SlideShare a Scribd company logo
1 of 29
Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
Sources & Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teen internet use basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are teens doing online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How else are teens connecting? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concerns in Online Safety Sphere ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Harassment & Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
What makes online harassment & bullying different? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pew Internet: Online Harassment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Cyberbullying ,[object Object],[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
Online Harassment (2) ,[object Object],[object Object],[object Object]
Frequency of bullying victimization among 11-16 year olds   by environment ( n =1,193) (Ybarra, 2009)
Online (or not) Harassment  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why should we worry (2)? ,[object Object],[object Object],[object Object],[object Object]
Overlap of cyberbullying & internet victimization (Ybarra, 2010)
Differences between cyberbullying & internet harassment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cell phone-based harassment ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Sending Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Receiving Sexts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sexting Scenarios ,[object Object],[object Object],[object Object]
Element of coercion for some sexting ,[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Final Thoughts ,[object Object],[object Object],[object Object],[object Object]
THANK YOU Amanda Lenhart Pew Internet & American Life Project http://www.pewinternet.org Twitter: @amanda_lenhart

More Related Content

What's hot

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned outMohamed Sedky
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 

What's hot (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 

Similar to Cyberbullying 2010: What the Research Tells Us

Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011daniel_eukids
 

Similar to Cyberbullying 2010: What the Research Tells Us (20)

Week 5
Week 5Week 5
Week 5
 
Internet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth developmentInternet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth development
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...Social networking sites, unwanted sexual solicitation, Internet harassment, a...
Social networking sites, unwanted sexual solicitation, Internet harassment, a...
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Cyberbullying and adolescent mental health
Cyberbullying and adolescent mental healthCyberbullying and adolescent mental health
Cyberbullying and adolescent mental health
 
Digital adolescence: Myths and truths about growing up with technology
Digital adolescence: Myths and truths about growing up with technologyDigital adolescence: Myths and truths about growing up with technology
Digital adolescence: Myths and truths about growing up with technology
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Youth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truthsYouth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truths
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011
 
Pitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital agePitfalls and opportunities for growing up in the digital age
Pitfalls and opportunities for growing up in the digital age
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
cyberworld
cyberworld cyberworld
cyberworld
 

More from Pew Research Center's Internet & American Life Project

More from Pew Research Center's Internet & American Life Project (20)

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Trust, Facts, Democracy
Trust, Facts, DemocracyTrust, Facts, Democracy
Trust, Facts, Democracy
 
Skills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 FactsSkills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 Facts
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
Online Harassment 2017
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 
Education in the age of fake news and disputed facts
Education in the age of fake news and disputed factsEducation in the age of fake news and disputed facts
Education in the age of fake news and disputed facts
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
The new landscape of facts and trust
The new landscape of facts and trustThe new landscape of facts and trust
The new landscape of facts and trust
 
The secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries addressThe secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries address
 
How People Fit Libraries Into Their Lives
How People Fit Libraries Into Their LivesHow People Fit Libraries Into Their Lives
How People Fit Libraries Into Their Lives
 
The New Age of Politics and Media
The New Age of Politics and MediaThe New Age of Politics and Media
The New Age of Politics and Media
 
Digital Divides – Feeding America
Digital Divides – Feeding AmericaDigital Divides – Feeding America
Digital Divides – Feeding America
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
How the public grades libraries – and uses libraries
How the public grades libraries – and uses librariesHow the public grades libraries – and uses libraries
How the public grades libraries – and uses libraries
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
 

Recently uploaded

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Cyberbullying 2010: What the Research Tells Us

  • 1. Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.  
  • 12.
  • 13. Frequency of bullying victimization among 11-16 year olds ( n =1,193) (Ybarra, 2009)
  • 14.
  • 15. Frequency of bullying victimization among 11-16 year olds by environment ( n =1,193) (Ybarra, 2009)
  • 16.
  • 17.
  • 18.
  • 19. Overlap of cyberbullying & internet victimization (Ybarra, 2010)
  • 20.
  • 21.
  • 22.  
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. THANK YOU Amanda Lenhart Pew Internet & American Life Project http://www.pewinternet.org Twitter: @amanda_lenhart

