SlideShare a Scribd company logo
1 of 20
Download to read offline
Teens, Online Stranger Contact and Cyberbullying
What the research is telling us…




Amanda Lenhart
Internet Safety Task Force
April 30, 2008
Washington, DC
Methodology
• Interviewed 700 parent-child pairs in
  November 2007 and 935 parent – child
  pairs in Oct-Nov 2006
• Teens ages 12-17
• Nationally representative sample
• Focus groups conducted in 2004, 2006 &
  2007
• Building on previous survey work with
  teens and parents in 2000 and 2004


Teens & Online Safety         April 30, 2008   2
Who is Online?

• 75% of American adults go online
• 94% of American teens ages 12 to 17 use
  the internet
• 87% of all parents are online
• 73% of all families have broadband @ home
• 68% of online Americans have home
  broadband
• 6% of teens do not use the internet


Teens & Online Safety         April 30, 2008   3
Location: Where do teens go online?

• 89% of online teens have access at home
• 75% have internet access at school
• 70% go online from a friend’s or relative’s house
• 50% have gone online from a library
• 9% go online from a community center or house
  of worship
• 93% of online teens have multiple points of
  access—home AND school AND the library AND
  a friend’s house…
• 77% say they go online most often from home



Teens & Online Safety                 April 30, 2008   4
What technology do teens have?

• 59% of online teens have a desktop or
  laptop computer
• 71% of online teens have a cell phone
• 54% of online teens have an iPod or Mp3
  player
• 8% of teens have a PDA – Sidekick,
  Blackberry, NV



Teens & Online Safety            April 30, 2008   5
What are teens doing online?
•    81% go to websites about movies, TV shows, music groups, or
     sports stars
•    77% go online to get news
•    58% of online teens have a profile online
•    57% of online teens have created some kind of content online
•    57% have watched a video on a video-sharing site like
     YouTube or GoogleVideo
•    55% go online to get information about a college, university or
     other school that they are thinking about attending.
•    38% have bought something online like books, clothes or
     music
•    28% have looked online for health, dieting or physical fitness
     information


Teens & Online Safety                          April 30, 2008    6
SNS: Demographics
• 58% of online teens have a profile online
• Girls, particularly older girls, more likely to use SNS
  than boys (70% of girls 15-17 have profile online,
  compared to 57% of boys 15-17)
• Age is major factor
   – 12 -14 year-olds; 38% have an online profile
   – 15 -17 year-olds; 77% have an online profile
• Other demographic factors not significant
   – Income
   – Race/ethnicity

 Teens & Online Safety                   April 30, 2008     7
Concerns in Online Safety Sphere

• Inappropriate contact (wanted/unwanted)
     – Strangers
     – Bullies


• Inappropriate content
     – Exposure (wanted/unwanted)
     – Prevention




Teens & Online Safety               April 30, 2008   8
Contact - Strangers
• Definition of “complete stranger:”
  “…[someone] who has no connection at
  all to you or any of your friends.”
• 32% of online teens have been contacted
  online by a complete stranger.
• Of teens who have been contacted, 23%
  say they were made scared or
  uncomfortable by the stranger contact.
• Overall, 7% of online teens experienced
  disturbing stranger contact.
Teens & Online Safety          April 30, 2008   9
Contact – Strangers (2)
• Factors that predict a greater likelihood of online
  contact (% reporting stranger contact in each
  group)
   – Posting photos (49%)
   – Having a profile online (44%)
   – Female (39%)
   – Flirting via social networks (53%)
• Factors that predict a greater likelihood of scary
  or uncomfortable online contact
   – Female (11% vs. 4% of males)


Teens & Online Safety                  April 30, 2008   10
Contact -- Strangers (3)

• No association between stranger contact and
  any other content posted to online profiles
• Social network users more likely to have been
  contacted by strangers, but not more likely to
  find that contact scary or uncomfortable
• Having internet monitoring software (but not
  filters) is correlated with lower reported levels of
  contact by someone unknown to the teen or
  his/her friends.




