Welcome!

News Feed Item

Cyberbullying Triples According to New McAfee “2014 Teens and the Screen Study”

McAfee, part of Intel Security, today released findings from the company’s 2014 Teens and the Screen study: Exploring Online Privacy, Social Networking and Cyberbullying. The annual study examines the online behavior and social networking habits of U.S. preteens and teens. The most significant finding from this year’s study reveals that 87% of youth have witnessed cyberbullying versus last year when 27% of youth witnessed cruel behavior online. This behavior was perceived to result in anger and embarrassment, leading to a broader theme about how online behavior is impacting their offline lives. The study highlights how risky online activity can follow them offline and possibly make them even more susceptible to cyberbullying.

“Parents must discuss online activity with their children to better ensure their safety and security offline,” said Michelle Dennedy, chief privacy officer at McAfee. “Whether a child is a victim or an instigator of cruel behavior such as cyberbullying, the negative behavior can deeply affect their identity and their reputation.”

Cyberbullying

Despite significant efforts to discourage cyberbullying, and its negative effects, the number of occurrences continues to grow with 87% of youth having witnessed cyberbullying. Of those who responded they were cyberbullied, 72% responded it was due to appearance while 26% answered due to race or religion and 22% stated their sexuality was the driving factor. Of those who witnessed cyberbullying, 53% responded the victims became defensive or angry while 47% said the victims deleted their social media accounts, underscoring its significant emotional impact. While the study reveals cyberbullying continues to represent a serious problem for youth, the 2014 survey found 24% of youth would not know what to do if they were harassed or bullied online.

Online Conflict Driving Offline Consequences

Unfortunately, the negative experience of cyberbullying does not only exist online. Social networks are causing a majority of U.S. adolescents to experience negative situations that ultimately lead to offline arguments. The study found 50% of youth have been involved in an argument because of something posted on social media, a 51% increase from last year’s result, which found only 33% had been involved in an argument. Four percent of young adults stated the original online altercation led to a physical fight.

Not So Private Lives

In addition to oversharing feelings, youth also overshare what would be considered private information publicly, both intentionally and unintentionally. Only 61% of youth have enabled the privacy settings on their social networking profiles to protect their content, and 52% do not turn off their location or GPS services across apps, leaving their locations visible to strangers. Additionally, 14% have posted their home addresses online – a 27% increase from last year’s results.

“By uncovering our youth’s online behavior activities, parents, guardians, teachers and coaches can be more aware of cruel behavior that can potentially take place offline,” continued Dennedy. “As a result of closely monitoring online activities, hopefully we all can do our part to provide appropriate assistance and help eradicate cyberbullying.”

Other Survey Highlights:

No Parent Zone: Youth want to socially network with their peers only

  • Youth use social networking sites they believe their parents are not members of or are trolling. YouTube is the most frequented site, with 97% of respondents visiting the site or app on a weekly basis. YouTube was closely followed by Instagram, with 92% of respondents visiting the site or app on a weekly basis.

Hide and Don’t Seek: Youth would change their online behavior if they knew their parents were watching

  • Although 90% of youth believe their parents trust them to do what is right online, 45% would still change their online behavior if they knew their parents were watching.

Finding Social Acceptance

  • While 79% of youth have never used the Internet or social media to reinvent themselves, one in three youth feel more accepted on social media than they do in real life.

Privacy Concern

  • Youth fear their privacy will be compromised (25%) and fear being hacked (24%) more than they fear being unpopular (16%) or cyberbullied (12%).

Social Regret

  • Half (49%) of youth have regretted something they have posted online.

Top 5 Tips for Parents to Help Educate Their Kids:

1. Connect with your kids. Casually talk to them about the risks of all online connections and make sure the communication lines are open.

2. Gain access. Parents should have passwords for their children’s social media accounts and passcodes to their children’s devices to have full access at any given moment.

3. Learn their technology. Stay one step ahead and take the time to research the various devices your kids use. You want to know more about their devices than they do.

4. Get social. Stay knowledgeable about the newest and latest social networks. You don’t have to create an account but it is important to understand how they work and if your kids are on them.

5. Reputation management. Make sure your kids are aware anything they post online does not have an expiration date.

To learn more, please visit:

Quantitative Methodology

The Futures Company conducted a survey among 1,502 young adult men and women ages 10 to 18 in the United States. The survey was split evenly among age and gender. The interviews were conducted from April 2, 2014 through April 14, 2014.

About McAfee

McAfee, part of Intel Security and a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com

Note: McAfee is a registered trademark of McAfee, Inc. in the United States and other countries. Other names and brands may be claimed as the property of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...