ArticlePDF Available

Cyberbullying: A Literature Review



Content may be subject to copyright.
Cyberbullying 1
Buffy Sue Fegenbush
University of Louisiana at Lafayette
St. Mary Parish School System
Dianne F. Olivier
Department of Educational Foundations and Leadership
University of Louisiana at Lafayette
Paper presented at the
Annual Meeting of the Louisiana Education Research Association
March 5-6, 2009
Cyberbullying 2
Cyberbullying is the online harassment of children by children. While most
cyberbullying instances happen at home, the repercussions of these acts of aggressions
are often brought to the school campus. This new trend has left school systems unsure of
the proper response to handling student needs while balancing legal and ethical
responsibilities. The purpose of this literature review is to provide a comprehensive
analysis of the current research on cyberbullying and the issues that surround it in order
to develop future researchable hypotheses in the area of cyberbullying as it relates to
school policy and protocol. The works of Aftab, Hinduja, Patchin, Shariff, and Willard,
all prominent researchers in the study of cyberbullying, have been reviewed so that they
issues related to cyberbullying can be better understood. These issues include traditional
bullying, teen social networking and media use, the forms of cyberbullying, legal
boundaries protecting First Amendment student rights, and policy and program
implications. Most of the research indicates that the issue of cyberbullying can not truly
be addressed unless it is approached both proactively and reactively.
Cyberbullying 3
Table of Contents
I. Introduction p. 4
Topic, Overview, and Purpose p. 4
Organization of the Review, Scope, and Library Research Plan p. 5
Interest, Significance, and Rationale for the Critical Review p. 6
II. Review of the Literature about Cyberbullying p. 8
Cyberbullying Defined p. 8
Focus on Traditional Bullying p. 10
Traditional Bullying: The Bully, the Bullied, and the Bystander p. 13
The Bully p. 15
The Bullied p. 16
Linking the bully and the Bullied p. 18
The Bystander p. 20
From Traditional Bullying to Cyberbullying p. 23
The Internet and Teen Use: The Tools and Forms of p. 24
The Tools of Teen Internet Use p. 25
The Forms of Teen Internet Use p. 27
Cyberbullying: The Cyberbully, the Cyberbullied, and the
Cyberbystander p. 30
The Cyber bully p. 30
The Vengeful Angel p. 31
The Power Hungry and Revenge of the Nerds p. 32
Mean Girls p. 32
The Inadvertent p. 33
The Cyberbullied p. 33
Linking the Cyberbully and the Cyberbullied p. 35
The Cyberbystanders p. 37
Other Stakeholders in the Issue of Cyberbullying p. 37
Parents p. 38
Teachers and School Administrators p. 38
School Boards p. 39
Cyberbullying: The Law p. 39
Federal Response p. 40
State Response p. 40
Louisiana’s Response p. 42
Cyberlaw: Legal Considerations for School Systems p. 45
Policy Implications p. 47
III. Discussion p. 50
Summary and Interpretations p. 50
Conclusions p. 53
Recommendations p. 56
IV. References p. 58
V. Bibliography p. 64
VI. Appendix p. 67
Cyberbullying 4
Topic, Overview, and Purpose
While school systems have made great strides in creating and implementing crisis
response plans and zero tolerance policies, it is important to continually scan the societal
landscape to see if additional concerns should be addressed in the area of student safety
(Pellegrini & Bartini, 2000). It has become increasingly evident that the Internet has
brought to our campuses another threat to student safety cyberbullying. According to a
2004 survey given by i-SAFE America, 42% of school-aged children have been bullied
while online. This percentage increased drastically in a 2008 study that raised the statistic
from 42% to 72% (Juvonen & Gross, 2008).
Research shows that some 93% of today’s teens use the Internet. More and more
this use is for online socialization with peers; not all of it is positive in nature (Lenhart,
Madden, Macgill, & Smith, 2007). Daily, students across the nation are being bullied
online and are bringing to school the residual effects of these personal attacks (Trolley,
Hanel, & Shields, 2006; Willard, 2007). Daily, school administrators across the nation
struggle with the desire to act on behalf of the victimized student, but are not sure how to
respond since most acts of cyberbullying happen off campus. It is the regrettable job of
administrators to balance the needs of the victim against the judicial rights of the bully;
legal guidance and policy protocol from school boards and systems are limited
(Anderson, 2007).
Hinduja and Patchin (2008), researchers in the field of Internet- and computer-
related criminality, state that “one of the most important steps a district can take to help
protect its students and protect itself from legal liability is to have a clear and
Cyberbullying 5
comprehensive policy regarding bullying and harassment, technology, and their
intersection: cyberbullying” (p.188). School systems face huge barriers when
implementing clear and comprehensive cyberbullying policy. It has become the easy
track to apply current zero tolerance policies against bullying to cases of cyberbullying. Is
this an effective practice? Some researchers believe it is, while others think that this
reactive type of policy does not address future instances of cyberbullying. While zero
tolerance policies stop those who are caught, these policies do not address educating
those who are still cyberbullying. Only time and additional study will give school
systems more definitive answers to this question. For now, school systems must wade
through the available sources of information to develop more comprehensive and
proactive actions against cyberbullying.
The purpose of this literature review is to provide a comprehensive analysis of the
current research on cyberbullying and the implications of the issues that surround it in
order to develop future researchable hypotheses in the area of cyberbullying as it relates
to school policy.
Organization of the Review, Scope, and Library Research Plan
To successfully address the issue of cyberbullying, school systems need to have
the answers to the following questions, thus these questions will outline the research
topics that will be examined in this literature review. These questions were researcher
developed by following the investigative patterns of Aftab (2008), Hinduja & Patchin
(2005), Shariff (2008), and Willard (2003 & 2007), all leading researchers in the field of
childhood cyberbullying and Internet safety issues:
1. What is cyberbullying?
Cyberbullying 6
2. What basic components are necessary for cyberbullying to take place?
3. How is cyberbullying different from traditional bullying?
4. Who are the stakeholders in cyberbullying; what roles do they play? should
they play?
5. What are the legal issues related to cyberbullying for schools to understand?
6. What avenues and policies are school systems using to prevent/address
7. What other issues/barriers play a role in policy development that effect
cyberbullying policies?
Many forms of literature will be surveyed in this review. The literature on
cyberbullying is relatively new mostly within the last five years. The researcher will
investigate the references attached to previous studies for possible avenues of
examination. Online research will begin with key terms such as: cyberbullying, school
policy, zero tolerance, Internet safety, cyberlaw, and any other terms that surface as topic
critical as the research expands. Multiple online safety sites have been established by
those who are key researchers in this area of interest. A thorough examination of their
sites will provide key information and other leads for possible review. Additionally,
recent books that have been written on the topic will be read for researcher
Interest, Rationale for the Critical Analysis and Significance
Technological advances have brought an unexpected threat to the school campus
the cyberbully. While most acts of cyberbullying occur off-campus, residual effects of
bullying make their way to school. How schools should handle the cyberbully and to
Cyberbullying 7
what degree are questions that are not easily answered. As in any school-related issue,
programs and policies must be implemented that addresses the moral, educational, and
legal aspects of cyberbullying. Research in the area of cyberbullying and the implications
of cyberbullying to school systems is relatively new, thus the frameworks upon which
school policy should be based are still developing.
It is in the best interest of those who are developing and implementing policy and
protocol to have an understanding of the themes related to cyberbullying and how they
are interconnected so that more effective school programs and policy will be realized.
Ultimately, this issue is critical to the safety and well-being of our nation’s young people.
Policy for cyberbullying is no longer an option; it is a school system necessity.
Cyberbullying 8
Review of the Literature about Cyberbullying
What exactly constitutes an act of cyberbullying is not always easy to define.
Generally, the definition of cyberbullying depends upon the viewpoint of those who are
defining it. Shariff (2008) states that “when we define a behavior, it is important to
remember it as an action that takes place in a particular context, at a particular time, with
various influences operating on the individuals who take the action” (p. 29). This is
particularly applicable to the issue of cyberbullying. In order for any cyberbullying policy
to be established and effectively implemented by school systems, members must
recognize and address issues related to cyberbullying without alienating those we are
trying to reach the youth.
Cyberbullying Defined
Definitions of cyberbullying should “illustrate the forms it takes, the tools that are
used to engage in it, and ways in which it is understood to differ from traditional
bullying” (Shariff, 2008. p.29). Between the years of 2001 and 2003, two individuals
have been credited with coining the term cyberbullying: Canadian school teacher, Bill
Belsey (2008), who is also accredited with establishing the first online site pertaining to
cyberbullying,, and American Lawyer, Nancy Willard (2003). Belsey
(2008) says “cyberbullying involves the use of information and communication
technologies to support deliberate, repeated, and hostile behaviour by an individual or
group that is intended to harm others” (¶1).
Willard (2003) originally defined cyberbullying as language that is “defamatory,
constitutes bullying, harassment, or discrimination, discloses personal information, or
contains offensive, vulgar or derogatory comments” (p.66). While this outlined the form
Cyberbullying 9
of the language, it did not define the tools that that were used for engagement or how it
differs from traditional bullying. Willard (2007) has since then redefined cyberbullying as
being cruel to others by sending or posting harmful material or engaging in other
forms of social cruelty using the Internet or other digital technologies, such as cell
phones. Young people may be the target of cyberbullying from others or may
engage in such harmful behavior. Direct cyberbullying involves repeatedly
sending offensive messages. More indirect forms of cyberbullying include
disseminating denigrating materials or sensitive personal information or
impersonating someone to cause harm (p.10).
Willard (2007) also believes that the terms Internet and online are interchangeable when
speaking about cyber issues as “it is getting pretty hard to define where the Internet
begins and where it ends... (I consider) these to be expansive terms that encompass all of
the current and emerging information and communication technologies” (p. xii).
The conceptualization of cyberbullying as defined by Belsey and Willard has
been used to guide the emergence of cyber research and policy; their definitions, ideas,
and studies have been the building blocks for current research (Hinduja & Patchin, 2008,
Shariff 2008, & Trolley, Hanel, & Shields, 2006). However, while their definitions are
comprehensive, one component is missing that is needed for the purpose of this review
the ages of those involved. This literature review will focus on cyberbullying of school-
aged children and the imperative that school systems have to respond. Therefore, to help
conceptualize this literature review, the definition stated by Aftab (2006), a cybercrime,
Internet privacy and cyber-abuse lawyer and creator of will
be followed:
Cyberbullying 10
cyberbullying is when a child, preteen or teen is tormented, threatened, harassed,
humiliated, embarrassed or otherwise targeted by another child, preteen or teen
using the Internet, interactive and digital technologies or mobile phones. It has to
have a minor on both sides, or at least have been instigated by a minor against
another minor. Once adults become involved, it is plain and simple cyber-
harassment or cyberstalking. Adult cyber-harassment or cyberstalking is NEVER
called cyberbullying. (¶ 1)
Aftab’s definition establishes what the act of cyberbullying is, the tools used, and
pinpoints that cyberbullying is something that is done child on child, as most state law
defines minors as those who are under the age of 18 (Nolo, 2008). This is a key
understanding for those who are establishing policy in the school system, and it helps to
limit the scope of possibilities school cyberbullying policies need to cover.
Focus on Traditional Bullying
To fully comprehend cyberbullying, it is crucial to recognize its roots in
traditional bullying. Historically, bullying has been seen as a rite of passage for kids.
Many times it has been said that “kids will be kids” and instances of bullying have not
been taken seriously. Most instances of school-aged bullying occur on the school campus
a place that is supposed to be safe and nurturing for students (Sampson, 2002).
Instances are most likely to occur during less supervised or unsupervised times such as
when students are in class transition, locker rooms, gyms, or on the bus. Instances also
occur in the classroom setting while the teacher is present. Many times in instances of
bullying, the teacher will dismiss the claim of the student or downplay the importance of
the incident. Researchers feel that until educators understand the signs of bullying and the
Cyberbullying 11
full impact on the victims and those who witness these acts, this tradition will continue
(Coloroso, 2003; Crother & Kilbert, 2008).
Bullying as a phenomenon was not well-researched until recent years. In the
1970s, a study in Norway was conducted about the harms of school-aged bullying by
Olweus, who is commonly recognized as the pioneer in school-aged bullying research.
His in-depth study of the phenomenon of school-aged bullying actually was the first of its
kind (APA Online,2008, ¶ 3). At that time, Olweus (1993) defined bullying as “when (a
student) is exposed, repeatedly and over time, to negative actions on the part of one or
more other students” (p. 9). He went on to define negative actions as “when someone
intentionally inflicts, or attempts to inflict, injury or discomfort upon another basically
what is implied is the definition of aggressive behavior” (p. 9).
Based upon this general understanding of bullying established by Olweus, later
research in the 80s and 90s was conducted in other countries. Still, it was not until recent
years, around 2001, that the prevalence of bullying was studied by American researchers.
It is interesting to note that this is the same year that initial studies in cyberbullying were
conducted, as well. This interest in bullying was spawned from the rash of school
violence and high profile crimes that were sweeping across the news in the 1990s
(Sampson, 2002). The highest profile of all of these incidents happened at Columbine
High School in Columbine, Colorado.
On April 20, 1999 at Columbine High School, two teenagers killed twelve
classmates, one teacher, and wounded twenty-four others before killing themselves.
These young men were part of a self-named group called the trench coat mafia. They
Nazi saluted one another at school; they built bombs within their own homes; and they
Cyberbullying 12
had their rooms filled with journals and school layouts. This self-created group was
formed as a response to the ongoing embarrassment and aggravation (bullying) that they
had received from the more popular cliques on campus. None of this was noted or
addressed by school officials or the parents of the boys. The school principal stated that
he was not even conscious to the fact that he had a Nazi group on campus. For over a
year, they planned their retaliation against their school peers (Raywid, 2000).
