Cyber Social World Ppt

Embed Size (px)

Citation preview

  • 8/3/2019 Cyber Social World Ppt

    1/21

    The Cyber Social World

    of Todays Youth

    Purple People Eaters

    (Becky Groth & Melissa Nol)

  • 8/3/2019 Cyber Social World Ppt

    2/21

    In the Beginning

    The internet first came into existence in 1969.

    The internet was developed as part of a project

    by the United States Department of Defense as

    a means to communicate that would survive anuclear war (Cooper & Mathy, 2003).

  • 8/3/2019 Cyber Social World Ppt

    3/21

    Today

    Chat rooms Instant messaging

    Email

    Information acquisition Real time gaming

    Social networking sites like

    FaceBook or MySpace

    Dating

    Pornography

  • 8/3/2019 Cyber Social World Ppt

    4/21

    Social networking, instant messenger,chat rooms, and internet predators

    Teens are being intercepted by pedophiles

    The number of men who engage children andadolescents on the internet is statistically on therise

    Individuals are able to explore a darker side totheir sexuality in anonymity that might includechild pornography or violent images of sex thatthey would have never initially pursued in real life

    The cyber world is an enabler and it creates anideal breeding ground for sexual predators

    (Young, 2005).

  • 8/3/2019 Cyber Social World Ppt

    5/21

    Social networking, instant messenger, chat

    rooms, and internet predators cont...

    Alicia Kozakiewicz, fromPittsburgh, 13 years old

    Thought she was talking to avery pretty, red headed girl

    about her age. Except that thefriend was really a pedophileand he later kidnapped, rapedand tortured the thirteen yearold girl for four days (Jaffe,

    2007). Justin Berry, 13 years old

    He was lured into a pedophilessex ring where he was abusedand molested (Eichenwald,

    2005)

  • 8/3/2019 Cyber Social World Ppt

    6/21

    Social networking, instant messenger,

    chat rooms, and closeness of friendships Reduction hypothesis is based on four assumptions:

    a) The internet motivates adolescents to form moresuperficial relationships online with strangers

    b) Online friendships with strangers are less beneficial for

    adolescents than existing offline friendships C) The time spent online with strangers occurs at the

    expense of time with offline friends

    d) As a result of the three proceeding assumptions, the

    closeness of existing friendships are reduced (Locke, 1998).

  • 8/3/2019 Cyber Social World Ppt

    7/21

    Social networking, instant messenger,

    chat rooms, and closeness of friendships

    The Stimulation Theory

    a) The internets reduced cues encouragesadolescents to disclose their inner feelings moreeasily than in real-life interactions

    b) Intimate self disclosure is an importantpredictor in reciprocal liking, caring, and trust(Collins & Miller, 1994)

    c) As a result of these assumptions, internet

    enhanced intimate self disclosure stimulates thecloseness of adolescents offline existingrelationships (McKenna & Bargh, 2000).

  • 8/3/2019 Cyber Social World Ppt

    8/21

    Social networking, instant messenger,chat rooms, and closeness of friendships Little support for the reduction hypothesis

    Early internet effects studies reported reductive effects

    There were not as many participants involved in theinternet

    Little crossover between offline friends and online friends Use of internet in United States Households have increased

    exponentially

    Therefore, when adolescents spend time online they cansimultaneously foster online relationships as well as their

    real-life relationships with online contact (Valkenburg &Jochen, 2007)

    The results of a recent study of internet and computergame use by adolescents suggested that online interactionsmay now be an important context for interactions with

    friends (Willoughby, 2008).

  • 8/3/2019 Cyber Social World Ppt

    9/21

    Online Gaming Online gaming is a way for teenagers and adolescents to

    portray roles and participate in fantasy. Unfortunately,these games can be highly addictive and can discourageprosocial interaction.

    Wizards of War CraftRunescape- XBOX 360-Playstation-Nintendo Wii

    Runescape Promotes: Rudeness, Cheating, Gambling,Player killing, Luring others to the wilderness by trickery tokill them and take their items, Killing unicorns to raise yourlevel by obtaining their game valuable unicorn horn.(www.truthscape.com)

  • 8/3/2019 Cyber Social World Ppt

    10/21

    Online Gaming Cont

    The Story of a Real RuneScape Addict

    http://www.youtube.com/watch?v=FTZsUQZt3kkhttp://www.youtube.com/watch?v=FTZsUQZt3kk
  • 8/3/2019 Cyber Social World Ppt

    11/21

    Cyber Bullying Megan Meier. Megan was

    thirteen years old. She had beguntalking to who she thought was aboy her age on the internetnamed Josh. Megan disclosedmany private things to Josh

    Megan received an unsettling

    message that started a tragicchain of events

    I don't know if I want to befriends with you any longerbecause I hear you're not nice to

    your friends.

