1,020 Matching Annotations
  1. Jan 2026
    1. Acknowlegement This study was funded by Public Safety Canada. Start of text box Overview of the study Using multiple surveys, this article examines cyberbullying and cybervictimization among Canadian youth and young adults aged 12 to 29. With rates of online and social media use being high among young people, there is an increased risk of online forms of bullying and victimization. This paper examines the prevalence of cyberbullying and cybervictimization among young people, with a focus on identifying the at-risk populations, behaviours related to prevalence, such as internet and smart phone usage, and the association of online victimization with other forms of victimization, such as fraud and assault. Some young people are more vulnerable to cybervictimization, including Indigenous youth, sexually diverse and non-binary youth, youth with a disability, and girls and women.  Cybervictimization increases during adolescence and remains high among young adults in their early 20s. It then tapers off in the late 20s. Increased internet usage, as well as using smart phones before bed and upon waking, are associated with an increased risk of being cyberbullied. For youth aged 12 to 17, not using devices at mealtime, having parents who often know what their teens are doing online, and having less difficulty making friends act as potential buffers against cybervictimization. Cybervictimized young adults often change their behaviour, both online—from blocking people and restricting their own access—and offline—such as carrying something for protection. Cybervictimized young adults were also more likely to have experienced other forms of victimization such as being stalked and being physically or sexually assaulted. End of text box Introduction Internet use is now woven into the fabric of Canadian society. It has become a large part of everyday life, whether it is in the context of online learning, remote working, accessing information, e-commerce, obtaining services (including healthcare), streaming entertainment, or socializing. And while nearly all Canadians use the internet to some degree, Canadians under 30 represent the first generation born into a society where internet use was already ubiquitous. As such, it may not be surprising that Canadians under the age of 30 are more likely to be advanced users of the internet, compared to older generations.Note   In addition, they often spend many hours on the internet, with this usage increasing during the COVID-19 pandemic, more so than any other age group.Note  Besides proficiency and intensity, the way in which young people interact with the internet is often different from older generations. Previous Statistics Canada research has shown that younger people are more likely than their older counterparts to use social media, more likely to use multiple social media apps, and engage in more activities on these apps.Note  This use has been related to some negative outcomes for younger people, including lost sleep and trouble concentrating.Note  Social media and online activities may also place youth and young people at increased risk of cybervictimization or cyberbullying. Numerous studies have investigated both the prevalence and impact of cybervictimization, noting that youth are often at increased risk.Note   While comparisons across studies are often difficult because of definitional differences, ages of the youth being studied, and the time frames, there is consensus on the criteria for measuring cybervictimization. These include (1) intentions to harm the victim, (2) power imbalance between the bully and victim, (3) the repeated nature of aggression, (4) use of electronic devices (including phones or computers), and (5) possible anonymity.Note  This article examines cyberbullying among youth and young adults aged 12 to 29 in Canada using four population-based surveys. The Canadian Health Survey of Children and Youth (CHSCY) collects information on cyberbullying among youth aged 12 to 17, while three surveys capture this information for adults aged 18 to 29. These surveys include the Canadian Internet Use Survey (CIUS), the General Social Survey (GSS-Cycle 34) on Victimization and the Survey of Safety in Public and Private Spaces (SSPPS). Each will be used to help paint a picture of cyberbullying of younger people in Canada.Note  Definitions and measures of cyberbullying within each of the surveys are detailed in “Cyberbullying content across four Statistics Canada surveys” text box. The study starts by discussing the prevalence of, and risk factors associated with, cyberbullying among teens aged 12 to 17. This is followed by an analysis of cyberbullying among young adults aged 18 to 29. Along with providing a profile of cyberbullying, another goal is to highlight data and knowledge gaps in this area and potential areas where future surveys and research should focus. One-quarter of teens experience cyberbullying In 2019, one in four teens (25%) aged 12 to 17 reported experiencing cyberbullying in the previous year (Chart 1). Being threatened or insulted online or by text messages was the most common form, at 16%. This was followed by being excluded from an online community (13%) and having hurtful information posted on the internet (9%).   Among those aged 12 to 17, rates of cyberbullying increased with age, rising from 20% at age 12 to 27% by age 17. This perhaps reflects an increased use of the internet, and specifically social media usage with age. The largest increase in cyberbullying prevalence related to being threatened or insulted online or by text messages (from 11% at age 12 to 19% at age 17). Data table for Chart 1  Data table for chart 1 Table summary This table displays the results of Data table for chart 1 percentage (appearing as column headers). percentage Total youth aged 12 to 17 25 Hurtful information was posted on the internet 9 Excluded from an online community 13 Threatened/insulted online or by text messages 16 Source: Statistics Canada, Canadian Health Survey on Children and Youth, 2019. Besides age, the likelihood of being victimized online varied by gender, sexual attraction, Indigenous identity and educational accommodations.  Generally, boys and girls have quite similar prevalence of cybervictimization. For instance, about 1 in 4 (24% for boys and 25% for girls) reported that they experienced any of the three forms of cybervictimization. Non-binary teens, however, experienced cybervictimization at significantly higher levels than both boys and girls. Over half (52%) of teens who reported a gender other than male or female said that they were cybervictimized in the past year. The higher prevalence among non-binary teens was seen across all types of cybervictimization. The greatest difference, however, was seen for being excluded from an online community. The proportion of non-binary teens who reported this type of cybervictimization was about three and a half times the proportion recorded for boys and girls (45% versus 12% for boys and 13% for girls). In addition, youth aged 15 to 17Note  who identified as having the same gender attraction had a significantly higher likelihood of being cyberbullied (33%), compared to their peers who were exclusively attracted to a different gender (26%). This increased risk was seen for all types of cyberbullying but was most pronounced for hurtful information being posted on the internet and being excluded from an online community. First Nations youth (off-reserve) are at greater risk of cyberbullying First NationsNote  youth living off-reserve were more likely than their non-Indigenous peers to have been cyberbullied in the past year. In particular, 34% of First Nations youth reported being bullied online, compared to 24% of non-Indigenous youth. The risk was heightened for certain types of cyberbullying, including having hurtful information posted on the internet and being threatened/insulted online or by text messages. These higher levels of cybervictimization mirror the overall higher rates of victimization for Indigenous people, which could be rooted in the long-standing legacy of colonialism resulting in discrimination and systemic racismNote  (Table 1). No significant differences were observed for Inuit and Métis youth.Note   Most racialized groups had either similar or lower prevalence rates of cyberbullying compared to non-racialized and non-Indigenous youth. For example, 16% of the South Asian youth and 18% of Filipino youth said that they had experienced cyberbullying in the past year, much lower than the 27% of non-racialized, non-Indigenous youth who reported being victimized online. In addition, those born in Canada had a higher likelihood of cyberbullying, compared to the immigrant youth population (26% versus 19%). This was seen for all forms of online victimization. The differences in risk may be due to variations in frequency of going online. Indeed, previous research has shown that immigrants are less likely to be advanced users of the internet, and are more often non-users, basic users or intermediate users.Note     Table 1 Prevalence of cyberbullying among youth aged 12 to 17, by population group, 2019 Table summary This table displays the results of Prevalence of cyberbullying among youth aged 12 to 17. The information is grouped by Population Subgroups, ages 12 to 17 (appearing as row headers), Types of cyberbullying, Hurtful information was posted on the internet, Threatened/insulted online or by text messages, Excluded from an online community and Any of the 3 types of cyberbullying, calculated using percent units of measure (appearing as column headers). Population group Types of cyberbullying Hurtful information was posted on the internet Threatened/insulted online or by text messages Excluded from an online community Any of the 3 types of cyberbullying percentage Gender Boys (ref.) 7 16 12 24 Girls 10 16 13 25 Non-binary 30Note E: Use with cautionNote * 34Note E: Use with cautionNote * 45Note E: Use with cautionNote * 52Note E: Use with cautionNote * Indigenous identity First Nations 14Note E: Use with caution 23Note * 16Note E: Use with caution 34Note * Métis 12Note E: Use with caution 20 13Note E: Use with caution 30 Inuit 14Note E: Use with caution 30Note E: Use with caution Note F: too unreliable to be published 36Note E: Use with caution Non-Indigenous (ref.) 8 16 13 24 Racialized group Black 8 16 12 24 Chinese 7 11Note * 12 22 Filipino 10 10Note * 7Note * 18Note * South Asian 5Note * 9Note * 9Note * 16Note * Not part of a racialized group (ref.) 9 18 14 27 Country of Birth Canada (ref.) 9 17 14 26 Outside Canada 5Note * 11Note * 10Note * 19Note * Gender attractionTable 1 Note 1 Same gender (ref.) 15 22 17 33 Opposite gender 9Note * 18 13Note * 26Note * Youth has an education accomodation Yes 11Note * 19Note * 15 27Note * No (ref.) 7 14 12 23 Don't know 12Note * 19Note * 15 29Note * E use with caution F too unreliable to be published Note 1 Only asked of youth aged 15 to 17. Return to note 1 referrer Note * significantly different from the reference category (ref.) (p<0.05) Return to note * referrer Source: Statistics Canada, Canadian Health Survey of Children and Youth, 2019. Higher likelihood of cyberbullying among youth with education accommodation Based on results from CHSCY, having an education accommodation, such as an Individual Education Plan (IEP), Special Education Plan (SEP) or Inclusion and Intervention Plan (IIP), places youth at increased risk of cyberbullying. Overall, 27% of youth with some type of education accommodation for learning exceptionalities or special education needs were bullied online, compared to 23% of their peers without accommodation. The risk was greatest when the cyberbullying incidents involved hurtful information being posted on the internet or being threatened or insulted online or by text messages. The increased risk of cyberbullying among those with an education accommodation peaks at age 16, with 36% of 16 year-olds with an educational accommodation reporting being cyberbullied compared with 24% of youth without an accommodation.Note  Frequent use of social media tied to higher prevalence of cyberbullying among youth Because of the potential negative impacts of cyberbullying, including the effects on mental wellbeing, it is important to understand the factors that can expose youth to online harm. One of these possible factors relates to the frequency of online activity. The CHSCY asked youth how often they go online for social networking, video/instant messaging, and online gaming. The majority (about 80%) said that went online at least weekly, with 60% saying they went on social network platforms several times a day, and just over 50% reporting that they used video or instant messenger apps at this same level of frequency. About 1 in 3 (32%) teens said that they went online for gaming at least once a day or more. In general, results from CHSCY show that more frequent social networking, instant messaging use and online gaming had a strong association with an increased risk of cybervictimization. For instance, among youth who stated that they constantly use social networking, video and instant messaging or online gaming, about one-third (34%, 36% or 30% respectively) said that they had been cyberbullied in the past year. Conversely, the proportion reporting cybervictimization drops to around 20% when social networking and video and instant messaging was used less than once a week (22%, 22%, and 24% respectively). The risk decreases even further to less than 15% when youth never utilized social networking or video and instant messaging apps (Table 2).  Table 2 Prevalence of cyberbullying among youth aged 12 to 17, by frequency of social media use and gender, 2019 Table summary This table displays the results of Prevalence of cyberbullying among youth aged 12 to 17. The information is grouped by Frequency of social media use (appearing as row headers), Proportion cyberbullied in past year, by gender, Total, Boys, Girls, Social networking , Video or instant messaging and Online Gaming , calculated using percent units of measure (appearing as column headers). Frequency of social media use Proportion cyberbullied in past year Total Boys Girls Social networking Video or instant messaging Online Gaming Social networking Video or instant messaging Online Gaming Social networking Video or instant messaging Online Gaming percentage Constantly 34Note * 36Note * 30 33Note * 32Note * 30 34Note * 38Note * 28 Several times a day 27Note * 27Note * 30 26 27 30 27Note * 27Note * 29 Once a day (ref.) 21 23 27 22 25 26 20 20 29 Weekly 27 24 24 30 27 23 21 21 27 Less than weekly 22 20 24 22 21 19Note * 21 17 29Table 2 Note † Never 12Note * 14Note * 22Note * 14Note * 15Note * 15Note * 9Note * 13Note * 24Table 2 Note † Note † significant gender difference (p < 0.05) Return to note † referrer Note * significantly different from reference category (ref.) (p < 0.05) Return to note * referrer Note: Due to sample size limitations, the non-binary category is not releasable. Source: Statistics Canada, Canadian Health Survey of Children and Youth, 2019. No gender differences were found between social media, video or instant messaging use and cybervictimization.Note   For instance, for both boys and girls, the proportion who said they were cybervictimized in the past year was over 30% if they constantly checked their social networking and instant messaging applications, with the risk decreasing similarly with lower levels of use. The risk of cybervictimization increases with age, from 12 to 17, mirroring the increased frequency in the use of social networking, video and instant messaging as youth age. Going online more frequently had the same impact on the cybervictimization risk for Indigenous and non-Indigenous youth. That is, going on social media more frequently increased the risk to the same extent for both Indigenous youth and non-Indigenous youth. However, this was not the case for all youth. For instance, the risk associated with more frequent social media and gaming use was greater for non-racialized youth than it was for racialized youth. Cyberbullying is sometimes related to usage patterns of electronic devices In addition to frequency of use, usage pattern of electronic devices may also be related to risk. Among youth aged 12 to 17, three-quarters (75%) used