SlideShare una empresa de Scribd logo
1 de 18
Understanding &
            Responding to Cyber
            Bullying in the Cyber
            World

            Dr. Faye Mishna, Dean
            Margaret & Wallace McCain
Funded by   Family Chair in Child & Family
            f.mishna@utoronto.ca

            January 31, 2013
Context of Social Media World
 Recent dramatic technological advances have
  forever changed how we communicate & interact

 Children & youth are sophisticated users of
  technology

 Youth acquire technological competence much
  faster than their parents

 Youth seek social connections, information,
  personal assistance, entertainment online
Social Media World: Benefits
 Unprecedented opportunities for communication,
  learning & self-exploration

 Access to crucial resources such as social support
  (Informal & formal), reduce sense of isolation

 Most online interactions positive/neutral

 Self-disclosure, social comparison, normalize
  feelings of distress
Context of Social Media World: Risks

  Can reinforce negative or unhealthy views of self

  Can glamorize unhealthy identities through
   subculture that normalizes & encourages deviant
   behaviour

  Can provides pool of participants with low self-
   worth who may be vulnerable to exploitative
   relationships
    • e.g., sites for anorexia, self-
      injury, pedophilia, violence / terror
Context of Social Media World: Risks

 Cyber risks, through communication technologies
   Bullying
   Sexual solicitation or victimization
   Exposure to harmful material
      Pornography, violent images, hate messages

 When child feels safe (home, room)

 Those affected (youth) know much more about
  technology use than those who should protect
  (parents, educators)
Navigating the Social Media World
 Developmental characteristics & level of children
  & youth make them unprepared for the freedom
  afforded in the online world
    Dependency, growth, & change
    Autonomy & freedom

 Young people need guidance in order to make
  the best choices when utilizing communication
  technologies
Cyber Bullying
 No universal definition

 The use of communication & information
  technology to cause harm to another person

   Criteria: intent to cause harm, target, power
    imbalance

   Includes behaviours to spread rumours, hurt /
    threaten others, or sexually harass
Prevalence of Cyber Bullying

 Typically ranges from 10 to 35% (Agatston, Kowalski, &
  Limber, 2007; Hinduja & Patchin, 2008; Kowalski & Limber, 2007; Kowalski et al., 2008;
  Li, 2007; Williams & Guerra, 2007)




 Some estimates are much higher, up to 72%
  (Hoff & Mitchell, 2008; Juvonen & Gross, 2008; Mishna et al., 2010; Raskauskas &
  Stoltz, 2007)
What Makes Cyber Bullying Unique?

 Engagement with social media world is constant
   Therefore cyber bullying transcends the
    boundaries of time & space

 Difficult to escape, because technology follows
  children & youth everywhere

 Can impact young people above & beyond the
  effects of traditional bullying
Mental Health Implications

                 Can be devastating for children
                  & youth
“Like 1000
paper cuts
                 Is of growing concern for
eating away
                  parents, educators & society
at your soul”

                 Can affect many areas of
                  child/youth’s life
Education & Training

 Adults require knowledge about the forms of
  cyber risk
   • Education to help identify & respond
     appropriately

 Education should focus on safe use of
  technology & harmful consequences of risky
  interactions
Assessment Considerations
Type of
cyber risk
   Types of cyber risk

  Children & youth may not recognize extent of harm
Level of youth
understanding? cyber bullying
    caused by

   Careful use of label “cyber bullying”
      Youth may not identify as targets or perpetrators of
       cyber bullying
   Labels But may be involved in cyber bullying behaviour
          &
   language?

   Must use youth’s language
     e.g., “drama”
Strategies to Address Cyber Bullying
 Choose strategies thoughtfully &
  intentionally with consideration of the context

 Tools in your toolbox (Walker, 2012)
      Books, reports, research articles
      Brochures, fact sheets, safety tips
      School curriculum, webinars, tutorials
      Videos, DVDs, interactive media
      Youth driven prevention & intervention efforts
      Conversation starters to begin talking to youth about
       technology use & cyber bullying
Strategies to Address Cyber Bullying

 What professionals who work with
  children, youth & families can do (Bauman, 2011)
    Facilitate help-seeking