Teens & Online Safety                    April 30, 2008   11
Contact – Strangers (4)
How did teens respond to stranger contact?
• Of teens who were contacted by a
  stranger:
     – 65% just ignored it or deleted it
     – 21% responded so they could find out more
       about the person
     – 8% responded and asked to be left alone
     – 3% told an adult or someone in authority




Teens & Online Safety                 April 30, 2008   12
Contact – Bullies
• 32% of online teens have experienced one of the
  following forms of online harassment, also called
  “cyberbullying”

      – 15% of teens reported having private material
        (IM, txt, email) forwarded without permission
      – 13% had received threatening messages
      – 13% said someone had spread a rumor about
        them online
      – 6% had someone post an embarrassing picture
        of them online without permission


 Teens & Online Safety                 April 30, 2008   13
Contact – Bullies (2)

• Girls, particularly older girls, report more
  online bullying; 38% of all online girls
  reported experiencing some type of
  online bullying
• Social network users are also more likely
  to report online bullying – 39% of SNS
  users have experience it.
• But most teens (67%) think bullying
  happens more OFFLINE

 Teens & Online Safety             April 30, 2008   14
All the world is not a stage...
•    66% of all teens with profiles online have in some way restricted
     access to it – includes hiding it completely, taking it down, or
     making it private
•    77% of profile-owning teens have a currently visible online
     profile
      – Of those with a visible profile, 59% say only their friends can
        see their profile.
      – 40% say anyone can see profile
•    56% of teens with profiles say they have posted at least some
     fake information to their profile

“I use a pseudonym, who is 24. Because I regard myself as an intellectual,
    it’s easier to be taken seriously if people don’t know they’re talking to a
    16 year old.”
                            - Boy, Late High School


Teens & Online Safety                                April 30, 2008        15
Parents & control of internet access and use
• Some steps families take:
      – 74% of families have their computers in a
        public location
      – 65% of parents say they check up on their
        teens after they go online
      – 53% of families filter
      – 45% of families have monitoring software
        on the computer that their child uses
      – Kids aware of monitoring & filtering




Teens & Online Safety                 April 30, 2008   16
Parents & control of media
• Parents more likely to report rules around content
  viewed rather than time spent with media
   – Content rules:
             • 77% of parents have rules about what TV shows their child
               can watch
             • 68% of parents have rules about what internet sites their child
               can or cannot visit
             • 67% of parents have rules about video games their child can
               play




 Teens & Online Safety                                  April 30, 2008       17
Parents & control of media (2)
•   More than half of parents have rules for time spent with media in
    the home
     – 58% have rules about how much time their child can spend
        watching TV
     – 58% have rules about how much time their child can spend
        playing video games (rises to 64% of hhds w/gamers)
     – 55% have rules about how much time their child can spend
        online
•   Parents also have rules about information that may be shared
    online
     – 68% of parents of online teens say that they have rules about
        what kind of information their child may share over the internet
•   Only 7% of parents have no rules about media use at all


     Teens & Online Safety                          April 30, 2008    18
Final Thoughts

• Only a very small number of teens report
  uncomfortable online contact; most ably handle the
  contact by deleting or ignoring it
• Very little association between contact and
  information posted online
• Bullying is reported by same % of teens as stranger
  contact; and yet happens more offline
• Parents more likely to use non-technical methods of
  protection; rulemaking around content
• Safety in a mobile environment?