How could these signs have been ignored? These two teens were alienated from
their classmates, their teachers, and their surroundings and no one stepped in to assist or
question their motives for their behavior. It seems that this could have been avoided if the
signs had been read correctly by someone around them. Would an educational program
that outlined the signs of victimization and protocol for getting help have helped those
who could have made a difference namely, the teachers, the administrators, and those
who were part of the overall bullying incidents?
In 2001, Nansel, Overpeck, Pilla, Ruan, Simons-Morton, and Scheidt noted that
while aggression among US youth was increasing, such as the incident at Columbine,
there was no obtainable national data on the pervasiveness of school-aged bullying.
Looking at studies from other countries, they believed that there was a correlation
between bullying, aggression, and youth crime. It was their objective “to measure the
prevalence of bullying behaviors among US youth and to determine the association of
bullying and being bullied with indicators of psychosocial adjustment… (p.1). They
analyzed data gathered from a 1998 administration of the World Health Organization’s
Health Behaviour in School-aged Children Survey in which 15,686 students in 6
grade were questioned. Their main objective was to look for self-reporting of
Cyberbullying 13
involvement in bullying and/or being bullied by others. To qualify as an act of bullying,
the act of aggression had to have been intentional, repetitive, and represented an
imbalance of power, “with a more powerful person or group attacking a less powerful
one” (p. 2095). The following facts were garnered from their data analysis:
1. 29.95% reported moderate or frequent involvement in bullying; 13% as the
bully and 10.6% as the bullied.
2. 10.6% bullied others infrequently.
3. 8.8% bullied once a week or more.
4. 8.5% experienced bullying infrequently.
5. 8.4% experienced bullying once a week or more.
6. 6
graders bullied more prevalently than 9
and 10
7. Males were more likely than females to be the bully and the bullied.
8. Those who bullied or who were bullied demonstrated poorer psychological
adjustment than those who were not involved in acts of bullying.
If 29.95% reported moderate or frequent involvement in bullying, this would translate to
a national estimate of 5,736,417 children, with the most severe cases of 1,634,095
students bullied with moderate frequency and 1,611,809 bullied frequently (Nansel, et al,
2001). These statistics symbolize masses of children who are not being adequately
protected and approached by school systems.
Traditional Bullying: The Bully, the Bullied, and the Bystander
In her book, The Bully, the Bullied, and the Bystander, Coloroso (2003) builds
upon the previous works of Olweus. She portrays incidents of bullying as a scene in a
play that requires certain characters in order to be carried out and looks at the operation
Cyberbullying 14
of bullying from the perspectives of those who are directly involved in acts of bullying
the children. She set the scene by defining bullying as “conscious, willful, and deliberate
hostile activities intended to harm, induce fear through the threat of further aggression,
and create terror” (p.13). Coloroso states that acts of bullying always contain three
elements: an imbalance of power, intent to harm, and a threat to further aggression. When
the incidents are allowed to occur for too long she adds a fourth element, terror.
1. Imbalance of Power. Traditionally, bullies are male, bigger, stronger, and/or
older than those they are victimizing. Acts of bullying can be perpetrated by
one person or in more serious cases a group of like individuals who have
pinpointed a victim(s) due to a common reason like race or gender.
2. Intent to harm. Simply stated, the bully means to hurt their victim. This pain
can be physical, emotional, or verbal. The bully “expects the action to hurt,
and takes pleasure in witnessing the hurt” (p.13).
3. Threat of further aggression. When victims are picked, they know that the
attack upon their person, no matter what form it takes, will not be a one time
thing. Victims are usually selected because the bully knows that they are easy
4. Terror. The bullied know that they will be bullied again. This promotes a
sense of fear that grows with each attack upon their person. They become
trapped within the cycle of violence that bullying creates. This fear often
causes victims to keep the incidents of bullying to themselves, as they fear
more retribution from those who are bullying them.
Cyberbullying 15
The Bully
The bully is the key player in any incident of bullying. Research shows that
bullies are typically male, at the same age or older than their victims, stronger than their
victims, and generally hold some level of popularity on the school campus (Chan, 2006;
Coloroso, 2003; Nansel et al., 2001). It is interesting that those who bully usually have a
large group of friends and have leadership traits that others are attracted to in a group
even though the bully exhibits antisocial and other aggressive behaviors towards others
(Underwood, n.d.).
Bullying is usually done through physical, verbal, or emotional avenues. Physical
bullying involves kicking, hitting, pushing, and other aggressive gestures. Verbal
bullying, the most prevalent type of bullying, can take the form of name-calling,
persistent teasing, and spreading rumors about others. Emotional bullying, the most
difficult type to gauge, is the use of intimidation by gesturing, making facial expressions,
or excluding someone from a group. Boys are more likely to use physical and verbal
bullying, while girls are less obvious and use emotional bullying against those who they
perceive as less than they are (Underwood, n.d.).
The patterns the bully learns to attract attention and gain recognition spiral as the
bully ages. Bullies, if left unbridled, will escalate their behavior to more violent acts of
aggression, increased poor academic performance, and delinquent behaviors such as
drinking and criminal acts (Coloroso, 2003, & Nansel, et al., 2001). Coloroso (2003)
believes that bullies portray an “air of superiority that is often a mask to cover up a deep
hurt and a feeling of inadequacy” (p.21). School-aged bullies have a high tendency to
Cyberbullying 16
gain a criminal conviction when they reach adulthood, and often grow up to be
perpetuators of domestic violence (National Education Association, 2008, ¶ 6).
It is suggested that the behaviors of bullies are learned. Most likely, bullies are not
born with aggression, but learn it from the home or past experiences in which they,
themselves, were at the receiving end of aggressiveness from others (Chan, 2006).
Statistics show the bully is at an even higher risk than the bullied for thoughts of or acts
of suicide. It is believed that this can be contributed to the other factors that make
someone tend to bully others (Sampson, 2002).
The Bullied
The bullied child often has perceived flaws and it is these flaws upon which the
bully preys. Unless helped by others to get out of the situation in which they have been
placed, bullied children usually suffer irreparable damages due to the actions of others.
Based upon the previous studies of Olweus and more current researchers in the field of
bullying, Kowalski, Limber, and Agaston (2008) place children who are bullied into two
character categories: passive/submissive victims and provocative victims. Passive victims
are those who are most likely to be bullied. There is no one indicator, but rather a list of
possible characteristics that they may fit. These children tend to be to themselves. They
typically have few friends and are not part of the larger cliques on campus. It is obvious
that they fear being hurt and are anxious because of the body and verbal expressions that
they use. They are usually physically weaker and like to spend time with adults more so
than they do children.
Provocative victims are those who have a specific characteristic about them the
rouses the aggressiveness in the bully. Those most at-risk as provocative victims are
Cyberbullying 17
those who are viewed as different from the regular crowd. Obese, special needs, learning
disabled, and physical handicapped children are most at risk in this category. Those who
are different in sexual orientation or race from the bully are also at risk (Kowalski, et al.,
The bullied child is a victim. Like most victims of crime, the bullied can
experience depression, fear, and stress related to the incident (National Education
Association, 2008, ¶ 4). Victims of bullying are less likely to make friends in school and
more likely to experience loneliness while there (Nansel, et al., 2001). Bullying can
negatively affect the victim’s educational achievements, attendance, and future
aspirations (Kowalski, et al., 2008). Chronic victims, about 6-10% of those who are
bullied, sink into severe states of depression. To a similar degree, they begin to see
themselves as devalued as those who are bullying them or watching the acts of bullying
against them. The damage done to their self-esteem can have lasting effects on their adult
relationships and self-image. It is not surprising then that the bullied are more likely to
think about or commit acts of suicide than those who are not victims of bullying
(Sampson, 2002).
So why do the bullied remain silent? As previously mentioned, historically acts of
bullying have been seen as a rite of passage on school grounds and this is reinforced in
our society the stronger tell the weaker what to do. “Bullying often stems from the
social inequities that adult society creates, fosters, sustains and continues to grapple with”
(Shariff, 2008, p.23). Because of this societal parallel, victims have little faith in how
adults will respond to their situation (Coloroso, 2003; Sampson, 2002). A host of studies
have suggested additional reasons as to why the bullied remains silent: (a) Fear of
Cyberbullying 18
retaliation; (b) feelings of shame for being weak; (c) fear of not being believed; (d) a need
to not worry their parents; (e) thoughts that nothing would change as a result of telling;
(f) thoughts that involving parents and teachers will make it worse; (g) thoughts that
teachers would tell or involve the bully; and (h) fear of being called a snitch (Sampson,
Most of the reasons given by the victim involve thoughts of how others will
perceive him after telling about an act of bullying. The bullied child does not want to
appear weak or uncool in front of his peers, teachers, and parents. However, research
shows that the bullied child often becomes alone and anti-social in order to avoid being
bullied (Nansel, et al, 2001). It seems like an unfortunate catch 22 for the bullied. He
doesn’t tell to avoid being judged and ostracized by others, which is eventually what will
happen to him if he doesn’t tell.
Linking the Bully and the Bullied
The following section review is based upon the work of Chan (2006) who
explored the systemic patterns in bullying using his self-created School Life Survey (SLS)
to measure bullying and victimization. Three systemic patterns emerged from the
research: serial bullying, multiple victimization, and familial patterns.
Serial bullying is based upon the premise that most of the bullying is perpetrated
by a small number of bullies on a school campus. He found that most often when a child
was bullied, it was linked to one specific person. Chan noted that usually the identified
bully was not harassing just one child, but a group of children. In his research, 12.4% of
those studied were identified as serial bullies and were responsible for 69.2% of the
overall bullying at school. Girl serial bullies usually have two to four victims; boys serial
Cyberbullying 19
bullies have anywhere from two to fifteen. While mostly physically aggressive, serial
bullies use a combination of ways to intimidate their victims. They usually have a
reputation for intimidating characteristics and are easily more identifiable by school
stakeholders because of this.
The second pattern to emerge from Chan’s (2008) work focused on multiple
victimization. “The converse of serial bullying is multiple victimization, that is, more
than one perpetrator can converge on one victim” (Chan, 2008, p.361). Thirty-five
percent of those who had been bullied experienced multiple victimization. Those who are
multiple victimized generally have some physical, behavioral, or social-cognitive feature
that attracts bullies. This substantiates Kowalski’s, et al. (2008) provocative victim
concept that was previously discussed. It has been suggested that those who are
repeatedly victimized learn to develop coping strategies and blockade themselves from
certain social situations. These strategies might be exhibited by actions of self-exclusion,
always reading a book, not joining in clubs or organizations, or not talking to others in
class or social situations. By doing this, they seem anti-social and, therefore, are
perceived by their peers as deserving of the abuse they receive from others (Tani,
Greenman, Schneider, Fregoso, 2003). Like the bully, these victimized children are
usually well-known on the campus and quite often the adults know that they are not being
treated well by other children (Sampson, 2002).
The third pattern in Chan’s (2008) research suggests that bullies don’t just
happen; there is a familial pattern in this type of aggression. “When the names of bullies
provided by the victims were collated, another pattern… showed that there were about
half a dozen cases in each school where children in the same family… were named as
Cyberbullying 20
bullies by their peers” (p. 366). Children tend to mirror that which they see at home.
Those who witness aggression have a tendency to be aggressive and vice-versa. The
environment in which one grows and is fostered is a marker of the person one will
become. “Growing up in a hostile, cold, and punitive household will not eliminate the
possibility of a child becoming a decent, caring, responsible person; however, such an
environment will significantly reduce the chances of it happening” (Coloroso, p. 100).
Chan’s (2008) research ties together the relationship between the bully and the
bullied. Understanding the systemic patterns that build a relationship between the bully
and the bullied can assist school system in recognizing the warning signs of possible
victimization and help to develop proactive strategies to address, what seem to be, small
but identifiable groups on one’s campus. While Chan addresses the bully and the bullied,
he does not systemically judge how other individuals contribute to acts of bullying.
The Bystander
Coloroso (2003) refers to the bystander as the supporting cast in an act of
cyberbullying. This cast can range in numbers from very small to quite extensive,
depending upon the setting. How the bullying scene plays out is often decided by the
bystanders and whether they take the side of the bully or the bullied. Craig and Pepler
(1998) looked at the roles of bystanders in incidents of bullying. They found that 85% of
bullying incidents were witnessed by bystanders. Of these cases, 81% of the incidents
were reinforced by those who were there; 48% of the bystanders became active
participants, and only 13% of the bystanders actually intervened. After the incident, the
bystanders were often more supportative and friendly towards the bully than the bullied.
When bystanders are asked why they do not intervene, four reasons are most often given:
Cyberbullying 21
(a) the bystander is afraid of getting hurt himself; (b) the bystanders is afraid of becoming
a new target; (c) the bystander is afraid of doing something that will make it worse; and,
(d) the bystander simply does not know what to do.
Craig and Pepler (1998) feel that these are more excuses than legitimate reasons.
They, along with Coloroso (2003), believe that repetitive witnessing of bullying causes
bystanders to become desensitized and indifferent. This indifference or apathy is
reinforced because the bystander’s sense of self-confidence and self-respect erodes with
each act of bullying they witness. Eventually the bystander will understand the side of the
bully more so than the bullied. Taking a more neutral view, Underwood (n.d.) states that
“many children do not have the self-confidence or skills to stop bullying on their own and
should not be expected to do so” (Slide 20). This reinforces the need for proactive
programs and policies on school campuses that direct students in responding
appropriately to these types of situations.
