – 39% of SNS users have experience it. (Pew, 2007) • But most teens (67%) think bullying & harassment happens more OFFLINE. (Pew, 2007)
  • 36. May 2010 36 Frequency of bullying victimization among 11- 16 year olds by environment (n=1,193) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% School Internet Cell phone text messaging To and from school Some other place Everyday Once or twice a week Once or twice a month Less often than monthly Never (Ybarra, 2009)
  • 37. May 2010 37 Online (or not) Harassment • School is by far the most common place youth report being bullied (31%) versus elsewhere (e.g., 13% online) • The prevalence rate of Internet harassment (both perpetration and victimization) appears to be stable (2006-2008). • The majority (59%) of Internet harassment comes from other minors • Youth who report being harassed online report a myriad of concurrent psychosocial problems offline, too Source: Michele Ybarra & colleagues work on the 2005 Youth Internet Safety Survey fielded by UNH CCRC & 2007- 2008 Growing up with Media research
  • 38. May 2010 38 Why should we worry? • Bullying is broadly associated with: – School violence – Delinquency – Suicidal ideation • Bullied teens (and often bullies themselves) have higher levels of: – Depression and other psychological problems – Substance abuse
  • 39. May 2010 39 Why should we worry (2)? • Some research suggests that significant portions of teens aren’t bothered by online harassment or bullying • Research suggests that 1/3 of teens (34%) are distressed by online harassment. (Wolak et al, 2007) – Distressed = “Extremely or very upset or afraid” • Teens who are high internet users are more likely to be distressed (Wolak, 2007)
  • 40. Draw Your Line – MTV http://www.athinline.org/drawyourline
  • 41. May 2010 41 Overlap of cyberbullying & internet victimization (Ybarra, 2010)
  • 42. May 2010 42 Differences between cyberbullying & internet harassment Cyberbullying is not more common than Internet harassment • On average (between 2007-2008): 37% were harassed, 14% were bullied online in the past year Cyberbullying is not more damaging than Internet harassment • Among those cyberbullied, 15% report being very / extremely upset • Among those harassed, between 17-34% report being very / extremely upset
  • 43. May 2010 43 Cell phone-based harassment • 75% of teens have cell phones • 54% of all teens text message daily • 26% have been harassed through their cell phone by voice calls or text messages • 47% have sent a text message they regretted sending • And then there’s sexting – which is generally not a form of harassment itself, but when the images are shared, can lead to harassment and bullying.
  • 45. May 2010 45 Sending Sexts • No difference by gender • Oldest teens most likely to have sent – 8% of 17 year olds – 4% of 12 year olds • 17% who pay for all the costs of the phone send sexts vs. 3% of others
  • 46. May 2010 46 Receiving Sexts • Again, no gender differences and increases by age – 4% of 12 year olds – 20% of 16 year olds – 30% of 17 year olds
  • 47. May 2010 47 Sexting Scenarios 1. Between two romantic partners, as a part of, instead of, or as a prelude to sex – never leaves couple 2. Between two romantic partners – but shared with others 3. Between two people where at least one would like to be in a relationship – shows interest
  • 48. May 2010 48 Element of coercion for some sexting “When I was about 14-15 years old, I received/sent these types of pictures. Boys usually ask for them or start that type of conversation. My boyfriend, or someone I really liked asked for them. And I felt like if I didn’t do it, they wouldn’t continue to talk to me. At the time, it was no big deal. But now looking back it was definitely inappropriate and over the line.” 17 year old girl

Notas del editor

  1. ACCOUNT INFORMATION. TO DOWNLOAD AND INSTALL Paltalk YOU MUST BE AT LEAST EIGHTEEN (18) YEARS OF AGE. THERE ARE CERTAIN AREAS ON Paltalk THAT CONTAIN ADULT OR MATURE CONTENT. ACCORDINGLY, YOU REPRESENT THAT YOU ARE AT LEAST EIGHTEEN (18) YEARS OF AGE TO USE THOSE AREAS. NO ONE UNDER THE AGE OF THIRTEEN (13) IS PERMITTED TO USE Paltalk. NO ONE BETWEEN THE AGES OF THIRTEEN (13) AND EIGHTEEN (18) MAY USE Paltalk WITHOUT ADULT SUPERVISION. PARENTS AND GUARDIANS ASSUME ALL LIABILITY AND RESPONSIBILITY FOR THE USE OF THEIR ACCOUNTS BY OTHER PERSONS, INLCLUDING BUT NOT LIMITED TO USE OF THEIR ACCOUNTS BY PERSONS UNDER EIGHTEEN (18) YEARS OF AGE. ANY USER FOUND TO BE UNDER THE AGE OF THIRTEEN (13) OR PERMITTING USE OF Paltalk BY A PERSON UNDER THE AGE OF THIRTEEN (13), MAY HAVE HIS OR HER ACCOUNT SUSPENDED OR TERMINATED WITH OR WITHOUT NOTICE AND OTHER ACTIONS MAY ALSO BE TAKEN. IF A CHILD UNDER THIRTEEN (13) HAS ACCESS TO YOUR COMPUTER, DO NOT SAVE YOUR Paltalk PASSWORD; THIS WILL RESTRICT THE CHILD AND ANY UNAUTHORIZED USER FROM USING YOUR ACCOUNT. IN ADDITION, WE STRONGLY RECOMMEND THAT YOU CHECK REGULARLY TO SEE IF ANY NEW, UNAUTHORIZED ACCOUNTS HAVE BEEN CREATED UNDER YOUR Paltalk ACCOUNT. TO DELETE ANY * ProfileWe store information that we collect through cookies, log files, clear gifs, to create a “profile” of your preferences. We tie your personally identifiable information, and your purchasing history, to information in the profile, in order to provide tailored promotions and marketing offers and to improve the content of the site for you. We do not share your profile with other third parties without your consent. Paltalk is the sole owner of the information collected on Paltalk.com. Paltalk collects personally identifiable information from our users at several different points on our Web site or through our downloaded software.