Teens & Online Safety                April 30, 2008   19
Thank You

Amanda Lenhart
Pew Internet & American Life Project
alenhart@pewinternet.org
http://www.pewinternet.org

More Related Content

What's hot

Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouthGrowing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyoutheraser Juan José Calderón
 
APRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors OnlineAPRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors OnlineAARP
 
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAPRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAARP
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAPRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAARP
 
Reaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studiesReaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studiesDmytro Lysiuk
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingDamon Taylor
 
Internet Generation Gap
Internet Generation GapInternet Generation Gap
Internet Generation Gapfafa111283
 
Where are blokes going online?
Where are blokes going online?Where are blokes going online?
Where are blokes going online?eyndia
 

What's hot (19)

Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouthGrowing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
 
APRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors OnlineAPRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors Online
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAPRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAPRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
 
Youth, Sex & the Internet: What practitioners need to know
Youth, Sex & the Internet:  What practitioners need to knowYouth, Sex & the Internet:  What practitioners need to know
Youth, Sex & the Internet: What practitioners need to know
 
Transportation and privacy in the mobile age
Transportation and privacy in the mobile age Transportation and privacy in the mobile age
Transportation and privacy in the mobile age
 
Buying and selling e-content
Buying and selling e-contentBuying and selling e-content
Buying and selling e-content
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Reaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studiesReaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studies
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Youth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truthsYouth Internet victimization: Myths and truths
Youth Internet victimization: Myths and truths
 
cyberworld
cyberworld cyberworld
cyberworld
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
 
Older Adults and Internet Use: (Some of) What we know
Older Adults and Internet Use: (Some of) What we knowOlder Adults and Internet Use: (Some of) What we know
Older Adults and Internet Use: (Some of) What we know
 
Internet Generation Gap
Internet Generation GapInternet Generation Gap
Internet Generation Gap
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Where are blokes going online?
Where are blokes going online?Where are blokes going online?
Where are blokes going online?
 

Viewers also liked

Odissia
OdissiaOdissia
OdissiaRoin
 
OER's: Models of sustainability
OER's: Models of sustainabilityOER's: Models of sustainability
OER's: Models of sustainabilityDolors Capdet
 
3 Day Outlook And Weather Symbols Template
3 Day Outlook And Weather Symbols Template3 Day Outlook And Weather Symbols Template
3 Day Outlook And Weather Symbols TemplateMWF2009
 
E Learning @ Qite
E Learning @ QiteE Learning @ Qite
E Learning @ QiteQPoint
 
Directiva Television sin Fronteras
Directiva Television sin FronterasDirectiva Television sin Fronteras
Directiva Television sin FronterasGonzalo Martín
 
13 beautiful pictures 8 vvv
13 beautiful pictures 8 vvv13 beautiful pictures 8 vvv
13 beautiful pictures 8 vvvfilipj2000
 

Viewers also liked (20)

03 relaciones
03 relaciones03 relaciones
03 relaciones
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
New33needs
New33needsNew33needs
New33needs
 
Odissia
OdissiaOdissia
Odissia
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
[16] Nu P 09 1
[16] Nu P 09 1[16] Nu P 09 1
[16] Nu P 09 1
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
OER's: Models of sustainability
OER's: Models of sustainabilityOER's: Models of sustainability
OER's: Models of sustainability
 
3 Day Outlook And Weather Symbols Template
3 Day Outlook And Weather Symbols Template3 Day Outlook And Weather Symbols Template
3 Day Outlook And Weather Symbols Template
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
[5] Nu P 02 1
[5] Nu P 02 1[5] Nu P 02 1
[5] Nu P 02 1
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
E Learning @ Qite
E Learning @ QiteE Learning @ Qite
E Learning @ Qite
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Directiva Television sin Fronteras
Directiva Television sin FronterasDirectiva Television sin Fronteras
Directiva Television sin Fronteras
 
[12] Nup 07 3
[12] Nup 07 3[12] Nup 07 3
[12] Nup 07 3
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
Como evitar enfermarse
Como evitar enfermarseComo evitar enfermarse
Como evitar enfermarse
 
13 beautiful pictures 8 vvv
13 beautiful pictures 8 vvv13 beautiful pictures 8 vvv
13 beautiful pictures 8 vvv
 

