![Page 1: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/1.jpg)
A Survey Analysis Carol M. Walker, MEd, MADoctoral Candidate, IUP
![Page 2: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/2.jpg)
◦ The use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, personal Web sites or blogs and online personal polling Web sites. The technology is used to promote deliberate, repeated and hurtful behavior by an individual or group, with the intent to harm others (Haber & Haber, 2007, p. 52).
◦ Cyberbullying should be considered the use of interactive technologies such as social networking sites, cell phones (text, video, voice, or picture messaging), instant messaging, or other newly developed technology-based communication tools. These tools are used to repeatedly deliver slanderous, hurtful, obsessive, or obscene messages that result in harm to the recipient (Walker, 2010.
Cyberbullying DefinedCyberbullying Defined
![Page 3: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/3.jpg)
Who? Why?
CyberbullyingCyberbullying
![Page 4: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/4.jpg)
![Page 5: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/5.jpg)
Growth in technology◦ Cell phones◦ Social Networking
Age
Extent◦ Varies greatly
Age and Extent of Age and Extent of CyberbullyingCyberbullying
![Page 6: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/6.jpg)
Theory◦ Social Dominance Theory
Survey◦ 27 item survey◦ 6 Demographic and 21 cyberbullying
![Page 7: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/7.jpg)
120 undergraduate college students◦ 70 female, 50 male: age 18 – 24
16% live at home, 53% on campus housing, and 31% off campus but not at home
Grades: 51% A-B, 47% B-C, 2% C-D
Technology use:◦ 14% between 1 & 2 hours daily◦ 31% between 3 & 4 hours daily◦ 55% over 4 hours daily
![Page 8: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/8.jpg)
54% of respondents know someone who has been cyberbullied
100% of male respondents know someone who has been cyberbullied
Technologies used: Facebook (56%), Cell Phones (45%), AIM (43%) most frequently reported
11% of participants reported being cyberbullied ~ 43% of them 4 or more times
Statistically significant results:
![Page 9: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/9.jpg)
Suicidal ideation Eating disorders Chronic illness Depression (often long-term) Low self-esteem Poor academic performance Problem behaviors Drinking and drugs
Psychological Impact Psychological Impact
![Page 10: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/10.jpg)
Several court cases to date◦ J.S. v. Bethlehem Area School District◦ Layshock v. Hermitage School District◦ Emmett v. Kent School District
Legal IssuesLegal Issues
![Page 11: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/11.jpg)
Gather all forces
System level◦ Establish guidelines for appropriate use of
computer networks
Classroom Interventions◦ Incorporate lessons on cyberbullying ◦ Implement effective social skills and conflict
resolution
Intervention and Intervention and PreventionPrevention
![Page 12: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/12.jpg)
1. Don’t engage the person2. Print everything out3. Change your screen name4. Don’t share personal info in chat rooms5. Identify the sender6. Contact the service provider7. Think before you send8. Parents, get involved9. Teachers, get involved10. Comprehensive action is neededStover, D. (2006) www.eddigest.com
Prevention techniques for Prevention techniques for studentsstudents
![Page 13: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/13.jpg)
Enhancing Child Safety & Online Technologies◦ December 2008◦ http://wiredsafety.org/resources/pdf/
2009_isttf_final_report.pdf Wired Safety
◦ http://wiredsafety.org/ iSafe
◦ http://www.isafe.org/ National Criminal Justice Reference Service
◦ http://www.ncjrs.gov/InternetSafety/cyber.html Stop Bullying Now
◦ http://stopbullyingnow.hrsa.gov/adults/default.aspx Stop Cyberbullying
◦ http://www.illinoisattorneygeneral.gov/cyberbullying/for_educators.html
![Page 14: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/14.jpg)
![Page 15: A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP](https://reader030.vdocuments.site/reader030/viewer/2022032802/56649e185503460f94b044ac/html5/thumbnails/15.jpg)
Strom, P. & Strom, R. (2005) When teens turn cyberbullies. Education Digest, 71(4), 35-41
Stover, D. (2006). Treating cyberbullying as a school violence issue. School Board News, 26 (8)
Mason, K.L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in Schools 45(4), 323-348
Pickett, A.D., & Thomas, C. (2006). Turn off that phone. American School Board Journal