1 / 19

Utah Mental Health Counselor Association

Adolescence and digital pitfalls: what parents and clinicians need to know Kristal James, LCMHC, NCC Michael Negrette , LMFT Carrie Rogers-Whitehead, Mlis , MPA. Utah Mental Health Counselor Association. Objectives. What is digital violence? Online harassment and cyberbullying

shae
Download Presentation

Utah Mental Health Counselor Association

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Adolescence and digital pitfalls: what parents and clinicians need to knowKristal James, LCMHC, NCCMichael Negrette, LMFTCarrie Rogers-Whitehead, Mlis, MPA Utah Mental Health Counselor Association

  2. Objectives • What is digital violence? • Online harassment and cyberbullying • Risk and protective factors for cyberbullying • Clinician experiences and perspectives • Ethics and digital behavior • Discussion

  3. 1. What is digital violence? Digital sexual violence is violence

  4. Digital Violence Includes • Privacy violations • Cyberstalking • Cyberbullying • Doxing • Trolling • Hacking and stealing personal images • Taking explicit pictures or videos without consent • Harassment, particularly with online gaming

  5. Womenare more likely to be sexually harassed online than men, particularly young women However, men are slightly more likely to be harassed online than women 2/3 of American adults have witnessed online harassment

  6. Pew Research found an increase in online harassment from their 2014 study to 2017. 53% of women aged 18-29 report they have received unsolicited sexual images online.

  7. Where does this harassment occur? • Video games- Men are more likely to play video games than women. Thus, receive the majority of harassment • Dating apps • Website comments section • Personal emails • Social Media • Anonymous message boards like Reddit

  8. In 2016 more people accessed the Internet through mobile devices than desktops for the first time • 95% of teens have access to a smartphone • YouTube, Snapchat and Instagram are the most popular social media for teens, followed by Facebook • Teen girls use social media more while teen boys play games more MobileTrends 45% of teens according to a 2018 Pew Research study say they are on their phone almost “constantly.”

  9. 2. Risk and protective factors for cyberbullying Risk and protective factors for perpetrators and victims

  10. Students seen as different than their peers Females 2x more likely to be both victim and perpetrators of cyberbullying More hours behind a screen Less parental and adult monitoring Students previously cyberbullied are more likely to cyberbully others Cyberbullying Risk Factors

  11. Parental involvement Encouraging “moral engagement” and empathy Less screen-time Digital literacy skills (i.e. understanding settings) School and family support and safe places to report cyberbullying Cyberbullying Protective Factors Digital citizenship skills (i.e. understanding digital footprint)

  12. Loneliness Risk Factors Individuals who have a lack of connection to peers are more likely to exhibit unhealthy online behavior and be at risk for predators online. Protective Factors Individuals who have more social connection are more likely to use technology in a positive way and have more resiliency to negative online behaviors.

  13. 3. CLINICIAN EXPERIENCES AND PERSPECTIVES

  14. Set expectations from ‘go’ No cell phones at family time No phones at dinner No Phubbing Turn in cell phones at bed time Follow School Policies Cell Phone Usage Recommendations Phones are available for ‘checking’

  15. Baseline then earn – 1 hour to begin No PCs/consoles/TVs in bedrooms Use behavior contracts Video Game Suggestions – PC and Consoles Balance – Involvement with other activities

  16. Other Clinical /parentalconsiderations • Talk! And Listen! • Set a good technology example • Model healthy living – Balance • Educate yourself! • Block options

  17. 5. discussion What do you see?

  18. References • Centers for Disease Control, “Sexual Violence Prevention,” https://www.cdc.gov/features/sexualviolence/index.html • Connecting the Dots: An Overview of the Links Among Multiple Forms of Violence. Atlanta, GA: National Center for Injury Prevention and Control, Centers for Disease Control and Prevention Oakland, CA: Prevention Institute. • Rogers-Whitehead, Carrie. "What Prevention Science Tells Us about Cyberbullying." ISTE | Blog. June 19, 2018. https://www.iste.org/explore/articleDetail?articleid=2210 • Pew Research, “Online Harassment 2017” http://www.pewinternet.org/2017/07/11/online-harassment-2017/ • We are Thorn, ”Child Sex Trafficking Statistics” https://www.wearethorn.org/child-trafficking-statistics/

  19. References • Hood, Michelle, and Amanda L. Duffy. "Understanding the Relationship between Cyber-victimisation and Cyber-bullying on Social Network Sites: The Role of Moderating Factors." Personality and Individual Differences 133 (2018): 103-08. doi:10.1016/j.paid.2017.04.004. • StopBullying.gov, “Facts about Bullying,” https://www.stopbullying.gov/media/facts/index.html • Pew Research, “Teens, Social Media and Technology 2018” http://www.pewinternet.org/2018/05/31/teens-social-media-technology-2018/

More Related