SlideShare una empresa de Scribd logo
1 de 69
Descargar para leer sin conexión
CYBER PSYCHOLOGY
& CYBERBULLYING:
Life in a
Virtual World
Dr. Warren J. Blumenfeld
University of Massachusetts
Amherst, Massachusetts
warrenblumenfeld@gmail.com
The Birth of CyberPsychology
John Suler
Introductory Video
AGENDA
1. Cyber Psychology
2. The “Online Disinhibition Effect”
3. Cyber Time
4. Cyber Space & Postmodernism
5. Freud Peering from the Computer
6. Bullying & Cyberbullying
7. Instances of Cyberbullying
8. What Can Be Done?
9. Suggestions for Targets of Cyberbullying
Cyber Psychology
• The nature of social communication
technologies combined with relative
anonymity of cyberspace create
conditions for users to experience less
behavioral inhibitions than in Real Life
(RL) or Face-To-Face (f2f) situations.
• Altered state of consciousness
The “Online Disinhibition Effect”
(Suler)
• Positive:
– through anonymity of cyberspace, users
can exhibit extraordinary acts of kindness
or charity that they may have felt
inhibited from expressing in RL
The “Online Disinhibition Effect”
• Negative:
– this anonymity and altered psychological
environment may allow users to
communicate more objectionable needs
and desires onto others.
Cyber Time
• Exists Asynchronically:
– people often do not have to interact in
real time, which can add to the
disinhibition effect when one does not
have to deal with the immediate reactions
of others.
(Turkel)
Cyber Space
• Transcends Distance:
– virtually shrinking space making geography
irrelevant.
– Advantages: can bring people closer together,
making a virtual world community.
– Disadvantages: for people with anti-social
motives, the nature of social communication
technologies can enable users to abuse others
not only next door, but also on other side of
planet.
Cyber Space
• Personae:
– people can alter, change, emphasize different
aspects of their personalities or identities,
– or totally reinvent themselves
– show different personae (Latin “that through
which the sound comes” or the actor’s mask)
(Turkel)
Cyber Space
• Avatar:
–individuals can engage in masquerade
–change into a virtual costume known as an
“avatar.”
Cyber Space
• Communicating only with typed text in
social communication technologies,
• Users have options:
–being oneself
–expressing only parts of one’s identity
– assuming imagined identities
–remaining completely anonymous
(Suler)
Cyber Space: Postmodernism
• Computers embody postmodernism’s
important tenets:
– challenging
– contesting
– ultimately destabilizing identities.
• individuals continually redeploy identities as
fluid
• changing
• multifaceted
• non-essentialized
Cyber Space: Postmodernism
Identity destabilization presents many possibilities
• Positive:
– can allow individuals to relate in genuinely open and
honest ways about themselves that might be frightening
offline to discuss in real life personal encounters.
• Negative:
– with anonymity, individual can act out hostile or
sadistic emotions by abusing others online.
(Suler)
Cyber Space: Postmodernism
• Equalizing Effect:
– People begin on a relatively level playing field.
– Virtual net democracy dependent largely on technical
skills of user.
– Regardless of social status:
• Wealth, Race, Sex, Sexual & Gender Identity & Expression,
Physical & Mental Attributes, & many other social identities
(Suler)
Cyber Space
• Altered Perceptions:
– transitional space that becomes extension of
user’s intrapsychic world
– cyberspace communication can alter perceptions
and one’s state of consciousness by becoming:
• make-believe world
• dream-like experience
• even a game where rules of RL no longer apply
This may explain forms of computer and cyberspace
addictions.
College students throughout the world were
asked to go 24 hours without digital media:
Freud Peering from the Computer
Freud Peering from the Computer
• Transference:
– individual’s unconscious redirection of feelings from
one person to another.
– Kapelovitz: “the inappropriate repetition in the present
of a relationship that was important in a person's
childhood.”
– Suler: “we recreate in our relationship with the
computer some aspect of how we related to our family
members.”
– cyberspace can recreate & replay past relationships,
satisfy unmet, frozen, or thwarted needs from childhood
Freud Peering from the Computer
• Erotic Transference:
– Suler: does not consist of sexual feeling per se toward
computers
– “the perception of the computer as powerful, perhaps in
ways similar to how parents are perceived as powerful.”
Freud Peering from the Computer
• Erotic Transference & Cyber Abuse:
– Technologies provide users means to act out unmet
needs for power and control over others,
– to transfer frozen needs for attention or
acknowledgement not sufficiently satisfied within
the family constellation
Cyber Space Overall
Can inhibit a user’s sense of
responsibility for actions online
Bullying &
Cyberbullying
Bullying Defined
“Bullying is a specific type of aggression
in which:
1. the behavior is intended to harm or
disturb,
2. The behavior occurs repeatedly over
time,
3. There is an imbalance of power, with
a more powerful person or group
attacking a less powerful one.”
(JAMA, 2001)
Bullying Can Take At Least
Three Forms:
1. Physical: hitting, kicking, spitting,
pushing, taking personal belongings.
2. Verbal: taunting, malicious teasing,
name calling, making threats.
3. Psychological: spreading rumors,
manipulating social relationships, or
engaging in social exclusion, extortion,
or intimidation.
(U.S. Department of Justice, 2001)
Harassment Defined
• Harassment is victimization based upon one’s real or
perceived race, color, national origin, religion,
disability, gender, sexual orientation, or marital
status, physical appearance, or personality
characteristics.
• May include but not limited to:
– Verbal, nonverbal, physical, or written harassment
– Repeated remarks of demeaning nature
– Implied or explicit threats
– Demeaning jokes, stories, or activities
– Unreasonable interference with a student’s performance
(Iowa Department of Education)
Family Risk Factors:
Some child-rearing styles found to predict whether
young people will grow up to exhibit aggressive
bullying behaviors:
– Lack of warmth & involvement by parents.
– Overly-permissive overly-harsh parenting
– Harsh, physical discipline.
– Family/community model/support bullying behaviors.
– Victimization by older siblings
Loeber & Stouthamer-Loeber
Peer Risk Factors:
– Lack maturity or insight
– Friends have positive attitudes about violence.
– High status aggressive persons seek to enhance
their social power and protect their prestige with
peers.
– Low social status people seek to deflect taunting
and aggression, or enhance their social position
with higher status peers.
– Social/relational aggression creates excitement,
alleviates boredom, & secures friendships.
People Who Bully
A+
• Imagination
• Spontaneity
D-
•Impulse
control
•Empathy
Perpetrators of Hate Crimes by Age
LA County, 2009
Perpetrators of violent crimes by sex
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
85% 90% 91% 95% 95% 95% 99.8%
Females
Males
FBI 2009
38%
27%
35%
% of students who do
nothing
% of students who
wantto help, but
don't
% of students who
