Associations Between Parental Monitoring, Adolescent Disclosure, and Adolescent Risky Internet Behaviors Elizabeth Yale, M.A., Aaron Metzger, Ph.D., Amanda.

Slides:



Advertisements
Similar presentations
Digital Citizenship Cyber bullying Answers. 1.What is a Cyber bully? a. A bully that intimidates over the internet and is 17 years old or younger b. A.
Advertisements

Internet Safety 9th Grade Health.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Developed by Technology Services 1:1 Laptop Initiative
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
Wolfpack Advocacy Hour January 10, 2012 Grade 10.
Maternal Psychological Control: Links to Close Friendship and Depression in Early Adolescence Heather L. Tencer Jessica R. Meyer Felicia D. Hall University.
The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
Forms of Cyberbullying
Study examined associations between adolescent information management (disclosure & secrecy), parenting behaviors (solicitation & rules), and adolescent.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber- Bullying. CYBER-BULLYING Cyber-bullying is being cruel to others by sending or posting harmful materials using cell phone or internet.
Cyber Safety in Schools
The ultimate guide to cyber- bullying.. Cyber-bullying is the use of electronic information and communication to bully or otherwise harass an individual.
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
High School Safe Environment “Cyberbullying” Resources and Assessment Materials.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
 Definition: Building online communities of those that share interests and activities.  Examples:  Myspace  Facebook  Twitter “Online communication.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
S TOP CYBERBULLYING ! This is our project on cyberbullying. This will teach you different types of cyberbullying and stories of victims. We will tell you.
Internet Safety Awareness
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
Cyberbullying Brittany Benningfield EDF 204 Spring 2015.
What is cyberbullying? Contributed by Joanne Thompson All resources in the "Safeguarding Resources" section of our resource bank have been submitted by.
Internet Safety Keeping Kids and Teens Safe
Jennifer Carter RCMS Spring 2012 COWBOY CIRCUIT: Electronic Safety & Your Teen.
Kara LaRose, School Counselor Willow Dale Elementary School
SEAL Say no to bullying.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Sexting Criminal Teen Trend
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Cyberbullying Kim Mulkey.
Social Media How can we manage social network for children?
Why is Cyber Bullying on the Rise? By: Yolanda Epp.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
CYBER SAFETY & PREVENTION Jacquelyn M. Trejo Southmore Intermediate.
1. Verbal bullying including derogatory comments and bad names 2. Bullying through social exclusion or isolation 3. Physical bullying such as hitting,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Predator Identification Internet Safety Awareness.
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
PGHS Advocacy Digital Citizenship Lesson 2
Internet Safety Cell Phones Texting. Protect your privacy.. Only give out your number to people you know and trust Only give out your number to people.
Today we are teaching the Millennial Generation!!!!
Cyber Bullying. Cyber Bullying is very serious it has resulted in death and suicide.
CYBER SMART QUIZ Watch This First.
Parent-Child Connections on Facebook and Cyberbullying Gustavo S. Mesch University of Haifa Israel.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
“ Cyber bullying is bullying that takes place via technology. Whether on gaming sites, through a mobile device or via a social networking site, the effects.
NOYes Not Sure? A Digital Citizenship Lesson Plan for Middle School.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
Social Media Smarts. Yep! That’s Me! I have had a cell phone since 5 th Grade I just got a cell phone this year I wish I had a cell phone I have an IPAD.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
By Michael Brice Jr.. What is cyber- bullying Cyber-bullying is bullying that takes place using electronic technology. Electronic technology includes.
Cyberbullying project
E-Safety What are the dangers: Seeing disturbing information or images
Bullying through technology Sexting Consequences
Issues In media studies: Cyberbullying
Appropriate Use of Technology
CYBERBULLYING.
Pause Before You Post! CHC Peer Education. Pause Before You Post! CHC Peer Education.
Meole Brace School Information Evening
Online Safety! Created by Educational Technology Network
Cyberbullying and Mental Health Awareness
Presentation transcript:

Associations Between Parental Monitoring, Adolescent Disclosure, and Adolescent Risky Internet Behaviors Elizabeth Yale, M.A., Aaron Metzger, Ph.D., Amanda Hanrahan Department of Psychology West Virginia University Life-Span Development Abstract Results Discussion MOTHER-REPORTED MEASURES Solicitation about internet/phone use: (7 items; =.90) Assessed frequency of mothers asking their teens about internet/phone behaviors (1 = Never to 5 = Always). Example: The types of text messages he/she sends on his/her cell phone? Family rules about internet/phone use: (4 items; =.78) Assessed the extent to which a family has rules about internet and phone use (1 = No rules to 5 = Firm, clear rules). Example: How long your is child allowed to be online? Covert monitoring of teens internet/phone use (4 items; =.70): Assessed whether parents utilized indirect strategies to gain information about their adolescents internet/phone behaviors. 1 = yes, 0 = no Example: Do you use social networking sites (such as FACEBOOK) to monitor your childs behavior? ADOLESCENT-REPORTED MEASURES Adolescent disclosure and secrecy about internet/phone use: 5 items assessed frequency of adolescents internet/phone disclosure (How often do you tell your parents about the following). 5 items assessed frequency of secrecy about internet/phone use (How often do you keep the following activities secret). 1 = Never to 5 = Always Example: The types of pictures and comments you put on your social networking site? Risky internet behaviors: (6 items; =.75) Measured the frequency of adolescents engagement in risky internet/phone behaviors (0, 1, 2-3, 4-5, 7-10, 11+ times) Example: How often in the last 30 days have you text/sexted sexual messages? Cyberbullying behaviors and cyber victimization: 5 items ( =.72) assessed frequency of engagement in cyberbullying behaviors. 7 items ( =.89) assessed frequency of cyber victimization. Table 1. Regression table for prediction of adolescent risky internet/phone behaviors Note. R 2* = adjusted R; Betas are from the final step of the regression; Non-significant 2-way interactions from the final model were excluded from the table; * p <.05; ** p <.01 Increased internet and cell phone use put adolescents at risk for: cyber bullying/victimization (Ybarra et al., 2011). other risky internet behaviors (e.g., sending sexually explicit text messages ( Ybarra et al., 2011 ). Factors which may protect against internet risks: Parent-adolescent communication Parental behavioral control strategies Parents knowledge of teens whereabouts and activities is consistently linked with positive outcomes ( Kerr et al., 2010). Parents engage in monitoring strategies to gain information including solicitation, as well as indirect approaches such as checking teens personal items (Crouter & Head, 2002). Adolescent disclosure most consistently predicts knowledge, and positive outcomes (Cumsille et al., 2010; Kerr et al., 2010). Less research has considered computer and cell phone specific family processes: Mothers internet and cell phone specific monitoring strategies Rules about internet/phone use Solicitation, or asking, about internet/phone use Covert monitoring (e.g. reading teens s) Teens internet/cell phone specific information management Disclosure – freely sharing about internet/phone use Secrecy – actively keeping internet/phone use a secret The present study used a multi-informant (mothers and teens) approach to assess associations between: Mothers internet/phone specific information gathering strategies (rules, solicitation, covert). Teens internet/phone specific information management strategies (disclosure, secrecy). Teens internet risks, including engagement in cyberbullying, cyber victimization, and risky internet behaviors. Risky internet behaviors were significantly associated with: Adolescent disclosure about internet behaviors Mothers covert internet monitoring for girls but not boys Increased mothers covert monitoring was associated with increased risky internet behavior for girls, not boys (girls: B =.09, SE =.05, p =.04). Parent and adolescent communication about internet and cell phone behaviors: Associated with reduced risky internet behaviors, but unrelated to cyberbullying or victimization. Adolescents who discuss what they are doing online with their parents may engage in fewer risky internet behaviors (sexting, talking to strangers online). Mothers sneaky internet monitoring may lead to more risky behaviors, especially for girls. Mothers could be reacting to girls risky internet behaviors. Teen girls may feel that their privacy has been violated and react to parents sneaky monitoring. Increased cell phone use (but not internet use) was associated with increased internet risks, including cyberbullying, cyber victimization and risky internet behavior. The mobile nature of cellular phones may limit adults ability to traditionally monitor teens usage, and increase teens vulnerability. Parents may play a protective role by encouraging teens to discuss their internet behaviors, rather than setting rules about internet use, or tracking the websites teens are visiting. Future research should examine potential indirect effects of parenting on internet risks, including the facilitation of adolescent disclosure from parents open communication, less strict rules, and relationship quality. PARTICIPANTS 141 mother-adolescent dyads from Mid-Atlantic towns. Adolescents M age = 14.38, SD = 1.72; 80% Caucasian/White 60% female Mothers M age = 43.48, SD = 6.78; 80% Caucasian/White 93.6% Birth Mothers Are there associations between mothers internet monitoring strategies (solicitation, rules, covert) and youth internet risks? Do these associations vary as a function of age or gender? Are there associations between adolescent-initiated processes, internet disclosure and secrecy, and adolescents internet risks? Do these associations vary as a function of age or gender? References Background Study Questions Methods Figure 1. Mothers covert monitoring and adolescents risky internet/phone by gender Adolescent Risky Internet/Phone R 2* F Change Beta Step ** Age.23** Gender -.04 Internet Use -.04 Cell Phone Use.39** Step Teen Disclosure -.23** Teen Secrecy.06 Mother Internet Rules.08 Mother Internet Solicitation.02 Mother Internet Covert Monitoring -.16 Step * Mother Covert X Teen Gender.24* For more information contact: Elizabeth Yale or Aaron Metzger ) For more information about our research lab scan the code below with your mobile device. Crouter, A. C., & Head, M. R. (2002). Parental monitoring and knowledge of children. In M. H. Bornstein (Ed.), Handbook of Parenting: Vol. 3. Being and Becoming a Parent (pp ). Mahwah, NJ, US: Lawrence Erlbaum Associates Publishers. Cumsille, P., Darling, N., & Martinez, M. L. (2010). Shading the truth: Adolescents decisions to avoid issues, disclose, or lie to parents. Journal of Adolescence, 33, doi: /j.adolescence Kerr, M., Stattin, H., & Burk, W. J. (2010). A reinterpretation of parental monitoring in longitudinal perspective. Journal of Research on Adolescence, 20(1), doi: /j x Ybarra, M. L., Mitchell, K. J., & Korchmaros, J. D. (2011). National trends in exposure to and experiences of violence on the Internet among children. Pediatrics, 128, e1376-e1386. doi: /peds Results Three regressions predicted cyberbullying behaviors, cyber victimization, and risky internet behaviors. Models controlled for teen age, sex, internet use, and cellphone use. Age ( β =.18, p =.03) and time spent on a cell phone ( β =.35, p <.001) predicted engagement in cyberbullying behaviors. Gender ( β =.18, p =.03) and time spent on a cell phone ( β =.27, p <.01) predicted cyber victimization.