    "Megan Meier is a slut. MeganMeier is fat,"

    The world would be a betterplace without you

    Megan had hanged herself and

    died a day later (Good MorningAmerica, 2009).

    http://www.jeffreyjohnston.org/megan-pledge.htm

  • 8/3/2019 Cyber Social World Ppt

    12/21

    Sadly, Megan isnt the only victim

    The Readings Wanda's Song- The true victims ofCyber Bullying

    http://www.youtube.com/watch?v=_ChYyJilXmIhttp://www.youtube.com/watch?v=_ChYyJilXmIhttp://www.youtube.com/watch?v=_ChYyJilXmIhttp://www.youtube.com/watch?v=_ChYyJilXmIhttp://www.youtube.com/watch?v=_ChYyJilXmIhttp://www.youtube.com/watch?v=_ChYyJilXmIhttp://www.youtube.com/watch?v=_ChYyJilXmI
  • 8/3/2019 Cyber Social World Ppt

    13/21

    How Do I Know My Child Has a

    Problem? Internet Addiction Criteria:

    Preoccupation with theInternet

    Need for longer amounts of

    time online to achievesatisfaction

    Repeated unsuccessful effortsto control, cut back, or stopinternet use

    Restlessness, moodiness,depression, or irritabilitywhen attempting to cut downor stop internet use

  • 8/3/2019 Cyber Social World Ppt

    14/21

    How Do I Know My Child Has a

    Problem? Internet Addiction Criteria

    (Continued): Staying online longer than

    originally intended

    Jeopardizing or risking the loss ofa significant relationship, job, oreducational or career opportunitybecause of the Internet

    Lying to family members,

    therapists, or others to conceal theextent of involvement with theInternet

    Using the Internet as a way ofescaping from problems or ofrelieving a dysphoric mood

  • 8/3/2019 Cyber Social World Ppt

    15/21

    Internet Addiction Test (IAT)http://www.netaddiction.com/resources/internet_addiction_test.htm

    IAT Scale comprises 20 items which assess theseverity of negative consequences due to excessiveInternet use. Factor 1: Withdrawal and Social Problem

    Factor 2: Time Management and Performance

    Factor 3: Reality Substitute

  • 8/3/2019 Cyber Social World Ppt

    16/21

    What Can I Do as a Parent?

    Talk to Your Adolescent

    Monitor Your Computer

  • 8/3/2019 Cyber Social World Ppt

    17/21

    Talk to Your Adolescent!(Dombroski et al., 2006)

    Recognizing and Discussing Internet Dangers: Dangers of givingout personal information, and meeting people they have met online.

    Supervising Internet Friends: Discuss each online friend in a mannerthat respects the privacy of the youth while safeguarding him or her frominappropriate communication.

    Understanding and Approving Childrens Screen Names:Caregivers should ensure that their adolescent is using screen names devoid ofsexual innuendo.

  • 8/3/2019 Cyber Social World Ppt

    18/21

    Talk to Your Adolescent!(Dombroski et al., 2006)

    Establishing a Parent-Child Contract: Contract tohelp structure interest use and guidelines.

    Placing the Computer in a Public Location

    Contacting the Cyber Tip Line: If suspicion of onlinesexual solicitation of youth, call the National Center for

    Missing and Exploited Children (NCMEC) 1 (800) 843-

    5678.

  • 8/3/2019 Cyber Social World Ppt

    19/21

    How to Monitor Your Computer(Dombroski et al., 2006)

    Installation of a firewall:Asoftware or hardware firewall

    provides a barrier between acomputer and the Internet that

    prevents third parties fromcontrolling the computer.

    Installation of antivirus oranti-Trojan software

    Installation of a key logger:Efficient means of reviewing thetype of communication patternschildren are having on a

    computer.

  • 8/3/2019 Cyber Social World Ppt

    20/21

    How to Monitor Your Computer(Dombroski et al., 2006)

    Monitoring the Browser History Encryption:The use of encryption techniques will hide text

    from predators who are using an Ethernet sniffer to spy on achilds Internet-based communication.

    Privacy Filtration: Personal information may be blocked fromtransmission over the Internet (Netscape Nanny 5.0)

  • 8/3/2019 Cyber Social World Ppt

    21/21

    How to Monitor Your Computer(Dombroski et al., 2006)

    Application Tracking and Usage: Can monitor theamount of time spent using particular computer programs

    or applications.

    Chat Logging: Chat logger records and saves on thehard drive the plain text online conversations.