try to help
Bystander Behavior
in Bullying Incidents
© The Olweus Prevention Group, 2004
12-17
18-29
30-49
50-64
65+
93%
93%
81%
70%
38%
Internet Usage by Age
Pew Internet, 2009
Pew Internet, 2009
⌘
Cyberbullying Defined
“Cyberbullying involves the use of
information and communication
technologies such as e-mail, cell
phone and pager text messages,
instant messaging, defamatory
personal Web sites, and defamatory
online personal polling Web sites, to
support deliberate, repeated, and
hostile behaviour by an individual
or group, that is intended to harm
others.”
(Belsey)
Similarities & Differences Between
Face-To-Face Bullying &
Cyberbullying
• Similar: Both are about human
relationships, power, and control, and
actions can occur on numerous occasions
(www.bullying.org).
• Similar: Both may involve what
psychologists call the “Leveling Effect”:
people who bully often do so to diminish
others to inflate their own egos reflecting
their insecurities.
• Similar: Both do not simply involve those who
bully and those who are bullied (the “dyadic
view,”) but rather involve a number of “actors”
or roles across the social/school environment.
– People Who Bully
– Assistant or Follower of People Who Bully
– Encourager or Reinforcer of People Who Bully
– Outsider or “Bystander” Who Does Nothing
– Potential Defender or Ally of People Who Are Bullied
– Defender or Ally of People Who Are Bullied
– People Who Are Bullied
• (Sutton & Smith, 1999; Olweus, 1993)
• Different: Users of technology often do
things in cyberspace that they would not
ordinarily do in face-to-face (F2F) or real
life (RL) interactions—the “disinhibition
effect.” (Suler, 2001)
• Different: Cyberbullying is often even more
invisible to adults than other forms of
bullying.
• Different: Cyberbullying is a particularly
cowardly form of bullying. Cyberbullies can
often hide in the anonymity of cyberspace.
• Different: With anonymity, cyberbullies
do not have to “own” their actions, and
often do not fear being punished.
• Different: Cyberbullies can inflict pain
without having to see the effects, which
can result in a “deeper level of
meanness.” (Harmon, 2004)
• Different: The technology can shelter the
user from tangible feedback about
consequences of one’s actions, which can
result in minimized empathy or remorse.
(Media Awareness Network)
• Different: People can alter, change, or
emphasize different aspects of their
personalities or identities in
cyberspace—they can reinvent
themselves or show different per sonae
(Latin for “that through which the
sound comes” or the actor’s mask).
(Turkle, 1995)
• Different: Cyberbullies can
communicate their hurtful messages to
a very wide audience with remarkable
speed.
• Different: Cyberbullying is often
outside the legal reach of schools and
school boards when it occurs outside of
school.
• Different: Victims are often fearful of
telling others about being bullied because
they fear that reporting it would result in
adults taking away cell phones, computers,
or other forms of technology.
• Different: Victims may not know who the
cyberbully is since they may not be easily
identifiable.
• Different: Cyberbullying can occur any
time and any place. Home, therefore, is no
longer a refuge from peer bullying.
Similarities & Differences Between
Face-To-Face Bullying &
Cyberbullying
• Similar: Both are about human
relationships, power, and control, and
actions can occur on numerous occasions
(www.bullying.org).
• Similar: Both may involve what
psychologists call the “Leveling Effect”:
people who bully often do so to diminish
others to inflate their own egos reflecting
their insecurities.
• Similar: Both do not simply involve those who
bully and those who are bullied (the “dyadic
view,”) but rather involve a number of “actors”
or roles across the social/school environment.
– People Who Bully
– Assistant or Follower of People Who Bully
– Encourager or Reinforcer of People Who Bully
– Outsider or “Bystander” Who Does Nothing
– Potential Defender or Ally of People Who Are Bullied
– Defender or Ally of People Who Are Bullied
– People Who Are Bullied
• (Sutton & Smith, 1999; Olweus, 1993)
• Different: Users of technology often do
things in cyberspace that they would not
ordinarily do in face-to-face (F2F) or real
life (RL) interactions—the “disinhibition
effect.” (Suler, 2001)
• Different: Cyberbullying is often even more
invisible to adults than other forms of
bullying.
• Different: Cyberbullying is a particularly
cowardly form of bullying. Cyberbullies can
often hide in the anonymity of cyberspace.
• Different: With anonymity, cyberbullies
do not have to “own” their actions, and
often do not fear being punished.
• Different: Cyberbullies can inflict pain
without having to see the effects, which
can result in a “deeper level of
meanness.” (Harmon, 2004)
• Different: The technology can shelter the
user from tangible feedback about
consequences of one’s actions, which can
result in minimized empathy or remorse.
(Media Awareness Network)
• Different: People can alter, change, or
emphasize different aspects of their
personalities or identities in
cyberspace—they can reinvent
themselves or show different per sonae
(Latin for “that through which the
sound comes” or the actor’s mask).
(Turkle, 1995)
• Different: Cyberbullies can
communicate their hurtful messages to
a very wide audience with remarkable
speed.
• Different: Cyberbullying is often
outside the legal reach of schools and
school boards when it occurs outside of
school.
• Different: Victims are often fearful of
telling others about being bullied because
they fear that reporting it would result in
adults taking away cell phones, computers,
or other forms of technology.
• Different: Victims may not know who the
cyberbully is since they may not be easily
identifiable.
• Different: Cyberbullying can occur any
time and any place. Home, therefore, is no
longer a refuge from peer bullying.
Instances of Cyberbullying
• People sending hurtful, cruel, and oftentimes
threatening messages to other people.
– “Flame Mail”: designed to inflame, insight, or
enrage.
– “Hate Mail”: hate-inspired and oppressive--
racist, ethnocentric, sexist, homophobic, anti-
religious, ableist, classist, ageist, etc. (Also
known as “Cyberharassment.”)
• People stealing other peoples’ screen names
and sending inflammatory messages under
those screen names to other people. (Harmon, 2004)
Instances of Cyberbullying
• People creating online “polling booths” to
rate a school’s girls as “hottest,” “ugliest,” or
“most boring.” (Harmon, 2004)
• Individuals taking pictures of others in
locker rooms with digital phone cameras and
sending those pictures to others, or posting
them on Internet websites.
Instances of Cyberbullying
• People creating web sites with stories,
cartoons, caricatures, pictures, or jokes
ridiculing or mocking others.
• Posting material about a person involving
private, sensitive, or embarrassing
information.
– e.g., www.juicycampus.com
• Sending intimidating or threatening
messages (also known as “Cyberstalking”).
CYBERBULLYING & EFFECTS ON YOUNG PEOPLE
• Increased school absenteeism.
• School difficulties.
• Dropping out of school.
• May be perpetrators of school violence (75% of perpetrators
during last decade were victims of bullying).
