Jump to content

Talk:Cyberbullying

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 211.30.131.199 (talk) at 10:16, 3 April 2007. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

This article was nominated for deletion on 6 October 2005. The result of the discussion was Keep. An archived record of this discussion can be found here.


Modified Cyber bullying Article

We have enjoyed the discussion regarding this article and are glad that there is interest in this topic and in developing a coherent and informative explanation of cyberbullying for everyone to reference. We will post our contribution here for discussion; once refined it can be moved to the main article page. We have edited some statements that have not been supported in the research that we are familiar with. We have included findings from our most recent research that is in review in academic journals. Any suggestions would be appreciated. Thanks.

Non-notable educator 21:54, 11 October 2005 (UTC) (assisted by the colleague with a little more notability) history here[reply]

Since no one has commented - I am moving it over to the main article Non-notable educator 20:55, 16 October 2005 (UTC)[reply]


Cyber bullying

Cyber bullying (cyberbullying, cyber-bullying, online bullying) is the use of electronic information and communication devices such as e-mail, instant messaging, text messages, mobile phones, pagers and defamatory websites to bully or otherwise harass an individual or group through personal attacks or other means. Quite simply, cyber bullying is willful and repeated harm inflicted through the medium of electonic text. Like bullying, cyber bullying involves recurring harm and can be distinguished from peer harassment as a subsent of aggressive behavior because bullying represents a pattern of behavior committed over a period of time.


Examples of Cyber bullying

One of the more recognized occurrences of cyber bullying occured when Eric Harris, one of the killers in the Columbine High School massacre, put up a web site where he discussed murdering his fellow students, although no action was taken against Harris by the authorities at the time. [1] Another notable example was the Star Wars kid whose classmates uploaded illegally obtained video footage of him posing as the Star Wars character Darth Maul onto Kazaa in 2002. The footage was downloaded extensively and modified causing the subject extensive embarrassment resulting in treatment in a psychiatric hospital.

People Magazine (March 21, 2005) reported on a case involving a 13 year old young man who committed suicide as a result of cyber bullying. Classmates had been taunting and teasing him about his size via instant messages for about a month.


Issues Specific to Cyberbullying

Certain characteristics inherent in these technologies increase the likelihood that they will be exploited for deviant purposes. Personal computers offer several advantages to individuals inclined to harass others. First, electronic bullies can remain “virtually” anonymous. Temporary email accounts and pseudonyms in chat rooms, instant messaging programs, and other Internet venues can make it very difficult for individuals to determine the identity of aggressors. Cyberbullies can hide behind some measure of anonymity when using the text-message capabilities of a cellular phone or their personal computer to bully another individual, which perhaps frees them from normative and social constraints on their behavior. Further, it seems that cyberbullies might be emboldened when using electronic means to carry out their antagonistic agenda because it takes less energy and courage to express hurtful comments using a keypad or a keyboard than with one’s voice.

Second, supervision is lacking in cyberspace. While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users are viewable only by the sender and the recipient, and therefore outside the regulatory reach of the proper authorities. Furthermore, there are no individuals to monitor or censor offensive content in electronic mail or text messages sent via computer or cellular phone. Another problem is the increasingly common presence of computers in the private environments of adolescent bedrooms. Indeed, teenagers often know more about computers and cellular phones than their parents and are therefore able to operate the technologies without worry or concern that a probing parent will discover their experience with bullying (whether as a victim or offender).

In a similar vein, the inseparability of a cellular phone from its owner makes that person a perpetual target for victimization. Users often need to keep it turned on for legitimate uses, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone’s text messaging capabilities. There may truly be “no rest for the weary” as cyberbullying penetrates the walls of a home, traditionally a place where victims could seek refuge.

Research

Hinduja and Patchin (In Review) completed a study in the summer of 2005 of approximately 1500 Internet-using adolescents and found that over one-third of youth reported being victimized online and over 16% of respondents admitted to cyber bullying others. While most of the instances of cyber bullying involved relatively minor behavior (40% were disprespected, 18% were called names), over 12% were physically threatened and about 5% were scared for their safety. Notably, less than 15% of victims told an adult about the incident.

