Talk:Cyber-bullying/Archive01
From Wikipedia, the free encyclopedia
Contents |
[edit] Modified Cyber bullying Article
We have enjoyed the discussion regarding this article and are glad that there is interest in this topic and in developing a coherent and informative explanation of cyberbullying for everyone to reference. We will post our contribution here for discussion; once refined it can be moved to the main article page. We have edited some statements that have not been supported in the research that we are familiar with. We have included findings from our most recent research that is in review in academic journals. Any suggestions would be appreciated. Thanks.
Non-notable educator 21:54, 11 October 2005 (UTC) (assisted by the colleague with a little more notability) history here
Since no one has commented - I am moving it over to the main article Non-notable educator 20:55, 16 October 2005 (UTC)
[edit] Cyber bullying
Cyber bullying (cyberbullying, cyber-bullying, online bullying) is the use of electronic information and communication devices such as e-mail, instant messaging, text messages, mobile phones, pagers and defamatory websites to bully or otherwise harass an individual or group through personal attacks or other means. Quite simply, cyber bullying is willful and repeated harm inflicted through the medium of electonic text. Like bullying, cyber bullying involves recurring harm and can be distinguished from peer harassment as a subsent of aggressive behavior because bullying represents a pattern of behavior committed over a period of time.
[edit] Examples of Cyber bullying
One of the more recognized occurrences of cyber bullying occured when Eric Harris, one of the killers in the Columbine High School massacre, put up a web site where he discussed murdering his fellow students, although no action was taken against Harris by the authorities at the time. Another notable example was the Star Wars kid whose classmates uploaded illegally obtained video footage of him posing as the Star Wars character Darth Maul onto Kazaa in 2002. The footage was downloaded extensively and modified causing the subject extensive embarrassment resulting in treatment in a psychiatric hospital.
People Magazine (March 21, 2005) reported on a case involving a 13 year old young man who committed suicide as a result of cyber bullying. Classmates had been taunting and teasing him about his size via instant messages for about a month.
[edit] Issues Specific to Cyberbullying
Certain characteristics inherent in these technologies increase the likelihood that they will be exploited for deviant purposes. Personal computers offer several advantages to individuals inclined to harass others. First, electronic bullies can remain “virtually” anonymous. Temporary email accounts and pseudonyms in chat rooms, instant messaging programs, and other Internet venues can make it very difficult for individuals to determine the identity of aggressors. Cyberbullies can hide behind some measure of anonymity when using the text-message capabilities of a cellular phone or their personal computer to bully another individual, which perhaps frees them from normative and social constraints on their behavior. Further, it seems that cyberbullies might be emboldened when using electronic means to carry out their antagonistic agenda because it takes less energy and courage to express hurtful comments using a keypad or a keyboard than with one’s voice.
Second, supervision is lacking in cyberspace. While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users are viewable only by the sender and the recipient, and therefore outside the regulatory reach of the proper authorities. Furthermore, there are no individuals to monitor or censor offensive content in electronic mail or text messages sent via computer or cellular phone. Another problem is the increasingly common presence of computers in the private environments of adolescent bedrooms. Indeed, teenagers often know more about computers and cellular phones than their parents and are therefore able to operate the technologies without worry or concern that a probing parent will discover their experience with bullying (whether as a victim or offender).
In a similar vein, the inseparability of a cellular phone from its owner makes that person a perpetual target for victimization. Users often need to keep it turned on for legitimate uses, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone’s text messaging capabilities. There may truly be “no rest for the weary” as cyberbullying penetrates the walls of a home, traditionally a place where victims could seek refuge.
[edit] Research
Hinduja and Patchin (In Review) completed a study in the summer of 2005 of approximately 1500 Internet-using adolescents and found that over one-third of youth reported being victimized online and over 16% of respondents admitted to cyber bullying others. While most of the instances of cyber bullying involved relatively minor behavior (40% were disprespected, 18% were called names), over 12% were physically threatened and about 5% were scared for their safety. Notably, less than 15% of victims told an adult about the incident.
According to a 2005 survey by the National Children's Home charity and Tesco Mobile of 770 youth between the ages of 11 and 19, 20% of respondents revealed that they had been bullied via electronic means. Almost three-fourths (73%) stated that they knew the bully, while 26% stated that the offender was a stranger. Another interesting finding was that 10% indicated that another person has taken a picture of them via a cellular phone camera, consequently making them feel uncomfortable, embarrassed, or threatened. Many youth are not comfortable telling an authority figure about their cyberbullying victimization; while 24% and 14% told a parent or teacher respectively, 28% did not tell anyone while 41% told a friend (National Children’s Home, 2005).