• Increased risk of alcohol and drug use.
• Psychosomatic symptoms.
• Linked to serious mental health problems:
– Depression
– Anxiety Disorders
– Fear and Withdrawal
– Low Self Esteem
– Substance Abuse
– Suicidal Ideation, Attempts, Completion
Suicide is third leading cause of
death among adolescents, & is
responsible for more deaths than
all illnesses combined.
Karch et al., (2004)
CYBERBULLYING & EFFECTS ON YOUNG PEOPLE
• From Dardenne, Prairie, Missouri
• Committed suicide, Oct. 2006, 13
years old.
• Cyberbullied on MySpace.
• Thought she was communicating
with 16-year-old male named
"Josh Evans.”
• Mother of a friend of Meier,Lori
Janine Drew.
• Drew indicted on three counts of
accessing protected computers to
inflict emotional distress, and one
count of criminal conspiracy.
Megan Meier
CYBERBULLYING & EFFECTS ON YOUNG PEOPLE
• He had a speech and language
learning disability.
• Rumors spread that he was gay.
• Students cyberbullied him
continually in middle school.
• October 7, 2003, he took his life.
• He was 13 years old.
Ryan Patrick Halligan
This site is dedicated to the memory of our son Ryan and for all young people
suffering in silence from the pain of bullying and having thoughts of suicide. We
hope young people become less ashamed to ask for help when feeling suicidal.
We hope adults gain knowledge from our tragedy. As a society, we need to find
better ways to help our young people through their most difficult growing years.
John P. Halligan (RyanPatrickHalligan.org)
What Can Be Done?
www.bullying.org
1. Awareness & Education:
Educate yourself and your
school to the problem.
2. Be aware of sharing personal
information in person or online:
name, address, phone number,
school name, pictures of
yourself, e-mail address. Never
give your password except to
parents or guardians.
3. Don’t believe everything you read
online: Sometimes people will not tell
you the truth about who they are or
what they want.
4. Use Netiquette: Be polite to others
online just as you would offline. Do not
respond if anyone treats you rudely or
hatefully.
5. Never send a message to anyone
when you are angry: Wait until
you have calmed down. Make sure
your messages are calmly and
factually written.
6. Do not open messages from
someone you don’t know: If in
doubt, ask your parents,
guardians, or another adult.
7. If it doesn’t look or “feel right,” it
probably isn’t: Trust your
instincts.
8. Disconnect or Unplug: You don’t have
to be “Always On.” Take a break.
9. Contract with parents/guardians: Ask
them to read the information about
cyberbullying and Internet safety
issues.
10. Allies come to the defense of those who
are bullied. There is no such thing as
an “innocent bystander” in bullying. If
you are aware that bullying is
occurring, intervene on behalf of those
being bullied. This may include telling
a trusted adult. There is a difference
between “tattling” and “reporting.”
11. Parents install “Keystroke Logger” software: to
monitor their child’s computer interactions, for
those who may be engaging in cyberbullying.
12. Information Sessions: Schools can present
information sessions to students and
parents/guardians about cyberbullying.
13. Inservice Training: For teachers, staff,
administrators, and school boards on the topic
of cyberbullying.
14. Curricular Inclusion: In-class curricula
addressing issues of bullying and cyberbullying.
15. Schools need to institute school-wide bullying
prevention programs in conjunction with the
community on an on-going basis.
16. Schools institute students’ “anti-bullying
pledges,” which students can sign.
17. Update computer and Internet school policies:
This update should include harassment and
bullying done with new technologies such as
mobile and wireless Internet information
technologies. Policies should specifically prohibit
cyberbullying and clearly include consequences
for non-compliance.
Suggestions for Targets of
Cyberbullies
1. Speak out: Do not keep it to
yourself or do not isolate yourself.
Tell an adult you know and trust.
2. Inform your Internet, Instant
Messaging, or mobile phone
service providers.
3. Inform your local police.
4. Don’t reply to messages from
cyberbullies!!! They want you to reply to
them to know that they have worried and
upset you. They are trying to control you.
Don’t give them that pleasure.
5. Save all cyberbully’s messages: You
don’t have to read them, but keep them
as evidence and documentation. Police;
Internet service providers; school
teachers, counselors, and administrators;
and telephone companies can use these
messages to help you.
6. Protect yourself: Never arrange to meet
with someone you have met online
unless your parents/guardians go with
you. If you are meeting them, make
sure it is in a public place.
7. You may need to delete and change
your current e-mail accounts, cell
phone/pager accounts, and set up new
ones.
References
• Belsey, B. Cyberbullying.
http://www.cyberbullying.ca/main_frame.html.
• Ericson, N. (2001, June). Addressing the problem of juvenile bullying.
(OJJDP Fact Sheet #27). Washington, DC. U.S. Department of
Justice.
• Harmon, A. (2004, August 26). Internet gives teenage bullies weapons
to wound from afar. America Online. The New York Times Company.
• Iowa Department of Education Sample Policy on Bullying and
Harassment.
• JAMA: Journal of the American Medical Association, 285(16). April
25, 2001.
• Kapelovitz, L. H. (1987). To love and to work/A demonstration and
discussion of psychotherapy. Lanham, MD: Jason Aronson Inc.
References
• Loeber, R. & Stouthamer-Loeber, M. (1986). Family factors as
correlates and predictors of conduct problems and juvenile
delinquency. In M. Tonry and N. Morris (eds.), Crime and Justice,
Vol. 7. Chicago: University of Chicago Press
• Media Awareness Network, Challenging cyber bullying,
http://www.bewebaware.ca/english/CyberBullying.aspx.
• Olweus, D. (1993). Bullying at school: What we know and what we
can do. Oxford, UK: Blackwell.
• Rigby, K. (1996). Bullying in schools—And what to do about it.
Melbourne: ACER.
• Smith, P.K., & Sharp, S. (1994). School bullying: Insights and
perspectives. London: Routledge.
• Suler, J. (2001). Psychology of cyberspace—The online disinhibition
effect. http://www.rider.edu/~suler/psycyber/disinhibit.html.
References
• Sutton, J., & Smith, P.K. (1999). Bullying as a group process: An
adaptation of the participant role approach. Aggressive Behavior, 25
97-111.
• Tattum, D., & Tattum. E. (1992). Social education and personal
development. London. David Fulton.
• Turkle, S. (1995). Life on the screen: Identity in the age of the
internet. New York: Simon & Schuster
• Wolak, J., Mitchell, K., Finkelhor, D. (2006). Online victimization of
youth: Five years later. National Center for Missing & Exploited
Children.
•
References
• Ybarra, M., Mitchell, K., Wolak, J., Finkelhor, D. (2006). Examining
characteristics and associated distress related to Internet harassment:
Finding from the Second Youth Internet Safety Survey. Pediatrics,
118(4): E1169-E1177.
• Ybarra, M., Mitchell, K. (2004). Youth engaging in online
harassment: Associations with caregiver-child relationships, Internet
use, and personal characteristics. Journal of Adolescence, 27(3): 319-
336.
The
End

