Вы находитесь на странице: 1из 11

Running head: CYBERBULLYING: BEHIND THE KEYS

CYBERBULLYING: BEHIND THE KEYS


YVONNE LAWSON
ARIZONA STATE UNIVERSITY
SPE 417 K. BLACKSTONE
SPRING 2014
CYBERBULLYING: BEHIND THE KEYS

Page | 2

Abstract
The world as we know it has evolved by startling measures when it comes to technology. As any
form of technology becomes mainstream, the cost declines, and the availability rises. The internet, cell
phone and all forms of digital connectivity have followed this pattern to the point that children are now
endowed with Smart phones and Facebook pages. The school systems are encouraging BYOD, (Bring
Your Own Device) so that students can have access to more information than what is housed inside of the
classroom. President Franklin D. Roosevelt once said, "Great power involves great responsibility"
(Franklin D. Roosevelt, 2014).
1
The problem is children are being given great power and no idea how to
handle the responsibility.
This leads to an increasing occurrence of cyber bullying and little means of legally addressing the
issue, since the law has failed to keep up with technology. Furthermore, the law cannot clearly define the
point where the rights of one person begin and another's ends.
The purpose of this literature review is to understand what happens to the parties involved when
there are instances of cyber bullying. The literature of Donegan, Olweus, Madden et al. from Pew
Research Internet Project, as well as other research will attempt to define cyber bullying, the common
behaviors, and address the need for further legislation and school programs to support and protect our
youth from their digital enemies.





1
U.S. President Franklin D. Roosevelt wrote these words in an undelivered address prepared for Jefferson
Day, April 13, 1945. This address was later published. This quote or similar is also attributed to Voltaire. Source:
Voltaire. Jean, Adrien. Beuchot, Quentin and Miger, Pierre, Auguste. "uvres de Voltaire, Volume 48". Lefvre,
1832
CYBERBULLYING: BEHIND THE KEYS

Page | 3

The advancements in digital technology have progressed phenomenally fast in the couple
of decades. It has provided the ability for anyone to communicate instantly with others, via text,
video and audio calls. The internet provides the ability for people to access information from
multiple sources, People can download documents, audio and video files lightning speed. It
provides current, meaningful information from a vast resource that is far greater than the
textbooks in the classroom. Students who are unable to attend school can do so with an online
program, with or without video teleconferencing (Daugherty, 1998).
The affordability of owning a home computer, laptop, tablet, and/or cell phone means
that 87% of Americans use the internet, ownership of a cell phone hit 90% and 58% of U.S.
adults own a smartphone (Health Fact Sheet, 2014). Seventy-eight percent of teens ages 12 17,
own a cell phone of any kind with nearly half of them owning a Smartphone. Seventy-four
percent of teens are accessing the internet via their cell phone or tablet. One-third of those
adolescents mainly use a cell phone for internet access. Ninety-three percent of teens either have
a computer (80% have their own computer) or have access to one at home. Teens would also
have access to public computers at the library or computers at their school. Of the 95% teens
online, 80% are users of social networking and social media sites (Madden, Lenhart, Duggan,
Cortesi, & Gasser, 2013).
This generation of adolescents have grown up in a world surrounded by technology and
digital connectivity. It is as common to them as the furniture in the house. They need not rely
upon face-to-face interaction or even telephone calls. They are using their digital devices to
instant message, chat in public or private online chat boards or forums, send a text, snap a selfie,
CYBERBULLYING: BEHIND THE KEYS

Page | 4

upload a picture on Pinterest, update a Facebook status, tweet on Twitter, or post a video file on
Tumblr or leave a comment on ask.fm, for example.
However, with kids of nearly any age, there will be conflicts. The mild conflicts are
referred to as drama. Drama can be a very mild event where someone is bored, lives to talk about
negative events for attention, or has one problem after another. Drama can also be a simple
disagreement between two people. It can also explode by involving more people. " drama
takes place in front of an audience. Teens use the affordances of social media to gather attention,
involve themselves in others lives, and manipulate 'public' perceptions" (Marwick & boyd,
2011) The internet and cellphones are used in order to tip the scales in their favor, with the
outcome to make themselves feel victorious and the other party is decimated. When this
discourse takes place via digital means, it can escalate into cyber bullying.
"Cyber bullying refers to any harassment that occurs via the internet, cell phones, or other
devices" (Cyber Bullying Law & Legal Definition, 2014). A cyber bully mentally and
emotionally abuses their victim, tormenting them psychologically. The can cause problems for
the victim in real life, such as getting friends to shun them, shaming them into hiding, and
provoking strangers and friends to mock or insult the victim. The victims of cyber bullies can be
subjected to physical attacks on their property and persons, by the cyber bully themselves or by
others. The victim often knows the bully from their school or neighborhood.
According to Dan Olweus (2014), who has studied the subject of bullying for over 35
years, "A person is bullied when he or she is exposed, repeatedly and over time, to negative
actions on the part of one or more other persons, and he or she has difficulty defending himself
or herself". Olweus defines bullying with three components:
CYBERBULLYING: BEHIND THE KEYS