Similar to Teens Strangers Amanda Lenhart

internet promotions
internet promotionsinternet promotions
internet promotionsnewvision2
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthThinkB4UClick
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU versionSteven Knight
 
Negative Effects of Social Media
Negative Effects of Social MediaNegative Effects of Social Media
Negative Effects of Social MediaTyler Vanderwater
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptlival1
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptchellakaruppasamy
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teenscontactcareergyani
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptYadetaHailu
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013PNMI
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Timothy Corey
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Singapore 2022 Civility Infographic.pdf
Singapore 2022 Civility Infographic.pdfSingapore 2022 Civility Infographic.pdf
Singapore 2022 Civility Infographic.pdfmuhammadyusyaa
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Online Safety: A Pupil's Perspective
Online Safety: A Pupil's PerspectiveOnline Safety: A Pupil's Perspective
Online Safety: A Pupil's PerspectiveDigital Schoolhouse
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 

Similar to Teens Strangers Amanda Lenhart (20)

Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
internet promotions
internet promotionsinternet promotions
internet promotions
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
 
It’s Personal: Similarities and Differences in Online Social Network Use Betw...
It’s Personal: Similarities and Differences in Online Social Network Use Betw...It’s Personal: Similarities and Differences in Online Social Network Use Betw...
It’s Personal: Similarities and Differences in Online Social Network Use Betw...
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU version
 
Negative Effects of Social Media
Negative Effects of Social MediaNegative Effects of Social Media
Negative Effects of Social Media
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Singapore 2022 Civility Infographic.pdf
Singapore 2022 Civility Infographic.pdfSingapore 2022 Civility Infographic.pdf
Singapore 2022 Civility Infographic.pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Online Safety: A Pupil's Perspective
Online Safety: A Pupil's PerspectiveOnline Safety: A Pupil's Perspective
Online Safety: A Pupil's Perspective
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 

More from Jorge Borges

Cantanhede_PADDE_RBE.pdf
Cantanhede_PADDE_RBE.pdfCantanhede_PADDE_RBE.pdf
Cantanhede_PADDE_RBE.pdfJorge Borges
 
Transmedia storytelling em contexto educativo final | patrícia ferreira
Transmedia storytelling em contexto educativo final | patrícia ferreiraTransmedia storytelling em contexto educativo final | patrícia ferreira
Transmedia storytelling em contexto educativo final | patrícia ferreiraJorge Borges
 
Projeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrão
Projeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrãoProjeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrão
Projeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrãoJorge Borges
 
Como enriquecer las librerias en la era digital
Como enriquecer las librerias en la era digitalComo enriquecer las librerias en la era digital
Como enriquecer las librerias en la era digitalJorge Borges
 
Cidadania digital para professores
Cidadania digital para professoresCidadania digital para professores
Cidadania digital para professoresJorge Borges
 
Guia dos direitos humanos para os utilizadores da internet
Guia dos direitos humanos para os utilizadores da internetGuia dos direitos humanos para os utilizadores da internet
Guia dos direitos humanos para os utilizadores da internetJorge Borges
 
Os direitos de autor, plágio e citação...
Os direitos de autor, plágio e citação...Os direitos de autor, plágio e citação...
Os direitos de autor, plágio e citação...Jorge Borges
 
Medias, educação e bibliotecas
Medias, educação e bibliotecasMedias, educação e bibliotecas
Medias, educação e bibliotecasJorge Borges
 
Programa da Conferência do PNL 2015
Programa da Conferência  do PNL 2015Programa da Conferência  do PNL 2015
Programa da Conferência do PNL 2015Jorge Borges
 
Ensinar e aprender na web
Ensinar e aprender na webEnsinar e aprender na web
Ensinar e aprender na webJorge Borges
 
O uso seguro da informação da web em contexto educativo
O uso seguro da informação da web em contexto educativoO uso seguro da informação da web em contexto educativo
O uso seguro da informação da web em contexto educativoJorge Borges
 