Más contenido relacionado

La actualidad más candente

Internet Addiction
Internet AddictionInternet Addiction
Internet AddictionCLine2002
 
Social media dangers
Social media dangersSocial media dangers
Social media dangersSaman Sara
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on YouthSubham Dwivedi
 
Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences Chetan Pandey
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Ethics of Clinical Psychologists
Ethics of Clinical PsychologistsEthics of Clinical Psychologists
Ethics of Clinical PsychologistsHelping Psychology
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Interpersonal Attraction
Interpersonal AttractionInterpersonal Attraction
Interpersonal Attractionsantiniescolini
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentationguestb628c5
 

La actualidad más candente (20)

Internet Addiction
Internet AddictionInternet Addiction
Internet Addiction
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
 
Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Psychology of bullying
Psychology of bullyingPsychology of bullying
Psychology of bullying
 
Ethics of Clinical Psychologists
Ethics of Clinical PsychologistsEthics of Clinical Psychologists
Ethics of Clinical Psychologists
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
 
Interpersonal Attraction
Interpersonal AttractionInterpersonal Attraction
Interpersonal Attraction
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentation
 

Destacado

The Psychology of Human-Computer Interaction
The Psychology ofHuman-Computer InteractionThe Psychology ofHuman-Computer Interaction
The Psychology of Human-Computer InteractionSimon Bignell
 
Tools for design thinking - University of Virginia
Tools for design thinking - University of VirginiaTools for design thinking - University of Virginia
Tools for design thinking - University of VirginiaIsabelle Goldfarb
 
'Design to Grow' by David Butler and Linda Tischler
'Design to Grow' by David Butler and Linda Tischler'Design to Grow' by David Butler and Linda Tischler
'Design to Grow' by David Butler and Linda TischlerMarketing Buzzar
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Professor Mary Aiken
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysisMonish rm
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Destacado (6)

The Psychology of Human-Computer Interaction
The Psychology ofHuman-Computer InteractionThe Psychology ofHuman-Computer Interaction
The Psychology of Human-Computer Interaction
 
Tools for design thinking - University of Virginia
Tools for design thinking - University of VirginiaTools for design thinking - University of Virginia
Tools for design thinking - University of Virginia
 
'Design to Grow' by David Butler and Linda Tischler
'Design to Grow' by David Butler and Linda Tischler'Design to Grow' by David Butler and Linda Tischler
'Design to Grow' by David Butler and Linda Tischler
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar a Cyber Psychology & Cyberbullying

2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying preventioneverettwebmaster
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCrisAnnChattoII
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...Jim "Brodie" Brazell
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarinjarin651
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlinconkatrinarose14
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 

Similar a Cyber Psychology & Cyberbullying (20)

2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention2013 bullying & cyber bullying prevention
2013 bullying & cyber bullying prevention
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptx
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
Social networking by jarin
Social networking by jarinSocial networking by jarin
Social networking by jarin
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)What is Cyberbullying? (#WVUCommMOOC)
What is Cyberbullying? (#WVUCommMOOC)
 
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose ManlinconCYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
CYBER BULLYING AND INTERNET ADDICTION by Katrina Rose Manlincon
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying (1)
Cyberbullying (1)Cyberbullying (1)
Cyberbullying (1)
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Effects Of Bullying
Effects Of BullyingEffects Of Bullying
Effects Of Bullying
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 

Más de Warren Blumenfeld

A Condensed History of LGBTQ Clubs & Pubs & Hate Crimes
A Condensed History of LGBTQ Clubs & Pubs & Hate CrimesA Condensed History of LGBTQ Clubs & Pubs & Hate Crimes
A Condensed History of LGBTQ Clubs & Pubs & Hate CrimesWarren Blumenfeld
 
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Warren Blumenfeld
 
Democracy, Autocracy, & Other Governmental Systems
Democracy, Autocracy, & Other Governmental SystemsDemocracy, Autocracy, & Other Governmental Systems
Democracy, Autocracy, & Other Governmental SystemsWarren Blumenfeld
 
Immigration as "Racial" Policy
Immigration as "Racial" PolicyImmigration as "Racial" Policy
Immigration as "Racial" PolicyWarren Blumenfeld
 