an electronic device before falling asleep in the past week. This usage pattern rises from a low of 54% at age 12 to a high of 92% by age 17. Using electronic devices before going to sleep appears to increase the risk of being cyberbullied. About 27% of youth that used their electronic device before going to sleep were cyberbullied in the past year, compared to 19% who had not used their device before going to sleep. The increased risk was most often related to being threatened or insulted online or by text messages (18% versus 11% who had not used a device before going to sleep) (Chart 2). Data table for Chart 2  Data table for chart 2 Table summary This table displays the results of Data table for chart 2 Yes, a device was used and No, a device was not used (ref.), calculated using percentage units of measure (appearing as column headers). Yes, a device was used No, a device was not used (ref.) percentage Total youth aged 12 to 17 27Note * 19 Hurtful information was posted on the internet 10Note * 5 Threatened/insulted online or by text messages 18Note * 11 Excluded from an online community 14Note * 10 Note * significantly different from the reference category (ref.) (p<0.05) Return to note * referrer Source: Statistics Canada, Canadian Health Survey of Children and Youth, 2019. Use of electronic devices before going to sleep and risk of cybervictimization is fairly constant across age, but appears to be highest at age 15, where 31% had been cybervictimized in the past year. This proportion falls to 16% if they did not use their device before bedtime. Results suggest that parents may, in some cases, serve as protective agents, by not allowing electronic devices at the dinner table and having a greater knowledge of what their teens are doing online. For most youth (71%), parents did not allow electronic devices during the evening meal. However, 21% of youth said that their parents allowed electronic devices at the evening meal and another 7% said that their family does not eat together. The association with cybervictimization, especially being threatened or insulted online or by text messages, increases if electronic devices were allowed at dinner (18% versus 15%). However, there are no differences with respect to other types of cybervictimization. The real risk of cybervictimization is not whether a device was used, but whether the family ate together, which can be influenced by financial or other circumstances, such as work schedules or extracurricular activities.  Across all types of cybervictimization, 35% of youth who had not eaten dinner with parents reported that they had been cybervictimized in the past year, significantly greater than the 26% of youth who said that electronic devices were allowed at the evening meal, and the 23% who said that electronic devices were not allowed. This risk is strongest for ages 12 and 16. Parents’ knowledge of youth’s online activities may help lower the association with cybervictimization. Most Canadian youth who go online have some types of rules or guidelines established by their parents, which is usually more stringent for younger children and is typically relaxed as they age and gain more trust.Note  In 2019, the proportion who stated that their parents often or always know what they are doing online was quite high. In all, 63% stated this level of parental knowledge, while another 37% said that their parents never or only sometimes knew what they were doing online. Parental knowledge about online activity declines with age. At age 12, 77% of youth state that their parents often or always know what they are doing online, which drops to 51% by age 16 and to 49% by age 17. As may be expected, increased parental knowledge of teen’s online activity was associated with a lower risk of cybervictimization (Chart 3). In particular, close to a third of youth (29%) who said their parents never or only sometimes knew about their online activities reported that they had been cybervictimized. This proportion drops to 22% when parents often or always knew what their teen was doing online. A similar pattern is noted regardless of type of cybervictimization experienced. Data table for Chart 3  Data table for chart 3 Table summary This table displays the results of Data table for chart 3 Parents never or sometimes know online activity and Parents often or always know online activity (ref.), calculated using percentage units of measure (appearing as column headers). Parents never or sometimes know online activity Parents often or always know online activity (ref.) percentage Total youth aged 12 to 17 29Note * 22 Hurtful information was posted on the internet 12Note * 7 Threatened/insulted online or by text messages 20Note * 13 Excluded from an online community 15Note * 12 Note * significantly different from the reference category (ref.) (p<0.05) Return to note * referrer Source: Statistics Canada, Canadian Health Survey of Children and Youth, 2019. Youth who have difficulty making friends are most vulnerable to online victimization Based on previous research,Note  knowing more people and having more friends, especially close friends can perhaps shield youth from being victimized, and if they are victimized, having friends can perhaps offset some of the negative impacts. Therefore, it is expected that individuals who have a difficult time making friends may be at greater risk of being victims of cyberbullying, as the person or persons victimizing them may believe them to be easier targets of abuse. In general, across all youth aged 12 to 17, most do not have any difficulty making friends, based on responses from parents. Just over 80% of parents reported that their teen had no difficulty in making friends, while 15% said that their teen had some difficulty and around 4% said that they had a lot of difficulty or could not do it at all. Across individual ages, these proportions are similar. Also, boys and girls have very similar patterns of ease of making friends (parents of around 80% of both boys and girls said that they had no difficulty making friends).Note  It bears mentioning that these are parents’ reports about their child’s purported difficulty making friends and therefore may not be the most accurate. Parents may not be fully aware of how well their child develops friendships, as this information may be intentionally hidden from them. With respect to cybervictimization, teens that have greater difficulty making friends have a greater risk of being cybervictimized than their peers without any difficulty. For example, 23% of youth whose parents said they have no difficulty making friends reported that they had been victims of cyberbullying in the past year.  This proportion climbs 12 percentage points to 35% if teens had a lot of difficulty or were unable to make friends (Table 3). A similar pattern was observed regardless of the type of cyberbullying. The relationship between the ease of making friends and cyberbullying was seen across all ages, though the gap appears to be greatest at age 16. For example, almost half (44%) of 16-year-old teens who had trouble forming friendship were cyberbullied, compared with 24% who had no difficulty making friends. Girls were especially vulnerable to cyberbullying when they had trouble making friends.Note  Overall, 40% of girls whose parents said had a lot of difficulty making friends, or were unable to do so, were cybervictimized. This compares to 23% of girls who had no difficulty making friends. The corresponding difference for boys was much lower, with 28% being cyberbullied if they had trouble making friends and 23% without any difficulty.  Table 3 Prevalence of cyberbullying among youth aged 12 to 17, by ease of developing friendships, 2019 Table summary This table displays the results of Prevalence of cyberbullying among youth aged 12 to 17. The information is grouped by Cyberbullying type, age and gender (appearing as row headers), Difficulty making friends, No difficulty (ref.), Some difficulty and A lot of difficulty /Cannot make friends, calculated using percent units of measure (appearing as column headers). Cyberbullying type, age and gender Difficulty making friendsTable 3 Note 1 No difficulty (ref.) Some difficulty A lot of difficulty or Cannot make friends percentage Total youth aged 12 to 17 23 32Note * 35Note * Type of cyberbullying Hurtful information was posted on the internet 7 14Note * 15Note * Threatened/insulted online or by text messages 15 22Note * 22Note * Excluded from an online community 12 18Note * 24Note * Age 12 years 18 27Note * 29 13 years 21 32Note * 32 14 years 22 28 39 15 years 27 32 28 16 years 24 35Note * 44Note * 17 years 24 40Note * 39 Gender Boys 23 29Note * 28 Girls 23 35Note * 39Note * Note 1 Based on responses from parents. Return to note 1 referrer Note * significantly different from reference category (ref.) (p < 0.05) Return to note * referrer Note: Due to sample size limitations, the non-binary category is not releasable. Source: Statistics Canada, Canadian Health Survey of Children and Youth, 2019. Young adults: Women and young adults most often the target of cybervictimization The remainder of the study examines the patterns of cybervictimization among young adults aged 18 to 29.  To understand cyberbullying among this age group, three population-based surveys were used. These complementary surveys, while differing in survey design and measurement, shed light on the nature of cyberbullying and the young people most at risk. According to the 2018 SSPPS, 25% of young people aged 18 to 29 experienced some form of cybervictimization, with the most common being receiving unwanted sexually suggestive or explicit images or messages (15%) and aggressive or threatening emails, social media or text messages (13%) (Table 4). Young women were more often the target of the online abuse, with a prevalence almost double the rate for young men (32% versus 17%). This gender difference was even more pronounced for receiving unwanted sexually suggestive or explicit material, where young women were almost three times as likely to be targeted (22% versus 8%).Note   Therefore, the main gender differences appear to be with respect to cybervictimization of a sexualized nature, as there were no differences between men and women on solely aggressive content without sexual content.Note   Table 4 Prevalence of cybervictimization among young people aged 18 to 29, by age group, gender and type of cybervictimization, 2018 Table summary This table displays the results of Prevalence of cybervictimization among young people aged 18 to 29. The information is grouped by Type of cybervictimization (appearing as row headers), Total, Men, Women, Overall, 18-21 (ref.), 22-25 and 26-29, calculated using percent units of measure (appearing as column headers). Type of cybervictimization Total Men Women Young people aged 18 to 29 18 to 21 years (ref.) 22 to 25 years 26 to 29 years Young people aged 18 to 29 18 to 21 years (ref.) 22 to 25 years 26 to 29 years Young people aged 18 to 29 18 to 21 years (ref.) 22 to 25 years 26 to 29 years percentage Total 25 31 25 19Note * 17 25 16 13Note * 32Table 4 Note † 38Table 4 Note † 34Table 4 Note † 26Table 4 Note †Note * Received any threatening or aggressive emails, social media messages or text messages where you were the only recipient 13 14 13 11 9 12 8 8 16Table 4 Note † 17 18Table 4 Note † 14 You were the target of threatening or aggressive comments spread through group emails, group text messages or postings on social media 6 6 7 6 5 7 5 4 8 6 9 7 Somone posted or distributed (or threatened to) intimate or sexually explicit videos or images of you without your consent 2 2 3 2 2 3 2 1 3 2 5 3 Someone pressured you to send, share, or post sexually suggestive or explicit images or messages 6 10 5Note * 4Note * 3 5 3 3 9Table 4 Note † 16Table 4 Note † 8Table 4 Note †Note * 6Note * Someone sent you sexually suggestive or explicit images or messages when you did not want to receive them 15 20 17 10Note * 8 13 8 5Note * 22Table 4 Note † 27Table 4 Note † 26Table 4 Note † 16Table 4 Note †Note * Note † significant gender difference for a particular group (p < 0.05) Return to note † referrer Note * significantly different from reference category (ref.) (p < 0.05) Return to note * referrer Note: Due to sample size limitations, the non-binary category is not releasable. Source: Statistics Canada, Survey of Safety in Public and Private Spaces, 2018. For some types of cybervictimization, there was a significantly greater risk for young adults aged 18 to 21, as compared with young adults aged 26 to 29. For instance, about 20% of young adults aged 18 to 21 reported receiving unwanted sexually suggestive or explicit images or messeges in the last year, double the 10% of young adults aged 26 to 29 who said they also received these types of unwanted images or messages. Young adults aged 18 to 21 were also twice as likely to report being pressured to send, share or post sexually suggestive or explicit images or messages (10%) than their older counterparts (5% for ages 22 to 25 and 4% for ages 26 to 29). The relationship between cybervictimization and age is similar for both men and women, though rates are always higher for women. Both men and women have about a 12-percentage point gap between ages 18 and 21 and 26 and 29 in experiencing any of the five forms of cybervictimization in the past year (25% versus 13% for men, 38% versus 26% for women). With respect to the individual forms of cybervictimization, the largest decreases by age group related to sexual victimization, especially for women. For example, for women, there was about a 10-percentage point decline from age 18-21 to age 26-29 on being pressured to send, share or post sexually suggestive or explicit images or messages (16% to 6%) and receiving unwanted sexually suggestive or explicit images or messages (27% to 16%). Greater risk of cybervictimization among LGBTQ2 young adults Data from the SSPPS also show that LGBTQ2Note  young adults were more likely than their non-LGBTQ2 counterparts to have experienced cybervictimization (49% versus 23%).Note ,Note  Moreover, the decrease in the risk of cybervictimization across age groups is not seen among the LGBTQ2 population. That is, the proportion experiencing cybervictimization at ages 18 to 21 and late 20s is similar for LGBTQ2 adults, whereas the prevalence of cyberbullying among non-LGBTQ2 young adults declines by about half between the same ages (30% at age 18 to 21 to 18% at ages 26 to 29). Interestingly, among the LGBTQ2 population, the age group with the highest rates of cybervictimization are young adults aged 22 to 25 (at 58%).  This is a rare instance of a nonlinear age trend with respect to cybervictimization declining from age 18 to age 29.Note  First Nations young adults are more frequently the victims of cyberbullying Almost half (46%) of First Nations young people living off-reserve had experienced some form of cyberbullying in the preceding year. This was nearly double the share of non-Indigenous young adults (26%). There was no increased risk among Métis or Inuit young people.Note  Among racialized groups, the likelihood of being cyberbullied was similar to the non-racialized, non-Indigenous population. There was also no difference in risk by immigrant status.  