Sheri Bauman, Ph.D.
University of Arizona
Tucson, Arizona, United States
Paper to be presented at the National Coalition Against Bullying National Conference
Melbourne, Australia
November 2 – 4, 2007
Cyberbullying: a Virtual Menace
School bullying attracted considerable attention worldwide as it became apparent that this widespread behavior was neither innocuous nor stamina-building but harmful and insidious. A considerable and growing body of research has examined the prevalence and consequences of bullying, and has evaluated the effectiveness of various strategies for reducing the behavior.
Recently, technology has been added to the arsenal of strategies that can be employed by bullies to harm others. As most middle and high school students in developed countries use the Internet and other technology, such as mobile phones, the potential for hurtful behaviors is great (Keith &
Martin, 2005). Cyberbullying, a term coined by Canadian Bill Belsey, has increased very quickly and educators and researchers are understandably concerned that this problem is growing more rapidly than is educators’ and parents’ ability to respond effectively. This paper will review what is known about cyberbullying and what can be done to prevent it. The issue of using technology by sexual predators seeking victims will not be addressed in this paper.
Definitions
First, it is important to be clear on the meaning of terms to be used in this discussion.
Bullying has been defined as behavior that is intentional, harmful, repetitive, and reflects an abuse of power. Bullying behaviors can be physical (hitting, kicking, pushing), verbal (teasing, threatening), or relational (social exclusion, harming friendships, spreading rumors). Although physical bullying cannot happen via technology, both verbal and relational bullying can be accomplished using a variety of technological tools. Thus, cyberbullying shall be defined as verbal or
References: Anonymous. (2004). Psychological aspects of mobile phone usage among adolescents. Australian Psychological Society, 3. Retrieved January 23, 2007 from http://www.psychology.org.au/news/psychology_week/10.10_2.asp Beebe, T. J., Asche, S. E., Harrison, P. A., & Quinlan, K. B. (2004). Heightened vulnerability and increased risk-taking among adolescent chat room users: Results from a statewide Belsey, B. (2005). Cyberbullying: An emerging threat to the “always on” generation. Retrieved January 16, 2007 from http://www.cyberbullying.ca/pdf/feature_dec2005.pdf Berson, I. R., & Berson, M. J. (2005). Challenging online behaviors of youth: Findings from a comparative analysis of young people in the United States and New Zealand Berson, I. R., Berson, M. J., & Ferron, J. M. (2002). Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States. Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing a policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57. Retrieved January 15, 2007 from http://umanitoba.ca/publications/cjeap/articles/brown_jackson_cassidy.html Campbell, M. A. (2005). Cyber-bullying: An old problem in a new guise? Australian Journal of Guidance and Counseling, 15, 68-76. Giannetti, C., & Sagarese, M. (n.d.). The newest breed of bully, the cyberbully. Retrieved January 21, 2007 from http://www.pta.org/pr_magaine_article_details_1117639656218.html Grinter, R. E., & Palen, L. (2002). Instant messaging in teen life. Paper presented at the Computer Supported Cooperative Work conference, November 16-20, 2002, New Huffaker, D. A., & Calvert, S. L. (2005). Gender, identity, and language use in teenage blogs. Journal of Computer Mediated Communication, 10(2). Retrieved January 10, 2007 from http://www.blackwell-synergy.com/doi/full/10.1111/j.10836101.2005.tb00238.x?prevSearch=allfield%3A%28Gender%2C+Identity%2C+and+Lang August). Electronic bullying among school-aged children and youth. Paper presented at the annual conference of the American Psychological Association, August 20, 2005, Keith, S., & Martin, M. E. (2005). Cyberbullying: Creating a culture of respect in a cyber world. Kraft, E. (2006). Cyberbullying: A worldwide trend of misusing technology to harass others. WIT Transactions on Information and Communication Technologies, 36. Retrieved January 4, 2007 from http://library.witpress.com/pages/listPapers.asp?q_bid=349 Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School Psychology International, 27, 157-170. Merchant, G. (2001). Teenagers in cyberspace: An investigation of language use and language change in Internet chatrooms Owen, M. & Starick, P. (2006, December 4). Secret school society. The Advertiser News. Retrieved January 15, 2007 from http://www.theadvertisernews.com.au/?from ni_story) Patchin, J Smith, P. , Mahdavi, J., Carvalho, M., & Tippett, N. (2006). In investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in Strom, P. S., & Strom, R. D. (2005). Cyberbullying by adolescents: A preliminary assessment. Suler, J. (2005). Adolescents in cyberspace: The good, the bad, and the ugly. Retrieved January 23, 2007 from http://www.rider.edu/suler/psycyber/adoles.html Willard, N. (2004). I can’t see you – you can’t see me: How the use of information and communication technologies can impact responsible behavior Ybarra, M. L. & Mitchell, K. J. (2004). Youth engaging in online harassment: Associations with caregiver-child relationships, Internet use, and personal characteristics