The U.S. Culture of Firearms and the New Normal
The U.S. Culture of Firearms and the New NormalThe U.S. Culture of Firearms and the New Normal
The U.S. Culture of Firearms and the New NormalWarren Blumenfeld
 
Banned & Censored Books: 2000-2020
Banned & Censored Books: 2000-2020Banned & Censored Books: 2000-2020
Banned & Censored Books: 2000-2020Warren Blumenfeld
 
Hegemonic Representations of Minoritized Peoples in U.S. Popular Culture
Hegemonic Representations of Minoritized Peoples in U.S. Popular CultureHegemonic Representations of Minoritized Peoples in U.S. Popular Culture
Hegemonic Representations of Minoritized Peoples in U.S. Popular CultureWarren Blumenfeld
 
Social Reproduction Theory and Cultural & Social Capital
Social Reproduction Theory and Cultural & Social CapitalSocial Reproduction Theory and Cultural & Social Capital
Social Reproduction Theory and Cultural & Social CapitalWarren Blumenfeld
 
The Social Construction of "Race"
The Social Construction of "Race"The Social Construction of "Race"
The Social Construction of "Race"Warren Blumenfeld
 
On the Social Construction of Homosexuality and Trans Identities as Deviancy ...
On the Social Construction of Homosexuality and Trans Identities as Deviancy ...On the Social Construction of Homosexuality and Trans Identities as Deviancy ...
On the Social Construction of Homosexuality and Trans Identities as Deviancy ...Warren Blumenfeld
 
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Warren Blumenfeld
 
A Condensed History of Queer Clubs & Pubs
A Condensed History of Queer Clubs & PubsA Condensed History of Queer Clubs & Pubs
A Condensed History of Queer Clubs & PubsWarren Blumenfeld
 
Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"
Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"
Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"Warren Blumenfeld
 

Más de Warren Blumenfeld (20)

A Condensed History of LGBTQ Clubs & Pubs & Hate Crimes
A Condensed History of LGBTQ Clubs & Pubs & Hate CrimesA Condensed History of LGBTQ Clubs & Pubs & Hate Crimes
A Condensed History of LGBTQ Clubs & Pubs & Hate Crimes
 
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
 
Amherst, Massachusetts.pdf
Amherst, Massachusetts.pdfAmherst, Massachusetts.pdf
Amherst, Massachusetts.pdf
 
Democracy, Autocracy, & Other Governmental Systems
Democracy, Autocracy, & Other Governmental SystemsDemocracy, Autocracy, & Other Governmental Systems
Democracy, Autocracy, & Other Governmental Systems
 
Immigration as "Racial" Policy
Immigration as "Racial" PolicyImmigration as "Racial" Policy
Immigration as "Racial" Policy
 
The U.S. Culture of Firearms and the New Normal
The U.S. Culture of Firearms and the New NormalThe U.S. Culture of Firearms and the New Normal
The U.S. Culture of Firearms and the New Normal
 
Banned & Censored Books: 2000-2020
Banned & Censored Books: 2000-2020Banned & Censored Books: 2000-2020
Banned & Censored Books: 2000-2020
 
Education for Liberation
Education for LiberationEducation for Liberation
Education for Liberation
 
Hegemonic Representations of Minoritized Peoples in U.S. Popular Culture
Hegemonic Representations of Minoritized Peoples in U.S. Popular CultureHegemonic Representations of Minoritized Peoples in U.S. Popular Culture
Hegemonic Representations of Minoritized Peoples in U.S. Popular Culture
 
An LGBTIQ History Part 4
An LGBTIQ History Part 4An LGBTIQ History Part 4
An LGBTIQ History Part 4
 
Social Reproduction Theory and Cultural & Social Capital
Social Reproduction Theory and Cultural & Social CapitalSocial Reproduction Theory and Cultural & Social Capital
Social Reproduction Theory and Cultural & Social Capital
 
The Social Construction of "Race"
The Social Construction of "Race"The Social Construction of "Race"
The Social Construction of "Race"
 
On the Social Construction of Homosexuality and Trans Identities as Deviancy ...
On the Social Construction of Homosexuality and Trans Identities as Deviancy ...On the Social Construction of Homosexuality and Trans Identities as Deviancy ...
On the Social Construction of Homosexuality and Trans Identities as Deviancy ...
 
An lgbtq history3-3
An lgbtq history3-3An lgbtq history3-3
An lgbtq history3-3
 
An lgbtq history5
An lgbtq history5An lgbtq history5
An lgbtq history5
 
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...
 
An lgbtiq history2
An lgbtiq history2An lgbtiq history2
An lgbtiq history2
 
An lgbtiq history1
An lgbtiq history1An lgbtiq history1
An lgbtiq history1
 
A Condensed History of Queer Clubs & Pubs
A Condensed History of Queer Clubs & PubsA Condensed History of Queer Clubs & Pubs
A Condensed History of Queer Clubs & Pubs
 
Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"
Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"
Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"
 

Último

The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 

Último (20)