According to a 2005 survey by the National Children's Home charity and Tesco Mobile of 770 youth between the ages of 11 and 19, 20% of respondents revealed that they had been bullied via electronic means. Almost three-fourths (73%) stated that they knew the bully, while 26% stated that the offender was a stranger. Another interesting finding was that 10% indicated that another person has taken a picture of them via a cellular phone camera, consequently making them feel uncomfortable, embarrassed, or threatened. Many youth are not comfortable telling an authority figure about their cyberbullying victimization; while 24% and 14% told a parent or teacher respectively, 28% did not tell anyone while 41% told a friend (National Children’s Home, 2005).

A 2004 survey by i-Safe America of 1,556 students from grades 4 to 8 found that 42% had been bullied online and 35% had been threatened. As well, 53% had said hurtful things to others online. ^

A survey by the Crimes Against Children Research Center at the University of New Hampshire in 2000 found that 6% of the young people in the survey had experienced some form of harassment including threats and negative rumours and two per cent had suffered distressing harassment. In the UK, a study in 2002 by NCH, a children's charity found that one in four students had been the victim of bullying online. ^


Preventing and Addressing Cyber-bullying

As with traditional bullying, there are efforts we can take to prevent its online variant. Parents must regularly monitor the activities their children are engaged in while online. They must also encourage an open dialog with their children regarding issues of safety and responsible Internet use. Teachers, too, must take care to supervise students as they use computers in the classrooms and should consider incorporating discussions of issues related to cybersafety in their curriculum when appropriate. School liaison officers and law enforcement officials must investigate all instances of harassment – including electronic bullying – and hold responsible parties accountable. In short, parents, teachers, law enforcement, and other community leaders must keep up with technological advances so that they are equipped with the tools and knowledge to identify and address this problem before significant victimization occurs.

There are other steps you can take to address cyber bullying. Always print and save any harassing messages you receive. Only give screen names to people you trust and change often if necessary. Children and teens should talk to parents or other adults about cybersafety issues. Anyone who is being threatened and feel as though their personal safety is in jeopardy should contact the proper authorities. There are ways that you can change the way people get bullied it will really help.

Further Readings

  • Berson, I. R., Berson, M. J., & Ferron, J. M. (2002). Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States. Journal of School Violence, 1(2), 51-71.
  • Patchin, J. W. & Hinduja, S. (In Press). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, forthcoming in 2006.
  • Hinduja, S. & Patchin, J. W. (In Review). Cyberbullying: A Preliminary Profile of Offending and Victimization. Manuscript in review.
  • Keith, S. & Martin, M. E. (2005). Cyber-bullying: Creating a Culture of Respect in a Cyber World. Reclaiming Children & Youth, 13(4), 224-228.
  • Ybarra, M. L. & Mitchell, J. K. (2004). Online aggressor/targets, aggressors and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45, 1308-1316.


________________________

Article Expansion Plan

I suggest expanding this article from its current status by adding the following sections.

  • Research
  • Examples of Cyber bullying
  • Symptoms of Cyber bullying
  • Suggestions for combatting cyber bullying
    • By children and young people
    • By parents
    • By governments, schools and law enforcement

Other suggestions are welcome. I suggest working on sections here until such time as each section is ready to be moved across to the main article. Capitalistroadster 10:17, 7 October 2005 (UTC)[reply]

  • I like what you've done with this so far. I would maybe mention that cyber bullying happens among children and not just to children because I'm not sure that's quite clear. You also might want to include an example that seems more like the conventional idea of bullying. The example you use, even though it's cited in some of the news articles, to me isn't a great example and would be better included in a list of examples rather than as a sole example. I'll dig around some more and see if I can find some other information that will fit in well with the outline you've suggested which I totally agree with. Nice going. Jessamyn 23:42, 7 October 2005 (UTC)[reply]
  • Jessamyn,

Thanks for your advice. I have added the section on research. As for examples, I have some in mind notably the Star Wars kid which is perhaps a more typical example but I have printed off some academic journal articles outlining some examples. I would welcome your suggestions. Capitalistroadster 04:46, 8 October 2005 (UTC)[reply]

one word or two?