Table 5 Prevalence of cybervictimization among young people aged 18 to 29, by selected characteristics, 2018 Table summary This table displays the results of Prevalence of cybervictimization among young people aged 18 to 29. The information is grouped by Selected characteristics (appearing as row headers), Percent (appearing as column headers). Selected characteristics percentage Total 25 Gender Men (ref.) 17 Women 32Note * Racialized population Black 23 Chinese 19 Filipino 16 South Asian 18 Non-racialized (ref.) 27 Immigrant status Immigrant (ref.) 20 Canadian-born 27 Indigenous identity First Nations 46Note * Métis 31 Inuit 13 Non-Indigenous (ref.) 26 Disability No 17Note * Yes (ref.) 39 Sexual/gender diversity LGBTQ2 (ref.) 49 Non-LGBTQ2 23Note * Note * significantly different from reference category (ref.) (p < 0.05) Return to note * referrer Note: Due to sample size limitations, the non-binary category is not releasable. Source: Statistics Canada, Survey of Safety in Public and Private Spaces, 2018. Young adults with a disability are more often targeted Young adults aged 18 to 29 with a disabilityNote  were significantly more likely to report that they were cybervictimized in the past year. Across all forms of cybervictimization measured in the SSPPS, 39% of young adults with a disability reported having experienced cyberbullying in the past year, compared with 17% of the nondisabled young adult population (Table 5).Note  The SSPPS also allows for the examination of gender differences among young men and women with a disability. Almost half (46%) of women with a disability had experienced cybervictimization in the past year, much higher than the 22% of women without a disability. The difference for men was less marked. In 2018, 27% of men with a disability were targeted online, compared to 14% of other young men. The severity of the disability also appears to heighten risk. Based on the SSPPS, 56% of young adults with a severe to very severe disability stated that they had been cybervictimized in the past year, while 46% with moderate disability and 34% of those with a mild disability stated the same. This compares to 17% of young adults without a disability that experienced cybervictimization in the past year.Note  Frequent smart phone use is related to cybervictimization Being continually connected to the Internet is common among young adults aged 18 to 29, though this may place them at increased risk. Over half (55%) checked their smart phone at least every 15 to 30 minutes, with another one-third (30%) checking their smart phone at least once per hour on a typical day. Heavy cell phone use, defined as checking at least every 5 minutes, was the least common, with 15% of youth falling into this category. However, heavy use was more prevalent in the younger age groups. In 2018, 17% of young adults aged 18 to 20 were heavy users, falling to 11% among those aged 27 to 29. The majority, around three quarters, of young adults between the ages of 18 and 29 also stated that the last thing they do before going to sleep is check their phones, and a similar percentage stated that they do this again first thing upon waking up. The rates of checking before bed and upon waking are very similar regardless of gender and age. About 4 out of 5 (82%) young adults aged 18 to 20 checked their phones when waking up, and 71% of young adults aged 27 to 29 did the same. This difference, however, was not statistically significant. A pattern, albeit weak, emerges showing that more frequent smart phone use is associated with more online victimization. Based on data from the CIUS, 15% of young adults who used their smart phone at least every 5 minutes said that they had been cybervictimized in the past year. This was double (statistically significant at the p < 0.10 level) the rate of young adults who checked their phone less often (7%)Note . There were no significant differences on whether one used the smart phone before going to bed or after waking up and cybervictimization in the past year. While a direct comparison cannot be made with the data from the CHSCY on ages 12 to 17 presented earlier, it is interesting to note that among 12-to-17-year-olds there was a significant association between using one’s electronic device at bedtime and risk of cybervictimization, with a higher risk noted especially for teens age 12 and age 15. Using protective measures online is more common among younger women Being victimized online can also lead people to pull back from social media and other online activities. For example, information from the SSPPS shows that about 22% of young adults aged 18 to 29 said that in the past year, they blocked people on the internet because of harassment, while 13% said they restricted their access to the internet to protect themselves from harassment. A further 3% deleted their online account because of harassment. Young women were twice as likely as young men to block people because of harassment (31% versus 13%) and to restrict their own access (17% versus 10%) (Chart 4). These gender differences may be driven by the higher overall cybervictimization rates for women.Note  Data table for Chart 4  Data table for chart 4 Table summary This table displays the results of Data table for chart 4 Men, Women, Young people aged 18 to 29, 18 to 21 years, 22 to 25 years and 26 to 29 years, calculated using percentage units of measure (appearing as column headers). Men Women Young people aged 18 to 29 18 to 21 years 22 to 25 years 26 to 29 years Young people aged 18 to 29 18 to 21 years 22 to 25 years 26 to 29 years percentage Blocked people because of harassment 13Note * 15Note * 13Note * 11Note * 31 35 33 27 Restricted own access to protect self 10Note * 7Note * 10Note * 11 17 14 20 17 Deleted online account because of harassment 3 2 3 2 4 4 5 4 Note * significant difference (p < 0.05) between men and women for a particular age group. Return to note * referrer Note: Due to sample size limitations, the non-binary category is not releasable. Source: Statistics Canada, Survey of Safety in Public and Private Spaces (SSPPS), 2018. Limiting online activities as a response to cybervictimization is not surprising. Results from the GSS show a strong association between being victimized online and taking other precautions for one’s safety beyond unplugging from the internet. For example, when asked if they do certain things routinely to make themselves safer from crime, young adults aged 18 to 29 who had been cybervictimized in the past year were much more likely to say that they carry something for defense, such as a whistle, a knife or pepper spray, compared with young adults who had not experienced online victimization (12% versus 3%).  Cybervictimization associated with other forms of victimization among young people There is often a strong association between different types of in-person victimization.Note  This is also the case for cybervictimization.  Young adults who have been cybervictimized were more likely to be victims of fraud, more likely to have been stalked and also more likely to have been physically or sexually assaulted in the past year. Data from the GSS showed a connection between cybervictimization and risk of fraud. For example, 17% of young adults who had been cybervictimized in the past year said that they had also been a victim of fraud in the past year, more than four times higher than young adults who had not experienced cybervictimization (4%).Note  Cybervictimization is also highly correlated with other forms of victimization and behaviour. For instance, information from the SSPPS shows that young adults who have experienced unwanted behaviours in public that made them feel unsafe or uncomfortable had also been victims of online harassment and bullying in the past year.Note  About 45% of young adults who had experienced such behaviours had been cybervictimized in the past year, compared with 11% who had not experienced such behaviours (Table 6). The relationship between online victimization and unwanted behaviours in public appears to be similar for men and women. In particular, 41% of men and 46% of women who had experienced unwanted behaviours in public had also been cybervictimized. This compares to around 10% of men and women who had not experienced such incidents.Note  Cybervictimization may manifest itself in real-world public encounters because victims of online abuse may be highly sensitized to possibly unsafe or uncomfortable situations in public, especially in instances where the identity of the online abuser is not known. For all they know, the person making them feel unsafe or uncomfortable in public might be the very same person harassing them online.  Table 6 Prevalence of cybervictimization among young people aged 18 to 29, by experiences of in-person victimization in the past 12 months and gender, 2018 Table summary This table displays the results of Prevalence of cybervictimization among young people aged 18 to 29. The information is grouped by Gender (appearing as row headers), Felt unsafe or uncomfortable in public, Stalked and Experienced physical/sexual assault (appearing as column headers). Gender Felt unsafe or uncomfortable in publicTable 6 Note 1 StalkedTable 6 Note 2 Experienced physical/sexual assault Table 6 Note 3 Yes (ref.) No Yes (ref.) No None (ref.) One incident Two or more incidents percentage Total young people aged 18 to 29 45 10Note * 67 22Note * 21 54Note * 64Note * Men 41 10Note * 57 16Note * 15 44Note * 54Note * Women 46 11Note * 72 29Note * 27 62Note * 70Note * Note * significantly different from reference category (ref.) (p < 0.05) Return to note * referrer Note 1 Respondents were asked: Thinking about time you spent in public spaces in the past 12 months, how many times has anyone made you feel unsafe or uncomfortable by doing any of the following? Making unwanted physical contact, such as hugs or shoulder rubs or getting too close to you in a sexual manner. Indecently exposing themselves to you or inappropriately displaying any body parts to you in a sexual manner. Making unwanted comments that you do not look or act like a [man/woman/man or woman] is supposed to look or act. Making unwanted comments about your sexual orientation or assumed sexual orientation. Giving you unwanted sexual attention, such as inappropriate comments, whistles, calls, suggestive looks, gestures, or body language. Return to note 1 referrer Note 2 Respondents were asked: In the past 12 months, have you been stalked, that is, have you been the subject of repeated and unwanted attention, by someone other than a current or former spouse, common-law partner or dating partner. Return to note 2 referrer Note 3 Respondents are asked if the following incidents happened to them in the past 12 months (excluding acts committed by a current or previous spouse, common-law partner or dating partner): a. been attacked, b. anyone threatened to hit or attack you or threatened you with a weapon, c. has someone touch them in a sexual way against their will, d. has someone forced or attempted to force them into unwanted sexual activity by threatening them, holding them down or hurting them in some way, e. has anyone subjected you to a sexual activity to which you were not able to consent, that is, were you drugged, intoxicated, manipulated or forced in other ways than physically. Respondents are then asked if these things happened in one incident or more than one incident. Return to note 3 referrer Note: Due to sample size limitations, the non-binary category is not releasable. Source: Statistics Canada, Survey of Safety in Public and Private Spaces, 2018. According to the SSPPS, young adults who have been stalked in the past year have also been victims of online bullying and harassment in the past year.Note   For instance, 67% of young adults who stated that they had been stalked in the past year also stated that they had been cybervictimized in the past 12 months, three times higher than young adults who had not been stalked in the past year (22%). The relationship is similar for both men and women, with over 72% of women and 57% of men who had been stalked also stating that they had been cybervictimized. Being a victim of stalking is more prevalent among women in general, as 32% of women stated they had been stalked, significantly greater than the 17% of men who stated that they had been stalked.Note  A connection between online victimization and physical and sexual assaults also exists.Note  Overall, among victims of physical and sexual assault, the proportion that said they were also cybervictimized was very high. In 2018, 54% of physical or sexual assault victims reported being cybervictimized, climbing to 64% if young people had experienced two or more incidents of physical or sexual assault. The strong association is present for both young adult men and women, with consistently higher prevalence for women regardless of number of physical or sexual assaults. Perpetrators of online victimization are most often men and known to the victim An important area of research on cybervictimization that is often lacking relates to the gender of the offender and the relationship between the offender and the victim. Using the SSPPS, it is possible to understand the characteristics of the perpetrator in cybervictimization incidents (Chart 5). About two-thirds (64%) of young adults who had been cybervictimized stated that a man (or men) was responsible, while 19% said it was a woman (or women), 4% said that it was both, and 13% did not know the gender of their online attacker. This general pattern was similar regardless of gender of the victim, though for women victims, the perpetrator was much more likely to be a man (or men). For instance, 73% of women who had been victimized stated that their offender(s) was (were) a man/men, while 13% stated that it was a woman or women. In contrast, 45% of men said that it was a man (or men) that was responsible, while 31% stated that their offender(s) was a woman or women. At the same time, 19% of men and 11% of women did not know the gender of their online offender.Note  Data table for Chart 5  Data table for chart 5 Table summary This table displays the results of Data table for chart 5 Total, Gender of victim, Male victim (ref.) and Female victim, calculated using percentage units of measure (appearing as column headers). Total Gender of victim Male victim (ref.) Female victim percentage Male offender 64 45 73Note * Female offender 19 31 13Note * Both male and female offenders 4 6 3 Don’t know 13 19 11 Note * significantly different from reference category (ref.) (p < 0.05) Return to note * referrer Note: Due to sample size limitations, the non-binary category is not releasable. Source: Survey of Safety in Public and Private Spaces (SSPPS), 2018. The SSPPS also has information on the relationship of the offender and victim for the most serious incident of inappropriate online behaviour (combining single and multiple offender incidents). The most common offenders, at 55%, were offenders known to the victim, including friends, neighbours, acquaintances, teachers, professors, managers, co-workers, and classmates, as well as family members or current or former partners including spouses, common-law partners or dating partners. Meanwhile, 45% were offenders who were not known to the victim, including strangers or persons known by sight only. Thus, results show that the perpetrator was known to the victim in more than 50% of cases, regardless of the gender of the victim. Based on the SSPPS, 53% of men victims and 56% of women victims knew the person victimizing them online.  Conclusion Internet and smart phone use among youth and young adults in Canada is at a very high level, particularly since the pandemic. It is a tether to the outside world, allowing communication with one another, expanding knowledge, and being entertained. It is this importance and pervasiveness that makes it particularly challenging when there are risks of online victimization. A goal of this study was to highlight the current state of cybervictimization among Canadian youth and young adults aged 12 to 29. Four separate surveys were used to paint a picture of who is most at risk of cybervictimization, how online and offline behaviours may contribute to this association, and the association with other forms of victimization. Based on the analysis of the data, there are five key messages related to cybervictimization of youth and young adults: Not all youth and young adults experience cybervictimization equally.  