Welcome!

News Feed Item

Cyberbullying Triples According to New McAfee “2014 Teens and the Screen Study”

McAfee, part of Intel Security, today released findings from the company’s 2014 Teens and the Screen study: Exploring Online Privacy, Social Networking and Cyberbullying. The annual study examines the online behavior and social networking habits of U.S. preteens and teens. The most significant finding from this year’s study reveals that 87% of youth have witnessed cyberbullying versus last year when 27% of youth witnessed cruel behavior online. This behavior was perceived to result in anger and embarrassment, leading to a broader theme about how online behavior is impacting their offline lives. The study highlights how risky online activity can follow them offline and possibly make them even more susceptible to cyberbullying.

“Parents must discuss online activity with their children to better ensure their safety and security offline,” said Michelle Dennedy, chief privacy officer at McAfee. “Whether a child is a victim or an instigator of cruel behavior such as cyberbullying, the negative behavior can deeply affect their identity and their reputation.”

Cyberbullying

Despite significant efforts to discourage cyberbullying, and its negative effects, the number of occurrences continues to grow with 87% of youth having witnessed cyberbullying. Of those who responded they were cyberbullied, 72% responded it was due to appearance while 26% answered due to race or religion and 22% stated their sexuality was the driving factor. Of those who witnessed cyberbullying, 53% responded the victims became defensive or angry while 47% said the victims deleted their social media accounts, underscoring its significant emotional impact. While the study reveals cyberbullying continues to represent a serious problem for youth, the 2014 survey found 24% of youth would not know what to do if they were harassed or bullied online.

Online Conflict Driving Offline Consequences

Unfortunately, the negative experience of cyberbullying does not only exist online. Social networks are causing a majority of U.S. adolescents to experience negative situations that ultimately lead to offline arguments. The study found 50% of youth have been involved in an argument because of something posted on social media, a 51% increase from last year’s result, which found only 33% had been involved in an argument. Four percent of young adults stated the original online altercation led to a physical fight.

Not So Private Lives

In addition to oversharing feelings, youth also overshare what would be considered private information publicly, both intentionally and unintentionally. Only 61% of youth have enabled the privacy settings on their social networking profiles to protect their content, and 52% do not turn off their location or GPS services across apps, leaving their locations visible to strangers. Additionally, 14% have posted their home addresses online – a 27% increase from last year’s results.

“By uncovering our youth’s online behavior activities, parents, guardians, teachers and coaches can be more aware of cruel behavior that can potentially take place offline,” continued Dennedy. “As a result of closely monitoring online activities, hopefully we all can do our part to provide appropriate assistance and help eradicate cyberbullying.”

Other Survey Highlights:

No Parent Zone: Youth want to socially network with their peers only

  • Youth use social networking sites they believe their parents are not members of or are trolling. YouTube is the most frequented site, with 97% of respondents visiting the site or app on a weekly basis. YouTube was closely followed by Instagram, with 92% of respondents visiting the site or app on a weekly basis.

Hide and Don’t Seek: Youth would change their online behavior if they knew their parents were watching

  • Although 90% of youth believe their parents trust them to do what is right online, 45% would still change their online behavior if they knew their parents were watching.

Finding Social Acceptance

  • While 79% of youth have never used the Internet or social media to reinvent themselves, one in three youth feel more accepted on social media than they do in real life.

Privacy Concern

  • Youth fear their privacy will be compromised (25%) and fear being hacked (24%) more than they fear being unpopular (16%) or cyberbullied (12%).

Social Regret

  • Half (49%) of youth have regretted something they have posted online.

Top 5 Tips for Parents to Help Educate Their Kids:

1. Connect with your kids. Casually talk to them about the risks of all online connections and make sure the communication lines are open.

2. Gain access. Parents should have passwords for their children’s social media accounts and passcodes to their children’s devices to have full access at any given moment.

3. Learn their technology. Stay one step ahead and take the time to research the various devices your kids use. You want to know more about their devices than they do.

4. Get social. Stay knowledgeable about the newest and latest social networks. You don’t have to create an account but it is important to understand how they work and if your kids are on them.

5. Reputation management. Make sure your kids are aware anything they post online does not have an expiration date.

To learn more, please visit:

Quantitative Methodology

The Futures Company conducted a survey among 1,502 young adult men and women ages 10 to 18 in the United States. The survey was split evenly among age and gender. The interviews were conducted from April 2, 2014 through April 14, 2014.

About McAfee

McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Akana has announced the availability of version 8 of its API Management solution. The Akana Platform provides an end-to-end API Management solution for designing, implementing, securing, managing, monitoring, and publishing APIs. It is available as a SaaS platform, on-premises, and as a hybrid deployment. Version 8 introduces a lot of new functionality, all aimed at offering customers the richest API Management capabilities in a way that is easier than ever for API and app developers to use.
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Is the ongoing quest for agility in the data center forcing you to evaluate how to be a part of infrastructure automation efforts? As organizations evolve toward bimodal IT operations, they are embracing new service delivery models and leveraging virtualization to increase infrastructure agility. Therefore, the network must evolve in parallel to become equally agile. Read this essential piece of Gartner research for recommendations on achieving greater agility.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...