If one form is chosen cyberbullying vs, cyber bullying, it should remain constant throughout. I'd opt for the two word phrase and redirect the cyberbullying page to that. Jessamyn 02:51, 8 October 2005 (UTC)[reply]

The one word phrase seems more common - 68,400 Google hits vs. 53,700. Also, cyber- is a prefix, not its own word. Andre (talk) 22:14, 26 October 2005 (UTC)[reply]
I'd make a note to the alternitive spelling.... "Cyber bullying is also spelled "cyberbullying" in some cases..." (Signed: J.Smith) 17:20, 10 January 2006 (UTC)[reply]

As the first person to use this term six years ago as "cyberbullying" -one word, I would be very grateful if Wikipedia and others would do the same. --Belsey 04:17, 6 May 2006 (UTC)[reply]

cites for See Also links?

While I think it's a good idea to have examples, if we can, about cyberbullying, I'm reluctant to just list sites who have sometimes engaged in what some people call cyberbullying. For example Cruel.com is just a link of the day site which is sometimes cruel but often just odd and/or quirky and I think its inclusion on this list sort of dilutes the idea of cyberbullying. Can we find a list that is preferably published elsewhere that gives a few definiteive examples of this? If this list comes from someplace like that, please include a citation. Thank you. Jessamyn 14:49, 25 November 2005 (UTC)[reply]

NPOV

Ok, there was a NPOV tag added to this page... Can you please give your reasoning? I was bold and removed it... but I'll put it back given reasoning. (Signed: J.Smith)

I wasn't the one who added the tag but I have a problem with this line: Another problem is the increasingly common presence of computers in the private environments of adolescent bedrooms. This wrongly states that adolescents having computers and Internet access in their bedrooms is a bad thing and is not NPOV. I'd like to be bold and remove it but I'll wait a little while to see what others think. --WikiSlasher 13:53, 24 November 2006 (UTC)[reply]
There have been no objections and so I have removed the sentence. --WikiSlasher 05:28, 30 November 2006 (UTC)[reply]

Summary Section?

First of all the summary section spells through as thru, so I'm fixing it. But second, do we need a summary for this? lwelyk 03:14, 21 September 2006 (UTC)[reply]

Origins of cyberbullying

Cyberbullying wasn't invented until 1998??? It's been around since at least 1987. That was when I first saw it happening on a BBS.

I've deleted the entire section, there was no source and I couldn't find anything related to it using Google. --WikiSlasher 11:16, 2 December 2006 (UTC)[reply]

Move

I propose we move this article back to "Cyberbullying" which is used by vast majority of current academic researchers and is also the most commonly used spelling. --Aybaba 13:11, 15 January 2007 (UTC)[reply]

"hisself ain't a word"

Sure is - south of the mason-dixon line! *chuckles* Whoever you are [User:72.147.155.21]], at the scrag end of a tense and trying day your apt edit summary had me almost falling off my seat laughing...oh yes, and "mea culpa"...I will never get caught doing THAT one again! --Zeraeph 19:48, 9 February 2007 (UTC)[reply]

A saying

Theres an old saying "Sticks and stones will break my bones..." I forget the rest. You people are lame, get a life, "Oh my god, someone said something mean, lets get them in trouble!" —The preceding unsigned comment was added by 66.173.15.10 (talk) 14:13, 22 February 2007 (UTC).[reply]

Can Chat Rooms Really Be Used for Bullying?

How can chat rooms be used to bully people? You can quite simply leave the chat room or change your ID. The idea that you can bully someone makes very little sense.— Preceding unsigned comment added by 211.30.131.199 (talkcontribs)

I suppose you could say the same about anything. EG "If you are bullied at school you can bleach your hair or change school" - but real life doesn't work that way.
You leave the chat room, the bully can follow you, you can change your ID but you can't change your personality, it still shows enough to recognise, and BESIDES, the very fact that you are forced to try leaving the chat room, or changing your ID is already an invasion of your rights and freedoms.