If the bystander didn’t want to or could not stop the incident himself, why did not
tell an adult? Their reasons for not telling mirror those of the bullied victim. Studies
suggest teens feel teachers do not appropriately react when told about acts of bullying on
campus, nor do they feel teachers react harshly enough when they, themselves, witness
and respond to acts of bullying in their own classrooms (Sampson, 2002). This dual
perception concerning adult unresponsiveness to incidents of bullying gives credence to
the concern that adults/teachers, hence school systems, may not be responding
appropriately to incidents of bullying.
To respond appropriately to incidents of bullying, school counselors,
administrators, teachers, and other vital members of the school and school system need to
Cyberbullying 22
establish a school climate in which bullying is understood and addressed - a climate of
respect and caring. Proactive school programs that focus on building a sense of belonging
for all students, address character education, and teach conflict resolution are the answer
(Perry, 1999). This seems easy enough. Aren’t schools supposed to do this anyway? The
barrier is that to develop and continue these programs takes time, money, and continues
effort. Proactive measures are usually developed by schools after reactive measures have
taken place (Daniels, 2008). This is exactly what has happened in school response to
Initially, school systems responded to the tide of school violence after the 1990s
by implementing zero tolerance policies, imposing student dress codes and IDs, and
initiating random metal searches of students and lockers in schools across the nation
(Daniels, 2008; Perry, 1999). Within a few years, the public began to question the
overuse and strictness of zero tolerance policies. Were students being harmed by the
practice of the very policies that were put into place to protect them?
Current studies indicate educators still do not fully understood the impact of
traditional bullying on the bully, the bullied, and those who witness these acts, nor have
sufficient steps been taken to address these inadequacies. Much work needs to be done to
teach educators the differences between acts of bullying and what is just seen as part of
growing up. Do we too often take for granted, for example, that the popular kids will
make fun of the nerdy kids? Have educators become desensitized to acts of bullying
because to address all of them would be to acknowledge the problem exists (Crothers &
Kolbert, 2008)? It seems that a lack of knowledge and preventative measure on the part
of the school system are in the forefront for both traditional bullying and cyberbullying.
Cyberbullying 23
How is it expected that something as new as cyberbullying will be addressed when
traditional bullying, which has been around as long as students have been in school, still
has not been harnessed? Perhaps it is through their similarities, not their differences that
connections will be made to address both issues.
From Traditional Bullying to Cyberbullying
In the past, students could retreat to the safety of their homes to escape incidents
of bullying. Once the bell rang, they could run home and were safe until the next day.
The same cannot be said for cyberbullying. The impact of cyberbullying does not stop
when students pass through the school door. Cyberbullying has invaded their homes, their
bedrooms, and their personal laptops and phones. Even more insidious are the incidents
of cyberbullying as they can be targeted directly to the individual, wherever they are, or
on the Internet where anyone can see the victim’s torment (Aftab, 2008; Coloroso, 2003;
Willard, 2007)
Cyberbullying, like other forms of bullying, can be detrimental to a child’s
performance and sense of well-being at school. This connection between home and
school has opened the doors for school systems to intervene. Acts of cyberbullying can
actually start with traditional bullying instances at school and then move to the Internet or
vice-versa (California School Boards Association, 2007); they are usually not mutually
exclusive. Like bullying, cyberbullying acts are intentional, repetitive, and meant to
exclude. Shariff (2008)
would argue that the medium of cyberspace simply provides an avenue for
expression of the message… the message is not different from that which is often
expressed when bullying occurs in physical space (overtly or covertly)…it is
Cyberbullying 24
critical to understand the message, but also important to understand the medium
so that it too can be used to empower learning and convey an altogether different
message. (p.31)
The Internet and Teen Use: The Tools and Forms
Just as Willard (2007) took the privilege of using the term Internet as an all-
encompassing term to cover current and emerging information and communication
technologies (p. xii) so will the reviewer for the purpose of this research. It is not
enough to just use the term without some appreciation of what it entails. What are these
current and emerging technologies that are being used for cyberbullying; how are teens
using them? To address these questions, it is necessary that one first understands the
degree to which the Internet is used by minors and the magnitude of the Internet in their
daily lives.
In her book, Totally Wired: What Teens and Tweens Are Really Doing Online,
Goodstein (2007) describes the phase of adolescent development of teenagers today as
being not much different from past generations. While time periods and settings may
bring different issues, teens have always wanted “to figure out who we were apart from
our families, through our friendships, boyfriends, and the music we listened to… most of
us experienced the similar impulsiveness, invincibility and highs and lows otherwise
known as teen angst” (p.12). Teens have constantly wanted acceptance for who they are
and what they believe. Goldstein believes that the biggest distinctions by generation are
the means and media through which teens have tried to gain this acceptance. These
means are generally what differing generations see as generational gaps. It is interesting
to note that the generational gap between today’s youth and the previous generation is
Cyberbullying 25
now being referred to as a digital gap or digital divide so undeniable is the saturation of
digital media (Shariff, 2008).
Goodstein (2007) refers to today’s teens as totally wired in their daily lives. By
totally wired, she describes today’s teens as continually leaving one form of media to go
to another to complete everyday tasks. This sentiment has been similarly expressed by
other researchers in the field of teens and social media.
The Internet is the telephone, television, game console, and radio wrapped up in
one for most teenagers and that means it has become a major “player” in many
American families. Teens go online to chat with their friends, kill boredom, see
the wider world, and follow the latest trends. Many enjoy doing all of these things
at the same time during their online sessions… the Internet lets them connect with
friends, expand their social networks, explore their identities, and learn new
things (Lenhart, et al., 2001, ¶1).
Is it possible that too much adult attention is being given to Internet use by teens? Are
adults putting too much emphasis on the impact technology is having on children’s
personal and social development? Recent studies indicate that the answer to both of these
questions is a resounding, No.
The Tools of Teen Internet Use
In 2007, PEW Internet & American Life Project, a nonpartisan organization that
supports research on the Internet and its impact on society, published a report focusing on
a 2006 survey concerning teens and their use of social media. This survey administration
was a repeat of similar PEW surveys that had been conducted in 2000 and 2004 (Lenhart,
et al., 2007). The focus of these reports was twofold: to assess the level of use of the
Cyberbullying 26
Internet by teens and to assess the types of media that they were using. Using phone
interviewing strategies, 754 youth between the ages of 12 and 17 and 754 of their parents
were surveyed.
Table 1, Teen Internet and Communication Device Use, is based upon the PEW
studies conducted in 2000 and 2006, the following researcher-created figure was
fashioned to provide a visual comparison of the two studies and the noticeable changes in
teen Internet and communication device use during the six years separating the studies.
Table 1: Teen Internet and Communication Device Use
PEW 2000
PEW 2006
Internet Use
+ 20 %
Broadband Connection
at home
+ 65% more teens with
Internet connections at home
Cell Phone Ownership
+ 40% more teens own their
own phones
Wireless Internet
Wireless connections were not
measurable in the first study
Daily Internet Use
+20% more daily use
Table 1 Source: Data obtained from the PEW Internet and American Life Studies, 2004
& 2006, Lenhart, et al., 2001 & Lenhart, et al., 2007.
It is significantly noticeable that teen use of the Internet is escalating. In just six
years, the use of the Internet has increased 20% with 62% of teens going online on a daily
basis. Another remarkable gauge is the huge swell in cell phone use by teens a boost of
over 40% in just six years. Teen use of cell phones includes the common functionalities
of a typical cell phone: camera, video, Internet, texting, and content sharing capabilities.
These types of functionalities are being used to build online social networking sites
(Lenhart, et al. 2007).
Cyberbullying 27
In the 2004 PEW survey administration, the Internet was mostly seen as a source
of information - not as a teen gathering spot. It was noted in the 2008 study that “more of
them than ever are treating it (the Internet) as a venue of social interaction a place
where they can share creations, tell stories, and interact with others” (PEW, Introduction,
p.i). This social networking is no different to teens than traditional social networking
activities like meeting at a popular hangout or talking to friends on the phone; it is more
an extension of these traditional teen activities (Goodstein, 2007).
The Forms of Teen Internet Use
So, how are teens networking online? Not only did the PEW 2006 study show the
increased degree to which teens are using the Internet, but it also gave a portrait of how
they are using it. The following statistics have been taken from the PEW 2006 Summary
of Findings Page:
1. 64% of online teens ages 12-17 have participated in one or more among a
wide range of content-creating activities on the Internet.
2. 39% of online teens share their own artistic creations online, such as artwork,
photos, stories, or videos, up from 33% in 2004.
3. 33% create or work on webpages or blogs for others, including those for
groups they belong to, friends, or school assignments, basically unchanged
from 2004 (32%).
4. 28% have created their own online journal or blog, up from 19% in 2004.
5. 27% maintain their own personal webpage, up from 22% in 2004.
6. 26% remix content they find online into their own creations, up from 19% in
Cyberbullying 28
7. 55% of online teens ages 12-17 have created a profile on a social networking
site such as Facebook or MySpace.
8. 47% of online teens have uploaded photos where others can see them, though
many restrict access to the photos in some way.
9. 14% of online teens have posted videos online. (Lenhart, et al., 2007, p. i)
While one may look at the activities listed and think that they are similar to things done
in past generations like sharing photos from a scrapbook, writing diaries (blogs, today),
passing notes, and talking with friends, the media through which they are sharing these
activities have changed.
Most online socialization takes place through social networking sites. Boyd
(2008) studied the teen phenomenon of online social networking use, specifically
MySpace and Facebook, and their implications toward teen social and psychological
development. He characterized social network sites as
based around profiles, a form of individual… homepage, which offers a
description of each member. In addition to text, images, and video created by the
member, the social network site profile contains comments from other members
and a public list of the people that one identifies as Friends within the network.
While these online profiles are specific to the individual that creates them, they are
accessible by and public to all who have access to them. Consequently, things that the
public may not normally know about someone are more readily accessible by more than
their closest friends.
Cyberbullying 29
Boyd (2008) states that online social networking sites have four inherent
differences from typical face-to-face interactions: (a) persistence, (b) searchability, (c)
replicability, and (d) invisible audiences. Using Boyd’s (2008) research, these ideas are
defined with the implications of how this could lead to an unsafe situation for teens.
1. Persistence. Online speech is persistent in that networked communications are
permanently recorded and exist even after they are not longer visible. They
can be retrieved at any time. Therefore, thoughts or ideas expressed that one
may want to take back or no longer feel are still expressed, long after the time
as passed to which it applies.
2. Searchability. As individual identities are stored and recorded, anyone has the
capabilities to search for anyone, even it they do not know the person.
Searches for those who have similar tastes, friends, or profiles can open up an
individual’s profile to the world. This exposes the users to those who may not
necessarily have the best intentions towards them.
3. Replicability. It is as easy as copying and pasting to move someone’s words
from one site to another. When this is done, it is hard to distinguish between
the original from the copied text. This leaves open the possibility that
someone else can use an individual’s words or thoughts against them or in a
way that was not originally intended.
4. Invisible audiences. Unlike face-to-face situations, online users can not
ascertain who is with them in a virtual setting. Teens cannot be sure that the
person they are talking to really is who they say they are. Users can not see
who is virtually looking at them. The implications for this are the most
Cyberbullying 30
frightening for today’s teens. They never know who is watching them and for
what reason.
These unique variables to social networking have opened unknown doors through
which typical teens issues are no longer typical. The things that bring status in school are
often the same things that bring status online. The number of friends one has listed, using
the latest slang, and doing what is important to be in the in crowd are still important in
online networks (Kowalski, et al., 2008)
Cyberbullying: The Cyberbully, the Cyberbullied, and the Cyberbystander
“Opportunities for self-affirmation and self-expression provided by the Internet
can quickly become vehicles for denigration and cyberbullying” (Kowalski, et al., 2008,
p.9). “Teens are directly faced with peer pressure and the need to conform to what is seen
to be cool, Worse, they are faced with it in the most public of settings possible…the
choice is still there: cool or lame” (Boyd, 2008, p.133). To avoid being marked lame,
teens will often adjust their personal beliefs in order to achieve social acceptance. This
self-adjusting in personal beliefs brings us back to the cast members we explored in the
act of traditional bullying: the bully, the bullied, and the bystander. They are now the
cyberbully, the cyberbullied, and the cyberbystander. How are they self-adjusting from
their traditional roles in this new venue?
The Cyberbully
Studies show that the motives for bullying someone online have remained fairly
the same as traditional bullying: power and a need to dominate or subdue others.
However, the profile of the bully is changing. The anonymity of being online has
empowered those who may not have typically shown aggression in an open forum
Cyberbullying 31
(Shariff, 2008). No longer is the bully just the big, mean boy on campus. Bullies can now
include those you may not usually suspect. They can be the nerdy kid in the corner, the
heavy girl in PE class, the quiet kid who never speaks, and just about any other person on
campus who needs or just wants to feel empowered. The Internet has “democratized”
bullying (Goodstein, 2007, p. 82).
Aftab (2008) believes the key to understanding online bullies is to understand the
motivation behind their actions. Through her work, she has identified five typical types of
online bullies: the (a) Vengeful Angel, (b) Power Hungry, (c) Revenge of the Nerds, (d)
Mean Girls, and (e) Inadvertent. While each category has its own specific profile, these
profiles are not meant to stereotype the online bully by looks. These profiles are based
upon characteristics in personality, not outward appearance, and provide an
understanding of possible motives that could be key in helping schools respond fittingly
to incidents of cyberbullying (Trolley, et al., 2006).
The Vengeful Angel. These types of online bullies target those they feel are
victimizing their own person or others, and they want to get back at them. The problem
initially begins somewhere else, and the vengeful angel retaliates online. The twist is
Vengeful Angels do not view themselves as bullies, but as defenders of others, even
though they doing to others what they do not like done to them. Generally, no one knows
the identity of the Vengeful Angel except maybe a close friend or two who are aware of
the whole situation (Aftab, 2008; Willard, 2007).