Editor's Notes

  1. In order for us to create the most effective and targeted solutions, we have to know the exact nature of the problem.
  2. Patchwork of research – different definitions of cyberbullying make cross-study comparisons difficult. Methods vary considerably – each has something to tell us.
  3. Library access and CELL PHONE ACCESS is particularly important to African American, and to a lesser extent English-Speaking Hispanic students. One quarter of low income teens (HHI under $30K) and 25% of African American teens say they go online most often from school, compared to 15% of online teens overall. Fewer low SES and African American teens go online daily 53% of af-am, vs 67% of white teens 75% of high income teens go online daily, compared to 39% of low SES teens. Slight decrease in teens going online from home since we first asked – broader use/access and also wide variety of access points/mobile access.
  4. Not just email, IM, but social networks, mobile devices and gaming platforms are all used to connect, talk and interact with others. And thus also may become platforms for bullying, too. This is where teens are - particularly outside of school - online, connected to each other by various means at all times.
  5. Online safety concerns breakdown roughly into two parts – concerns over harmful contact and concern over harmful content. What we’re focusing on here today is online CONTACT, rather than content and specifically, online bullying aka cyberbullying.
  6. Definition of bullying downloaded from http://olweus.org/public/bullying.page on May 12, 2009 and is also contained in Dan Olweus’ 1993 book “Bullying at School”: Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993
  7. Source: Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Online – identity can be shrouded. Youth who are physically bullied can/do retaliate online. Can be hard to determine who instigated and where. These are the “bully-victims” and the “instigator-victims.” Other definitions of cyberbullying used in major research projects on the topic: “willful use of the Internet as a technological medium through which harm or discomfort is intentionally and repeatedly inflicted through indirect aggression that targets a specific person or group of persons.” (Williams and Guerra, 2007) “an overt, intentional act of aggression towards another person online” (19% of young and regular internet users reported experiencing this) (Ybarra, & Mitchell, 2004) “Willful and repeated harm inflicted through the medium of electronic text.” (Patchin & Hinduja, 2006)
  8. Invasive – computer and the internet bring the bullying into the sphere of the home, and cell phones, which are generally personal devices carried everywhere, mean that the bullying never stops.
  9. Pew data is measuring online harassment, as our questions did not ask about repetition or power imbalance. 15% had private comm forwarded with out permission 13% had a rumor spread about them 13% received a threatening message or comm 6% had embarrassing picture posted w/out permission Limitations: we missed a big one Missing spoofed/faked profile But Teens are also endlessly creative when it comes to bullying (and many other things) e.g., Text bombing=when a person sends 1000 of texts to one number… can be difficult to block, must pay for each text – can run up $100s in bills & makes it impossible to receive communication from others. Bullying in games – e.g., killing a player’s character quickly and repeatedly so gamer can’t play the game. Sources in this slide: Lenhart, A. (2007) Cyberbullying. Pew Internet & American Life Project, Washington, DC. http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Lenhart, A., et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  10. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx p. 86
  11. 9% data point is from: Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 33% data point is from: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156. Data unclear on likelihood of victims knowing perpetrator – 45-89% say they know who is harassing them. No major differences in SES, race/ethnicity, parent education in likelihood of being harassed online. (Pew 2007 data)
  12. Slide source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  13. Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Worth noting: Journal of Adolescent Health December 2007 issue has a special issue entirely devoted to research on Cyberbullying. Other research points to girls as more likely victims, or to boys and girls experiencing online bullying and harassment equally. (Wolak et al, 2007) – answers here not 100% conclusive. Ybarra data suggests that bullying does happen more at school than online. See following slide…
  14. Source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  15. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007 Dec;41(6 Suppl 1):S42-50. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.
  16. These are the “concurrent psychosocial problems” from Ybarra’s work. Source info for statements above: (see previous slides or bibliography for full cites) Bullying is broadly associated with: School violence – (Olweus, 2009 website ) Delinquency – (Hinduja & Patchin, 2007) Suicidal ideation (Hinduja & Patchin, in press @ Archives of Suicide Research) Depression and other psychological problems (Ybarra, 2007, Wolak, 2007) Substance abuse (Ybarra, 2007, Wolak, 2007) Delinquency / School avoidance (Hinduja & Patchin, 2007) Weapon-carrying (Nansel, 2003) Poor parent/caregiver relationships/offline victimization (Ybarra, 2007, Wolak, 2006)
  17. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177.
  18. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  19. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  20. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  21. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  22. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  23. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  24. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  25. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  26. Bibliography: Burgess-Proctor A, Patchin JW, and Hinduja S. Cyberbullying and Online Harassment: Reconceptualizing the victimization of adolescent girls in V. Garcia and J. Clifford [Eds.]. Female crime victims: Reality reconsidered . Upper Saddle River, NJ: Prentice Hall. 2008 Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156 Hinduja S and Patchin JW. Offline Consequences of Online Victimization: School Violence and Delinquency. J School Violence 2007;6(3): 89-112 Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org. Lenhart, A. Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. (2009) http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx Lenhart, A et al. Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC.(2010) http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx Nansel TR, Overpeck M, Pilla RS et al. Bullying behaviors among U.S. youth: Prevalence and association with psychological adjustment. JAMA 2001;285: 2094-2100. Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993. Material downloaded from http://olweus.org/public/bullying.page on May 11, 2009. Palfrey J, Sacco D, boyd d, Debonis D. Enhancing Child Online Safety: Final Report of the Internet Safety Technical Taskforce to the multi-state working group on social networking of United States Attorneys General. Berkman Center for Internet & Society at Harvard University:Cambridge, MA. December 31, 2008. pp. 22-28. Available online at http://cyber.law.harvard.edu/publications/2009/ISTTF_Final_Report Patchin JW and Hinduja S. Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying. Youth Violence and Juvenile Justice 2006;4: 148-169. Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Williams KR and Guerra NG. Prevalence and Predictors of Internet Bullying. J Adolescent Health. 2007 Dec: 41 S14-S21. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Ybarra M, Espelage DL, Mitchell KJ. The Co-occurrence of Internet Harassment and Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators. J Adolescent Health 2007: 41: S31-S41 Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007a Dec:41(6 Suppl 1):S42-50. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.