    Encourage sensitive responses from parents

    Enlist the help of police & lawyers when necessary

    Create innovative ways to support youth
       e.g., cyber counselling
What Social Workers Can Do
 Individual counselling with youth involved
    Can be brief or longer: must be tailored
    Helping youth learn different ways of interacting

 Youth support groups

 Supporting parents

 Advocacy at individual, community, societal levels

 Workshops bringing together school
  administrators, teachers, parents, & youth (Bauman, 2011)
What Parents Can Do
 Adult supervision of technology challenging
 Parents faced with accepting children’s unavoidable
  autonomy in cyber world, while trying to monitor activities
 Disclosure may be difficult because of fear of losing
  technological privileges
 Ability for youth to tell adults is critical as delaying
  disclosure delays receiving help
 Be supportive: associated with less cyber bullying
 Maintain open lines of communication
 Encourage youth to use technologies in positive ways
 Create environments in which children & youth feel safe
  disclosing cyber bullying involvement
Key Points
 The social media world is complex, pervasive &
  here to stay

 Cyber bullying can occur on any technological
  device

 Cyber bullying can include various harmful
  behaviours

 Both overlap & distinctions between online &
  offline bullying
Key Points

 Cyber bullying can be devastating

 Adults must be supportive & accepting toward
  youth regarding their technology use

 Adults must maintain open communication to
  help youth with technology use & problems that
  may arise

Más contenido relacionado

Destacado

Deskolados
Deskolados Deskolados
Deskolados
zbs2011
 
What can i bring to your group
What can i bring to your groupWhat can i bring to your group
What can i bring to your group
kereco
 
Tiedonhankinnan etätehtävät (Kuortane)
Tiedonhankinnan etätehtävät (Kuortane)Tiedonhankinnan etätehtävät (Kuortane)
Tiedonhankinnan etätehtävät (Kuortane)
Heidi Eriksson
 
Leonardo da vinci
Leonardo da vinciLeonardo da vinci
Leonardo da vinci
perealbalat
 

Destacado (19)

Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
 
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisStopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In Schools
 
@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011
 
Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
 
La palma, our island corrected
La palma, our island correctedLa palma, our island corrected
La palma, our island corrected
 
Deskolados
Deskolados Deskolados
Deskolados
 
Tiedonhallinnan opas-opettajalle
Tiedonhallinnan opas-opettajalleTiedonhallinnan opas-opettajalle
Tiedonhallinnan opas-opettajalle
 
What can i bring to your group
What can i bring to your groupWhat can i bring to your group
What can i bring to your group
 
Tiedonhankinnan etätehtävät (Kuortane)
Tiedonhankinnan etätehtävät (Kuortane)Tiedonhankinnan etätehtävät (Kuortane)
Tiedonhankinnan etätehtävät (Kuortane)
 
Leonardo da vinci
Leonardo da vinciLeonardo da vinci
Leonardo da vinci
 

Más de Scott Mills

Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"
Scott Mills
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Scott Mills
 
Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011
Scott Mills
 
Crime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksCrime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talks
Scott Mills
 

Más de Scott Mills (12)

Beyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyBeyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media Strategy
 
Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
 
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
 
Social Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsSocial Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott Mills
 
Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight
 
Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011
 
Crime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksCrime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talks
 
Promote Crime Stoppers International
Promote Crime Stoppers InternationalPromote Crime Stoppers International
Promote Crime Stoppers International
 
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple..."Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
 

Último

Último (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Keynote Address On Cyber Bullying By Dr. Faye Mishna 13 Division Toronto Police School Summit 2013