Those that are most vulnerable to online harm were youth aged 15 -17 with same-gender attraction or, more broadly, LGBTQ2 young adults aged 18-29, youth and young adults with a disability, Indigenous youth, and young adult women when the cybervictimization measures were more of a sexual nature. Cybervictimization increases during adolescence and remains high among young adults in their early 20s. The risk drops somewhat as young adults approach age 30. This age pattern was found using two surveys that allowed for prevalence estimates by smaller age groupings (CHSCY and SSPPS). The prevalence estimates were not completely comparable across ages 12 to 29, but the pattern remained. Greater internet use, as well as using devices at bedtime and upon waking up was associated with being cybervictimized. Potential buffers of this connection especially for the teenage population (ages 12-17) were not using devices at mealtime, having parents who often know what their teens were doing online, and having less difficulty making friends. Taking action to make themselves safer was seen for youth and young adults who have been cybervictimized. This included blocking people online, restricting their own internet access, and carrying something for protection when offline. Experiencing other forms of victimization was more common among those who were cybervictimized. This includes being stalked and being physically or sexually assaulted, and experiencing other types of unwanted behaviours in public. The benefits of the internet for the youth and young adult population are numerous, however, as this study has illustrated, there are certain risks associated with the anonymity and widespread exposure to many unknown factors while online. Knowing the socio-demographic factors and internet use patterns associated with cybervictimization can help tailor interventions to better prevent and respond to cybervictimization. Future analytical work should continue to better understand online victimization faced by youth and young adults. Darcy Hango is a senior researcher with Insights on Canadian Society at Statistics Canada. Start of text box Data sources, methods and definitions Four surveys are used in this paper: (1) Canadian Health Survey on Children and Youth (CHSCY), 2019; (2) Canadian Internet Use Survey (CIUS),2018-2019; (3) General Social Survey GSS on Victimization (cycle 34): 2019-2020, and (4) Survey of Safety in Public and Private Spaces (SSPPS): 2018. The analysis is split into 2 separate broad age groups: ages 12 to 17 is examined using the CHSCY, and ages 18 to 29 is examined using the CIUS, the GSS, and the SSPPS. There remain data gaps in cybervictimization. For instance, there is a need for more information on the perpetrators of cybervictimization. This may involve adding more follow-up questions on existing surveys, whether it is CHSCY or victimization surveys. Moreover, information on specific types of social media platforms, such as social networking sites, image-based sites and discussion forums would be helpful to pinpoint which applications are seeing the most incidents of cyberbullying. As internet use and potential harm is not restricted to people aged 12 and older, it would be critical to understand the prevalence and nature of cybervictimization for the youngest Canadians, those under the age of 12, recognizing that survey adaptation and ethical considerations would need to be considered. Lastly, certain population subgroups are more at risk of cybervictimization than others and the research for this study revealed that an inadequate sample size for some groups, such as Indigenous youth and young adults, as well as sexually and gender diverse youth and young adults, limits the ability to understand the dimensions of the issue for these populations. As such, it is necessary to consider oversampling certain groups to produce meaningful cybervictimization estimates. An additional concern, overarching many of the above issues, is the “digital divide”, particularly affecting communities in rural areas and the north. Recent statistics reveal that in 2017, 99% of Canadians had access to long term evolution (LTE) networks, though this was true for only about 63% of Northern residents.Note  The disparity in connectivity may have an adverse impact especially for the Indigenous population in terms of not only Indigenous youths’ underrepresentation in Canadian data on cyberbullying, but also digital literacy initiatives in Northern or in First Nations and Inuit communities. End of text box                                 Start of text box Cyberbullying content across four Statistics Canada surveys 1. Canadian Health Survey on Children and Youth (CHSCY), youth aged 12 to 17 years, 2019 (data collection period between February and August 2019) During the past 12 months, how often did the following things happen to you? Someone posted hurtful information about you on the Internet Someone threatened or insulted you through email, instant messaging, text messaging or an online game Someone purposefully excluded you from an online community 2. Canadian Internet Use Survey (CIUS), people aged 15 years and older, 2018-2019 (data collection period between November 2018 and March 2019) Universe: Internet users in the past 3 months During the past 12 months, have you felt that you were a victim of any of the following incidents on the Internet? Did you experience? Bullying, harassment, discrimination Misuse of personal pictures, videos or other content Other incident 3. General Social Survey GSS on Victimization (cycle 34), people aged 15 years and older, 2019-2020 (data collection period between April 2019 and March 2020) Universe: Internet users in the past 12 months In the past 5 years, have you experienced any of the following types of cyber-stalking or cyber-bullying? This can be narrowed down to past year by the following question: “You indicated that you experienced some type of cyber-stalking or cyber-bullying in the past 5 years. Did any occur in the past 12 months?” You received threatening or aggressive emails or instant messages where you were the only recipient You were the target of threatening or aggressive comments spread through group emails, instant messages or postings on Internet sites Someone sent out or posted pictures that embarrassed you or made you feel threatened Someone used your identity to send out or post embarrassing or threatening information Any other type 4. Survey of Safety in Public and Private Spaces (SSPPS), people aged 15 years and older, 2018 (data collection period between April and December 2018) Universe: Internet users in the past 12 months Indicate how many times in the past 12 months you have experienced each of the following behaviours while online. You received any threatening or aggressive emails, social media messages, or text messages where you were the only recipient You were the target of threatening or aggressive comments spread through group emails, group text messages or postings on social media Someone posted or distributed, or threatened to post or distribute, intimate or sexually explicit videos or images of you without your consent Someone pressured you to send, share, or post sexually suggestive or explicit images or messages Someone sent you sexually suggestive or explicit images or messages when you did not want to receive them End of text box Notes Note Internet-use Typology of Canadians: Online Activities and Digital Skills Return to note  referrer Note See Bilodeau, Kehler, and Minnema 2021 Return to note  referrer Note Canadians’ assessments of social media in their lives Return to note  referrer Note Other concerns as a result of increased internet and/or smart phone usage such as lack of sleep and anxiety are important but are left for other research. A recent example is an article by Schimmele et al 2021. Return to note  referrer Note Because there are already very comprehensive reviews of the prevalence and consequences of cybervictimization in Canada and abroad this is not gone into detail here. Readers should consult Zych et al 2019 ; Field 2018 for reviews, and Kim et al 2017; Hango 2016; and Holfeld and Leadbeater 2015 for examples of recent research using Canadian data. Return to note  referrer Note See Field, 2018 Return to note  referrer Note All differences are significant at p <0.05 level, unless otherwise noted. Return to note  referrer Note Questions on sexual attraction were only asked for youth aged 15 to 17. Return to note  referrer Note The Indigenous population covered in this paper are from all provinces and territories. In both the CHSCY and the SSPPS samples were selected from across Canada. The samples do not include youth and young adults living on First Nations reserves and other Aboriginal settlements. Return to note  referrer Note See Perreault 2022 for recent research focused on exploring victimization trends among the Indigenous population in Canada. Return to note  referrer Note The sample size for Inuit youth was too small to detect significant differences between groups. Return to note  referrer Note Wavrock, Schellenberg, and Schimmele 2021. Return to note  referrer Note The analysis by age is not shown but is available upon request. Return to note  referrer Note Sample size was not sufficient to conduct analyses in this section separately for the gender diverse population. Return to note  referrer Note See MediaSmarts 2022. Return to note  referrer Note See for example, research by Bollmer et al 2005 and Kendrick et al 2012. Return to note  referrer Note Due to sample size limitations, analysis does not include gender diverse youth. Return to note  referrer Note Due to sample size limitations, analysis does not include gender diverse youth. Return to note  referrer Note Due to sample size limitations, analysis does not include gender diverse young adults. Return to note  referrer Note Among ages 12 to 17, there were no differences between boys and girls on cybervictimization because none of the measures explicitly asked whether the bullying was of a sexual nature. Some additional analysis on the SSPPS on ages 15 to 17 (available upon request), showed that teen girls did report a significantly higher probability than teen boys of experiencing the three cybervictimization forms that explicitly tapped into the sexualized nature of the abuse. There were no gender differences on the two measures that only asked about aggressive cybervictimization. Return to note  referrer Note Based on the SSPPS derived variable of ‘LGBTQ2’, which uses responses to sex at birth, gender, and sexual orientation. Return to note  referrer Note This aligns with other research on violent victimization among the LGBTQ population. See Jaffray 2020; Cotter and Savage 2019. Return to note  referrer Note In the GSS, LGBTQ2 young adults also reported a significantly higher probability of experiencing cybervictimization in the form of pictures that embarrassed or threatened them (4.4% versus 1%). Return to note  referrer Note These estimates are not presented in a table but are available upon request. Return to note  referrer Note The sample size for Inuit young adults was too small to detect significant differences between groups. Return to note  referrer Note A person is defined as having a disability if he or she has one or more of the following types of disability: seeing, hearing, mobility, flexibility, dexterity, pain-related, learning, developmental, memory, mental health-related. Return to note  referrer Note In the GSS, a larger share of young adults with a disability also reported being cybervictimized via aggressive comments through email (4.3% versus 1.1%), and in CIUS, on any of the 3 types of cybervictimization measures (18.1% versus 7%). Return to note  referrer Note These results are not in a table and are available upon request. Based on the global severity score, severity classes were established. Severity scores increase with the number of disability types, the level of difficulty associated with the disability and the frequency of the activity limitation. The name assigned to each class is simply intended to facilitate use of the severity score. It is not a label or judgement concerning the person’s level of disability. The classes should be interpreted as follows: people in class 1 have a less severe disability than people in class 2; the latter have a less severe disability than people in class 3; and so on. For more information on severity scores and classes, please refer to the Canadian Survey on Disability (CSD), 2017: Concepts and Methods Guide. Return to note  referrer Note These proportions are not statistically different from each other due to high sampling variability. Return to note  referrer Note Recall that data from the SSPPS showed that 32% of young women said they were cybervictimized in the past year, compared with 17% of young men. Return to note  referrer Note See examples of some research that examines links between different types of victimization for example see Finkelhor et. al 2011; Turner et. al 2016; Waasdorp and Bradshaw 2015. Return to note  referrer Note Fraud in this case refers to having one’s personal information or account details used to obtain money or buy goods and services, having one’s personal information or account details used to create or access an account, apply for benefits, services or documents, and having been tricked or deceived out of money or goods either in person, by telephone or online. Return to note  referrer Note Respondents were asked: Thinking about time you spent in public spaces in the past 12 months, how many times has anyone made you feel unsafe or uncomfortable by doing any of the following? a. Making unwanted physical contact, such as hugs or shoulder rubs or getting too close to you in a sexual manner, b. Indecently exposing themselves to you or inappropriately displaying any body parts to you in a sexual manner, c. Making unwanted comments that you do not look or act like a (man/woman) is supposed to look or act, d. Making unwanted comments about your sexual orientation or assumed sexual orientation, or e. Giving you unwanted sexual attention, such as inappropriate comments, whistles, calls, suggestive looks, gestures, or body language. Return to note  referrer Note Due to sample size limitations, analysis does not include gender diverse young adults. Return to note  referrer Note Respondents were asked: In the past 12 months, have you been stalked, that is, have you been the subject of repeated and unwanted attention, by someone other than a current or former spouse, common-law partner or dating partner. Return to note  referrer Note These results are not shown in a table but are available upon request. Return to note  referrer Note In the SSPPS, respondents were asked if the following things happened to them in the past 12 months (excluding acts committed by a current or previous spouse, common-law partner or dating partner): a. been attacked, b. anyone threatened to hit or attack them or threatened them with a weapon, c. has someone touch them in a sexual way against their will, d. has someone forced or attempted to force them into unwanted sexual activity by threatening them, holding them down or hurting them in some way, e. has anyone subjected them to a sexual activity to which they were not able to consent, that is, were they drugged, intoxicated, manipulated or forced in other ways than physically. Respondents are then asked if these things happened in one incident or more than one incident. Return to note  referrer Note Due to sample size limitations, analysis does not include non-binary young adults. Return to note  referrer Note See CRTC Communications Monitoring Report, 2019. Return to note  referrer Related information Related Articles Bullying victimization among sexually and gender diverse youth in Canada Social Media Use, Connections and Relationships in Canadian Adolescents Findings from the 2018 Health Behaviour in School-aged Children (HBSC) Study Data sources Canadian Health Survey on Children and Youth Survey of Safety in Public and Private Spaces General Social Survey - Canadians' Safety Canadian Internet Use Survey Bibliographic references References How to cite this article  More information ISSN: 2291-0840 Note of appreciation Canada owes the success of its statistical system to a long-standing partnership between Statistics Canada, the citizens of Canada, its businesses, governments and other institutions. Accurate and timely statistical information could not be produced without their continued co-operation and goodwill. Standards of service to the public Statistics Canada is committed to serving its clients in a prompt, reliable and courteous manner. To this end, the Agency has developed standards of service which its employees observe in serving its clients. Copyright Published by authority of the Minister responsible for Statistics Canada. © His Majesty the King in Right of Canada as represented by the Minister of Industry, 2023 Use of this publication is governed by the Statistics Canada Open Licence Agreement. Catalogue no. 75-006-x Frequency: Occasional Ottawa Related infographics Cyberbullying among youth in Canada Cybervictimization among young adults in Canada Date modified: 2023-03-15

