A Survey Analysis Carol M. Walker, MEd, MA Doctoral Candidate, IUP
◦ The use of information and communication technologies such as , cell phone and pager text messages, instant messaging, personal Web sites or blogs and online personal polling Web sites. The technology is used to promote deliberate, repeated and hurtful behavior by an individual or group, with the intent to harm others (Haber & Haber, 2007, p. 52). ◦ Cyberbullying should be considered the use of interactive technologies such as social networking sites, cell phones (text, video, voice, or picture messaging), instant messaging, or other newly developed technology-based communication tools. These tools are used to repeatedly deliver slanderous, hurtful, obsessive, or obscene messages that result in harm to the recipient (Walker, Cyberbullying Defined
Who? Why? Cyberbullying
Growth in technology ◦ Cell phones ◦ Social Networking Age Extent ◦ Varies greatly Age and Extent of Cyberbullying
Theory ◦ Social Dominance Theory Survey ◦ 27 item survey ◦ 6 Demographic and 21 cyberbullying
120 undergraduate college students ◦ 70 female, 50 male: age 18 – 24 16% live at home, 53% on campus housing, and 31% off campus but not at home Grades: 51% A-B, 47% B-C, 2% C-D Technology use: ◦ 14% between 1 & 2 hours daily ◦ 31% between 3 & 4 hours daily ◦ 55% over 4 hours daily
54% of respondents know someone who has been cyberbullied 100% of male respondents know someone who has been cyberbullied Technologies used: Facebook (56%), Cell Phones (45%), AIM (43%) most frequently reported 11% of participants reported being cyberbullied ~ 43% of them 4 or more times Statistically significant results:
Suicidal ideation Eating disorders Chronic illness Depression (often long-term) Low self-esteem Poor academic performance Problem behaviors Drinking and drugs Psychological Impact
Several court cases to date ◦ J.S. v. Bethlehem Area School District ◦ Layshock v. Hermitage School District ◦ Emmett v. Kent School District Legal Issues
Gather all forces System level ◦ Establish guidelines for appropriate use of computer networks Classroom Interventions ◦ Incorporate lessons on cyberbullying ◦ Implement effective social skills and conflict resolution Intervention and Prevention
1. Don’t engage the person 2. Print everything out 3. Change your screen name 4. Don’t share personal info in chat rooms 5. Identify the sender 6. Contact the service provider 7. Think before you send 8. Parents, get involved 9. Teachers, get involved 10. Comprehensive action is needed Stover, D. (2006) Prevention techniques for students
Enhancing Child Safety & Online Technologies ◦ December 2008 ◦ l_report.pdf l_report.pdf Wired Safety ◦ iSafe ◦ National Criminal Justice Reference Service ◦ Stop Bullying Now ◦ Stop Cyberbullying ◦ /for_educators.html /for_educators.html
Strom, P. & Strom, R. (2005) When teens turn cyberbullies. Education Digest, 71(4), Stover, D. (2006). Treating cyberbullying as a school violence issue. School Board News, 26 (8) Mason, K.L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in Schools 45(4), Pickett, A.D., & Thomas, C. (2006). Turn off that phone. American School Board Journal