The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 

Cyber Psychology & Cyberbullying

  • 1. CYBER PSYCHOLOGY & CYBERBULLYING: Life in a Virtual World Dr. Warren J. Blumenfeld University of Massachusetts Amherst, Massachusetts warrenblumenfeld@gmail.com
  • 2. The Birth of CyberPsychology John Suler Introductory Video
  • 3. AGENDA 1. Cyber Psychology 2. The “Online Disinhibition Effect” 3. Cyber Time 4. Cyber Space & Postmodernism 5. Freud Peering from the Computer 6. Bullying & Cyberbullying 7. Instances of Cyberbullying 8. What Can Be Done? 9. Suggestions for Targets of Cyberbullying
  • 4. Cyber Psychology • The nature of social communication technologies combined with relative anonymity of cyberspace create conditions for users to experience less behavioral inhibitions than in Real Life (RL) or Face-To-Face (f2f) situations. • Altered state of consciousness
  • 5. The “Online Disinhibition Effect” (Suler) • Positive: – through anonymity of cyberspace, users can exhibit extraordinary acts of kindness or charity that they may have felt inhibited from expressing in RL
  • 6. The “Online Disinhibition Effect” • Negative: – this anonymity and altered psychological environment may allow users to communicate more objectionable needs and desires onto others.
  • 7. Cyber Time • Exists Asynchronically: – people often do not have to interact in real time, which can add to the disinhibition effect when one does not have to deal with the immediate reactions of others. (Turkel)
  • 8. Cyber Space • Transcends Distance: – virtually shrinking space making geography irrelevant. – Advantages: can bring people closer together, making a virtual world community. – Disadvantages: for people with anti-social motives, the nature of social communication technologies can enable users to abuse others not only next door, but also on other side of planet.
  • 9. Cyber Space • Personae: – people can alter, change, emphasize different aspects of their personalities or identities, – or totally reinvent themselves – show different personae (Latin “that through which the sound comes” or the actor’s mask) (Turkel)
  • 10. Cyber Space • Avatar: –individuals can engage in masquerade –change into a virtual costume known as an “avatar.”
  • 11. Cyber Space • Communicating only with typed text in social communication technologies, • Users have options: –being oneself –expressing only parts of one’s identity – assuming imagined identities –remaining completely anonymous (Suler)
  • 12. Cyber Space: Postmodernism • Computers embody postmodernism’s important tenets: – challenging – contesting – ultimately destabilizing identities. • individuals continually redeploy identities as fluid • changing • multifaceted • non-essentialized
  • 13. Cyber Space: Postmodernism Identity destabilization presents many possibilities • Positive: – can allow individuals to relate in genuinely open and honest ways about themselves that might be frightening offline to discuss in real life personal encounters. • Negative: – with anonymity, individual can act out hostile or sadistic emotions by abusing others online. (Suler)
  • 14. Cyber Space: Postmodernism • Equalizing Effect: – People begin on a relatively level playing field. – Virtual net democracy dependent largely on technical skills of user. – Regardless of social status: • Wealth, Race, Sex, Sexual & Gender Identity & Expression, Physical & Mental Attributes, & many other social identities (Suler)
  • 15. Cyber Space • Altered Perceptions: – transitional space that becomes extension of user’s intrapsychic world – cyberspace communication can alter perceptions and one’s state of consciousness by becoming: • make-believe world • dream-like experience • even a game where rules of RL no longer apply This may explain forms of computer and cyberspace addictions.
  • 16.
  • 17. College students throughout the world were asked to go 24 hours without digital media:
  • 18. Freud Peering from the Computer
  • 19. Freud Peering from the Computer • Transference: – individual’s unconscious redirection of feelings from one person to another. – Kapelovitz: “the inappropriate repetition in the present of a relationship that was important in a person's childhood.” – Suler: “we recreate in our relationship with the computer some aspect of how we related to our family members.” – cyberspace can recreate & replay past relationships, satisfy unmet, frozen, or thwarted needs from childhood
  • 20. Freud Peering from the Computer • Erotic Transference: – Suler: does not consist of sexual feeling per se toward computers – “the perception of the computer as powerful, perhaps in ways similar to how parents are perceived as powerful.”
  • 21. Freud Peering from the Computer • Erotic Transference & Cyber Abuse: – Technologies provide users means to act out unmet needs for power and control over others, – to transfer frozen needs for attention or acknowledgement not sufficiently satisfied within the family constellation
  • 22. Cyber Space Overall Can inhibit a user’s sense of responsibility for actions online
  • 24. Bullying Defined “Bullying is a specific type of aggression in which: 1. the behavior is intended to harm or disturb, 2. The behavior occurs repeatedly over time, 3. There is an imbalance of power, with a more powerful person or group attacking a less powerful one.” (JAMA, 2001)
  • 25. Bullying Can Take At Least Three Forms: 1. Physical: hitting, kicking, spitting, pushing, taking personal belongings. 2. Verbal: taunting, malicious teasing, name calling, making threats. 3. Psychological: spreading rumors, manipulating social relationships, or engaging in social exclusion, extortion, or intimidation. (U.S. Department of Justice, 2001)
  • 26. Harassment Defined • Harassment is victimization based upon one’s real or perceived race, color, national origin, religion, disability, gender, sexual orientation, or marital status, physical appearance, or personality characteristics. • May include but not limited to: – Verbal, nonverbal, physical, or written harassment – Repeated remarks of demeaning nature – Implied or explicit threats – Demeaning jokes, stories, or activities – Unreasonable interference with a student’s performance (Iowa Department of Education)
  • 27. Family Risk Factors: Some child-rearing styles found to predict whether young people will grow up to exhibit aggressive bullying behaviors: – Lack of warmth & involvement by parents. – Overly-permissive overly-harsh parenting – Harsh, physical discipline. – Family/community model/support bullying behaviors. – Victimization by older siblings Loeber & Stouthamer-Loeber
  • 28. Peer Risk Factors: – Lack maturity or insight – Friends have positive attitudes about violence. – High status aggressive persons seek to enhance their social power and protect their prestige with peers. – Low social status people seek to deflect taunting and aggression, or enhance their social position with higher status peers. – Social/relational aggression creates excitement, alleviates boredom, & secures friendships.
  • 29. People Who Bully A+ • Imagination • Spontaneity D- •Impulse control •Empathy
  • 30. Perpetrators of Hate Crimes by Age LA County, 2009
  • 31. Perpetrators of violent crimes by sex 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 85% 90% 91% 95% 95% 95% 99.8% Females Males FBI 2009