      security Online harassment

  2. Nov 2025
    1. As a form, fanfictions make intertextuality visible because they rely on readers' ability to see relationships between the fan-writer's stories and the original media sources.

      What many people who brush fan fiction off as irrelevant tend to ignore is the vast understanding of a pre-existing setting needed to contextualize the writings made, as well as the effort and organization required to properly build off of such settings.

    1. Because many young people growing up in a digital world will find their own reasons for becoming literate--reasons that go beyond reading and writing to acquire academic knowledge-it is important to remain open to changes in subject matter learning that will invite and extend the literacy practices they already possess and value.
  3. Oct 2025
  4. Jul 2025
    1. Virtual shopping agent technology combines natural language processing with predictive analytics. This combination allows such systems to understand customer queries in natural languages while predicting future purchasing behaviour. The result is a more intuitive and efficient shopping experience that feels personal and responsive. Intelligent shopping bots represent the most advanced form of these systems. They can handle complex customer interactions, process multiple data points simultaneously, and learn from every interaction.

      Explore how AI agents for online shopping revolutionize with personalization, automation, and smart recommendations reshaping the future of eCommerce.

  5. Jun 2025
  6. May 2025
    1. Welcome to Python Online Compiler!Key features:• Run Python code directly in your browser• Install packages with pip• Share your code with others• Multiple tabs for different files• Light and dark themes

      Say goodbye to Python setup hassles! Code directly in your browser with zero installation needed. Write your code, hit RUN, and see results instantly. Our clean, powerful editor gives you syntax highlighting, multiple tabs, and easy package installation with pip.

      Need to share your work? One click generates a link anyone can use to view and run your code. Switch between light and dark themes, customize your layout, and code Python anywhere, anytime. Try our random code examples to get started quickly.

      Python Online - the simplest way to write, run, and share Python code!

  7. Apr 2025
  8. Mar 2025
    1. Jim Riegert, now in his 70s, remembers what it used to be like. "Back then, typewriters were pretty big. Typewriters and adding machines," he says, referring to desktop calculators. "It got really difficult in the typewriter business about 25 years ago," he says. "The internet was coming on and killing us, too." He runs Typewriters.com and, despite a decline in sales in recent decades, he still shifts four or five electric IBM typewriters every week.
    1. Nate Fischer is a venture capitalist in Dallas whose current projects include a rural real estate development in Tennessee and Kentucky that he has marketed to conservatives. (Mr. Isker has said he planned to move there.) Mr. Fischer has been reading Mr. Renn’s work since around 2019. He asked Mr. Renn to have a drink with him in Manhattan when Mr. Fischer was there taking a weeklong course in “real world risk” organized by Nassim Nicholas Taleb, a thinker both he and Mr. Renn cite frequently.

      Influence of Taleb on a certain flavor of white guy. in America.

  9. Feb 2025
  10. Jan 2025
    1. All product listings should have proper details about the product ingredients, weight, size and nutritional information, helping the user to make an informed decision. Also, make sure the app has high quality images and availability status of the items, for achieving a transparent shopping experience.

      Discover the best grocery shopping apps like Coles for hassle-free online shopping. From top grocery delivery apps to online platforms, explore how these apps simplify grocery shopping with convenience and quick deliveries.