This type of online bully is the easiest for schools to help. Vengeful Angels needs
to understand that no one should take justice into their own hands; they are not doing
good by harming others. The old adage that two wrongs do not make a right fits well in
Cyberbullying 32
this scheme. School officials should focus on the core reasons as to why the Vengeful
Angel retaliated. Once the true motives are identified, Vengeful Angels can be given
alternate ways to respond. If appropriate, school officials can step in to alleviate the
problems through authorized means (Trolley, et al., 2006).
The Power Hungry and Revenge of the Nerds. The Power Hungry and Revenge of
the Nerds are often grouped together as their motives and responses are similar. The
Power Hungry can be likened to the typical offline bully. These bullies want to feel
strong, hurt others, and wield terror. It is important to them that someone else knows
about their acts of bullying. They are proud of what they are doing, and if responses from
others do not satisfy them, they will escalate their bullying into bigger and meaner acts.
This blends with the Revenge of the Nerds, because the online Power Hungry represent
those who are often bullied in a regular school setting. Offline, they are weak, small,
heavy, geeks, handicapped and a host of other words used to describe those who are not
recognized as cool at school. Online, they are powerful and possess greater technical
strengths (Aftab, 2008).
The Power Hungry and Revenge of the Nerds are the most dangerous types of
online bullies. Their bullying is personal to them, and they tend to target one victim
repetitively. They get a kick out of being strong (Aftab, 2008). This makes them the
hardest for school systems to discipline, and their acts of bullying are often untraceable.
However, when they are caught, it can be understood that they meant to do what they did
(Willard, 2007).
Mean Girls. Mean Girls bullying is usually done by a group who are looking for
something to do and do not care that they may hurt others while doing it. They are trying
Cyberbullying 33
to entertain themselves; trying to be funny at the expense of others. They want the
recognition for bullying others and want to be seen as a power online. This can be
equated to typical cliques that walk the halls of school daily across the nation. They are
identifiable because of who they are, what they believe in, and who they will allow to
join in their group. If they get attention from others, their activities grow. If they do not,
they tend to stop or find another way to gain popularity for their group (Aftab, 2008).
Because of the openness of their activities, the members of these groups are easy
to identify. It is easier for schools to react appropriately when officials are aware of who
they are trying to correct. Even if the incident happens off campus, the officials can
respond by making other interested parties aware of the incidents that have occurred
(Trolley, et al., 2006; Willard, 2007).
The Inadvertent. Inadvertents do not understand that their actions can be seen as
bullying. They are usually just playing or pretending. Their words are more responses to
what they receive and are not meant to hurt but to just be part of what is happening part
of the game. Because their actions are not premeditated, they are different from the
Vengeful Angel who intends to get back at another. Inadvertents do not appreciate that
their actions can be seen as cyberbullying and often feel bad once they realize they have
hurt others (Aftab, 2008; Trolley et al., 2006).
The Cyberbullied
According to a 2004 survey given by i-SAFE America, 42% of school-aged
children have been bullied while online. This percentage increased drastically in a 2008
study that raised the statistic from 42% to 72% (Juvonen & Gross, 2008). Compare these
statistics to the near 20% of students who report being traditionally bullied (Nansel, et al.,
Cyberbullying 34
2001), and one can see that there is a dramatic increase in victimization when bullying
occurs online. Most teens who are bullied online are often the same teens who are bullied
offline usually resulting from the same motivations. The new addition to the online
bullied are generally those who are retaliated against by empowered Vengeful Angels and
Revenge of the Nerds. In either case, online victims are viewed by the bully as deserving
of the treatment they are receiving (Trolley, et al., 2006; Willard, 2007).
Typically, the cyberbullied respond to the aggression in much the same fashion as
traditional victims have been shown to do. Chait (2008) states that
Cyber victimization has been shown to cause poor grades, emotional spirals, poor
self-esteem, repeated school absences, depression, and in some cases suicide.
These outcomes are similar to real-life bullying outcomes, except for that with
cyber bullying there is often no escape. School ends at 3 p.m., while the Internet
is open for business year round (¶ 7).
Because of this extension of time and space for online bullying, additional signs may
exist for cybervictims. They may seem anxious and have unexplainable mood swings
after online use or stop using their equipment at home all together. They are less likely to
talk about their online experiences or friends, and may avoid allowing others to view
their computer usage. (Shariff, 2008; Trolley, et al., 2006; Willard, 2007).
The bigger issue for the cyberbullied is trust. Face-to-face situations usually allow
the victims to see the bully and those who are supporting the bully’s actions. Likewise,
the victims have a better chance of knowing who is on their side and can be trusted.
Cybervictimization takes this away. The Internet is open to classmates and to the world,
and it is hard to be completely sure of the person(s) on the other end. The anonymous
Cyberbullying 35
nature of cyberbullying leaves the victims paranoid and unsure of their surroundings.
This self-doubt can be debilitating (Willard, 2007).
Like traditional victims, cybervictims are not likely to tell adults about the
mistreatment they are receiving. Statistics show that 58% of those who are online bullied
do not tell an adult parent or others (Juvonen & Gross, 2008). This unwillingness to tell
is not only due to the fact they feel adults may not respond appropriately, but because
they fear their Internet usage will be taken by those who are trying to protect them. This
fear turns to panic when the objects being used against them personal photos or
messages are not something that they would want shared with adults (Coloroso, 2003).
Linking the Cyberbully and the Cyberbullied
The twist in cyberbullying is that the difference between the cyberbullied and the
cyberbully is not always clear. Once the cyberbullied reacts to the cyberbully, he can no
longer be called a victim, per se (Willard, 2007). The victimization can be recurring. As it
progresses, those involved continually switch roles between bully and bullied. To
conceptualize how one incident of aggression can grow from a small laptop to the whole
school or world and back, one must know the actions through which cyberbullying
naturally occurs.
Table 2, Cyberbullying Avenues, is taken from the efforts of Trolley, et al. (2006)
who base their work upon the research of Willard and add their own interpretations for
school systems’ understanding and direction. They believe school systems must “define
and recognize the severity of a threat…so that (school officials) can accurately report to
outside agencies” (p.12).
Cyberbullying 36
Table 2: Cyberbully Avenues
Name of Avenue
Explanation of Avenue
Language that moves
dialogue to a new level
Consistent messaging and
repeating the action
Harassment that is more
serious in nature; this is a
threat of impending harm
This is the art of putting
someone down - slander
This is a person who poses
as someone else to retrieve
sensitive or private
information - fraud
Outing &
This person is pretending
to be a friend. It includes
collecting private
information and them
sharing and mocking the
Not allowing someone to
be part of a group;
intentionally leaving them
or and not allow them to
participate in electronic
communication - exclusion
Table 2 Source: Trolley, et al. (2006. p. 13).
While each behavior is described in isolation, the users of these avenues generally
combine them while perpetrating acts of aggression online. No matter the avenue(s)
through which the online bullying takes place, it is easy to see why someone who is
victimized would be tempted to respond. The impulse to react is hard to control,
Cyberbullying 37
especially for children (Coloroso, 2003); thus the painful cycle begins and everyone
inappropriately responding owns a part of the blame (Willard, 2007).
The Cyberbystander
The role of the bystander is one that is not often given much study in the process
of cyberbullying (Coloroso, 2003). Perhaps this is because the bystander(s) in an incident
of cyberbullying can never clearly be defined. The audience of an act of cyberbullying is
not just those who witness the incident unfold at the time that it occurs. Bystanders can
witness the act several days, months, and possibly years later as words and images often
placed online can be retrieved indefinitely (Coloroso, 2003; Shariff, 2008).
Willard (2007) believes cyberbystanders play an important role in preventing acts
of bullying. Research shows that the role of friends, those who have been identified
online as such, is a determinant of how the victim will respond to acts of online
aggression. If he is supported by his friends, and they take up for him in appropriate
manners online, he is more likely to feel less victimized. Therefore, “empowering
bystanders will be a key prevention strategy” in averting cyberbullying (p. 4). By
teaching them how to influence the online climate and report incidents to others,
cyberbystanders will have the tools to decide which role of the two bystander roles they
wish to play, bystanders who are part of the problem or bystanders who are part of the
solution (Trolley, et al, 2006; Willard, 2007).
Other Stakeholders in the Issue of Cyberbullying
Parents, school officials, and school boards play decisive roles in how acts of
online aggression are understood and approached by all involved (Coloroso, 2003;
Shariff, 2008). It is to adults that children look for guidance and support when they
Cyberbullying 38
experience problems. The disconnect occurs in situation’s of cyberbullying because
children tend to understand the medium through which these aggressive acts are
occurring better than the adults that are supposed to guide them ( Hinduja & Patchin,
2008) The children are more knowledgeable than those who are normally in charge
(Shariff, 2008). Just as the actual acts of cyberbullying are waged to show control or
power over another, so are the rules and guidelines that are set forth by the adults in a
child’s life. Since most equate knowledge with power, the Internet has created a power
struggle between children and the adults who are responsible for setting the rules and
guidelines the children must follow (Shariff, 2008).
Parents are decisive in the prevention of cyberbullying. Aggressive acts of
cyberbullying are happening in their homes using communicative devices that they have
typically purchased for their children. The best tactic for parents to take is the direct
approach talking about limits, expectations, and precautions can stop a lot of the issues
before they begin. Remember that not all parents have children who are victims. The
cyberbully has parents, too. Parents who are aware of acts of cyberbullying should take
action. Contacting other adults who need to be notified and talking about how to stop the
acts will make them part of the solution (Coloroso, 2003).
Teachers and School Administrators
Studies have not shown teachers and school administrators in a pleasing light for
responding to bullying at school. The question has been asked, if they will not respond to
acts they see, why would they respond to those they do not? This question has merit.
Research shows that school officials are more likely to respond to bullying when the
Cyberbullying 39
incident involves physical injury. Generally their responses are to the act of aggression
and do not address the reasons why it happened (Shariff, 2008). The battle wounds
garnered from an act of cyberbullying will not display themselves as bruises or cuts and
without understanding why someone was victimized, it is almost impossible to stop.
School Boards
School boards have a responsibility to understand the issues that are facing the
students, administrators, and communities which they serve. School systems have
developed policies to cover equipment and Internet use, purchased filtering systems that
ban certain words or topics, and generally employ more individuals who are responsible
for fixing the equipment than individuals who are responsible for teaching how to use the
equipment and related application, thus hampering at-school technology use more than
encouraging it (Daniels, 2008). Policies against cell phones, student email and social
forum use have almost completely halted the use of these applications at school (Shariff,
While these policies have allowed school systems to stymie abuse of the Internet
at school, it has also separated teens from what makes them uniquely different from
previous generations. Through policy implementation, school boards have taken from
students their native tongue and have forced them to use antiquated forms of
communication and expression. Students have been stripped of their identities on the
school campus in order to protect school systems from legal and other outside
repercussions. These reactive school measures are passed due to “a need to appease
powerful voices rather than a genuine concern for the diverse perspectives and values of
Cyberbullying 40
the school community… the challenge for school boards increase as they attempt to
navigate competing rights and interests” (Shariff, 2008, p. 182-183).
Cyberbullying: The Law
Federal Response
At this point, no decision on a cyberbullying case has been made by the United
States Supreme Court; the issue is just too new. Nonetheless, as reported by the Federal
Communications Commission (FCC) (2008), Congress has recognized the issue of
cyberbullying through the recent updating of the 2001 Children’s Internet Protection Act
(CIPA). CIPA requires all schools who receive federal funding through E-rate, a grant
program that makes affordable specific communication devices for schools who qualify,
to follow set guidelines to receive funding. Initially, these guidelines focused on policies
and filtering systems that limited children’s access to unsuitable content and materials
(FCC, 2008).
In the summer of 2008, the requirements of the grant were modified to require
receiving schools to have safety policies and technologies planned and implemented
before receiving funds. Specifically, “schools and libraries must also certify that, as part
of their Internet safety policy, they are educating minors about appropriate online
behavior, including cyberbullying awareness and response and interacting with other
individuals on social networking sites and chat rooms” (¶ 3).
State Response
State response to cyberbullying across the nation has been great. Thirty-six states
have anti-bullying laws dating back to 1999. According to research done by USA Today
(2008), of these 36 states, 10 states have laws that specifically address cyberbullying
Cyberbullying 41
while numerous others are currently considering cyberbullying bills. In 2006, South
Carolina passed The Safe School Climate Act. This act required school districts in the
state “to adopt policies to prohibit harassment, intimidation or bullying at school.
Electronic communication was included in the definition of bullying.” (USA Today, ¶ 8.)
In 2007, Arkansas passed a bill that allowed school officials to intervene in acts of
cyberbullying even if the acts of cyberbullying did not happen on campus. As stated in
the bill, school officials have the right to act “if the electronic act is directed specifically
at students or school personnel and is maliciously intended for the purpose of disrupting
school, and has a high likelihood of succeeding in that purpose. (USA Today, ¶ 1) Both
of these state examples are similar to bills being created across the nation. These state
initiatives are models for other state response across the country.
Unfortunately, state reactions have usually been in response to great tragedy. A
recent case surrounds the 2005 suicide of a Florida teen, Jeffrey Johnston. At the age of
15, Jeffery committed suicide after two years of ongoing cyberbullying by a classmate.
On April 30, 2008, the Florida senate unanimously approved HB669, the Jeffrey
Johnston Stand up for All Students Act (i.e. Jeff’s Law, 2006). As stated on the Florida
House of Representatives website (2008), the bill has been established to: (a) Prohibit
bullying and harassment of any student or employee of public K-12 educational
institutions, (b) require school districts to adopt policies prohibiting bullying and
harassment, (c) provide immunity for school officials and restrictions with respect to
defending the action and application of policy provisions, and (d) require Florida DOE
approval of school district policy and school district compliance with reporting
procedures as perquisites to receiving state funds.