Page | 5

1. Bullying is aggressive behavior that involves unwanted, negative actions.
2. Bullying involves a pattern of behavior repeated over time.
3. Bullying involves an imbalance of power or strength.
These components are present in cyber bullying as well. Cyber bullying does have its own
unique characteristics such as anonymity, accessibility to the victim, fears of retribution or the
revocation of their digital devices by parents, bystanders on the internet can be in the thousands
or more, and because children are not face-to-face, they may behave in ways they would not if
they were in the presence of the other person (Olweus, What is Cyber Bullying?, 2014).
According to Olweus, as cited by Donegan, there is a bullying hierarchy of seven
different levels; "the students who want to bully and initiate the action, their followers or
henchmen, supporters or passive bullies, passive supporters or possible bullies, disengaged
onlookers, possible defenders, and defenders who dislike the action of bullying and help those
that are victimized" (Donegan, 2012). The diversity of motives, typically anger, revenge or
frustration, indicates there is no defining who the cyber bullies are, but they share many of the
same characteristics of any bully. The cyber bully enjoys and relies upon the anonymity of the
internet. The victim may never know how close their bully may sit in class, or the reverse,
thinking it is someone near, yet it could be a stranger from afar. The latter is not as common in
terms of the primary bully. In Canadian teen, Amanda Todd's situation, the cyber bully is
currently believed to have not known Amanda and is a sexual predator. A man in the
Netherlands was arrested in connection with the online bullying of Amanda Todd (Nguyen &
Tepper, 2014).
Cyber bullies have been known to create bash board, online bulletin boards where people
can post hateful and cruel comments, taunts, and threats, by using a screen name, posting
CYBERBULLYING: BEHIND THE KEYS

Page | 6

anonymously and masking or hiding their internet protocol address. Texting a typical high school
way of communicating. It can also evolve into a text war. A person can send daily messages that
harass their victim or send unlimited texts such that the person either has to shut down their
phone or delete the unwanted texts. Deleting them without seeing them is not an easy thing for a
teenager to do. Shutting down their phone or even the ability to text is like severing a lifeline to
some, especially considering three-fourths of teens own a phone. Sexting is a more recent
phenomenon. Sexting is the act of sending sexually explicit photos, videos, or texts to a partner.
When images are sent out to someone else, even consensually, they can eventually wind up
shared on the internet. It might be a relationship gone badly and the recipient uses the sex photos
as a revenge or anger tactic. It is possible that someone else gets into one of the phones and sends
it out to everyone in an effort to humiliate, embarrass, or otherwise cause problems for their
victim (Hoff & Mitchell, 2009).
Amanda Todd was a 15-year old girl who suffered years of cyber-attacks, which also led
to school bullying. Like many young kids, they have foolish error in judgment and Amanda was
no different. She bared her breasts online and a sexual predator took a screen shot of the image.
Using the image as blackmail, the cyber bully threatened to share it with everyone if she did not
provide him/her with private cam session of a sexual nature. After Amanda refused, the bully did
as threatened, posting the image for everyone and anyone to see. The image made the rounds at
school and Amanda had to suffer the cruel and harsh treatment by her peers as well as from
strangers online. She suffered bodily harm when she was ambushed on the way home. Amanda
was later found, badly hurt, in a ditch.
CYBERBULLYING: BEHIND THE KEYS

Page | 7

Amanda tried to escape by changing schools a few times and even moving to another
city. Her online bully found her wherever she went and made sure Amanda had no peace (Todd,
2014). Amanda made several attempts on her life as well as self-injury in the form of cutting.
Cutting is "Self-injury, also called self-harm, is the act of deliberately harming your own body,
such as cutting or burning yourself. It's typically not meant as a suicide attempt. Rather, self-
injury is an unhealthy way to cope with emotional pain, intense anger, and frustration" (Self-
injury/cutting: definition, 2014).
On September 7, 2012, Amanda created a nine-minute video of her holding flashcards
and relating her torment (TheSomebodytoknow, 2012). One month later, Amanda committed
suicide. A new term has arisen for situations like Amanda, when the victim of a bully takes their
own life to escape their torment; the suicide is now being referred to as bullycide. Sadly,
Amanda's story is similar to a growing number of bullied victims. "Childline, a free counseling
service which is based in the United Kingdom and was established especially for adolescents and
teens, reported in their most recent annual report that cyber bullying concerns rose by a
whopping 87 percent in 2013" (Cyber Bullying Statistics 2014, 2014). This may not be the same
percentage of growth everywhere, but with the digital proliferation into our societies, across the
globe, the rates are raising at alarming rates.
There are several problems with online bullying. The identity of the bully may or may not
ever be revealed. If it doesn't happen on school grounds, schools may choose to ignore or may be
required to ignore, depending on where it takes place. The federal, state, or local laws may not
have a law specific enough to charge and prosecute the offender. Technology has far outgrown
the laws everywhere and legal eagles everywhere, in countries far and near, are trying to find
CYBERBULLYING: BEHIND THE KEYS