  11. Dec 2024
    1. the basic argument is that anytime people commun together for uh a long enough time things just get weird all the psychological issues start emerging um sociopaths start like messing things up and so it's going to be hard sense making what's happening and what's important if you're in a terrible community

      for - (online) communities - potential devolution of - from - YouTube - situational assessment - Luigi Mangione - - the Stoa

  12. Nov 2024
    1. Para desenhar uma boa e-atividade de aprendizagem, é fundamental definir objetivos claros e específicos, alinhados às metas do curso, e planear etapas detalhadas e sequenciadas, considerando o tempo necessário para a execução. A atividade deve ser adequada aos conteúdos e ao formato digital, utilizando ferramentas acessíveis e tecnologicamente apropriadas. É importante diversificar as atividades para atender a diferentes estilos de aprendizagem, promovendo a inclusão e a acessibilidade. As e-atividades devem estimular a participação ativa e colaborativa, desenvolvendo competências como pensamento crítico e resolução de problemas. O feedback construtivo é essencial, oferecendo orientações específicas para o aprimoramento dos alunos. As tarefas devem ser motivadoras, ligadas a contextos significativos e práticos, com critérios de avaliação bem definidos e alinhados às competências esperadas. Utilizar modelos estruturados, como os cinco estádios de Gilly Salmon ou a Taxonomia Digital de Bloom, pode ajudar a planear e-atividades progressivas e centradas na construção do conhecimento. Por fim, é necessário integrar a tecnologia e a pedagogia de forma coerente, garantindo uma aprendizagem ativa, significativa e alinhada às exigências do mundo digital.

    1. The seamless running of an eCommerce company depends on effective control of stock levels. Through demand prediction, stock level optimization, and reordering process automation, artificial intelligence streamlines inventory control. AI-driven inventory systems examine consumer preferences, seasonal variations, and sales trends to guarantee that you always have the appropriate level of supply.

      Transform your online store with 8 AI-driven WooCommerce solutions to optimize operations, personalize customer experiences, and boost sales. From AI-based inventory management to predictive analytics and chatbots, these tools ensure scalability and efficiency. Discover the future of AI-powered WooCommerce stores for enhanced growth and seamless user engagement.

    1. Advanced analytics Arc XP offers comprehensive analytics that enables companies to better target content and commerce for higher conversion rates, thereby understanding their audience.Although Arc XP Commerce is a great fit for businesses with complicated needs, it comes with high Arc XP pricing and calls for significant technical knowledge to run and maintain. Small and medium-sized companies with limited resources find this less ideal as a result.

      Are you considering WooCommerce or Arc Commerce for your eCommerce site? This post breaks down both platforms, exploring features, integrations, and business-fit to help you make an informed decision. Discover which platform aligns with your business goals, and how each can support growth in the competitive digital market.

  13. Oct 2024
  14. Sep 2024
  15. Aug 2024
  16. Jul 2024
  17. Jun 2024
    1. The public’s attitudes diverge in similarways on some of the more severe behaviors in the scenario. Most prominently, 85% of Americansthink that Julie experiences online harassment when she begins to receive vulgar messages abouther looks and sexual behavior. But substantially fewer (although still a majority at 66%) think thatthe social media platform has an obligation to step in and address that behavior.

      So this explains it more people see it as harassment, but not all think the platform should step in, but they should if the student asks them to.

      So should we have a policy stating students cannot copy discussion board entries outside of the LMS without student permissions

    2. The public has a higher threshold for behaviors thatconstitute “online harassment” than for behaviors that necessitate a responsefrom social media platforms

      Not sure I completely understand this, I think if a post is shared publicly without the original people in the incident being asked, there should be grounds for a Civil suit and much of this would stop.

  18. May 2024
    1. As in traditional classroom presentations, there can alsobe requirements for other students to view, respond, andask questions of the presenter. A typical setup mightinclude a requirement that the presenting student postthe presentation on the weekend, that the class view thepresentation during the first half of the week, and post acomment or question by Wednesday. The presenter studentwould then need to return later in the week to respond tocomments and questions.

      Way to make presentations easier and allow for interactive discussions in class.

    2. sample syllabus communication and engagementpolicy for an asynchronous online course, whichcommunicates an expectation for participation and thefoundation of a course architecture for engagement

      Sample syllabus for communication expectations

    3. face-to-face course syllabus does, butit must also set communication policies and expectationsfor online engagement as well as a course schedule thatoutlines the frequent and meaningful engagement andreflection required for students.

      syllabus is importing to setup up communication and learning space expectations

    4. we suggest that well-established fundamentalsof online course design and facilitation still need to reachand be accepted by a broader audience within highereducation, and that lingering perceptions about qualitydifferences between face-to-face and online educationsignify a professional development gap—one that can bebridged with training about active learning pedagogy andmodels for active learning in online asynchronous classes

      problem is a professional develop gap

  19. inst-fs-iad-prod.inscloudgate.net inst-fs-iad-prod.inscloudgate.net
    1. Online educators who use discussion boards successfully estimatethat their interaction with students can be as much as three timesthe interaction with face-to-face students, and that peer-to-peerinteraction is even many times more than that.

      interesting -= this could be a reason for introducing discussions in face-to-face courses as well

    1. Garrison, Anderson & Archer (2001) define teaching presence as “the design, facilitation, and direction of cognitive and social processes for the purpose of realizing personally meaningful and educationally worthwhile learning outcomes.”

      teaching presence design facilitation direction of cognitive and social processes for the purpose of realizing personally meaningful and educationally worthwhile learning outcomes

    1. In humanized online courses, positive instructor-student relationships are prioritized and serve “as the connective tissue between students, engagement, and rigor” (Pacansky-Brock et al., 2020, p. 2). In any learning modality, human connection is the antidote for the emotional disruption that prevents many students from performing to their full potential and in online courses, creating that connection is even more important

      connective tissue between students, engagement and rigor is an interesting reason for not using AI graders etc all the time, which are getting enticed to do.

    1. robust theme in the reasons given for preferringface-to-face delivery formats is the perceived lack of interactionwith an instructor in online courses.This was evident in statementsthat suggested that students believe they would have to “teachthemselves”, or that they would prefer a course taught by a “hu-man” or a “real teacher”.

      need for instructor interaction

    2. Thus, being in the physical presence ofothers might give the illusion of interaction in face-to-face classeswhich presents a challenge for online learning. It is possible thatthe interaction to which students are referring involves mostlythe physical aspect of human interaction. Electronic interaction, nomatter how frequent, may not be filling that aspect of the students’needs for social interaction

      physical presence with others - illusion of interaction

  20. Mar 2024
    1. ‍ Benefits of having an online cricket ID

      In the digital age, having an online cricket ID is essential for any cricket enthusiast. With an online cricket ID, you can access a plethora of features and services that enhance your cricket experience. Whether you're a passionate fan or a casual viewer, having an online cricket ID opens up a whole new world of possibilities.

      One of the key benefits of having an online cricket ID is the ability to access live match streaming. With Virat777, you can watch your favorite cricket matches from the comfort of your own home. No more relying on unreliable streams or missing out on the action. With just a few clicks, you can tune in to live matches and never miss a moment of the game.

      Another advantage of having an online cricket ID is the access to comprehensive match statistics. Virat777 provides detailed match analytics, allowing you to delve deep into the numbers and gain valuable insights. Whether you're a fantasy cricket player looking for player stats or a cricket enthusiast interested in team performance, Virat777 has you covered. Stay up-to-date with the latest trends and make informed decisions with the help of our comprehensive match statistics. Creating an online cricket ID also grants you access to exclusive content curated just for you. Virat777 offers a range of articles, videos, and interviews that provide in-depth analysis and behind-the-scenes insights. Immerse yourself in the world of cricket and get access to content that is not available anywhere else. With Virat777, you can stay connected to the game and indulge in your passion for cricket.

      Features of Virat777

      Virat777 offers a wide range of features that make it the ultimate destination for cricket enthusiasts. Our platform is designed to provide a seamless and engaging cricket experience, catering to the needs of both die-hard fans and casual viewers.

      One of the standout features of Virat777 is the personalized cricket ID. By creating a cricket ID, you can tailor your experience to suit your preferences. Keep track of your favorite teams and players, receive match notifications, and access personalized content recommendations. With our innovative technology, your cricket ID becomes your gateway to a world of cricketing excitement.

      Our user-friendly interface ensures that navigating the platform is a breeze. Whether you're a tech-savvy individual or someone who is new to online platforms, Virat777 is designed to be intuitive and easy to use. Find what you're looking for with just a few clicks and enjoy a seamless browsing experience.

      Virat777 also provides a reliable and high-quality streaming service. We understand the frustration of buffering and interrupted streams, which is why we have invested in state-of-the-art technology to ensure smooth and uninterrupted streaming. With Virat777, you can enjoy cricket matches in HD quality, without any lag or interruptions. Immerse yourself in the game and experience cricket like never before.

      How to create an online cricket ID on Virat777

      Creating an online cricket ID on Virat777 is quick and simple. Follow these steps to get started: Visit the Virat777 website and click on the "Sign Up" button. Fill in your details, including your name, email address, and password. Choose a unique username for your cricket ID. Select your favorite teams and players to personalize your cricket ID. Agree to the terms and conditions and click on the "Create ID" button. Congratulations! You now have your own personalized cricket ID on Virat777.

      Once you have created your cricket ID, you can start exploring the various features and services offered by Virat777. Customize your preferences, participate in quizzes and contests, and engage with the cricketing community. Your cricket ID is your passport to a world of cricketing excitement.

      Tips and strategies for using Virat777 effectively

      To make the most of your Virat777 experience, here are some tips and strategies:

      Customize your cricket ID: Take the time to personalize your cricket ID by selecting your favorite teams and players. This will ensure that you receive relevant updates and recommendations tailored to your preferences.

      Explore the content: Virat777 offers a wealth of exclusive content, including articles, videos, and interviews. Explore the content library and stay updated with the latest news and insights from the cricketing world.

      Participate in quizzes and contests: Test your cricket knowledge and challenge yourself by participating in quizzes and contests on Virat777. Not only will you have fun, but you'll also have the chance to win exciting prizes.

      Engage with the community: Virat777 has a vibrant community of cricket enthusiasts. Join the conversation, share your thoughts, and connect with fellow fans. Engaging with the community adds another layer of enjoyment to your cricketing experience.

      Popular cricket tournaments and leagues available on Virat777

      Virat777 offers a wide range of cricket tournaments and leagues for you to enjoy. From international fixtures to domestic tournaments, you'll find it all on our platform. Here are some of the popular cricket tournaments and leagues available on Virat777:

      ICC Cricket World Cup: The pinnacle of international cricket, the ICC Cricket World Cup brings together the best teams from around the world. Experience the thrill of watching the top cricketing nations battle it out for the coveted trophy.

      Indian Premier League (IPL): The IPL is one of the most popular domestic T20 leagues in the world. With star-studded teams and exciting matches, the IPL offers non-stop entertainment for cricket fans.