Cyberbullying 42
This law obliges school systems to address the issues of bullying on all levels,
including cyberbullying. This law also grants some immunity to school officials as they
address these new issues. Just as in other issues of student rights, the requirement of the
school to safely guard its students has once again over ranked the school system’s
obligation to ensure student free speech. Jeff’s Law will become the measuring stick for
other states as they respond to this issue. It is imperative that school boards take a closer
look at this case as they address policy requirements.
Louisiana’s Response
In 2001, Act 230 (R.S. 17:416.15) was passed by the Louisiana Legislature. Act
230 gave rights to the school systems to operate against bullying and required school
systems to develop zero tolerance policies that outlined the consequences of such acts.
While the term cyberbullying is not specifically mentioned in the wording of Act 230,
this law is often used as a basis for cyberbullying issues on school campuses. It should be
noted that this law gave leeway for school administrators to address cyberbullying issues
if the threats are “so severe, persistent, or pervasive that it creates an intimidating,
threatening, or abusive educational environment for a student (Damico & Toomy, 2001,
p. 2). It is further stated that “any student, school employee, or school volunteer who in
good faith reports an incident … shall be immune for a right of action for damages
arising from any failure to remedy the reported incident (p. 2).
Louisiana Attorney General Charles Foti, Jr. has become an advocate for
cyberbullying prevention. Within his own department, he has created a high tech crime
unit that focuses a great deal of its time on crimes against children, even when it is
perpetrated by other children. His staff currently travels the state and nation advocating
Cyberbullying 43
for cyberbullying prevention and education (Ford, 2008). In the PowerPoint presentation
she presents to school faculties, parents, and students, Monica Ford (2008), a member of
Attorney General Foti’s high tech crime unit, references the rights of the schools and the
school administration to act upon cyberbullying using Act No. 230. She states that it is
not just a right, but a legal obligation for school officials to report suspecting incidents of
student harm.
Cyberlaw: Legal Considerations for School Systems
School systems and educators across the nation want to know when it is legal for
school systems to discipline students for cyberbullying. Bullying is not a crime. One can
not be arrested for bullying and is not defined by law. However, the factors related to
bullying, such as slander, defamation of character, physical harm, harassment, threats of
physical harm, are legally defined. In order for schools to react to acts of bullying, they
must have proof of one or more of these underlying factors (Hinduja & Patchin, 2009;
Shariff, 2008). Actions brought against school systems and educators have focused on
these traditionally defined factors and applied them to the precedents set by case law.
Cyberlaw takes traditional legal concepts and laws related to constitutionally
given rights and extends them to the digital domain. (Yamaguchi, 2006). Cyberlaw
“means investigating at a more basic level what values free expression and the flow in
information on the Internet fulfill for individuals and societies. It also involves
consideration of how the harmful effects of these activities can be controlled” (p. 531).
The merging of cyberlaw to school law is complicated. While school officials generally
have more leniency than other public officials when dealing with school crime, state tort
Cyberbullying 44
immunity laws for educators do not always protect districts from being held negligent
(Kirby, 2008).
In the issue of cyberbullying, school officials have been given leeway when they
can prove that a student’s actions have materially and substantially disrupted learning,
interferes with the educational process, utilizes school-owned technology to harass, or
threatens other students or infringes on their civil rights (Hinduja & Patchin, 2008). Some
states have gone as far as defining these concepts as they specifically relate to bullying,
thus cyberbullying. Arkansas is one such case.
In 2007, Arkansas passed Public Act 115 which defined material and substantial
disruption as it applied to bullying. According to Act 115, “substantial disruption means
without limitation that any one or more of the following occur as a result of the bullying:
1. Necessary cessation of instruction or educational activities;
2. Inability of students or educational staff to focus on learning or function as an
educational unit because of a hostile environment;
3. Severe or repetitive disciplinary measures are needed in the classroom or
during educational activities; or
4. Exhibition of other behaviors by students or educational staff that
substantially interfere with the learning environment.” (Handuja & Patchin,
2008, p. 117)
The concept of material and substantial disruption has created a relationship between off-
campus issues and school related repercussions because of them. This merging has
created the nexus or connection that has given school systems ownership of the problem
and has opened the doors for them to legally respond to off campus issues.
Cyberbullying 45
According to Mason (2008), there are certain questions or guiding principles that
can be used when deciding upon how to react to cyber issues at school:
1) Did the incident happen on campus or off? If the incident happened on campus,
the school has more authority to address the issue. If the issue of cyberbullying
happens on campus, more than likely, the perpetrators are breaking other school
rules and policies that administration can use to enforce consequences for their
actions (Mason, 2008). When the incident happens off campus, it is important
that a school nexus can be found before schools respond with disciplinary
measures. If the material was redistributed using school equipment, this nexus is
easy document. If not, then the schools have a harder time substantiating their
actions (Willard, 2007).
2) Can the school place restrictions on off-campus student free speech? Precedents
already set in the area of student free speech and expression can be applied to
this question. Does the student speech appear sponsored by the school even if
the incident happens off campus? J.S. v. Bethlehem Area School District (2000)
found that schools can address off-campus speech “that threatens the safety of
another person when they can demonstrate harm to the victim” (Hinduja &
Patchin, 2008, p. 127). J.S. v. Blue Mountain School District (2007) expanded
this right of schools to react when off-campus online speech disrupts school
operations or interferes with the civil rights of others on campus (Hinduja &
Patchin, 2008).
3) Does the student speech create a school climate that is not conducive to student
well-being? Many precedents have been set that allow school administration to
Cyberbullying 46
act if there is a substantial interference in the educational process. Tinker v. Des
Moines Independent Community School District is usually cited in this area as
the precedent for the expression materially and substantially disruptive was
established with this case (Mason, 2008). In Layshock v. Hermitage School
District (2006), a student created a non-threatening, non-obscene website about
the school administration. The student was disciplined by the school, and the
student brought the case to court. The school system’s disciplinary measures
were upheld because the student’s actions required school administration to
investigate, resulting in lost time, and the school had to shut down the computer
system (California School Boards Association, 2007).
4) Were search and seizure measures followed? A search of student Internet usage
history and files can be conducted as long as there is a reasonable suspicion that
misuse has occurred. Students should have a limited expectation of privacy
when on school grounds. It is, however, still questionable if school personnel
have the right to read or access text message on students’ PDAs. At this time,
the general consensus is that this might violate wiretapping laws (Mason, 2008).
Klump v. Nazareth Area School District (2006) found that “school
administrators cannot violate students’ Fourth Amendment protection against
unreasonable searches of their cell phones for voice-mails or text messages,
unless they have clear, articulated, documentable, and reasonable suspicion that
school policy has been violated” (Handuja & Patchin, 2008, p. 127).
5) Did the school act in a reasonable and prudent manner? This question is more
concerned with the degree of response that an act of cyberbullying receives. As
Cyberbullying 47
in any act of school aggression, the severity of the punishment should fit the
severity of the crime. School policies and procedures should be followed at all
times. This is why it is vital that school system’s address cyberbullying in their
policies. Even if the school system does not have a legal reason to act against
cyberbullying, the systems do have an ethical need to prevent such crimes
against students they serve (Mason, 2008).
All of these legal issues and questions reflect to the concept of in loco parentis
provided by tort law to school officials. It is the obligation of administrators and teachers
to act as careful and prudent parents for students while they are at school (Shariff, 2008).
As long as the officials are acting for the greater good of the school and its children, the
courts generally prevail on the side of education. It is in the best interest of school
systems to create protocol for education and response to cyberbullying so that they are
not held liable for neglecting their roles of careful and prudent parents (Kowalski, et al,
Policy Implications
Because their motives differ, the solutions and responses to each type of
cyberbullying incident have to differ too. Unfortunately, there is no "one size fits
all" when cyberbullying is concerned… Experts who understand schoolyard
bullying often misunderstand cyberbullying, thinking it is just another method of
bullying. But the motives and the nature of cybercommunications, as well as the
demographic and profile of a cyberbully differ from their offline counterpart.
(Aftab, 2008)
Cyberbullying 48
On November 2, 2007, the National Association of Secondary School Principals
(NASSP) published a public issue statement on Internet safety and its impact on school
policy and response. The NASSP listed several guidelines for policy makers to follow
when making policy change considerations.
The NASSP (2007) recommends that policymakers:
1. Formulate policies that reinforce a balanced approach to the use of Internet
technologies and protect students and personnel from Internet crime,
2. provide funding and other resources to support ongoing professional
development of school leaders and staff on Internet safety issues,
3. where appropriate, build the capacity of central office to be the clearinghouse
for district wide technology issues,
4. hold Internet service providers and social networking Web sites accountable
for reporting criminal behavior to the appropriate authorities,
5. reward schools that are using technology in effective and innovative ways.
Solicit, showcase and recognize these best practices, and
6. remind parents to oversee their children’s Internet use. (¶ 6)
In 2007, The California School Boards Association created a policy brief
concerning cyberbullying that can be used as a guide. The California School Boards
Association (CSBA) suggests that issues of cyberbullying are incorporated in standard
school board safety policies. Since standard school safety policies already address issues
of bullying and harassment, it is easier to modify existing policies than create new ones.
The following policy areas to be reviewed and revised are suggested:
Cyberbullying 49
1. Integration of strategies to address cyberbullying in the existing school safety
2. Search and Seizure polices should be revised to address online issues,
3. Student Technology policies should be adjusted to address bullying,
4. Education and Professional development of students, parents, and staff should
5. Acceptable use of the district’s technological resources,
6. Use of the filters to block Internet sites,
7. Supervision and monitoring policies of students’ online activity while at
school, and
8. Due Process and Disciplining Procedures (CSBA, p. 4).
While The California School Boards Association (2007) suggestions deal directly to
policy and the types of policy that should be revised or created, the suggestions of the
National Association of Secondary School Principals (2007) also include educating all
school stakeholders about the issues of cyber safety.
The appendix includes a cyberbullying framework that has been created by
Willard (2007). The framework includes three pieces: (a) a Cyberbullying or Cyberthreat
Situation Review Process (Appendix A), (b) a School Actions and Options form
(Appendix B), and (c) an Incident Report and Evaluation Form (Appendix C). These
forms have been released for use by school systems and are currently being used across
the nation to guide educators through the process of recording, reporting, and disciplining
cases of cyberbullying.
Cyberbullying 50
Willard’s (2007) framework provides a detailed outline of the steps that school
administrators can follow when responding to acts of cyberbullying. These steps take into
consideration the guidelines of the law and a school administrator’s right to respond. As
one progresses through the framework, guiding questions and follow-up procedures are
delineated. While this is a review and response framework for incidents of cyberbullying,
Willard states that this plan will best work after school systems have: (a) conducted a
policy and practice review, (b) provided professional development for school
stakeholders, (c) practiced parental and community outreach activities, (d) provided
student education, and (e) conducted ongoing needs assessments to monitor the progress
of the school plan. She condones both proactive and reactive measures to address the
issue of cyberbullying.
Summary and Interpretations
Olweus’ work (1993) on traditional bullying in the late 1970’s set the tone for
future work in the study of school bullying. He brought to light the common occurrence
of child on child aggressive behaviors at school and the detrimental affects these
behaviors had on those who were involved in them. Subsequent research supported that
bullying incidents at school were traditionally seen as rites of passage that allowed
children to learn to adapt to the real world and take up for themselves (Coloroso, 2003).
This was substantiated by the fact that although most instances of bullying were
witnessed by others, few actually did anything to assist those who were bullied and the
victims were often left to fend for themselves (Craig & Pepler, 1998).
Cyberbullying 51
Studies concerning traditional school bullying were not conducted in America
until 2001 with the work of Nansel and colleagues, the same year that researchers began
to study the emergence of a new school aggression issue, cyberbullying. Since then, these
issues have been merged in the works of researchers conducting quantitative studies and
meta-analyses of previous research to shed light on the commonalties and differences of
these aggressive acts and how related factors influence social reactions and school policy.
Belsey (2008) and Willard’s conceptual frameworks (2003 & 2007) on cyberbullying and
responses to cyberbullying have been guiding pieces for the subsequent work of Aftab
(2006 & 2008), Hinduja & Patchin (2008), and Shariff (2008). All concur that
cyberbullying acts are reflective of traditional bullying acts in that they are attempts of
one group to have power over another. All also concur that the medium through which
these cyberbullying acts occur the Internet has created a construct difference that
must be recognized in order for all involved to appropriately respond.
Research advocates it is through education and awareness that true strides will be
made in the deterrence of cyberbullying (Hinduja & Patchin, 2008; Kowalski, 2008;
Shariff, 2008; Willard, 2007). Common reactive practices by school systems to apply
disciplinary actions against those who commit acts of cyberbullying have not proven to
be effective. Likewise, it is not always clear which school system disciplinary responses
against these acts are permissible by law. Reactive measures taken by schools may reduce
aggressive incidents from reoccurring by those who are caught, but is takes programs that
instill character and cultivate healthy behaviors to affect long term changes (Perry, 1999).
Teen responses to the Internet, its uses, and issues related to it will be directly affected by
Cyberbullying 52
the responses of the adults who are around them. If this response is constructive,
educated, and positive, more teens will respond in like fashion (Kowalski, 2008).
Cyberbullying is undeniably an issue that is emerging on school campuses. While
it has always been understood that school and home issues are not mutually exclusive, it
is becoming more common that on-campus concerns for student safety and well-being are
related to off-campus student Internet use (Shariff, 2008). Online social networks have
emerged as prominent factors in the lives of the students served by school systems, and
the line that separates their online actions from home and school is blurring. Due to the
nature of this online aggression, it is not always easy for school officials to understand
when their rights begin and those of the cyberbully and cyberbullied begin. More work is
needed to develop better response frameworks for administrators and school system
support. However, the judicial system will ultimately set the standards upon which these
frameworks will be based and only time will tell what the legal precedents may be
(Sampson, 2002).