A 2004 survey by i-Safe America of 1,556 students from grades 4 to 8 found that 42% had been bullied online and 35% had been threatened. As well, 53% had said hurtful things to others online. ^
A survey by the Crimes Against Children Research Center at the University of New Hampshire in 2000 found that 6% of the young people in the survey had experienced some form of harassment including threats and negative rumours and two per cent had suffered distressing harassment. In the UK, a study in 2002 by NCH, a children's charity found that one in four students had been the victim of bullying online. ^
[edit] Preventing and Addressing Cyber-bullying
As with traditional bullying, there are efforts we can take to prevent its online variant. Parents must regularly monitor the activities their children are engaged in while online. They must also encourage an open dialog with their children regarding issues of safety and responsible Internet use. Teachers, too, must take care to supervise students as they use computers in the classrooms and should consider incorporating discussions of issues related to cybersafety in their curriculum when appropriate. School liaison officers and law enforcement officials must investigate all instances of harassment – including electronic bullying – and hold responsible parties accountable. In short, parents, teachers, law enforcement, and other community leaders must keep up with technological advances so that they are equipped with the tools and knowledge to identify and address this problem before significant victimization occurs.
There are other steps you can take to address cyber bullying. Always print and save any harassing messages you receive. Only give screen names to people you trust and change often if necessary. Children and teens should talk to parents or other adults about cybersafety issues. Anyone who is being threatened and feel as though their personal safety is in jeopardy should contact the proper authorities. There are ways that you can change the way people get bullied it will really help.
[edit] Further Readings
- Berson, I. R., Berson, M. J., & Ferron, J. M. (2002). Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States. Journal of School Violence, 1(2), 51-71.
- Patchin, J. W. & Hinduja, S. (In Press). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, forthcoming in 2006.
- Hinduja, S. & Patchin, J. W. (In Review). Cyberbullying: A Preliminary Profile of Offending and Victimization. Manuscript in review.
- Keith, S. & Martin, M. E. (2005). Cyber-bullying: Creating a Culture of Respect in a Cyber World. Reclaiming Children & Youth, 13(4), 224-228.
- National Children's Home. (2005). Putting U in the picture. Mobile Bullying Survey 2005. [Online] Available: http://www.nch.org.uk/uploads/documents/Mobile_bullying_%20report.pdf, September 4, 2005.
- Ybarra, M. L. & Mitchell, J. K. (2004). Online aggressor/targets, aggressors and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45, 1308-1316.
[edit] External Links
________________________
[edit] Article Expansion Plan
I suggest expanding this article from its current status by adding the following sections.
- Research
- Examples of Cyber bullying
- Symptoms of Cyber bullying
- Suggestions for combatting cyber bullying
- By children and young people
- By parents
- By governments, schools and law enforcement
Other suggestions are welcome. I suggest working on sections here until such time as each section is ready to be moved across to the main article. Capitalistroadster 10:17, 7 October 2005 (UTC)
- I like what you've done with this so far. I would maybe mention that cyber bullying happens among children and not just to children because I'm not sure that's quite clear. You also might want to include an example that seems more like the conventional idea of bullying. The example you use, even though it's cited in some of the news articles, to me isn't a great example and would be better included in a list of examples rather than as a sole example. I'll dig around some more and see if I can find some other information that will fit in well with the outline you've suggested which I totally agree with. Nice going. Jessamyn 23:42, 7 October 2005 (UTC)
- Jessamyn,
Thanks for your advice. I have added the section on research. As for examples, I have some in mind notably the Star Wars kid which is perhaps a more typical example but I have printed off some academic journal articles outlining some examples. I would welcome your suggestions. Capitalistroadster 04:46, 8 October 2005 (UTC)
[edit] one word or two?
If one form is chosen cyberbullying vs, cyber bullying, it should remain constant throughout. I'd opt for the two word phrase and redirect the cyberbullying page to that. Jessamyn 02:51, 8 October 2005 (UTC)
- The one word phrase seems more common - 68,400 Google hits vs. 53,700. Also, cyber- is a prefix, not its own word. Andre (talk) 22:14, 26 October 2005 (UTC)
- I'd make a note to the alternitive spelling.... "Cyber bullying is also spelled "cyberbullying" in some cases..." (Signed: J.Smith) 17:20, 10 January 2006 (UTC)
As the first person to use this term six years ago as "cyberbullying" -one word, I would be very grateful if Wikipedia and others would do the same. --Belsey 04:17, 6 May 2006 (UTC)
[edit] cites for See Also links?
While I think it's a good idea to have examples, if we can, about cyberbullying, I'm reluctant to just list sites who have sometimes engaged in what some people call cyberbullying. For example Cruel.com is just a link of the day site which is sometimes cruel but often just odd and/or quirky and I think its inclusion on this list sort of dilutes the idea of cyberbullying. Can we find a list that is preferably published elsewhere that gives a few definiteive examples of this? If this list comes from someplace like that, please include a citation. Thank you. Jessamyn 14:49, 25 November 2005 (UTC)