  • 32. 38% 27% 35% % of students who do nothing % of students who wantto help, but don't % of students who try to help Bystander Behavior in Bullying Incidents © The Olweus Prevention Group, 2004
  • 33. 12-17 18-29 30-49 50-64 65+ 93% 93% 81% 70% 38% Internet Usage by Age Pew Internet, 2009 Pew Internet, 2009 ⌘
  • 34. Cyberbullying Defined “Cyberbullying involves the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others.” (Belsey)
  • 35. Similarities & Differences Between Face-To-Face Bullying & Cyberbullying • Similar: Both are about human relationships, power, and control, and actions can occur on numerous occasions (www.bullying.org). • Similar: Both may involve what psychologists call the “Leveling Effect”: people who bully often do so to diminish others to inflate their own egos reflecting their insecurities.
  • 36. • Similar: Both do not simply involve those who bully and those who are bullied (the “dyadic view,”) but rather involve a number of “actors” or roles across the social/school environment. – People Who Bully – Assistant or Follower of People Who Bully – Encourager or Reinforcer of People Who Bully – Outsider or “Bystander” Who Does Nothing – Potential Defender or Ally of People Who Are Bullied – Defender or Ally of People Who Are Bullied – People Who Are Bullied • (Sutton & Smith, 1999; Olweus, 1993)
  • 37. • Different: Users of technology often do things in cyberspace that they would not ordinarily do in face-to-face (F2F) or real life (RL) interactions—the “disinhibition effect.” (Suler, 2001) • Different: Cyberbullying is often even more invisible to adults than other forms of bullying. • Different: Cyberbullying is a particularly cowardly form of bullying. Cyberbullies can often hide in the anonymity of cyberspace.
  • 38. • Different: With anonymity, cyberbullies do not have to “own” their actions, and often do not fear being punished. • Different: Cyberbullies can inflict pain without having to see the effects, which can result in a “deeper level of meanness.” (Harmon, 2004) • Different: The technology can shelter the user from tangible feedback about consequences of one’s actions, which can result in minimized empathy or remorse. (Media Awareness Network)
  • 39. • Different: People can alter, change, or emphasize different aspects of their personalities or identities in cyberspace—they can reinvent themselves or show different per sonae (Latin for “that through which the sound comes” or the actor’s mask). (Turkle, 1995)
  • 40. • Different: Cyberbullies can communicate their hurtful messages to a very wide audience with remarkable speed. • Different: Cyberbullying is often outside the legal reach of schools and school boards when it occurs outside of school.
  • 41. • Different: Victims are often fearful of telling others about being bullied because they fear that reporting it would result in adults taking away cell phones, computers, or other forms of technology. • Different: Victims may not know who the cyberbully is since they may not be easily identifiable. • Different: Cyberbullying can occur any time and any place. Home, therefore, is no longer a refuge from peer bullying.
  • 42. Similarities & Differences Between Face-To-Face Bullying & Cyberbullying • Similar: Both are about human relationships, power, and control, and actions can occur on numerous occasions (www.bullying.org). • Similar: Both may involve what psychologists call the “Leveling Effect”: people who bully often do so to diminish others to inflate their own egos reflecting their insecurities.
  • 43. • Similar: Both do not simply involve those who bully and those who are bullied (the “dyadic view,”) but rather involve a number of “actors” or roles across the social/school environment. – People Who Bully – Assistant or Follower of People Who Bully – Encourager or Reinforcer of People Who Bully – Outsider or “Bystander” Who Does Nothing – Potential Defender or Ally of People Who Are Bullied – Defender or Ally of People Who Are Bullied – People Who Are Bullied • (Sutton & Smith, 1999; Olweus, 1993)
  • 44. • Different: Users of technology often do things in cyberspace that they would not ordinarily do in face-to-face (F2F) or real life (RL) interactions—the “disinhibition effect.” (Suler, 2001) • Different: Cyberbullying is often even more invisible to adults than other forms of bullying. • Different: Cyberbullying is a particularly cowardly form of bullying. Cyberbullies can often hide in the anonymity of cyberspace.
  • 45. • Different: With anonymity, cyberbullies do not have to “own” their actions, and often do not fear being punished. • Different: Cyberbullies can inflict pain without having to see the effects, which can result in a “deeper level of meanness.” (Harmon, 2004) • Different: The technology can shelter the user from tangible feedback about consequences of one’s actions, which can result in minimized empathy or remorse. (Media Awareness Network)
  • 46. • Different: People can alter, change, or emphasize different aspects of their personalities or identities in cyberspace—they can reinvent themselves or show different per sonae (Latin for “that through which the sound comes” or the actor’s mask). (Turkle, 1995)
  • 47. • Different: Cyberbullies can communicate their hurtful messages to a very wide audience with remarkable speed. • Different: Cyberbullying is often outside the legal reach of schools and school boards when it occurs outside of school.
  • 48. • Different: Victims are often fearful of telling others about being bullied because they fear that reporting it would result in adults taking away cell phones, computers, or other forms of technology. • Different: Victims may not know who the cyberbully is since they may not be easily identifiable. • Different: Cyberbullying can occur any time and any place. Home, therefore, is no longer a refuge from peer bullying.
  • 49. Instances of Cyberbullying • People sending hurtful, cruel, and oftentimes threatening messages to other people. – “Flame Mail”: designed to inflame, insight, or enrage. – “Hate Mail”: hate-inspired and oppressive-- racist, ethnocentric, sexist, homophobic, anti- religious, ableist, classist, ageist, etc. (Also known as “Cyberharassment.”) • People stealing other peoples’ screen names and sending inflammatory messages under those screen names to other people. (Harmon, 2004)
  • 50. Instances of Cyberbullying • People creating online “polling booths” to rate a school’s girls as “hottest,” “ugliest,” or “most boring.” (Harmon, 2004) • Individuals taking pictures of others in locker rooms with digital phone cameras and sending those pictures to others, or posting them on Internet websites.
  • 51. Instances of Cyberbullying • People creating web sites with stories, cartoons, caricatures, pictures, or jokes ridiculing or mocking others. • Posting material about a person involving private, sensitive, or embarrassing information. – e.g., www.juicycampus.com • Sending intimidating or threatening messages (also known as “Cyberstalking”).