While many names researcher names are beginning to emerge in the study of
cyberbullying, most of their ideas are based upon the traditional work of Olweus and the
frameworks of Willard. No studies were found that contradicted their basic thoughts in
this field of study they only substantiated and expounded upon them. Common terms
and like concepts were used repetitively to address the same basic guiding questions in
the literature surveyed. These same guiding questions were used to develop this literature
review and, consequently, may have limited the scope of the reviewer and the breadth of
information considered.
Cyberbullying 53
Separate but Equal? Bullying and Cyberbullying
Today’s children are much more fluent at using online resources than ever before.
Their understanding of cyberlanguage and cybersociety is poles apart from today’s adults
who were not born into a world that has evolved from a physical environment to infinite
cyber space; today’s youth do not see the Internet as separate from traditional
socialization and interactions, but as common as face-to-face talking (Shariff, 2008).
Adults view the Internet as tool to be used; teens view the Internet as an extension of
themselves. These differing viewpoints have caused a division in how Internet use and
the issues related to it are understood by various stakeholders (Goodstein, 2007).
Possibly, this division in understanding has also created a divide between traditional
bullying and cyberbullying that does not exist nor needs to be focused upon when
developing overarching policies and programs to address bullying and cyberbullying.
Until the late 1990s, traditional bullying, the roots to cyberbullying, had never
really been recognized as an issue that needed to be addressed on school campuses. Since
then, many character education programs have been developed to instill good citizenry
and middle class values, but there is no real research to gauge if they have been effective
in curbing bullying behaviors at school or if the same basic premises can be applied to
cyberbullying response (Coloroso, 2003; Shariff, 2008). Do these two issues, bullying
and cyberbullying, need to be separated in order to be addressed? Studies show that the
acts of aggression in both types are based upon the same desires: power and a need to
dominate or subdue others (Shariff, 2008). Conceivably the answers to solving both types
of bullying may be more alike than different.
Cyberbullying 54
Consider this. When students hit with their fists, it is called physical bullying.
When students tease with their mouths, it is called verbal bullying. It only makes sense
that when one harasses using the Internet, it is called cyberbullying. This idea is alluded
to by Shariff (2008) who believes that “cyberbullying is simply a progression of
traditional bullying using new means” (p. 31). Shariff’s comment brings to mind
Coloroso’s (2003) analogy that incidents of traditional bullying are simply acts being
played out by characters on a stage.
Instead of the scene unfolding on the school playground, the characters of
cyberbullying are staged in a virtual world that has its own setting concerns and issues to
be addressed. The premises of the play and the characters who unfold before the audience
have not changed, but have simply adapted to their new stage. How they play out the
scene depends upon the dialogue or tools that they are given to use. Are the words that
they type from a keyboard really different from those that they speak from their mouths?
The reactions of bystanders to incidents of bulling have been portrayed as
decisive in the overall outcome of an act of bulling (Coloroso, 2003). Though not
mentioned in the role of bystander in the literature, it can be proposed that parents, school
site personnel, and school boards who are responsible for the education and protection of
children should be thought of as bystanders and studied as such. Simply referred to as
other stakeholders in the literature (Shariff, 2008), these groups are aware of the problem
and are not necessarily reacting appropriately to it. As the roles of bystanders are
conceptualized (Coloroso, 2003; Willard, 2007) this would categorized these adult groups
as bystanders who are part of the problem. While they know children under their care are
victims of bullying, they are not reacting in suitable ways to stop the occurrence.
Cyberbullying 55
Parents want their children protected, but they do not want their rights violated
while they are being protected. This often confuses their stakeholder role in an act of
aggression. While they know the incident is occurring, they also have a need to protect
their child, whether they are the bully or the bullied (Shariff, 2008). This places them in a
bystander role that is not easy to define and often complicates the situation (Coloroso,
2003). Until teachers and administrators become active participants in educating students
about and responding to online issues, they are acting as bystanders who are not part of
the solution.
School boards have the biggest responsibility of all. They create the policies and
fund the programs that teachers, administrators, students and parents are expected to
follow. Perhaps it is the battle to balance the rights and interests of these varying diverse
groups that is holding school boards back from deciding which bystander role they will
take in this issue. While they have an obligation to provide a well-rounded educational
system to their students, they also have to battle the legal and ethical issues that are
attached to this obligation (Kowalski, et al., 2008; Shariff, 2008). Consequently, school-
based officials will generally respond as outlined by school boards (Sampson, 2002).
The bystander role taken by school boards will be mostly guided by what the judicial
system will allow them to take. The bystander role taken by school officials will be the
one that is dictated to them by the school system. The best scenario would be that all
parties, parents, school officials, and school boards act as bystanders who are part of the
solution and react to acts of cyberbullying in an appropriate manner.
Cyberbullying 56
While social networking sites have been the topic of research, no studies were
found that used these sites as vehicles for study. Studies conducted in the nature setting of
the problem and those who are part of the problem will create a more conducive
environment in which true responses can be acquired. Focus groups gathered from these
sites or other online social forums would use already created participant samples that
have self-formed based upon interests prior to researcher manipulation. Asynchronous or
synchronous online interviewing protocol could be followed in order to develop studies
qualitative in nature and that would give voice to those who are most affected by the
issue if cyberbullying the children. Quantitative studies could also be conducted in like
fashion by distributing using surveys and questionnaires to already created listservs and
forums to gather stakeholder perception data.
Further research in the systemic patterns that are related to bystander reactions to
online bullying would bring to the forefront how the audiences’ responses to
cyberbullying influence future occurrences. To implement programs and policies that are
comprehensive in nature, all school stakeholder roles and responsibilities must be
considered. The old adage, It takes a whole village to raise a child, has never been more
true, and in the realm of the Internet, the boundaries of the village are growing to
encompass multitudes of individuals and personalities that have never been considered
before. Familial influences, namely parents, and the response of those of those who are
witnesses to acts of bullying, the bystanders, are most influential in determining how an
act of aggression will result (Aftab, 2008; Willard, 2007).
Cyberbullying 57
Throughout the literature review, children and their safety have been placed in the
center of the issue of cyberbullying. The body of literature is all written from the
perspective of the adult and how adults understand the issue and what adults perceive the
best practices to be in addressing cyberbullying. No research specifically addresses the
viewpoints of children and how they understand traditional bullying and cyberbullying in
theory. This issue is about children and their need for control. Their voice needs to be
heard and their perceptions of the problem may shed a new light on adult understanding
of the issue.
The research for both bullying and cyberbullying concludes that it will take
proactive measures to develop character development and stakeholder education to truly
direct all stakeholders in the right direction (Willard, 2007). “Preventing school violence
involves comprehensive programs that forge close, trusting relationships and help young
people develop a host of healthy behaviors including conflict resolution and anger
management skill…focusing on the hardware of control will not resolve dilemmas
involving the software of our students' hearts” (Halford, 1998, p.103).
Cyberbullying 58
Aftab, P. (2006). Stop Cyberbullying. WiredKids, Inc. Retrieved April 28, 2006 from
Aftab, P. (2008). What methods work with different kinds of cyberbullies? Retrieved
November 27, 2008 from
Anderson, N. (2007). A rough week for free speech? Retrieved November 12, 2008 from
APA Online (2008). School bullying is nothing new but psychologists identify new ways
to prevent it. Retrieved November 24, 2008 from http://www.psychology
Belsey, B. (2008). Always on, always aware. Retrieved
November 13, 2008 from
Boyd, D. (2008). Why youth ♥ social network sites: The role of networked publics in
teenage social life. Youth, Identity, and Digital Media. The John D. and Catherine
T. MacArthur Series on Digital Media and Learning. Retrieved on November 16,
2008 from
California School Boards Association Governance and Policy Services. (2007).
Cyberbullying: Policy considerations for boards. Retrieved April 28, 2008
Chan, H. F. (2006). Systemic patterns in bullying and victimization. School Psychology
Cyberbullying 59
International, 27(3), 352-369. Retrieved October 16, 2008 from Sage.
Chait, J. (2008). Cyberbullying statistics. Retrieved May 1, 2008 from
Coloroso, B. (2003). The bully, the bullied, and the bystander. New York: Harper
Craig, W. & Pepler, D. (1995). (Observations of bullying and victimization in the school
year. Canadian Journal of School Psychology, 13(2), p. 41-59. Retrieved on
November 24, 2008 from Sage Publications database.
Crothers, L.M., & Kolbert, J. B. (2008). Tackling a problematic Management issue:
Teachers’ intervention in childhood bullying problems. Intervention in School and
Clinic, 43(3), p. 132-139. Retrieved on October 16, 2008 from Sage Publications
Daniels, P. (2008). Zero tolerance policies in schools. Missouri: Greenhaven Press.
Damico & Toomy. (2001). House bill no. 364. Retrieved April 28, 2006 from
Federal Communications Commission. (2008) Children’s Internet protection act: FCC
consumer facts. Retrieved November 12, 2008 from
Ford, M. (2008). Cyber Safety. Guest Speaker Presentation on April 28, 2008 at Berwick
High School in Berwick, Louisiana.
Goodstein, A. (2007). Totally wired: What teens and tweens are really doing online. New
York: St. Martin’s Griffin.
Jeff's Law. (2006). Retrieved May 6 2006, from
Cyberbullying 60
Juvonen, J., & Gross, E. (2008). Extending the school grounds? Bullying experiences in
cyberspace. The Journal of School Health, 78(9), p. 496-505. Retrieved October
16, 2008 from Sage Publications database.
Halford, J. (1998). Toward peaceable schools. Educational Leadership, 56(1), p. 103.
Retrieved on November 30, 2008 from
Hinduja, S. & Patchin, J. W. (2005). Research summary: Cyberbullying victimization.
Retrieved May 1, 2006 from
Hinduja, S. & Patchin, J. W. (2008). Bullying beyond the schoolyard: Preventing and
responding to cyberbullying. California: Corwin Press.
Kirby, W. (2008). Eliminate bullying a legal imperative. National Association of
Secondary School Principals, 8(2), p. 1-6.
Kowalski, R. M., Ph.D., Limber, S. P., Ph.D., & Agatston, P. W., Ph.D. (2008).
Cyberbullying: Bullying in the digital Age. Massachusetts: Blackwell Publishing.
Lenhart, A., Madden, M., Macgill, A., & Smith, A. (2007). Teens and social media:
The use of social media gains a greater foothold in teen life as they embrace the
conversational mature of interactive online media. PEW Internet & American
Life Project. Retrieved November 15, 2008 from
Lenhart, A., Raine, L., & Lewis, O. (2001). Teenage life online: the rise of the instant-
message generation and the Internet’s impact on Friendships and family
relationships. PEW Internet & American Life Project. Retrieved November 15,
Cyberbullying 61
2008 from
Mason, K., Ph.D. (2008). Cyberbullying: Legal issues. Cleveland State University.
Retrieved May 1, 2006 from
Nansel, T., Overpeck, M., Pilla, R., Ruan, W., Simons-Morton, B., and Scheidt P. (2001).
Bullying Behaviors Among US Youth: Prevalence and Association With
PsychosocialAdjustment. Journal of the American Medical Association 285(16),
20942100. Retrieved November 22, 2008 from http://jama.ama-
National Association of Secondary School Principals. (n.d.). NASSP board position
statement on Internet safety. Retrieved May 1, 2006 from
National Education Association. (2008). National bullying awareness campaign.
Retrieved on November 22, 2008 from
bullying.html (2008). Minor, definition of. Retrieved November 24, 2008 from
Olweus, D. (1993). Bullying at School. Massachusetts: Blackwell.
Pellegrini, A., & Bartini, M. (2000). A longitudinal study of bullying, victimization, and
Cyberbullying 62
Peer affiliation during the transition form primary school to middle school.
American Educational Research Journal, 37(3), p. 699-725. Retrieved October
Perry, C. (1999). Proactive thoughts on creating safe schools. School Community
Journal, 9(1), p. 113-119.
Raywid, M. (2000). Musings in the wake of columbine What can schools do? Phi Delta
Kappa 81(6), 444 - 449.
Sampson, R. (2002). Bullying in schools. US Department of Justice, Office of
Community Oriented Policing Services. Retrieved November 22, 2008 from
Shariff, S. (2008). Cyberbullying: Issues and solutions for the school, the classroom and
the home. New York: Routledge.
Tani, F., Greenman, B., Schneiger, B., & Fregoso, M. (2003). Bullying and the big five:
A study of childhood personality and participant roles in bullying incidents.
School Psychology International, 24(2), p. 131-146. Retrieved on October 16,
2008 from Sage Publications database.
Trolley, B, Hanel, C., and Shields, L. (2006). Demystifying & deescalating cyber bullying
in the schools: A resource guide for counselors, educators and parents., Inc.
Underwood, L. (n.d). Bullying. Workshop PowerPoint on Bullying. Retrieved November
24, 2008 through the Purdue University Purdue Extension from
USA Today. (2008). State action on cyberbullying. Retrieved April 28, 2006 from
Cyberbullying 63
Willard, N. (2003). Off-campus, harmful online student speech. Journal of School
Violence, 1(2), p. 65-93.
Willard, N. (2007). Cyberbullying and cyberthreats: Responding to the challenge of
online social aggression, threats, and distress. Research Press. Retrieved
May 1, 2008 from
Willard, N. (2007). Cybersafe kids, cyber-savvy teens: Helping young people learn to use
the Internet safely and responsibly. California: Jossey-Bass.
Yamaguchi, I. (2006). Cyberlaw. Theory Culture Society, 23(2-3), p. 529-531. Retrieved
October 16, 2008 from Sage Publications database.
