Welcome!

News Feed Item

Cyberbullying Triples According to New McAfee “2014 Teens and the Screen Study”

McAfee, part of Intel Security, today released findings from the company’s 2014 Teens and the Screen study: Exploring Online Privacy, Social Networking and Cyberbullying. The annual study examines the online behavior and social networking habits of U.S. preteens and teens. The most significant finding from this year’s study reveals that 87% of youth have witnessed cyberbullying versus last year when 27% of youth witnessed cruel behavior online. This behavior was perceived to result in anger and embarrassment, leading to a broader theme about how online behavior is impacting their offline lives. The study highlights how risky online activity can follow them offline and possibly make them even more susceptible to cyberbullying.

“Parents must discuss online activity with their children to better ensure their safety and security offline,” said Michelle Dennedy, chief privacy officer at McAfee. “Whether a child is a victim or an instigator of cruel behavior such as cyberbullying, the negative behavior can deeply affect their identity and their reputation.”

Cyberbullying

Despite significant efforts to discourage cyberbullying, and its negative effects, the number of occurrences continues to grow with 87% of youth having witnessed cyberbullying. Of those who responded they were cyberbullied, 72% responded it was due to appearance while 26% answered due to race or religion and 22% stated their sexuality was the driving factor. Of those who witnessed cyberbullying, 53% responded the victims became defensive or angry while 47% said the victims deleted their social media accounts, underscoring its significant emotional impact. While the study reveals cyberbullying continues to represent a serious problem for youth, the 2014 survey found 24% of youth would not know what to do if they were harassed or bullied online.

Online Conflict Driving Offline Consequences

Unfortunately, the negative experience of cyberbullying does not only exist online. Social networks are causing a majority of U.S. adolescents to experience negative situations that ultimately lead to offline arguments. The study found 50% of youth have been involved in an argument because of something posted on social media, a 51% increase from last year’s result, which found only 33% had been involved in an argument. Four percent of young adults stated the original online altercation led to a physical fight.

Not So Private Lives

In addition to oversharing feelings, youth also overshare what would be considered private information publicly, both intentionally and unintentionally. Only 61% of youth have enabled the privacy settings on their social networking profiles to protect their content, and 52% do not turn off their location or GPS services across apps, leaving their locations visible to strangers. Additionally, 14% have posted their home addresses online – a 27% increase from last year’s results.

“By uncovering our youth’s online behavior activities, parents, guardians, teachers and coaches can be more aware of cruel behavior that can potentially take place offline,” continued Dennedy. “As a result of closely monitoring online activities, hopefully we all can do our part to provide appropriate assistance and help eradicate cyberbullying.”

Other Survey Highlights:

No Parent Zone: Youth want to socially network with their peers only

  • Youth use social networking sites they believe their parents are not members of or are trolling. YouTube is the most frequented site, with 97% of respondents visiting the site or app on a weekly basis. YouTube was closely followed by Instagram, with 92% of respondents visiting the site or app on a weekly basis.

Hide and Don’t Seek: Youth would change their online behavior if they knew their parents were watching

  • Although 90% of youth believe their parents trust them to do what is right online, 45% would still change their online behavior if they knew their parents were watching.

Finding Social Acceptance

  • While 79% of youth have never used the Internet or social media to reinvent themselves, one in three youth feel more accepted on social media than they do in real life.

Privacy Concern

  • Youth fear their privacy will be compromised (25%) and fear being hacked (24%) more than they fear being unpopular (16%) or cyberbullied (12%).

Social Regret

  • Half (49%) of youth have regretted something they have posted online.

Top 5 Tips for Parents to Help Educate Their Kids:

1. Connect with your kids. Casually talk to them about the risks of all online connections and make sure the communication lines are open.

2. Gain access. Parents should have passwords for their children’s social media accounts and passcodes to their children’s devices to have full access at any given moment.

3. Learn their technology. Stay one step ahead and take the time to research the various devices your kids use. You want to know more about their devices than they do.

4. Get social. Stay knowledgeable about the newest and latest social networks. You don’t have to create an account but it is important to understand how they work and if your kids are on them.

5. Reputation management. Make sure your kids are aware anything they post online does not have an expiration date.

To learn more, please visit:

Quantitative Methodology

The Futures Company conducted a survey among 1,502 young adult men and women ages 10 to 18 in the United States. The survey was split evenly among age and gender. The interviews were conducted from April 2, 2014 through April 14, 2014.

About McAfee

McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
MongoDB Atlas leverages VPC peering for AWS, a service that allows multiple VPC networks to interact. This includes VPCs that belong to other AWS account holders. By performing cross account VPC peering, users ensure networks that host and communicate their data are secure. In his session at 20th Cloud Expo, Jay Gordon, a Developer Advocate at MongoDB, will explain how to properly architect your VPC using existing AWS tools and then peer with your MongoDB Atlas cluster. He'll discuss the secur...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
In his session at Cloud Expo, Alan Winters, an entertainment executive/TV producer turned serial entrepreneur, will present a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to max...
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...