Ensinar e aprender com a tecnologia, hoje
Ensinar e aprender com a tecnologia, hojeEnsinar e aprender com a tecnologia, hoje
Ensinar e aprender com a tecnologia, hojeJorge Borges
 
Diálogos sobre aristides_de_sousa_mendes
Diálogos sobre aristides_de_sousa_mendesDiálogos sobre aristides_de_sousa_mendes
Diálogos sobre aristides_de_sousa_mendesJorge Borges
 
A segurança nas redes sociais basto 9_junho_2010
A segurança nas redes sociais basto 9_junho_2010A segurança nas redes sociais basto 9_junho_2010
A segurança nas redes sociais basto 9_junho_2010Jorge Borges
 
Divulgacao 2010 proj-profissões
Divulgacao 2010 proj-profissõesDivulgacao 2010 proj-profissões
Divulgacao 2010 proj-profissõesJorge Borges
 
Apresentação insafe lisboa
Apresentação insafe lisboaApresentação insafe lisboa
Apresentação insafe lisboaJorge Borges
 
PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...
PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...
PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...Jorge Borges
 
Gripe A Guia De Procedimentos 2
Gripe A Guia De  Procedimentos  2Gripe A Guia De  Procedimentos  2
Gripe A Guia De Procedimentos 2Jorge Borges
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na InternetJorge Borges
 

More from Jorge Borges (20)

Cantanhede_PADDE_RBE.pdf
Cantanhede_PADDE_RBE.pdfCantanhede_PADDE_RBE.pdf
Cantanhede_PADDE_RBE.pdf
 
Transmedia storytelling em contexto educativo final | patrícia ferreira
Transmedia storytelling em contexto educativo final | patrícia ferreiraTransmedia storytelling em contexto educativo final | patrícia ferreira
Transmedia storytelling em contexto educativo final | patrícia ferreira
 
Projeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrão
Projeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrãoProjeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrão
Projeto D’ÁQUEM, ALÉM-MAR | agrupamento de escolas de torrão
 
Como enriquecer las librerias en la era digital
Como enriquecer las librerias en la era digitalComo enriquecer las librerias en la era digital
Como enriquecer las librerias en la era digital
 
Cidadania digital para professores
Cidadania digital para professoresCidadania digital para professores
Cidadania digital para professores
 
Guia dos direitos humanos para os utilizadores da internet
Guia dos direitos humanos para os utilizadores da internetGuia dos direitos humanos para os utilizadores da internet
Guia dos direitos humanos para os utilizadores da internet
 
Os direitos de autor, plágio e citação...
Os direitos de autor, plágio e citação...Os direitos de autor, plágio e citação...
Os direitos de autor, plágio e citação...
 
Medias, educação e bibliotecas
Medias, educação e bibliotecasMedias, educação e bibliotecas
Medias, educação e bibliotecas
 
Programa da Conferência do PNL 2015
Programa da Conferência  do PNL 2015Programa da Conferência  do PNL 2015
Programa da Conferência do PNL 2015
 
RBE tablets
RBE tabletsRBE tablets
RBE tablets
 
Ensinar e aprender na web
Ensinar e aprender na webEnsinar e aprender na web
Ensinar e aprender na web
 
O uso seguro da informação da web em contexto educativo
O uso seguro da informação da web em contexto educativoO uso seguro da informação da web em contexto educativo
O uso seguro da informação da web em contexto educativo
 
Ensinar e aprender com a tecnologia, hoje
Ensinar e aprender com a tecnologia, hojeEnsinar e aprender com a tecnologia, hoje
Ensinar e aprender com a tecnologia, hoje
 
Diálogos sobre aristides_de_sousa_mendes
Diálogos sobre aristides_de_sousa_mendesDiálogos sobre aristides_de_sousa_mendes
Diálogos sobre aristides_de_sousa_mendes
 
