College of Mass Communication
BULLYING GOES TWEETING: AN EVALUATION ON THE FEATURES OF TWITTER THAT MAKE IT A VENUE FOR CYBER BULLIES
DE GUZMAN, JORDAN CHARLES
MARQUEZ, NARILYN JOY
Submitted to: Prof. Aleth Gayosa
I. INTRODUCTION
A. BACKGROUND OF THE STUDY
Bullying is defined as a specific type of repeated aggression in which the behavior is intended to harm or disturb and there is an imbalance of power (Nansel, et. al., 2001, as cited in Montes &Halterman 2007) or a ‘‘victim–perpetrator’’ dimension (Einarsen and Skogstad, 1996; Keashly, 1998, as cited in LaVan& Martin, 2008) and which are unwanted by the victim, which may be done deliberately, or unconsciously, but clearly cause humiliation, offense, distress, may interfere with job performance, and/or cause an unpleasant working environment (Einarsen, 1999, as cited in Heames& Harvey, 2006). Most of the time, bullying can be categorized into three: physical, emotional, and verbal bullying. Physical bullying usually involves behaviors that intentionally inflict bodily harm like hitting, pushing, punching, and kicking (Wilson, 2011). The second type, emotional bullying, refers to the cases where a person is made to feel isolated and ridiculed largely through mechanism such as teasing, shouting, mocking and ignoring; this is a case where the bullying does not necessarily have a physical component and for that reason it is sometimes harder to spot or rectify (Anonymous, 2006). The last type, verbal bullying, is name-calling, making offensive remarks, or joking about a person 's religion, gender, ethnicity, socioeconomic status, or the way they look (Time for Tolerance, n.d.). However, because of the fast development of technology, a new form of bullying has risen, and it is in the form of cyber bullying. Viewed as an extension of traditional bullying, this kind of bullying is also aggressive and is typically repetitive (Agatston, n.d.). There is still
Bibliography: Anonymous.(2006). Emotional bullying.www.typesofbullying.com. Retrieved September 13, 2011, from http://www.typesofbullying.com/emotional_bullying/emotional_bullying.html Belsey, B Berarducci, L. (2009) Traditional bullying victimization and new cyberbullying behaviors. Retrieved September 25, 2011 from http://etd.ohiolink.edu/send-pdf.cgi/Berarducci%20Lindsay%20R.pdf?dayton1239916629 Bhat, C Brodkin, J. (2010). Facebook vs. twitter: battle for web users intensifies as facebook fends offprivacy complaints. Network World. Retrieved September 28, 2011, from Proquest database Brown, K., Jackson, M., & Cassidy, W Correa, F. (2011, August). Bullying linked to domestic violence, alcohol, drugs. Clinical Psychiatry News, 39.8. Retrieved September 18, 2011, from Academic OneFile database Keith, S Field, E. (n.d.). What is school bullying?.School Angels. Retrieved September 18, 2011, from http://schoolangels.com.au/bm/resources/bullying/what-is-school-bullying-100508.shtml Heames, J Jost, J. Sidanius, J. (2004). Political Psychology: Key Readings. 330 LaVan, H Li, Q. (2007). Bullying in the new playground: research into cyberbullying and cyber victimisation. Australasian Journal of Educational Technology, 23. Retrieved September 18, 2011, from http://www.ascilite.org.au/ajet/ajet23/li.html Lowensohn, J Montes, G. &Halterman, J. (2007). Bullying among children with autism and the influence of comorbidity with adhd: a population-based study. Ambulatory Pediatrics, 7. Retrieved September 16, 2011, from ProQuest database Nash, M Patchin, J. W. &Hinduja, S. (2006). Bullies move beyond the schoolyard: a preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148-169. Patricia, A. (n.d.). Cyber bullying: what’s the big deal?.PureSight. Retrieved September 17, 2011, fromhttp://www.puresight.com/Cyberbullying/cyber-bullying-whats-the-big-deal.html Olweus. (2011). What is Cyber Bullying?.Olweus Bullying Prevention Program. Retrieved September 17, 2011, fromhttp://www.olweus.org/public/cyber_bullying.page Sanders, C., Phye, G. (2004). Bullying: Implications for the Classroom.43-46. Scroeder, S. (2009).Twitter’s security meltdown.Mashable. Retrieved September 19, 2011, from http://mashable.com/2009/07/15/twitter-security-meltdown/ Stagg, J., Sheridan, D., Jones, R., &Speroni, K. (2007). Evaluation of a workplace bullying cognitive rehearsal program in a hospital setting Nursing, 42. Retrieved September 16, 2011, from ProQuest database Sysomos Time for Tolerance.(n.d.)Types of bullying.Time for Tolerance. Retrieved September 15, 2011, fromhttp://library.thinkquest.org/07aug/00117/typesbullying.html Wilson, K. (2011). Traditional bullying. Slide Share. Retrieved September 13, 2011, from http://www.slideshare.net/kwilson11/traditional-bullying-8384408 Wolfe, D. (2011). Security watch.American Banker. Retrieved September 27, 2011, from Academic OneFile database Ybarra, M. L. & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: a comparison of associated youth characteristics