  • 1. Understanding & Responding to Cyber Bullying in the Cyber World Dr. Faye Mishna, Dean Margaret & Wallace McCain Funded by Family Chair in Child & Family f.mishna@utoronto.ca January 31, 2013
  • 2. Context of Social Media World  Recent dramatic technological advances have forever changed how we communicate & interact  Children & youth are sophisticated users of technology  Youth acquire technological competence much faster than their parents  Youth seek social connections, information, personal assistance, entertainment online
  • 3. Social Media World: Benefits  Unprecedented opportunities for communication, learning & self-exploration  Access to crucial resources such as social support (Informal & formal), reduce sense of isolation  Most online interactions positive/neutral  Self-disclosure, social comparison, normalize feelings of distress
  • 4. Context of Social Media World: Risks  Can reinforce negative or unhealthy views of self  Can glamorize unhealthy identities through subculture that normalizes & encourages deviant behaviour  Can provides pool of participants with low self- worth who may be vulnerable to exploitative relationships • e.g., sites for anorexia, self- injury, pedophilia, violence / terror
  • 5. Context of Social Media World: Risks  Cyber risks, through communication technologies  Bullying  Sexual solicitation or victimization  Exposure to harmful material  Pornography, violent images, hate messages  When child feels safe (home, room)  Those affected (youth) know much more about technology use than those who should protect (parents, educators)
  • 6. Navigating the Social Media World  Developmental characteristics & level of children & youth make them unprepared for the freedom afforded in the online world  Dependency, growth, & change  Autonomy & freedom  Young people need guidance in order to make the best choices when utilizing communication technologies
  • 7. Cyber Bullying  No universal definition  The use of communication & information technology to cause harm to another person  Criteria: intent to cause harm, target, power imbalance  Includes behaviours to spread rumours, hurt / threaten others, or sexually harass
  • 8. Prevalence of Cyber Bullying  Typically ranges from 10 to 35% (Agatston, Kowalski, & Limber, 2007; Hinduja & Patchin, 2008; Kowalski & Limber, 2007; Kowalski et al., 2008; Li, 2007; Williams & Guerra, 2007)  Some estimates are much higher, up to 72% (Hoff & Mitchell, 2008; Juvonen & Gross, 2008; Mishna et al., 2010; Raskauskas & Stoltz, 2007)
  • 9. What Makes Cyber Bullying Unique?  Engagement with social media world is constant  Therefore cyber bullying transcends the boundaries of time & space  Difficult to escape, because technology follows children & youth everywhere  Can impact young people above & beyond the effects of traditional bullying
  • 10. Mental Health Implications  Can be devastating for children & youth “Like 1000 paper cuts  Is of growing concern for eating away parents, educators & society at your soul”  Can affect many areas of child/youth’s life
  • 11. Education & Training  Adults require knowledge about the forms of cyber risk • Education to help identify & respond appropriately  Education should focus on safe use of technology & harmful consequences of risky interactions
  • 12. Assessment Considerations Type of cyber risk  Types of cyber risk  Children & youth may not recognize extent of harm Level of youth understanding? cyber bullying caused by  Careful use of label “cyber bullying”  Youth may not identify as targets or perpetrators of cyber bullying Labels But may be involved in cyber bullying behaviour & language?  Must use youth’s language  e.g., “drama”
  • 13. Strategies to Address Cyber Bullying  Choose strategies thoughtfully & intentionally with consideration of the context  Tools in your toolbox (Walker, 2012)  Books, reports, research articles  Brochures, fact sheets, safety tips  School curriculum, webinars, tutorials  Videos, DVDs, interactive media  Youth driven prevention & intervention efforts  Conversation starters to begin talking to youth about technology use & cyber bullying
  • 14. Strategies to Address Cyber Bullying  What professionals who work with children, youth & families can do (Bauman, 2011)  Facilitate help-seeking  Encourage sensitive responses from parents  Enlist the help of police & lawyers when necessary  Create innovative ways to support youth  e.g., cyber counselling
  • 15. What Social Workers Can Do  Individual counselling with youth involved  Can be brief or longer: must be tailored  Helping youth learn different ways of interacting  Youth support groups  Supporting parents  Advocacy at individual, community, societal levels  Workshops bringing together school administrators, teachers, parents, & youth (Bauman, 2011)
  • 16. What Parents Can Do  Adult supervision of technology challenging  Parents faced with accepting children’s unavoidable autonomy in cyber world, while trying to monitor activities  Disclosure may be difficult because of fear of losing technological privileges  Ability for youth to tell adults is critical as delaying disclosure delays receiving help  Be supportive: associated with less cyber bullying  Maintain open lines of communication  Encourage youth to use technologies in positive ways  Create environments in which children & youth feel safe disclosing cyber bullying involvement
  • 17. Key Points  The social media world is complex, pervasive & here to stay  Cyber bullying can occur on any technological device  Cyber bullying can include various harmful behaviours  Both overlap & distinctions between online & offline bullying
  • 18. Key Points  Cyber bullying can be devastating  Adults must be supportive & accepting toward youth regarding their technology use  Adults must maintain open communication to help youth with technology use & problems that may arise