      Big Bash League (BBL): The BBL is Australia's premier T20 competition, featuring top domestic and international players. Watch the high-octane action as teams compete for glory in this thrilling tournament.

      Pakistan Super League (PSL): The PSL is the premier T20 league in Pakistan, showcasing the best talent from the country and around the world. Experience the passion and excitement of Pakistani cricket with the PSL.

      Comparison with other online cricket ID providers While there are several online cricket ID providers available, Virat777 stands out from the crowd. Here's how Virat777 compares to other platforms: Streaming quality: Virat777 offers high-quality streaming with minimal buffering, ensuring a smooth and uninterrupted viewing experience. Some other platforms may struggle with streaming quality, leading to frustration for users.

      Comprehensive match statistics: Virat777 provides detailed match analytics, giving users access to a wealth of information. Other platforms may offer limited statistics or lack in-depth analysis.

      Personalized content: Virat777 curates personalized content based on user preferences, ensuring that users receive recommendations tailored to their interests. This level of customization may be lacking in other platforms.

      Community engagement: Virat777 has a vibrant community of cricket enthusiasts, fostering engagement and interaction among users. Other platforms may not have the same level of community engagement.

      Conclusion

      Why Virat777 is the best choice for online cricket Fans

      When it comes to online cricket ID provider, Virat777 is the clear winner. With its wide range of features, user-friendly interface, and commitment to delivering a top-quality cricket experience, Virat777 is the ultimate destination for cricket enthusiasts. Create your cricket ID today and elevate your love for the game at Virat777.

    1. Facebook marketplace, set location in various regions. (Ymmv)Ebay (flooded with junk, diamonds in the rough are either overpriced or seller wants high shipping)Auctionninja.com (like shopgoodwill, but higher quality items on average and higher final bids on interesting items)Hibid.com (I've gotten a thing or two here)Estatesales.net (I've gotten good deals here)Estatesales.org (usually redirects to respective company sites to bid there)Shopgoodwill.com (hard to win bids on interesting items)Goodwillfinds.com (the higher end/rarer items they receive go here, so higher prices)Craigslist (usually baren of typewriters)Kijiji (I don't find much that's both interesting and feasible to ship)Etsy (meh, overpriced)
  21. Feb 2024
  22. Jan 2024
  23. Dec 2023
    1. Are you two serious? Instead of advocating to fix this bug you go out of your way to post another bug report to advocate the devs to dig in their heels?! How about standardizing some devastating needed questions in the technology industry: 1. How does this help productive members of society? 2. Does this serve a useful purpose? 3. Should I be doing this? 4. Have I had a full, non-interrupted, rational conversation with multiple people who disagrees to help determine if I have objectively determined my answers to the first three questions?
  24. Nov 2023
    1. 36% of Salesforce customers that have bought other companies’ cloud products – like Service Cloud, Sales or Marketing Cloud – have also purchased Community Cloud. In addition to that, 21% of respondents intend to purchase Community Cloud in the very near future. If this is true, more than 50% of the most active Salesforce customers will use Community Cloud actively for their business needs very soon. And all of that within two years of the product launch!

      These numbers suggest a growing preference for Community Cloud among Salesforce's most active user base, so that underscores a substantial opportunity for businesses to enhance their Salesforce experience through Community Cloud integration.

    1. Posted byu/[deleted]3 years agoArchivedHow do you politely tell someone they’re breathing heavily into their microphone?

      This is a problem with one new participant of a session I take part in regularly. I have been too polite to say anything, but the breathing is constant and loud. I am sure everyone is annoyed but no-one wants to be the bad guy. I wish the meeting's host would do everyone a favor and say something or mute the offender, thus creating a less distracting environment for all.

      When people aren't aware of basic mic etiquette and don't develop the habit of turning off their mic except when talking, this happens. Reminding people to turn off mic or enforcing it is in my opinion squarely the host's responsibility.

      I think those who participate in online meetings (this means many of us) should develop greater self-awareness and learn proper online etiquette.

  25. Oct 2023
    1. https://udenver.zoom.us/meeting/register/tZcuceuspzkuE9VomnEaGva1HH1ra_iS4Eua?ref=jessestommel.com#/registration

      Some related ideas that are suggesting some sort of thesis for improving the idea of ungrading: - We measure the things we care about. - In Education, we care about learning and understanding, but measuring these outside of testing and evaluation is difficult at best (therefor ungrading). - No one cares about your GPA six months after you graduate. - Somehow we've tied up evaluations and grades into the toxic capitalism and competition within US culture. Some of this is tied into educational movements related to Frederick Winslow Taylor and Harvards Eliot. - Hierarchies instituted by the Great Chain of Being have confounded our educational process.

  26. Sep 2023
    1. The “major” blues scale Some improvisers find it helpful to think of a major blues scale. The difference between a major and minor pentatonic scale is identical to the difference between the major and minor blues scale: the major blues scale is a rotation of the blues scale of its relative minor. Begin the blues scale on me (↓^3)(↓3^)(\downarrow\hat3), and you will get a blues scale for the relative major. These relationships are summarized in Example 5
  27. Aug 2023
    1. We are already seeing the emergence of ‘tech-free’ camps and vacation packages. Experiencing life ‘offline’ will become a generational goal, much like the Millennial generation introduced ride sharing and home sharing. Ironically, it will be technology that enables this trend, and premiums will be paid for uninterrupted time to focus or to simply enjoy being alive. This may also indicate a new kind of disparity between economic strata, with the more-wealthy affording privacy, peace and quiet while the lower strata remain fodder for 24/7 social media aggregators and botnets.
      • for: futures, digital futures, online vs offline role reversal, inequality
      • quote
      • paraphrase
        • We are already seeing the emergence of
          • ‘tech-free’ camps and
          • ' tech-free' vacation packages
        • Experiencing life ‘offline’ will become a generational goal,
          • much like the Millennial generation introduced ride sharing and home sharing.
        • Ironically, it will be technology that enables this trend, and premiums will be paid for uninterrupted time to focus or to simply enjoy being alive.
        • This may also indicate a new kind of disparity between economic strata, with
          • the more-wealthy affording privacy, peace and quiet while
          • the lower strata remain fodder for 24/7 social media aggregators and botnets.
      • author: Sam Adams
        • 24 year veteran of IBM
        • senior AI research scientist, RTI International
    2. We lived in a relatively unregulated digital world until now. It was great until the public realized that a few companies wield too much power today in our lives. We will see significant changes in areas like privacy, data protection, algorithm and architecture design guidelines, and platform accountability, etc. which should reduce the pervasiveness of misinformation, hate and visceral content over the internet.
      • for: quote, quote - Prateek Raj, quote - internet regulation, quote - reducing misinformation, fake news, indyweb - support
      • quote
        • We lived in a relatively unregulated digital world until now.
        • It was great until the public realized that a few companies wield too much power today in our lives.
        • We will see significant changes in areas like
          • privacy,
          • data protection,
          • algorithm and
          • architecture design guidelines, and
          • platform accountability, etc.
        • which should reduce the pervasiveness of
          • misinformation,
          • hate and visceral content
        • over the internet.
        • These steps will also reduce the power wielded by digital giants.
        • Beyond these immediate effects, it is difficult to say if these social innovations will create a more participative and healthy society.
        • These broader effects are driven by deeper underlying factors, like
          • history,
          • diversity,
          • cohesiveness and
          • social capital, and also
          • political climate and
          • institutions.
        • In other words,
          • just as digital world is shaping the physical world,
          • physical world shapes our digital world as well.
      • author: Prateek Raj
        • assistant professor in strategy, Indian Institute of Management, Bangalore
    3. Our first attempts at building community online have had both good and bad outcomes. We know them all. But would we have expected otherwise? We are new at digital communities and are inventing them as we move forward. Of course we aren’t going to get it right the first time. But the key question is whether these technologies help us form social bonds or not. Anyone who has posted a question in a forum and received an answer from a stranger knows firsthand that they bring us together.
      • for: quote, quote - Byron Reese, quote - digital communities, quote - online communities, indyweb - support
      • quote
        • Our first attempts at building community online have had both good and bad outcomes.
        • We know them all. But would we have expected otherwise?
        • We are new at digital communities and are inventing them as we move forward.
        • Of course we aren’t going to get it right the first time. But the key question is whether these technologies help us form social bonds or not.
        • Anyone who has posted a question in a forum and received an answer from a stranger knows firsthand that they bring us together.
      • author: Byron Reese
        • futurist
        • author of "The Fourth Age: Smart Robots, Conscious Computers and the Future of Humanity"
  28. Jul 2023
  29. Jun 2023
    1. One of my favorite ways that creative people communicate is by “working with their garage door up,” to riff on a passage from Robin Sloan (below). This is the opposite of the Twitter account which mostly posts announcements of finished work: it’s Screenshot Saturday; it’s giving a lecture about the problems you’re pondering in the shower; it’s thinking out loud about the ways in which your project doesn’t work at all. It’s so much of Twitch. I want to see the process. I want to see you trim the artichoke. I want to see you choose the color palette. Anti-marketing.

      other things that came to mind:

      • social/collective annotation like Hypothesis
      • publishing notes online through digital gardens, etc
      • online journaling
  30. May 2023
  31. Apr 2023
    1. Twitter is a neat illustration of the problem with benevolent dictatorships: they work well, but fail badly. Because they are property — not protocols — they can change hands, and overnight, you get a new, malevolent dictator who wants to retool the system for extraction, rather than collaboration.

      Benevolent dictatorships: work well; fail badly

      Twitter is the example listed here. But I wonder about benevolent dictatorships in open source. One example: does Linus have a sound succession plan for Linux? (Can such a succession plan even be tested and adjusted?)

  32. Mar 2023
    1. Wesentlich gefördert durch die Deutsche Forschungsgemeinschaft, wurde in den Jahren 1997 und 1998 das gesamte Zettelarchiv des Wörterbuches der ägyptischen Sprache, insgesamt 1,5 Millionen Blätter, verfilmt und digitalisiert. Dadurch wurde dieses einmalige Archiv auch erstmals gesichert.

      With support from the German Research Foundation, the 1.5 million sheets of the Wörterbuch der ägyptischen Sprache began to be digitized and put online in 1997.

    1. Fortunately, we found RingCaptcha (https://ringcaptcha.com), which has a the 'starter plan' that offers free 500 OTP monthly. Just a small plug for them for providing freemium service; they are highly reliable because they are integrated with all major global, and regional providers, e.g., Twilio, Nexmo, Infobip, MessageBird, etc., and send your OTP through the best provider/route based on country/phone carrier, and can auto fallback to alternative paths. This means you just need to integrate with RingCaptcha, without the headache of deciding which SMS/voice OTP provider has best combination of price and reliability, which is a real headache when you are sending OTP world-wide.
  33. Feb 2023
  34. Jan 2023
    1. 个人学习可能取决于他人行为的主张突出了将学习环境视为一个涉及多个互动参与者的系统的重要性
    1. Richter, Tonio Sebastian. “Whatever in the Coptic Language Is Not Greek, Can Wholly Be Considered Ancient Egyptian”: Recent Approaches towards an Integrated View of the Egyptian-Coptic Lexicon.” Journal of the Canadian Society for Coptic Studies. Journal de La Société Canadienne Pour Les Études Coptes 9 (2017): 9–32. https://doi.org/10.11588/propylaeumdok.00004673.

