News Feed Item
Cyberbullying Triples According to New McAfee “2014 Teens and the Screen Study”
|By Business Wire
|June 3, 2014 12:01 AM EDT
McAfee, part of Intel Security, today released findings from the
Teens and the Screen study: Exploring Online Privacy, Social Networking
and Cyberbullying. The annual study examines the online
behavior and social networking habits of U.S. preteens and teens. The
most significant finding from this year’s study reveals that 87%
of youth have witnessed cyberbullying versus last year when 27%
of youth witnessed cruel behavior online. This behavior was
perceived to result in anger and embarrassment, leading to a broader
theme about how online behavior is impacting their offline lives. The
study highlights how risky online activity can follow them offline and
possibly make them even more susceptible to cyberbullying.
“Parents must discuss online activity with their children to better
ensure their safety and security offline,” said Michelle Dennedy, chief
privacy officer at McAfee. “Whether a child is a victim or an instigator
of cruel behavior such as cyberbullying, the negative behavior can
deeply affect their identity and their reputation.”
Despite significant efforts to discourage cyberbullying, and its
negative effects, the number of occurrences continues to grow with 87%
of youth having witnessed cyberbullying. Of those who responded they
were cyberbullied, 72% responded it was due to appearance while 26%
answered due to race or religion and 22% stated their sexuality
was the driving factor. Of those who witnessed cyberbullying, 53% responded
the victims became defensive or angry while 47% said the victims
deleted their social media accounts, underscoring its significant
emotional impact. While the study reveals cyberbullying continues to
represent a serious problem for youth, the 2014 survey found 24% of
youth would not know what to do if they were harassed or bullied online.
Online Conflict Driving Offline Consequences
Unfortunately, the negative experience of cyberbullying does not only
exist online. Social networks are causing a majority of U.S. adolescents
to experience negative situations that ultimately lead to offline
arguments. The study found 50% of youth have been involved in an
argument because of something posted on social media, a 51%
increase from last year’s result, which found only 33% had been
involved in an argument. Four percent of young adults stated the
original online altercation led to a physical fight.
Not So Private Lives
In addition to oversharing feelings, youth also overshare what would be
considered private information publicly, both intentionally and
unintentionally. Only 61% of youth have enabled the privacy
settings on their social networking profiles to protect their content,
and 52% do not turn off their location or GPS services across
apps, leaving their locations visible to strangers. Additionally, 14%
have posted their home addresses online – a 27% increase from
last year’s results.
“By uncovering our youth’s online behavior activities, parents,
guardians, teachers and coaches can be more aware of cruel behavior that
can potentially take place offline,” continued Dennedy. “As a result of
closely monitoring online activities, hopefully we all can do our part
to provide appropriate assistance and help eradicate cyberbullying.”
Other Survey Highlights:
No Parent Zone: Youth want to socially network with their peers only
Youth use social networking sites they believe their parents are not
members of or are trolling. YouTube is the most frequented site, with 97%
of respondents visiting the site or app on a weekly basis. YouTube was
closely followed by Instagram, with 92% of respondents visiting
the site or app on a weekly basis.
Hide and Don’t Seek: Youth would change their online behavior if they
knew their parents were watching
Although 90% of youth believe their parents trust them to do
what is right online, 45% would still change their online
behavior if they knew their parents were watching.
Finding Social Acceptance
While 79% of youth have never used the Internet or social media
to reinvent themselves, one in three youth feel more accepted on
social media than they do in real life.
Youth fear their privacy will be compromised (25%) and fear
being hacked (24%) more than they fear being unpopular (16%)
or cyberbullied (12%).
Half (49%) of youth have regretted something they have posted
Top 5 Tips for Parents to Help Educate Their
1. Connect with your kids. Casually talk to them about the
risks of all online connections and make sure the communication lines
2. Gain access. Parents should have passwords for their
children’s social media accounts and passcodes to their children’s
devices to have full access at any given moment.
3. Learn their technology. Stay one step ahead and take
the time to research the various devices your kids use. You want to know
more about their devices than they do.
4. Get social. Stay knowledgeable about the newest and
latest social networks. You don’t have to create an account but it is
important to understand how they work and if your kids are on them.
5. Reputation management. Make sure your kids are aware
anything they post online does not have an expiration date.
To learn more, please visit:
The Futures Company conducted a survey among 1,502 young adult men and
women ages 10 to 18 in the United States. The survey was split evenly
among age and gender. The interviews were conducted from April 2, 2014
through April 14, 2014.
McAfee, part of Intel Security and a wholly owned subsidiary of Intel
Corporation (NASDAQ: INTC), empowers businesses, the public sector, and
home users to safely experience the benefits of the Internet. The
company delivers proactive and proven security solutions and services
for systems, networks, and mobile devices around the world. With its
visionary Security Connected strategy, innovative approach to
hardware-enhanced security, and unique global threat intelligence
network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com
Note: McAfee is a registered trademark of McAfee, Inc. in the United
States and other countries. Other names and brands may be claimed as the
property of others.
Photos/Multimedia Gallery Available: http://www.businesswire.com/multimedia/home/20140602006734/en/
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 4, 2016 09:30 AM EDT Reads: 413
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
May. 4, 2016 08:15 AM EDT Reads: 980
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications.
In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 4, 2016 08:00 AM EDT Reads: 1,242
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 4, 2016 08:00 AM EDT Reads: 1,270
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data.
In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
May. 4, 2016 08:00 AM EDT Reads: 1,166
Artificial Intelligence has the potential to massively disrupt IoT.
In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things.
AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 4, 2016 08:00 AM EDT Reads: 1,299
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore.
This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 4, 2016 07:45 AM EDT Reads: 1,180
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights.
At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 4, 2016 07:30 AM EDT Reads: 402
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform.
In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 4, 2016 07:00 AM EDT Reads: 827
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical.
In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 4, 2016 07:00 AM EDT Reads: 1,041
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments.
In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 4, 2016 06:00 AM EDT Reads: 1,247
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing.
In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 4, 2016 05:30 AM EDT Reads: 410
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity.
In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 4, 2016 04:45 AM EDT Reads: 1,338
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems.
In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
May. 4, 2016 12:45 AM EDT Reads: 1,187
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting.
In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 3, 2016 10:00 PM EDT Reads: 1,368