Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Cyberbullying
Introduction
• Cyberbullying is when a person use the internet, cell phones ,or other technological
devices to send or post text or images intended to hurt, embarrass, threaten,
torment, humiliate, or intimidate their victim
Types of Cyberbullying
• Cyber harassment
• Cyberbullying or harassment by proxy Online grooming
• Cyberstalking
• Denigration (Dissing)
• Phishing
• Exclusion/Gossip Groups
• Sexting
• Falsify identity
• Trickery
• Flaming
Most common sites in which cyberbullying occurred:
• Email (21%),
• Online chatrooms (20%)
• Social networking sites (20%)
• Mobile phones (19%)
• Other websites (8%) and
• Other forms of texting , such as Twitter (6%)
Reasons for Cyberbullying
• Cyberbullying was significantly associated with the use of proactive aggression,
justification of violence, exposure to violence, and less perceived social support of
friends.
• Other reasons for cyberbullying are: envy, prejudice and intolerance for disability,
religion, gender, shame, pride , guilt, and anger.
Reasons for Cyberbullying
• Cyberbullying emerges most commonly from relationship problems (break-ups, envy,
intolerance, and ganging up)
• Victims experience powerfully negative effects (especially on their social well-being)
• The reactive behavior from schools and students is generally inappropriate, absent, or
ineffective
Tools a cyberbully can use:
• All teens surveyed use the Internet on a
regular basis
95%
• Teens who use social media,
that they have witnessed someone
being mean or cruel to another
88%
• Watched a video on a video-sharing
site such as YouTube or Google Video
57%
• Teens using social networking sites
80%
Traditional vs cyber
• Power imbalance between bully and
victims
• Bullying behavior is repeated overtime
• Face to face interaction
• Bully or bullies can remain anonymous
• Bullying behavior is repeated overtime
• Bullying behaviors occur through an
electronic device or online
Victims
• Cyber victims had also often been traditional victims, and cyberbullies had often been
traditional bullies.
• Cyber victims are more dependent upon the internet, feel less popular, take more
internet-related risks.
• Youth who are bullied at or near school are significantly more likely to be a victim of
cyberbullying.
Gender Differences in Response to Cyberbullying:
• Females are cyberbullied more often than males.
• Girls are more likely to have experienced cyberbullying than boys--25.8% versus 16%,
respectively.
• Girls are more likely to spread rumors while boys are more likely to post hurtful pictures
or videos.
• Girls are more likely to become victims of cyberbullying, whereas boys are more inclined
to engage in electronic bullying.
Preventing cyberbullying
• A case can be made for some degree of censorship, but it also must acknowledge the
need for educators to provide children and young people with the skill to manage risk
effectively, to know how to protect themselves and to support vulnerable peers who are
being mistreated online.

More Related Content

Cyberbullying

  • 2. Introduction • Cyberbullying is when a person use the internet, cell phones ,or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim
  • 3. Types of Cyberbullying • Cyber harassment • Cyberbullying or harassment by proxy Online grooming • Cyberstalking • Denigration (Dissing) • Phishing • Exclusion/Gossip Groups • Sexting • Falsify identity • Trickery • Flaming
  • 4. Most common sites in which cyberbullying occurred: • Email (21%), • Online chatrooms (20%) • Social networking sites (20%) • Mobile phones (19%) • Other websites (8%) and • Other forms of texting , such as Twitter (6%)
  • 5. Reasons for Cyberbullying • Cyberbullying was significantly associated with the use of proactive aggression, justification of violence, exposure to violence, and less perceived social support of friends. • Other reasons for cyberbullying are: envy, prejudice and intolerance for disability, religion, gender, shame, pride , guilt, and anger.
  • 6. Reasons for Cyberbullying • Cyberbullying emerges most commonly from relationship problems (break-ups, envy, intolerance, and ganging up) • Victims experience powerfully negative effects (especially on their social well-being) • The reactive behavior from schools and students is generally inappropriate, absent, or ineffective
  • 7. Tools a cyberbully can use: • All teens surveyed use the Internet on a regular basis 95% • Teens who use social media, that they have witnessed someone being mean or cruel to another 88% • Watched a video on a video-sharing site such as YouTube or Google Video 57% • Teens using social networking sites 80%
  • 8. Traditional vs cyber • Power imbalance between bully and victims • Bullying behavior is repeated overtime • Face to face interaction • Bully or bullies can remain anonymous • Bullying behavior is repeated overtime • Bullying behaviors occur through an electronic device or online
  • 9. Victims • Cyber victims had also often been traditional victims, and cyberbullies had often been traditional bullies. • Cyber victims are more dependent upon the internet, feel less popular, take more internet-related risks. • Youth who are bullied at or near school are significantly more likely to be a victim of cyberbullying.
  • 10. Gender Differences in Response to Cyberbullying: • Females are cyberbullied more often than males. • Girls are more likely to have experienced cyberbullying than boys--25.8% versus 16%, respectively. • Girls are more likely to spread rumors while boys are more likely to post hurtful pictures or videos. • Girls are more likely to become victims of cyberbullying, whereas boys are more inclined to engage in electronic bullying.
  • 11. Preventing cyberbullying • A case can be made for some degree of censorship, but it also must acknowledge the need for educators to provide children and young people with the skill to manage risk effectively, to know how to protect themselves and to support vulnerable peers who are being mistreated online.