Cyberbullying 64
Alexander, K., & Alexander M. (2005). American Public School Law (6
California: Thomson West.
Anderson, N. (2007). What consistutes cyberbullying? A case study from the trenches.
Retrieved November 12, 2008 from
Besage, V. (2006). Bullying among girls: Friends or foes? School Psychology
International, 27(5), p. 535-551. Retrieved on September 9, 2008 from Sage
Publications database.
Bully Police USA. (2008). Retrieved April 22, 2008 from
Carlise, N., & Rofes, E. (2007). School bullying: Do adult survivors perceive long-term
effects? Traumatology, 13(1), p. 16 26. Retrieved October 16, 2008 from Sage
Publications database.
Davis, M. (2008). Social networks: Friend or foe? Education Week: Digital Directions,
Spring/Summer, p. 15-20.
Ewing, C. P. (2000). Sensible zero tolerance protects students. Harvard Education Letter.
Retrieved on October 26, 2008 from
First, J. (2000). Protection for whom? At what price? Harvard Education Letter.
Retrieved on October 26, 2008 from
Gibbs, N., (1999). In sorrow and disbelief. Retrieved November 24, 2008
Cyberbullying 65
Hargittai, E., & Hinnant, A. (2008). Digital inequality: Differences in young adults’ use
of the internet. Communication Research, 35(5), p. 602-621. Retrieved on
October 16, 2008 from Sage Publications database.
Hudson, D. (n.d.). Cyberspeech. First Amendment Retrieved on November
12, 2008 from
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School
Psychology International, 27(2), p. 157-170. Retrieved on October 16, 2008 from
Sage Publications database.
Livingstone, S., & Helsper, E. (2007). Graduations in digital inclusion: Children, young
people and the digital divide. New Media & Society, 9(4), p.671-696. Retrieved
on October 16, 2008 from Sage Publications database.
National Crime Prevention Council. (2008). Cyberbullying. Retrieved April 28,
2008 from /bullying/
Quinn, D. (2003). Legal issues in educational technology: Implications for school
leaders. Educational Administration Quarterly 39(2), p. 187-207. Retrieved
October 16, 2008 from Sage Publications database. In memory of ryan patrick halligan. Retrieved November 12,
2008 from (2008). Bullying facts and statistics. Retrieved on November 22, 2008
Schneider, M., & Buckley, J. (2002). Creating choosers: Information, the digital divide,
and the propensity to change schools. Social Science Computer Review, 20(4), p.
Cyberbullying 66
451-470. Retrieved October 16, 2008 from Sage Publications database.
Tellis, W. (1997). Introduction to case study. Retrieved November 7, 2008 from
Yu, L. (2006). Understanding information inequality: Making sense of the literature of
the information and digital divides. Journal of Librarianship and Information
Science. 38(4), p. 229 252. Retrieved October 16, 2008 from Sage Publications
Cyberbullying 67
Appendix A
Cyberbullying 68
Appendix B
Cyberbullying 69
Appendix C
Cyberbullying 70
... Hinduja and Patchin (2008) stated that "One of the most important steps a district can take to help protect its students and protect itself from legal liability is to have a clear and comprehensive policy regarding bullying and harassment, technology, and their intersection: cyberbullying" (as cited in Fegenbush 2009, p.4-5) There are four types of reasons behind online bullies indentified by Aftab (2008), The Vengeful Angel, Power Hungry, Revenge of the Nerds, Mean Girls, and Inadvertent (Fegenbush, 2009) I will be focusing on The Vengeful Angel type for this project because that type is what is commonly seen in cyberspace. This type of online bullies target those they think are victimizing one of their own or others, they do not view themselves as bullies, but as defenders of others (Fegenbush, 2009). ...
... There are four types of reasons behind online bullies indentified by Aftab (2008), The Vengeful Angel, Power Hungry, Revenge of the Nerds, Mean Girls, and Inadvertent (Fegenbush, 2009) I will be focusing on The Vengeful Angel type for this project because that type is what is commonly seen in cyberspace. This type of online bullies target those they think are victimizing one of their own or others, they do not view themselves as bullies, but as defenders of others (Fegenbush, 2009). Cyberbullying toward innocent people is no longer a new thing. ...
This screenplay project focuses on cyberbullying's impacts on its victims, both mentally and physically. The goal is to shed light into this action of crime that is often overlooked, to make a better cyberspace environment, and to raise awareness to the public, especially cyberbullying perpetrators, to stop what they are doing. To do so, this creative thesis uses the cyberbullying concept that points out how cyberspace bullying can trigger paranoia and depression among many other mental disorders. The work is based on theories on paranoia, depression and cyberbullying itself. From the screenplay, it is shown how the main characters got cyberbullied, and later went from a healthy, hardworking, resilient man to a mentally broken human being as a consequence. By understanding the impact the act of cyberbullying can have on a person’s life, cyberspace users can be more responsible and refrain themselves from the act of cyberbullying.Keywords: Cyberbully, Screenplay, Depression, Paranoia, Psychological Thriller.
... Cyberbullying may take many forms, including flaming (use of vulgar language through online communication [49], 'trolling (intentionally forcing people to argue or fight on online platforms' [49]), 'denigration (Spreading rumors to damage someone's reputation' [34], 'masquerade (pretending to be someone else or in other words hiding real identity' [34]), flooding, 'exclusion (removing someone from an online social group' [50], 'outing (sharing of someone's private information publicly' [50], 'cyberstalking (sending offensive text messages through online communication' [50]), impersonation, cyber threats and online harassment (it may include hate speech, sexual content [34], [51]). ...
Full-text available
Higher education requires access to Information and communication technologies (ICT's). This exposure and access to ICT, coupled with the excessive usage of social media, has augmented the problem of cyberbullying among university students. Previous studies have investigated cyberbullying among school students while overlooking university students, who are actually more engaged in cyberbullying perpetration. In view of the gravity of the situation and its impact on the wellbeing of the university students, this study aims to understand the role of personal and psychological factors dragging Malaysian undergraduate students of public and private universities towards cyberbullying behaviour. In order to develop the framework, the study has utilized the 'Theory of planned behavior' and 'Social Cognitive Theory'. The study is based on a quantitative research approach and employs a self-administered survey to collect data. The data has been analyzed through the Structured Equation Modeling (SEM) technique using SmartPLS. The results reveal that individual factors including cyberbullying awareness and personality traits are not associated with Malaysian undergraduate students' cyberbullying behaviour. However, psychological factors, including self-esteem, internalizing behavior, and antisocial behavior, play an instrumental role in developing Malaysian undergraduate students' cyberbullying attitude. The study also confirms that subjective norms assert a powerful positive impact on cyberbullying attitude of Malaysian undergraduates. Lastly, the study aims to contribute to the research on cyberbullying behavior by offering a conceptual validated model that predicts Malaysian university students' cyberbullying behavior. This study also found that social media usage plays moderating role between cyberbullying intention and cyberbullying behavior. Parents, universities, and governments will benefit from this study by understanding factors to be considered when making a policy to reduce cyberbullying among university students. INDEX TERMS Cyberbullying, personal factors, psychological factors, higher education, university students , theory of planned behaviour and socio-cognitive theory.
... Consequently, the victim becomes depressed, confused, anxious, violent, withdrawn, isolated and shy. His performance at home and school gets poor, as well (Buffy & Dianne, 2009). The problem of cyberbullying continues in light of the negligence of parents, social workers and psychologists who have inadequate experience and knowledge of some secrets of this issue. ...
... It includes the methods of harassment and aggression that the youth practice using with their peers via mobile phones and electronic mail, which is currently known as cyberbullying (Abu Douh, 2017). Buffy and Dianne (2009) defined cyberbullying as "the distant annoyance and harassment using the methods of electronic communications by the bully, with the aim of creating an anxious and stressful atmosphere for the victim". The electronic bullying is different from the normal way of bullying, in that it is not governed by a certain time or place, and there is a lesser degree of responsibility on the bully in comparison with the normal way of bullying (Yot-Domínguez et al., 2019). ...
Research Proposal
Full-text available
This study aimed at identifying the factors of cyberbullying among the basic stage students in the City of Al-Ain from the perspective of their parents. The study used the descriptive analytical approach in order to achieve the study objectives. The study sample consisted of 129 parents of the basic stage students who were chosen in the random way of sampling. The researcher used the electronic questionnaire as a tool for collecting data from the sample individuals, which consisted of two parts; the first part included the demographic data, and the second part consisted of 17 questions about the subject matter. The results revealed that the main reasons leading to cyberbullying are: lack of parental control; the negative impact of media on children; the low level of commitment to manners and values in our society; the prevalence of violence; and the cyberbullying, where the bully could be a victim of another bully. The results also emphasised that cyberbullying could be the reason for many psychological problems, such as depression, stress and anxiety as well as social problems, such as alienation and lack of social relationships, and in addition to academic problems, such as low academic achievement among students. Based on the results, the authors recommend: to enhance the role of the family and school in instilling good manners in our children; to insert different activities in the school curriculum to distract their attention from the bad content of the social communication methods; to invest the children's free time in developing their talent, practicing sports and different activities; and to keep them as far as possible from the virtual world.
... It includes the methods of harassment and aggression that the youth practice using with their peers via mobile phones and electronic mail, which is currently known as cyberbullying (Abu Douh, 2017). Buffy and Dianne (2009) defined cyberbullying as "the distant annoyance and harassment using the methods of electronic communications by the bully, with the aim of creating an anxious and stressful atmosphere for the victim". The electronic bullying is different from the normal way of bullying, in that it is not governed by a certain time or place, and there is a lesser degree of responsibility on the bully in comparison with the normal way of bullying (Yot-Domínguez et al., 2019). ...
Full-text available
This study aimed at identifying the factors of cyberbullying among the basic stage students in the City of Al-Ain from the perspective of their parents. The study used the descriptive analytical approach in order to achieve the study objectives. The study sample consisted of 129 parents of the basic stage students who were chosen in the random way of sampling. The researcher used the electronic questionnaire as a tool for collecting data from the sample individuals, which consisted of two parts; the first part included the demographic data, and the second part consisted of 17 questions about the subject matter. The results revealed that the main reasons leading to cyberbullying are: lack of parental control; the negative impact of media on children; the low level of commitment to manners and values in our society; the prevalence of violence; and the cyberbullying, where the bully could be a victim of another bully. The results also emphasised that cyberbullying could be the reason for many psychological problems, such as depression, stress and anxiety as well as social problems, such as alienation and lack of social relationships, and in addition to academic problems, such as low academic achievement among students. Based on the results, the authors recommend: to enhance the role of the family and school in instilling good manners in our children; to insert different activities in the school curriculum to distract their attention from the bad content of the social communication methods; to invest the children's free time in developing their talent, practicing sports and different activities; and to keep them as far as possible from the virtual world.
... While many researchers define CB/CV based on characteristics established for TB/TV, there is no agreement on the resemblance of the phenomena (Vandebosch and Van Cleemput 2009). Based on research findings, four prevailing opinions are distinguished which support that students may be involved: (a) exclusively in one of two phenomena (e.g., McLoughlin et al. 2009), (b) in both phenomena with the same role (e.g., Katzer et al. 2009;Kowalski et al. 2008;Olweus 2012), (c) in both phenomena with opposite roles, or (d) in both phenomena with multiple roles (Fegenbush and Olivier 2009). ...
Full-text available
Although increasingly more studies investigate the relationship of cyber and traditional bullying/victimization, it’s unclear whether the phenomena are distinct. The purpose of this study was to investigate the roles that Greek Junior High school students engage in cyber and traditional bullying/victimization incidents, as well as the psychosocial and emotional profile of the students that are classified into each participant role. Overall, 1,097 Greek Junior High school students (mean age= 13.95, 51% girls), completed a self-report questionnaire about cyber and traditional bullying/victimization, empathy, psychopathic traits, online disinhibition, social skills, social anxiety and peer relations. Latent Profile Analysis indicated four distinct groups of participants (“uninvolved”, “bullies”, “victims”, “bully/victims”). ANOVA and Kruskal Wallis analyses showed that “uninvolved” students had the most adaptive profile (low scores in psychopathic traits and online disinhibition and high in social skills), while students who frequently bullied both online and offline (“bullies”), were the least functional of the sample (e.g., high scores in psychopathic traits and low in empathy and social skills) and differed on several characteristics from those classified as “bully/victims”. Finally, victims had a poor psychosocial profile (e.g., high social anxiety and poor social relations). These findings confirm that cyber aggression is part of a general bullying/victimization pattern and that students are most effectively classified based on their behavior and not the context of manifestation. Findings can contribute to the ongoing debate on the similarities/differences of cyber and traditional bullying/victimization, as well as their simultaneous occurrence. Access to full-text view-only version:
... Menurut kajian baru-baru ini, kira-kira 20% hingga 40% daripada pelajar-pelajar akan menjadi mangsa buli siber semasa zaman kanak-kanak(Tokunaga, 2010). Buli siber telah menyerang ke dalam rumah mereka, bilik tidur mereka melalui komputer riba peribadi dan telefon pintar(Fegenbush & Olivier, 2009). Buli siber yang juga dirujuk sebagai buli elektronik merupakan salah satu pembawa kesan yang tidak elok hasil pembangunan teknologi komunikasi kerana serangan buli siber secara berterusan mendatangkan akibat yang negatif kepada mangsa-mangsa (Ahlfors, 2010). ...