  • 52. CYBERBULLYING & EFFECTS ON YOUNG PEOPLE • Increased school absenteeism. • School difficulties. • Dropping out of school. • May be perpetrators of school violence (75% of perpetrators during last decade were victims of bullying). • Increased risk of alcohol and drug use. • Psychosomatic symptoms. • Linked to serious mental health problems: – Depression – Anxiety Disorders – Fear and Withdrawal – Low Self Esteem – Substance Abuse – Suicidal Ideation, Attempts, Completion
  • 53. Suicide is third leading cause of death among adolescents, & is responsible for more deaths than all illnesses combined. Karch et al., (2004)
  • 54. CYBERBULLYING & EFFECTS ON YOUNG PEOPLE • From Dardenne, Prairie, Missouri • Committed suicide, Oct. 2006, 13 years old. • Cyberbullied on MySpace. • Thought she was communicating with 16-year-old male named "Josh Evans.” • Mother of a friend of Meier,Lori Janine Drew. • Drew indicted on three counts of accessing protected computers to inflict emotional distress, and one count of criminal conspiracy. Megan Meier
  • 55. CYBERBULLYING & EFFECTS ON YOUNG PEOPLE • He had a speech and language learning disability. • Rumors spread that he was gay. • Students cyberbullied him continually in middle school. • October 7, 2003, he took his life. • He was 13 years old. Ryan Patrick Halligan This site is dedicated to the memory of our son Ryan and for all young people suffering in silence from the pain of bullying and having thoughts of suicide. We hope young people become less ashamed to ask for help when feeling suicidal. We hope adults gain knowledge from our tragedy. As a society, we need to find better ways to help our young people through their most difficult growing years. John P. Halligan (RyanPatrickHalligan.org)
  • 56. What Can Be Done? www.bullying.org 1. Awareness & Education: Educate yourself and your school to the problem. 2. Be aware of sharing personal information in person or online: name, address, phone number, school name, pictures of yourself, e-mail address. Never give your password except to parents or guardians.
  • 57. 3. Don’t believe everything you read online: Sometimes people will not tell you the truth about who they are or what they want. 4. Use Netiquette: Be polite to others online just as you would offline. Do not respond if anyone treats you rudely or hatefully.
  • 58. 5. Never send a message to anyone when you are angry: Wait until you have calmed down. Make sure your messages are calmly and factually written. 6. Do not open messages from someone you don’t know: If in doubt, ask your parents, guardians, or another adult. 7. If it doesn’t look or “feel right,” it probably isn’t: Trust your instincts.
  • 59. 8. Disconnect or Unplug: You don’t have to be “Always On.” Take a break. 9. Contract with parents/guardians: Ask them to read the information about cyberbullying and Internet safety issues. 10. Allies come to the defense of those who are bullied. There is no such thing as an “innocent bystander” in bullying. If you are aware that bullying is occurring, intervene on behalf of those being bullied. This may include telling a trusted adult. There is a difference between “tattling” and “reporting.”
  • 60. 11. Parents install “Keystroke Logger” software: to monitor their child’s computer interactions, for those who may be engaging in cyberbullying. 12. Information Sessions: Schools can present information sessions to students and parents/guardians about cyberbullying. 13. Inservice Training: For teachers, staff, administrators, and school boards on the topic of cyberbullying. 14. Curricular Inclusion: In-class curricula addressing issues of bullying and cyberbullying.
  • 61. 15. Schools need to institute school-wide bullying prevention programs in conjunction with the community on an on-going basis. 16. Schools institute students’ “anti-bullying pledges,” which students can sign. 17. Update computer and Internet school policies: This update should include harassment and bullying done with new technologies such as mobile and wireless Internet information technologies. Policies should specifically prohibit cyberbullying and clearly include consequences for non-compliance.
  • 62. Suggestions for Targets of Cyberbullies 1. Speak out: Do not keep it to yourself or do not isolate yourself. Tell an adult you know and trust. 2. Inform your Internet, Instant Messaging, or mobile phone service providers. 3. Inform your local police.
  • 63. 4. Don’t reply to messages from cyberbullies!!! They want you to reply to them to know that they have worried and upset you. They are trying to control you. Don’t give them that pleasure. 5. Save all cyberbully’s messages: You don’t have to read them, but keep them as evidence and documentation. Police; Internet service providers; school teachers, counselors, and administrators; and telephone companies can use these messages to help you.
  • 64. 6. Protect yourself: Never arrange to meet with someone you have met online unless your parents/guardians go with you. If you are meeting them, make sure it is in a public place. 7. You may need to delete and change your current e-mail accounts, cell phone/pager accounts, and set up new ones.
  • 65. References • Belsey, B. Cyberbullying. http://www.cyberbullying.ca/main_frame.html. • Ericson, N. (2001, June). Addressing the problem of juvenile bullying. (OJJDP Fact Sheet #27). Washington, DC. U.S. Department of Justice. • Harmon, A. (2004, August 26). Internet gives teenage bullies weapons to wound from afar. America Online. The New York Times Company. • Iowa Department of Education Sample Policy on Bullying and Harassment. • JAMA: Journal of the American Medical Association, 285(16). April 25, 2001. • Kapelovitz, L. H. (1987). To love and to work/A demonstration and discussion of psychotherapy. Lanham, MD: Jason Aronson Inc.
  • 66. References • Loeber, R. & Stouthamer-Loeber, M. (1986). Family factors as correlates and predictors of conduct problems and juvenile delinquency. In M. Tonry and N. Morris (eds.), Crime and Justice, Vol. 7. Chicago: University of Chicago Press • Media Awareness Network, Challenging cyber bullying, http://www.bewebaware.ca/english/CyberBullying.aspx. • Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford, UK: Blackwell. • Rigby, K. (1996). Bullying in schools—And what to do about it. Melbourne: ACER. • Smith, P.K., & Sharp, S. (1994). School bullying: Insights and perspectives. London: Routledge. • Suler, J. (2001). Psychology of cyberspace—The online disinhibition effect. http://www.rider.edu/~suler/psycyber/disinhibit.html.
  • 67. References • Sutton, J., & Smith, P.K. (1999). Bullying as a group process: An adaptation of the participant role approach. Aggressive Behavior, 25 97-111. • Tattum, D., & Tattum. E. (1992). Social education and personal development. London. David Fulton. • Turkle, S. (1995). Life on the screen: Identity in the age of the internet. New York: Simon & Schuster • Wolak, J., Mitchell, K., Finkelhor, D. (2006). Online victimization of youth: Five years later. National Center for Missing & Exploited Children. •
  • 68. References • Ybarra, M., Mitchell, K., Wolak, J., Finkelhor, D. (2006). Examining characteristics and associated distress related to Internet harassment: Finding from the Second Youth Internet Safety Survey. Pediatrics, 118(4): E1169-E1177. • Ybarra, M., Mitchell, K. (2004). Youth engaging in online harassment: Associations with caregiver-child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27(3): 319- 336.