SYS-CON MEDIA Authors: Liz McMillan, Plutora Blog, Trevor Parsons, Elizabeth White, Pat Romanski

News Feed Item

Cyberbullying Triples According to New McAfee “2014 Teens and the Screen Study”

McAfee, part of Intel Security, today released findings from the company’s 2014 Teens and the Screen study: Exploring Online Privacy, Social Networking and Cyberbullying. The annual study examines the online behavior and social networking habits of U.S. preteens and teens. The most significant finding from this year’s study reveals that 87% of youth have witnessed cyberbullying versus last year when 27% of youth witnessed cruel behavior online. This behavior was perceived to result in anger and embarrassment, leading to a broader theme about how online behavior is impacting their offline lives. The study highlights how risky online activity can follow them offline and possibly make them even more susceptible to cyberbullying.

“Parents must discuss online activity with their children to better ensure their safety and security offline,” said Michelle Dennedy, chief privacy officer at McAfee. “Whether a child is a victim or an instigator of cruel behavior such as cyberbullying, the negative behavior can deeply affect their identity and their reputation.”

Cyberbullying

Despite significant efforts to discourage cyberbullying, and its negative effects, the number of occurrences continues to grow with 87% of youth having witnessed cyberbullying. Of those who responded they were cyberbullied, 72% responded it was due to appearance while 26% answered due to race or religion and 22% stated their sexuality was the driving factor. Of those who witnessed cyberbullying, 53% responded the victims became defensive or angry while 47% said the victims deleted their social media accounts, underscoring its significant emotional impact. While the study reveals cyberbullying continues to represent a serious problem for youth, the 2014 survey found 24% of youth would not know what to do if they were harassed or bullied online.

Online Conflict Driving Offline Consequences

Unfortunately, the negative experience of cyberbullying does not only exist online. Social networks are causing a majority of U.S. adolescents to experience negative situations that ultimately lead to offline arguments. The study found 50% of youth have been involved in an argument because of something posted on social media, a 51% increase from last year’s result, which found only 33% had been involved in an argument. Four percent of young adults stated the original online altercation led to a physical fight.

Not So Private Lives

In addition to oversharing feelings, youth also overshare what would be considered private information publicly, both intentionally and unintentionally. Only 61% of youth have enabled the privacy settings on their social networking profiles to protect their content, and 52% do not turn off their location or GPS services across apps, leaving their locations visible to strangers. Additionally, 14% have posted their home addresses online – a 27% increase from last year’s results.

“By uncovering our youth’s online behavior activities, parents, guardians, teachers and coaches can be more aware of cruel behavior that can potentially take place offline,” continued Dennedy. “As a result of closely monitoring online activities, hopefully we all can do our part to provide appropriate assistance and help eradicate cyberbullying.”

Other Survey Highlights:

No Parent Zone: Youth want to socially network with their peers only

  • Youth use social networking sites they believe their parents are not members of or are trolling. YouTube is the most frequented site, with 97% of respondents visiting the site or app on a weekly basis. YouTube was closely followed by Instagram, with 92% of respondents visiting the site or app on a weekly basis.

Hide and Don’t Seek: Youth would change their online behavior if they knew their parents were watching

  • Although 90% of youth believe their parents trust them to do what is right online, 45% would still change their online behavior if they knew their parents were watching.

Finding Social Acceptance

  • While 79% of youth have never used the Internet or social media to reinvent themselves, one in three youth feel more accepted on social media than they do in real life.

Privacy Concern

  • Youth fear their privacy will be compromised (25%) and fear being hacked (24%) more than they fear being unpopular (16%) or cyberbullied (12%).

Social Regret

  • Half (49%) of youth have regretted something they have posted online.

Top 5 Tips for Parents to Help Educate Their Kids:

1. Connect with your kids. Casually talk to them about the risks of all online connections and make sure the communication lines are open.

2. Gain access. Parents should have passwords for their children’s social media accounts and passcodes to their children’s devices to have full access at any given moment.

3. Learn their technology. Stay one step ahead and take the time to research the various devices your kids use. You want to know more about their devices than they do.

4. Get social. Stay knowledgeable about the newest and latest social networks. You don’t have to create an account but it is important to understand how they work and if your kids are on them.

5. Reputation management. Make sure your kids are aware anything they post online does not have an expiration date.

To learn more, please visit:

Quantitative Methodology

The Futures Company conducted a survey among 1,502 young adult men and women ages 10 to 18 in the United States. The survey was split evenly among age and gender. The interviews were conducted from April 2, 2014 through April 14, 2014.

About McAfee

McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile ...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, focused on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud platfo...
At 15th Cloud Expo, Shrikant Pattathil, Executive Vice President at Harbinger Systems, demos a video delivery platform that helps you do interactive videos. He discusses how Harbinger is accomplishing it in the cloud world, the problems they faced and the choices they made to get around these problems.
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP ...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
"For the past 4 years we have been working mainly to export. For the last 3 or 4 years the main market was Russia. In the past year we have been working to expand our footprint in Europe and the United States," explained Andris Gailitis, CEO of DEAC, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
Over the past year, Datical has had amazing success with our flagship product, Datical DB. We’ve seen multiple visionary, sector-leading companies select Datical DB to drive their Application Schema changes. Now that the number has grown rapidly over the past year, we can begin to see patterns in why customers choose Datical DB. One of them turns out to be pretty emblematic of our other customers. So, let's examine the reasons why they chose to adopt Datical DB.
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.