Page | 8

current laws to use, and trying to get new laws passed to protect its citizens. This is a daunting
task, but one that needs to be undertaken with expediency. One of the main hurdles to the
passage of comprehensive laws is the rights to free speech and the violation of civil rights. Some
states require that the person typing the harassment have to be uniquely identifiable, not simply
by means of ownership of the digital device or the I.P. address.
Working to Halt Online Abuse is a volunteer organization that is dedicated to fighting
cyber bullying by education of law enforcement, the internet community, and the general public.
The also attempt to provide victims with ways to empower themselves. WHO@ maintains a
website, www.haltabuse.org, that keeps abreast of pending and current cyber stalking-related
U.S. federal and state laws, including states that have yet to pass laws on this matter. They have
added two additional countries, Australia and India.
Schools are adopting after-school clubs like FOR aka Rachel's Challenge, which provides
education and support for students. Experts in the field, like Dan Olweus, who has spent thirty-
five years researching the subject of bullying and has created programs for schools to address the
bullying problems. His program is provides training, certification, assessments, webinars and
more (Olweus Bullying Prevention Program, 2014).
Amanda Todd's case is but one case, and the internet, research, and statistics are
inundated with countless more and the numbers are growing. It is clear that schools and laws
need to continue to evolve with technology and this digital age. The statistics bear out the need to
address this issue with serious and dedicated resources. Our society, more importantly, our
children desperately need this help.

CYBERBULLYING: BEHIND THE KEYS

Page | 9




References

Cyber Bullying & Social Bullying. (2013). Retrieved from Bullying Statistics:
http://www.bullyingstatistics.org/content/cyber-bullying.html
Cyber Bullying Law & Legal Definition. (2014). Retrieved from USLegal.com:
http://definitions.uslegal.com/c/cyber-bullying/
Cyber Bullying Statistics 2014. (2014). Retrieved from NoBullying.com: http://nobullying.com/cyber-
bullying-statistics-2014/
Daugherty, M. &. (1998). University Faculty and Student Perceptions of Web-based Instruction. Journal
of Distance Education, 13(1), 21-39. Retrieved from
http://www.jofde.ca.ezproxy1.lib.asu.edu/index.php/jde/article/view/134/411
Donegan, R. (2012). Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis. The
Elon Journal of Undergraduate Research in Communications, 3(1), 33-42. Retrieved from
http://www.elon.edu/docs/e-
web/academics/communications/research/vol3no1/04DoneganEJSpring12.pdf
Franklin D. Roosevelt. (2014). Retrieved from The American Presidency Project:
http://www.presidency.ucsb.edu/ws/?pid=16602
Health Fact Sheet. (2014, Jan). Retrieved from Pew Research Internet Project:
http://www.pewinternet.org/fact-sheets/health-fact-sheet/
CYBERBULLYING: BEHIND THE KEYS

Page | 10

Hoff, D. L., & Mitchell, S. N. (2009). Cyberbullying: causes, effects, and remedies. Journal of Education
Administration, 47(5), 652-665. Retrieved from
http://www.emeraldinsight.com.ezproxy1.lib.asu.edu/journals.htm?articleid=1812293
Madden, M., Lenhart, A., Duggan, M., Cortesi, S., & Gasser, U. (2013). Teens and Technology 2013.
Retrieved from Pew Research Internet Project: http://www.pewinternet.org/2013/03/13/teens-
and-technology-2013/
Marwick, A. E., & boyd, d. (2011, September 12). The Drama! Teen Conflict, Cossip, and Bullying in
Networked Publics. Social Science Research Network. Retrieved from
http://ssrn.com/abstract=1926349
Nguyen, A., & Tepper, S. (2014, April 17). Amanda Todd: Man arrested in Netherlands in Canadians
online bullying. Retrieved from TheStar.com:
http://www.thestar.com/news/gta/2014/04/17/amanda_todd_man_arrested_in_netherlands_in_con
nection_with_canadians_online_bullying.html
Olweus Bullying Prevention Program. (2014). Retrieved from ViolencePreventionWorks.org:
http://www.violencepreventionworks.org/public/index.page
Olweus, D. (2014). Recognizing Bullying. Retrieved from ViolencePreventionWorks.org:
http://www.violencepreventionworks.org/public/recognizing_bullying.page
Olweus, D. (2014). What is Cyber Bullying? Retrieved from ViolencePreventionWorks.org:
http://www.violencepreventionworks.org/public/cyber_bullying.page
Self-injury/cutting: definition. (2014). Retrieved from Mayo Clinic: http://www.mayoclinic.org/diseases-
conditions/self-injury/basics/definition/con-20025897
TheSomebodytoknow. (2012, September 7). My story: Struggling, bullying, suicide, self harm. Retrieved
from http://youtu.be/vOHXGNx-E7E
CYBERBULLYING: BEHIND THE KEYS

Page | 11

Todd, A. (2014, April 16). The Sextortion of Amanda Todd: Cyberharclement ( The Fifth Estate ). The
Fifth Estate. Retrieved from http://youtu.be/JuOMR2bv6DU

Вам также может понравиться