Conference Paper
Full-text available
Abstrak Penggunaan teknologi canggih seperti komputer dan telefon pintar yang dilengkapi kemudahan internet secara berpanjangan dan tanpa bimbingan boleh meningkatkan risiko pelajar untuk mengalami gangguan emosi yang meliputi kebimbangan, kemurungan, tekanan perasaan, takut, marah, sedih, dendam dan sebagainya. Masalah emosi ini mungkin timbul akibat gangguan dan serangan siber yang kemudiannya boleh membawa kepada perubahan tingkah laku yang tidak baik atau lebih berat lagi, meningkatkan kecenderungan untuk membunuh diri. Di samping itu, pihak yang mencetuskan gangguan dan serangan siber juga mungkin mengalami masalah dan tingkah laku yang perlu dirawat demi kelangsungan hidup yang sejahtera. Salah satu pendekatan yang sering digunakan untuk menangani masalah berkaitan emosi dan tingkah laku ialah Rational Emotive Behavior Therapy (REBT). Keberkesanan REBT tidak dinafikan namun dalam pendekatan tersebut telah mengabaikan aspek agama, khususnya agama Islam yang bersifat sejagat dan syumul serta begitu akrab dengan masyarakat nusantara. Justeru, artikel ini akan membahaskan tentang kepentingan untuk menyuntik unsur keislaman dalam REBT dan seterusnya mencadangkan unsur keislaman yang sewajarnya dimasukkan dalam REBT. Berdasarkan cadangan-cadangan tersebut maka satu modul penerapan unsur keislaman dalam REBT boleh dibina dan diuji keberkesanannya untuk menangani kesan gangguan dan serangan siber dan juga masalah-masalah lain yang berkaitan emosi dan tingkah laku.
This study aims to identify the level of cyberbullying among a sample consisting of teenager students in the city of Mafraq in Jordan. It also aims to identify the differences at the level of cyberbullying in terms of gender, educational level, and academic achievement. The sample of the study was composed of 160 male and female students randomly selected from four schools of the education directorate in the northeast desert in 2020. Cyberbullying scale was employed in this research. The results revealed that the level of cyberbullying among adolescent students was moderate. Findings also suggested that there are differences at the level of cyberbullying between students in terms of gender, educational level, and academic achievement. In addition, the results suggested differences between the participants attributed to the interaction between gender and academic achievement and the interaction between educational level and academic achievement.
Conference Paper
Active mobile users and mobile web adoption in South Africa are increasing, with these increases mobile phone bullying, also widely known as " cyber-bullying ", seems to be on the rise and has become a major concern in schools. Technology provides several benefits to young people, but it also has its drawbacks, as it can be used for harm not only by some adults but also amongst youth. Victims of this horrific act are usually school learners. There has been evidence of victims suffering negative consequences both socially and academically. The government has implemented a number of Antibullying campaigns around bullying in schools, yet bullying is still increasing. School learners today have access to mobile phones and the internet. Using popular social networks such as Facebook and mobile web applications e.g. Mxit, The Grid; the communities are able to communicate effectively and efficiently. Even though policies of social networking Web sites describe cyber-bullying as a violation of the terms of service, social networks are still being used to that extent. Questionnaires were distributed to two high schools in Cape Town; the primary focus of this study was to evaluate the number of mobile phone users amongst learners, creating an awareness of cyber-bullying amongst learners, and to get an indication of the level of cyber-bullying in Cape Town schools. The paper concludes with discussions and findings that could help not only the victims of mobile phone bullying, but teachers, school government bodies and the South African government to retaliate mobile phone bullying and create an awareness in schools and communities.
This study investigates the relationship between cyber-bullying (CB), cybervictimization (CV), parenting styles, children’s Internet use and skills, on-line disinhibition, and five perceived specific Internet parenting practices in a sample of 220 Greek elementary students. Bully-victims scored higher in online disinhibition, while children of democratic parents in safe Internet use, Internet skills, and parenting communication about Internet use. CB and CV correlated negatively with Internet content parenting practices and autonomy, and positively with on-line disinhibition. CB negatively correlated with behavioral control. Psychological autonomy, warm involvement and on-line disinhibition significantly predicted CB, while psychological autonomy, CV. Prevention and intervention recommendations are provided.
Full-text available
This article expands understanding of the digital divide to more nuanced measures of use by examining differences in young adults' online activities. Young adults are the most highly connected age group, but that does not mean that their Internet uses are homogenous. Analyzing data about the Web uses of 270 adults from across the United States, the article explores the differences in 18- to 26-year-olds' online activities and what social factors explain the variation. Findings suggest that those with higher levels of education and of a more resource-rich background use the Web for more “capitalenhancing” activities. Detailed analyses of user attributes also reveal that online skill is an important mediating factor in the types of activities people pursue online. The authors discuss the implications of these findings for a “second-level digital divide,” that is, differences among the population of young adult Internet users.
Full-text available
The purpose of this research was to describe bullying on the playground The subjects were children observed either bullying or being victimized on the playground. Bullying episodes were identified with 90% inter-rater agreement. Bullying occurred regularly on the playground, approximately once every seven minutes and was of short duration, 38 seconds. The majority of bullying episodes (68%) occurred within 120 feet of the school building. Adults were found to have intervened in 4% of the episodes, while peers intervened in 11% of the episodes. However, adults were more likely to intervene than peers if they were present. Peers were involved in some capacity in 85% of the episodes. Boys bullied more than girls and were more likely to bully victims of the same-sex and repeatedly target the same victim. There were no gender differences in the type of bullying and aggression. Children in the primary and junior grades were equally likely to be involved in bullying and tended to bully students from the same grade level. The results are discussed from an individual difference, socialinteractional, and ecological perspective.
This book looks in depth at the emerging issue of cyber-bullying. In this increasingly digital world cyber-bullying has emerged as an electronic form of bullying that is difficult to monitor or supervise because it often occurs outside the physical school setting and outside school hours on home computers and personal phones. These web-based and mobile technologies are providing young people with what has been described as: 'an arsenal of weapons for social cruelty'. These emerging issues have created an urgent need for a practical book grounded in comprehensive scholarship that addresses the policy-vacuum and provides practical educational responses to cyber-bullying. Written by one of the few experts on the topic Cyber-Bullying develops guidelines for teachers, head teachers and administrators regarding the extent of their obligations to prevent and reduce cyber-bullying. The book also highlights ways in which schools can network with parents, police, technology providers and community organizations to provide support systems for victims (and perpetrators) of cyber-bullying.
The Problem-Specific Guides summarize knowledge about how police can reduce the harm caused by specific crime and disorder problems. They are guides to prevention and to improving the overall response to incidents, not to investigating offenses or handling specific incidents. Neither do they cover all of the technical details about how to implement specific responses. The guides are written for police—of whatever rank or assignment— who must address the specific problem the guides cover. The guides will be most useful to officers who: Understand basic problem-oriented policing principles and methods. The guides are not primers in problem-oriented policing. They deal only briefly with the initial decision to focus on a particular problem, methods to analyze the problem, and means to assess the results of a problem-oriented policing project. They are designed to help police decide how best to analyze and address a problem they have already identified. (A companion series of Problem-Solving Tools guides has been produced to aid in various aspects of problem analysis and assessment.) Can look at a problem in depth. Depending on the complexity of the problem, you should be prepared to spend perhaps weeks, or even months, analyzing and responding to it. Carefully studying a problem before responding helps you design the right strategy, one that is most likely to work in your community. You should not blindly adopt the responses others have used; you must decide whether they are appropriate to your local situation. What is true in one place may not be true elsewhere; what works in one place may not work everywhere. Are willing to consider new ways of doing police business. The guides describe responses that other police departments have used or that researchers have tested. While not all of these responses will be appropriate to your particular problem, they should help give a broader view of the kinds of things you could do. You may think you cannot implement some of these responses in your jurisdiction, but perhaps you can. In many places, when police have discovered a more effective response, they have succeeded in having laws and policies changed, improving the response to the problem. (A companion series of Response Guides has been produced to help you understand how commonly-used police responses work on a variety of problems.) Understand the value and the limits of research knowledge. For some types of problems, a lot of useful research is available to the police; for other problems, little is available. Accordingly, some guides in this series summarize existing research whereas other guides illustrate the need for more research on that particular problem. Regardless, research has not provided definitive answers to all the questions you might have about the problem. The research may help get you started in designing your own responses, but it cannot tell you exactly what to do. This will depend greatly on the particular nature of your local problem. In the interest of keeping the guides readable, not every piece of relevant research has been cited, nor has every point been attributed to its sources. To have done so would have overwhelmed and distracted the reader. The references listed at the end of each guide are those drawn on most heavily; they are not a complete bibliography of research on the subject. Are willing to work with others to find effective solutions to the problem. The police alone cannot implement many of the responses discussed in the guides. They must frequently implement them in partnership with other responsible private and public bodies including other government agencies, nongovernmental organizations, private businesses, public utilities, community groups, and individual citizens. An effective problem-solver must know how to forge genuine partnerships with others and be prepared to invest considerable effort in making these partnerships work. Each guide identifies particular individuals or groups in the community with whom police might work to improve the overall response to that problem. Thorough analysis of problems often reveals that individuals and groups other than the police are in a stronger position to address problems and that police ought to shift some greater responsibility to them to do so. Response Guide No. 3, Shifting and Sharing Responsibility for Public Safety Problems, provides further discussion of this topic. The Problem of Bullying in Schools There is new concern about school violence, and police have assumed greater responsibility for helping school officials ensure students’ safety. As pressure increases to place officers in schools, police agencies must decide how best to contribute to student safety. Will police presence on campuses most enhance safety? If police cannot or should not be on every campus, can they make other contributions to student safety? What are good approaches and practices? Perhaps more than any other school safety problem, bullying affects students’ sense of security. The most effective ways to prevent or lessen bullying require school administrators’ commitment and intensive effort; police interested in increasing school safety can use their influence to encourage schools to address the problem. This guide provides police with information about bullying in schools, its extent and its causes, and enables police to steer schools away from common remedies that have proved ineffective elsewhere, and to develop ones that will work. Bullying is widespread and perhaps the most under-reported safety problem on American school campuses. Contrary to popular belief, bullying occurs more often at school than on the way to and from there. Once thought of as simply a rite of passage or relatively harmless behavior that helps build young people’s character, bullying is now known to have long-lasting harmful effects, for both the victim and the bully. Bullying is often mistakenly viewed as a narrow range of antisocial behavior confined to elementary school recess yards. In the United States, awareness of the problem is growing, especially with reports that in two-thirds of the recent school shootings (for which the shooter was still alive to report), the attackers had previously been bullied. “In those cases, the experience of bullying appeared to play a major role in motivating the attacker."
Since the tragic deaths in school shootings, much more attention has cen-tered on school violence and ways to make schools safer. Even though reports show that the overall school crime rate has declined since 1993, the fact that such violence has occurred on school property, in rural America, has shocked millions. The belief that "it can't happen here" has been badly shaken. Reactive measures such as metal detectors, student I.D. badges, security guards, locker searches and zero-tolerance polices can reduce violence, but schools and communities must do much more. They must be proactive. "Schools that impose order, rather than cultivating it, may win no more than an uneasy truce while at the same time losing the hearts and minds of their students" (Gaddy, 1987, pp 28-29). Building a respectful, caring, learn-ing environment by enhancing student sense of belonging, implementing a multifaceted school-wide character education program and teaching conflict resolution strategies can greatly reduce the reliance on reactive measures stated above and be instrumental in creating safe schools.
Using a new non-anonymous questionnaire and a nomina- tion method by which victims were asked to name their aggressors, Chan (2002) collated the responses from individual victims to produce name-clusters that were studied for systemic patterns of bullying and victimization within the whole-school community. Three such patterns emerged: serial bullying, multiple victimization and the familial pattern in bullying. Serial bullying is the situation where one perpe- trator preys on two or more victims, often traversing a broad range of classes and grades to target his/her victims. Although relatively fewer in number, this group of serial bullies was found to be responsible for a sizeable percentage of the bullying problems in the schools sampled. The data obtained support the notion that concentrating intervention efforts on this group will reap tremendous payoffs, by effectively elimi- nating the origin of much of the school's various forms of violence. The converse of serial bullying is multiple victimization, that is, more than one perpetrator can converge on one victim. The reasons why some children are chronically victimized and attract attack from multiple sources was discussed in the context of personality dispositions, peer- relational and family-relational factors, as well as its developmental links with workplace victim status in adulthood. The third pattern studied by Chan (2002) involved cases where children in the same family (i.e. siblings) turned up being named as bullies by their peers. Family influences (e.g. rearing practices, parental modelling) on aggres- sive behaviour in children have long been known. But transmission of influences between siblings, through acting as 'key pathogens' and/or 'partners in crime' is also responsible for the aggregation of delinquent behaviour. The familial pattern in bullying found in Chan's (2002) study is consistent with such transmission pathways. The ability to reveal the hidden patterns of interaction and links amongst bullies and victims in the context of the whole-school community attests to the sig- nificance and practical use of the SLS peer nomination method of asking victims to name the perpetrators of bullying. It makes possible the tracking of bullies and victims beyond class boundaries, thereby
In this article, the authors examine the extent to which electronic information about schools is an effective means of facilitating informed school choice. Using data gathered from a web site providing information to parents in Washington, D.C., the authors find that the digital divide is a potent barrier against widespread use of this information, despite its importance and potential to bridge the “content gap.” Among those parents who do use the site, however, the authors find that the amount of information that the parents view increases the probability of attempting to change their child’s school.
New technologies have the potential to revolutionize the educational system. Advancements in educational technology are taking place so swiftly that statutory and case law are continually developing and striving to keep the pace. Repercussions for school leaders are significant and include technology-related issues involving freedom of speech, harassment, privacy, special education, plagiarism, and copyright concerns. School leaders need to be mindful of these emerging legal conditions and understand the importance of professional development training for educators on technology and the law. With this in mind, the school law researcher and professor's role should be to communicate frequently with educators about new statutes and how to apply legal concepts and frameworks to these developing situations.