A segurança nas redes sociais basto 9_junho_2010
A segurança nas redes sociais basto 9_junho_2010A segurança nas redes sociais basto 9_junho_2010
A segurança nas redes sociais basto 9_junho_2010
 
Divulgacao 2010 proj-profissões
Divulgacao 2010 proj-profissõesDivulgacao 2010 proj-profissões
Divulgacao 2010 proj-profissões
 
Apresentação insafe lisboa
Apresentação insafe lisboaApresentação insafe lisboa
Apresentação insafe lisboa
 
PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...
PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...
PrevalêNcia Da Pré Obesidade E Obesidade Em CriançAs Do 1º Ciclo Do Ensino Bá...
 
Gripe A Guia De Procedimentos 2
Gripe A Guia De  Procedimentos  2Gripe A Guia De  Procedimentos  2
Gripe A Guia De Procedimentos 2
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na Internet
 

Recently uploaded

Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxraviapr7
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTDR. SNEHA NAIR
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSyedNadeemGillANi
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 

Recently uploaded (20)

Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptx
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 

Teens Strangers Amanda Lenhart

  • 1. Teens, Online Stranger Contact and Cyberbullying What the research is telling us… Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC
  • 2. Methodology • Interviewed 700 parent-child pairs in November 2007 and 935 parent – child pairs in Oct-Nov 2006 • Teens ages 12-17 • Nationally representative sample • Focus groups conducted in 2004, 2006 & 2007 • Building on previous survey work with teens and parents in 2000 and 2004 Teens & Online Safety April 30, 2008 2
  • 3. Who is Online? • 75% of American adults go online • 94% of American teens ages 12 to 17 use the internet • 87% of all parents are online • 73% of all families have broadband @ home • 68% of online Americans have home broadband • 6% of teens do not use the internet Teens & Online Safety April 30, 2008 3
  • 4. Location: Where do teens go online? • 89% of online teens have access at home • 75% have internet access at school • 70% go online from a friend’s or relative’s house • 50% have gone online from a library • 9% go online from a community center or house of worship • 93% of online teens have multiple points of access—home AND school AND the library AND a friend’s house… • 77% say they go online most often from home Teens & Online Safety April 30, 2008 4
  • 5. What technology do teens have? • 59% of online teens have a desktop or laptop computer • 71% of online teens have a cell phone • 54% of online teens have an iPod or Mp3 player • 8% of teens have a PDA – Sidekick, Blackberry, NV Teens & Online Safety April 30, 2008 5
  • 6. What are teens doing online? • 81% go to websites about movies, TV shows, music groups, or sports stars • 77% go online to get news • 58% of online teens have a profile online • 57% of online teens have created some kind of content online • 57% have watched a video on a video-sharing site like YouTube or GoogleVideo • 55% go online to get information about a college, university or other school that they are thinking about attending. • 38% have bought something online like books, clothes or music • 28% have looked online for health, dieting or physical fitness information Teens & Online Safety April 30, 2008 6
  • 7. SNS: Demographics • 58% of online teens have a profile online • Girls, particularly older girls, more likely to use SNS than boys (70% of girls 15-17 have profile online, compared to 57% of boys 15-17) • Age is major factor – 12 -14 year-olds; 38% have an online profile – 15 -17 year-olds; 77% have an online profile • Other demographic factors not significant – Income – Race/ethnicity Teens & Online Safety April 30, 2008 7
  • 8. Concerns in Online Safety Sphere • Inappropriate contact (wanted/unwanted) – Strangers – Bullies • Inappropriate content – Exposure (wanted/unwanted) – Prevention Teens & Online Safety April 30, 2008 8
  • 9. Contact - Strangers • Definition of “complete stranger:” “…[someone] who has no connection at all to you or any of your friends.” • 32% of online teens have been contacted online by a complete stranger. • Of teens who have been contacted, 23% say they were made scared or uncomfortable by the stranger contact. • Overall, 7% of online teens experienced disturbing stranger contact. Teens & Online Safety April 30, 2008 9
