Download presentation
Presentation is loading. Please wait.
Published byAmie Watson Modified over 9 years ago
1
A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP
2
◦ The use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, personal Web sites or blogs and online personal polling Web sites. The technology is used to promote deliberate, repeated and hurtful behavior by an individual or group, with the intent to harm others (Haber & Haber, 2007, p. 52). ◦ Cyberbullying should be considered the use of interactive technologies such as social networking sites, cell phones (text, video, voice, or picture messaging), instant messaging, or other newly developed technology-based communication tools. These tools are used to repeatedly deliver slanderous, hurtful, obsessive, or obscene messages that result in harm to the recipient (Walker, 2010. Cyberbullying Defined
3
Who? Why? Cyberbullying
5
Growth in technology ◦ Cell phones ◦ Social Networking Age Extent ◦ Varies greatly Age and Extent of Cyberbullying
6
Theory ◦ Social Dominance Theory Survey ◦ 27 item survey ◦ 6 Demographic and 21 cyberbullying
7
120 undergraduate college students ◦ 70 female, 50 male: age 18 – 24 16% live at home, 53% on campus housing, and 31% off campus but not at home Grades: 51% A-B, 47% B-C, 2% C-D Technology use: ◦ 14% between 1 & 2 hours daily ◦ 31% between 3 & 4 hours daily ◦ 55% over 4 hours daily
8
54% of respondents know someone who has been cyberbullied 100% of male respondents know someone who has been cyberbullied Technologies used: Facebook (56%), Cell Phones (45%), AIM (43%) most frequently reported 11% of participants reported being cyberbullied ~ 43% of them 4 or more times Statistically significant results:
9
Suicidal ideation Eating disorders Chronic illness Depression (often long-term) Low self-esteem Poor academic performance Problem behaviors Drinking and drugs Psychological Impact
10
Several court cases to date ◦ J.S. v. Bethlehem Area School District ◦ Layshock v. Hermitage School District ◦ Emmett v. Kent School District Legal Issues
11
Gather all forces System level ◦ Establish guidelines for appropriate use of computer networks Classroom Interventions ◦ Incorporate lessons on cyberbullying ◦ Implement effective social skills and conflict resolution Intervention and Prevention
12
1. Don’t engage the person 2. Print everything out 3. Change your screen name 4. Don’t share personal info in chat rooms 5. Identify the sender 6. Contact the service provider 7. Think before you send 8. Parents, get involved 9. Teachers, get involved 10. Comprehensive action is needed Stover, D. (2006) www.eddigest.com Prevention techniques for students
13
Enhancing Child Safety & Online Technologies ◦ December 2008 ◦ http://wiredsafety.org/resources/pdf/2009_isttf_fina l_report.pdf http://wiredsafety.org/resources/pdf/2009_isttf_fina l_report.pdf Wired Safety ◦ http://wiredsafety.org/ http://wiredsafety.org/ iSafe ◦ http://www.isafe.org/ http://www.isafe.org/ National Criminal Justice Reference Service ◦ http://www.ncjrs.gov/InternetSafety/cyber.html http://www.ncjrs.gov/InternetSafety/cyber.html Stop Bullying Now ◦ http://stopbullyingnow.hrsa.gov/adults/default.aspx http://stopbullyingnow.hrsa.gov/adults/default.aspx Stop Cyberbullying ◦ http://www.illinoisattorneygeneral.gov/cyberbullying /for_educators.html http://www.illinoisattorneygeneral.gov/cyberbullying /for_educators.html
15
Strom, P. & Strom, R. (2005) When teens turn cyberbullies. Education Digest, 71(4), 35-41 Stover, D. (2006). Treating cyberbullying as a school violence issue. School Board News, 26 (8) Mason, K.L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in Schools 45(4), 323-348 Pickett, A.D., & Thomas, C. (2006). Turn off that phone. American School Board Journal
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.