--Zeraeph 12:07, 15 March 2007 (UTC)[reply]

Thanks for your feedback. You cannot change schools easily etc: I accept that, but in a chat room, all you are is a name on the page, which 99% of the time is fake. There is no information there that a bully can use to trace you (except perhaps email adresses on some, but not always, and you can always put up fake adresses-whenever I have to register for anything, I have a special account just for that so they can't spam me/send me hate mail). If you don't make any more posts etc, then what else can they do? While having to do so may be an "inavsion" of your rights, it all boils down to little more than an annoyance. Think about it: the bully is just a name on a screen, which can only cause you problems if you let it. All it really means is that some random guy on some random page does not like you. it's not as if they can bash you up or do anything like that. I guess what I'm saying is while it may be an annoyance, it's never going to be as damaging and traumatic as normal bulliyng can be.
P.S. The heading of this should have been "used", not "sued". That's my typing for you.— Preceding unsigned comment added by 211.30.131.199 (talkcontribs)
It just isn't that simple. For one thing it depends on why you are posting in the chat-room in the first place. If it's just for entertainment and fun then yes, it is easy to walk away. But supposing it is important to your business or education? Then leaving could cause you a LOT of problems. A lot of Cyber-bullying takes place in the world on online support, where people have terrible problems, of various kinds, like bereavement, terminal cancer, domestic violence, and nowhere else to turn.
To be driven away from a vital support lifeline or business connection is MUCH worse than an "annoyance". A lot of Cyber-bullies are very clever. They try to get close to you, and find out your location and identity before they start bullying. Then they can cause a lot of distress and fear.--Zeraeph 01:10, 31 March 2007 (UTC)[reply]
Guess you're right there. Depends on what you're doing on the site. I guess the only trick is not to something stupid like reveal your real ID or location until you're certain of who the person is. How many times have we all been told the first rule: never trust anyone you meet in a chat room. That's partly why people make aliases for this in the first place.
Oh, by the way, I've never heard of a chat room related to business connection. Not that I'm saying that to pay you out, just I've never thought of that before. But if it was something serious like that, surely there'd be other more secure ways to communicate with people other than a chat room, wouldn't there? (Example- use a secure private network between the person you're talinkg to, or find an alternate means of contacting them). Or if it was serious enough, then there'd probably be administrators to stop any bullies etc by removing them. Education? Same thing, and there's still the possibiltiy of moving to an alternate forum on the same topic.
As for online support, I guess you can hope for mediators/administrators etc to expel people who behave in such a way. (probably something you might find in that sort of thing), or you could perhaps go to a different forum on the same thing (although I won't deny that being forced to do so in that situation would be less than beneficial, at least).
Still, there are some things normal bullying can do that cyber-bulliyng can't. One other tactic (obviously depending on the format of the chat room in question) is simply don't click on messages by the bully. In some chat rooms, that works (you might have to click on the message before you read it). Remember, even though it may be a problem to be forced to leave, once you have done so, then the bully cannot do anything else (provided you haven't given them your address), whereas in traditional bullying, that can be a lot harder. Remember, for traditional bullying to work, you have to be near the bully (such as at the same school or workplace), which can cause a lot of fear and distress, especially if the bully spreads ruours etc. In a chat-room setting, the bully can be on the other side of the planet and know nothing about you except what you tell them. You can in fact ascertain their origin quite easily by tracking their IP address in some forums. And they can't exactly do things like spread insulting or false rumours, physically bully you, blackmail you, or anything like that. And even if they do get yor real ID, they would need a LOT of information on you to do anything else (even if they lived close to yourself, which is exceptionally unlikely). Unless you give them your address and/or telephone number, or an image of you, it will be very difficult for them to do anything else to you. The chances of them being close enough are very small: they would have to live, at the very least, in the same state as you (even then that probably wouldn't be enough- they would probably have to live in the same city, or part of the city as you). Even if you gave them all that, then the bully may still not do anything with it. Although it could be rather traumatic at first, the fear would probably subside as you eventually realised the "threat" wasn't real. The only way they could be a probelm if they weren't clsoe to you would be if you gave them some really important information like your credit card number or something like that, which is just downright stupid. The same thing goes with stuff like your phone number. Unless you do that, they're just words on a page.
Essentially, cyber bulliyng in this scenario has the limitation that you have to actually give the bully the information first. But yes, I will admit, it can still be a problem.

Plagiarism

This entire article can be found at the following website: [[2]] I read through the first couple sections and it matches word for word --67.172.225.189 09:00, 22 March 2007 (UTC)[reply]

That's because Reference.com is a Wikipedia mirror site and clearly states the article comes from here. --Zeraeph 12:22, 22 March 2007 (UTC)[reply]