  • 10. Contact – Strangers (2) • Factors that predict a greater likelihood of online contact (% reporting stranger contact in each group) – Posting photos (49%) – Having a profile online (44%) – Female (39%) – Flirting via social networks (53%) • Factors that predict a greater likelihood of scary or uncomfortable online contact – Female (11% vs. 4% of males) Teens & Online Safety April 30, 2008 10
  • 11. Contact -- Strangers (3) • No association between stranger contact and any other content posted to online profiles • Social network users more likely to have been contacted by strangers, but not more likely to find that contact scary or uncomfortable • Having internet monitoring software (but not filters) is correlated with lower reported levels of contact by someone unknown to the teen or his/her friends. Teens & Online Safety April 30, 2008 11
  • 12. Contact – Strangers (4) How did teens respond to stranger contact? • Of teens who were contacted by a stranger: – 65% just ignored it or deleted it – 21% responded so they could find out more about the person – 8% responded and asked to be left alone – 3% told an adult or someone in authority Teens & Online Safety April 30, 2008 12
  • 13. Contact – Bullies • 32% of online teens have experienced one of the following forms of online harassment, also called “cyberbullying” – 15% of teens reported having private material (IM, txt, email) forwarded without permission – 13% had received threatening messages – 13% said someone had spread a rumor about them online – 6% had someone post an embarrassing picture of them online without permission Teens & Online Safety April 30, 2008 13
  • 14. Contact – Bullies (2) • Girls, particularly older girls, report more online bullying; 38% of all online girls reported experiencing some type of online bullying • Social network users are also more likely to report online bullying – 39% of SNS users have experience it. • But most teens (67%) think bullying happens more OFFLINE Teens & Online Safety April 30, 2008 14
  • 15. All the world is not a stage... • 66% of all teens with profiles online have in some way restricted access to it – includes hiding it completely, taking it down, or making it private • 77% of profile-owning teens have a currently visible online profile – Of those with a visible profile, 59% say only their friends can see their profile. – 40% say anyone can see profile • 56% of teens with profiles say they have posted at least some fake information to their profile “I use a pseudonym, who is 24. Because I regard myself as an intellectual, it’s easier to be taken seriously if people don’t know they’re talking to a 16 year old.” - Boy, Late High School Teens & Online Safety April 30, 2008 15
  • 16. Parents & control of internet access and use • Some steps families take: – 74% of families have their computers in a public location – 65% of parents say they check up on their teens after they go online – 53% of families filter – 45% of families have monitoring software on the computer that their child uses – Kids aware of monitoring & filtering Teens & Online Safety April 30, 2008 16
  • 17. Parents & control of media • Parents more likely to report rules around content viewed rather than time spent with media – Content rules: • 77% of parents have rules about what TV shows their child can watch • 68% of parents have rules about what internet sites their child can or cannot visit • 67% of parents have rules about video games their child can play Teens & Online Safety April 30, 2008 17
  • 18. Parents & control of media (2) • More than half of parents have rules for time spent with media in the home – 58% have rules about how much time their child can spend watching TV – 58% have rules about how much time their child can spend playing video games (rises to 64% of hhds w/gamers) – 55% have rules about how much time their child can spend online • Parents also have rules about information that may be shared online – 68% of parents of online teens say that they have rules about what kind of information their child may share over the internet • Only 7% of parents have no rules about media use at all Teens & Online Safety April 30, 2008 18
  • 19. Final Thoughts • Only a very small number of teens report uncomfortable online contact; most ably handle the contact by deleting or ignoring it • Very little association between contact and information posted online • Bullying is reported by same % of teens as stranger contact; and yet happens more offline • Parents more likely to use non-technical methods of protection; rulemaking around content • Safety in a mobile environment? Teens & Online Safety April 30, 2008 19
  • 20. Thank You Amanda Lenhart Pew Internet & American Life Project alenhart@pewinternet.org http://www.pewinternet.org