      Skimmed for the specifics I was looking for with respect to Gertrud Bauer's zettelkasten.

    2. It is a digitizedcard index containing about 15,000 token attestations of 150 types of Greek prepositions, conjunctions andparticles in Coptic from the whole range of Coptic dialects and types of text, arranged on the basis ofa detailedanalysis of their semantic and syntactic properties. This admirable work was conducted by Gertrud Bauer towhom this article is dedicated, in the 1970s and 1980s under the auspices of Alexander Bbhlig at the University ofTubingen. With Gertrud Bauer’s kind permission to make use of her work, we scanned the originalslips and slotted them into a database replicating the hierarchical structure of the original compilation It is ourpleasure to provide the public with a new lexicographical tool which helps to cope with a particularly difficultand interesting kind of Greek loanwords in Coptic.

      This repeats chunks of prior notes from https://www.geschkult.fu-berlin.de/en/e/ddglc/bauer-db/index.html, but is a better published/referenceable verion of it than just the web page.

      Link to : - https://hypothes.is/a/nrqq3JXqEe2i5TOTRdgmQg - https://hypothes.is/a/uCcDTJXnEe2nZFtz8Aa_LQ

    3. The DDGLC data are not accessible online as of yet. A migration of the database and the data into aMySQL target system is underway and will allow us to offer an online user interface by the end of 2017 Whatwe can already offer now is a by-product of our work, the Gertrud Bauer Zettelkasten Online.6'

      61 Available online at http://research.uni-leipzig.de/ddglc/bauerindex.html. The Work on this parergon to the lexicographical labors of the DDGLC project was funded by the Gertrud-und Alexander Böhlig-Stiftung. The digitization of the original card index was conducted by temporary collaborators and volunteers in the DDGLC project: Jenny Böttinger, Claudia Gamma, Tami Gottschalk, Josephine Hensel, Katrin John, Mariana Jung, Christina Katsikadeli, and Elen Saif. The IT concept and programming were carried out by Katrin John and Maximilian Moller.

      Digitization of Gertrud Bauer's zettelkasten was underway in 2017 to put the data into a MySQL database with the intention of offering it as an online user interface sometime in 2017.

    1. After browsing through a variety of the cards in Gertrud Bauer's Zettelkasten Online it becomes obvious that the collection was created specifically as a paper-based database for search, retrieval, and research. The examples and data within it are much more narrowly circumscribed for a specific use than those of other researchers like Niklas Luhmann whose collection spanned a much broader variety of topics and areas of knowledge.

      This particular use case makes the database nature of zettelkasten more apparent than some others, particularly in modern (post-2013 zettelkasten of a more personal nature).

      I'm reminded here of the use case(s) described by Beatrice Webb in My Apprenticeship for scientific note taking, by which she more broadly meant database creation and use.

    1. In summer 2010, Professor Peter Nagel of Bonn forwarded seven cardboard boxes full of lexicographical slips to the DDGLC office, which had been handed over to him in the early '90s by the late Professor Alexander Böhlig.

      In the 1990s Professor Alexander Böhlig of the University of Tuebingen gave Gertrud Bauer's zettelkasten to Professor Peter Nagel of Bonn. He in turn forwardd the seven cardboard boxes of slips to the Database and Dictionary of Greek Loanwords in Coptic (DDGLC) office for their use.

  35. Dec 2022
    1. Alas, lawmakers are way behind the curve on this, demanding new "online safety" rules that require firms to break E2E and block third-party de-enshittification tools: https://www.openrightsgroup.org/blog/online-safety-made-dangerous/ The online free speech debate is stupid because it has all the wrong focuses: Focusing on improving algorithms, not whether you can even get a feed of things you asked to see; Focusing on whether unsolicited messages are delivered, not whether solicited messages reach their readers; Focusing on algorithmic transparency, not whether you can opt out of the behavioral tracking that produces training data for algorithms; Focusing on whether platforms are policing their users well enough, not whether we can leave a platform without losing our important social, professional and personal ties; Focusing on whether the limits on our speech violate the First Amendment, rather than whether they are unfair: https://doctorow.medium.com/yes-its-censorship-2026c9edc0fd

      This list is particularly good.


      Proper regulation of end to end services would encourage the creation of filtering and other tools which would tend to benefit users rather than benefit the rent seeking of the corporations which own the pipes.

    1. I am not afraid of Charlie because he writes extreme, offensive things online. I am afraid of him because I recognize so many of his proclivities in regular people—the shifting eyes, the formless references and mental absence. If you spend all of your time consuming internet culture, you are consuming stories and myths and personalities that only exist online. To curate your online presence is to give up a piece of your physical self, to live in a simulated universe of your own creation. 
    2. When you meet extremely online people, you would expect them to at least talk. The best internet personalities come off as sharp and funny online and possess a natural digital fluency that conveys a degree of social skill. Even if they are not necessarily normal, you might expect that the strongest posters would be anti-social geniuses—brilliant minds trapped in tortured bodies, released onto the timeline. But in person, they stare straight ahead, pull out their phones, and show you their sharp, funny comments from the internet, then find a way to end the conversation quickly if you don’t have enough mutual followers.
    3. The innovation of Milady was reminding people that you can technically say anything you want online, if you just embrace that none of it matters. There is nothing physically stopping any of us from logging onto Twitter right now and typing pages and pages of literally anything. We decided to make the internet boring. We decided to care. You could inscribe yourself on every wall on the internet and no one can tell you “no.” 
    4. Internet people, or people whose entire identities are wrapped up in their online presence, represent a new direction of culture. You don’t have to live in or know about the real world to be important. You can loop around and around in a tiny online world with its own values and characters, and that is enough.
    5. I work hard to not be online. But I am always drawn back to internet culture because it moves so much faster than real life. In the best moments, people are so much more honest on the internet; a meme can capture a feeling it would take hundreds of words to explain. Being online is the surest way to feel relevant, even if you lose yourself in the process.
    1. What I missed about Mastodon was its very different culture. Ad-driven social media platforms are willing to tolerate monumental volumes of abusive users. They’ve discovered the same thing the Mainstream Media did: negative emotions grip people’s attention harder than positive ones. Hate and fear drives engagement, and engagement drives ad impressions. Mastodon is not an ad-driven platform. There is absolutely zero incentives to let awful people run amok in the name of engagement. The goal of Mastodon is to build a friendly collection of communities, not an attention leeching hate mill. As a result, most Mastodon instance operators have come to a consensus that hate speech shouldn’t be allowed. Already, that sets it far apart from twitter, but wait, there’s more. When it comes to other topics, what is and isn’t allowed is on an instance-by-instance basis, so you can choose your own adventure.

      Attention economy

      Twitter drivers: Hate/fear → Engagement → Impressions → Advertiser money. Since there is no advertising money in Mastodon, it operates on different drivers. Since there is no advertising money, a Mastodon operator isn't driven to get the most impressions. Because there isn't a need to get a high number of impressions, there isn't a need to fuel the hate/fear drivers.

  36. Nov 2022
    1. Donations

      To add some other intermediary services:

      To add a service for groups:

      To add a service that enables fans to support the creators directly and anonymously via microdonations or small donations by pre-charging their Coil account to spend on content streaming or tipping the creators' wallets via a layer containing JS script following the Interledger Protocol proposed to W3C:

      If you want to know more, head to Web Monetization or Community or Explainer

      Disclaimer: I am a recipient of a grant from the Interledger Foundation, so there would be a Conflict of Interest if I edited directly. Plus, sharing on Hypothesis allows other users to chime in.

    1. Hello! Daisy Thomas is my name. I recently earned an Economics Ph.D. degree from the University of Arizona, Tucson, USA. I earned my CSET AND CBEST (Multiple Subjects) teaching certificates on the side and graduated with a 7.75 GPA! I am an expert in Economics, statistics and Money Market. I worked on this Economics Homework Help and for exam purpose take my economics exam website and my client was so impressed with my work and also gave me 9.2/10 ratings. If you want to me to work for you then you can hire me anytime, I will never disappoint you.

    1. Hybrids are not the only possible way of combining remote and in-person: another possibility is to combine modes of participation not at the same time, but in sequence.

      Love the way Deborah moves us to do some modality-shifting here -- to see not just space as a category but time.

    1. I'm pretty much done thinking about "tools for thought". It quickly becomes an infinity of navel gazing and a complete waste of time. It's an easy topic for budding "influencers" because you don't actually need to know anything. All they need is to spend some time with a new bit of software and tell people how they should use it and the next thing you know they're selling an online course via their budding YouTube channel.

      scathing, but broadly true...

    1. Applying the self-determination theory (SDT) to explain student engagement in online learning during the COVID-19 pandemic

      -I will download the full article in EBSCO

      -This article will give me insight into how the self-determination theory helped with student engagement during the online learning they received during covid pandemic.

      -rating 7/10

      Chiu, T. K. (2022). Applying the self-determination theory (SDT) to explain student engagement in online learning during the COVID-19 pandemic. Journal of Research on Technology in Education, 54(sup1), S14-S30.

  37. Oct 2022
    1. Edgerly noted that disinformation spreads through two ways: The use of technology and human nature.Click-based advertising, news aggregation, the process of viral spreading and the ease of creating and altering websites are factors considered under technology.“Facebook and Google prioritize giving people what they ‘want’ to see; advertising revenue (are) based on clicks, not quality,” Edgerly said.She noted that people have the tendency to share news and website links without even reading its content, only its headline. According to her, this perpetuates a phenomenon of viral spreading or easy sharing.There is also the case of human nature involved, where people are “most likely to believe” information that supports their identities and viewpoints, Edgerly cited.“Vivid, emotional information grabs attention (and) leads to more responses (such as) likes, comments, shares. Negative information grabs more attention than (the) positive and is better remembered,” she said.Edgerly added that people tend to believe in information that they see on a regular basis and those shared by their immediate families and friends.

      Spreading misinformation and disinformation is really easy in this day and age because of how accessible information is and how much of it there is on the web. This is explained precisely by Edgerly. Noted in this part of the article, there is a business for the spread of disinformation, particularly in our country. There are people who pay what we call online trolls, to spread disinformation and capitalize on how “chronically online” Filipinos are, among many other factors (i.e., most Filipinos’ information illiteracy due to poverty and lack of educational attainment, how easy it is to interact with content we see online, regardless of its authenticity, etc.). Disinformation also leads to misinformation through word-of-mouth. As stated by Edgerly in this article, “people tend to believe in information… shared by their immediate families and friends”; because of people’s human nature to trust the information shared by their loved ones, if one is not information literate, they will not question their newly received information. Lastly, it most certainly does not help that social media algorithms nowadays rely on what users interact with; the more that a user interacts with a certain information, the more that social media platforms will feed them that information. It does not help because not all social media websites have fact checkers and users can freely spread disinformation if they chose to.

  38. Sep 2022
  39. Aug 2022

    Tags

    Annotators