SlideShare une entreprise Scribd logo
1  sur  88
Cyberbullying
By: Marisol Herrera
Technology Usage
 The prevalence rates of
technology usage among school
children continues to climb:
 Over 90% of youths use the
Internet (Wong-Lo & Bullock,
2011).
 Over 80% of teens use a cell
phone regularly (Bullying
Statistics, 2009).
 Teens between the ages of 13-17
average 1,742 text messages each
month (Gurian, n.d.).
Raises a Big Question
Are there any dangers with such usage?
Dangers
 The answer is yes. There are many dangers.
 Even though technology has its many
benefits and uses, if used improperly, it
could cause some drastic consequences.
 One misusage that will be discussed
throughout this presentation is:
CYBERBULLYING
Video
KB Recalls Her Day (Stop Bullying, 2011).
Cyberbullying
 Due to the continuous
climb of technological
advances in online and
electronic communication
and its heightened
accessibility to the world,
the typical school yard
bully has found a new
way and school yard to
torment its vulnerable
victims: this new avenue
is the cyber world.
Bullying in the 21st Century
About Cyberbullying
 A little over a decade
ago, the term
“cyberbullying” did not
even exist nor was it a
problem. Now it has
taken traditional bullying
by storm and has
revolutionized it to a
greater degree that it is
now so widespread and
pervasive that it has NO
boundaries or limits.
Definition of Cyberbullying
 Cyberbullying is defined as
an individual or group of
people that intentionally
and repeatedly inflict
harm on another person
through electronic forms
of communication to the
point where the victim
feels harassed or unsafe
(Mason, 2008; Miller &
Hufstedler, 2009).
Technology Used in Cyberbullying
 Cyberbullying harassment
includes the following uses
of technology for the
purpose to deliberately
antagonize the victim:
 Social networks (Facebook,
Twitter, MySpace, etc.)
 Mobile phone texting
 Videos
 Picture messages
 Instant messages
 Emails
 Chat rooms
 Blogs
 Phone calls
Intent of Cyberbullying
 The intent of cyberbullying is to tease,
taunt, name call, embarrass, humiliate,
threaten, and spread defamatory lies and
libelous rumors to ruin the cybervictim‟s
reputation (Miller & Hufstedler, 2009).
Its Pervasive Nature
Traditional Bullying
 Not many know it is
being done and only a
few witness it
 Usually done by one
bully or a small group
of bullies
 Lasts for short periods
of time each day and
the victim can usually
escape once at home
Cyberbullying
 Worldwide audience
that knows and is
watching it being done
 Is initiated by one bully
and then many others
join in to participate
 In a matter of seconds,
it can reach a multitude.
24/7 - attacked, home is
no longer a sanctuary
Examples of Cyberbullying
 Sending mean messages or threats through email or cell
phone
 Posting hurtful messages on social networks or web pages
 Spreading rumors online or through texts
 Posting embarrassing photos or secrets and spreading them
 Recording unauthorized videos and uploading them
 Hacking into account and posting damaging messages
 Stealing identity of person
 Leaving someone out of online groups
 Creating a fake online persona to bully others
 Sexting
 (Bullying Statistics, 2009; Brain Pop, 2012).
What is Sexting?
 Sexting is defined as the action of sending sexually
explicit photos, videos, or text through one‟s own
phone or computer to friends or potential suitors.
 20% of teenagers participate in sexting
 1 in 10 have shared a naked image of themselves
Why Do Teens Engage in Sexting
 Most Common: To be
fun or flirtatious
 To date or hook-up with
that person
 Peer pressure especially
by males (51%)
 To send a “sexy
present” to their
boyfriend or girlfriend
 To joke around
 To feel sexy
Sexting Ramifications
 Can ruin reputations
 Can spread like wild-fire to others thus cause
embarrassment and even suicide
 Could be considered as distributing child
pornography
 Could be labeled as a sex offender
Sexting, What Can We Do?
 We need to teach students about
the legal ramifications and
embarrassment that could be
incurred.
 We also need to help parents
understand this growing epidemic
and inform them of what they can
do to protect their child.
 Furthermore, because sexting can
turn into cyberbullying especially
when spread for others‟
amusement, it must be included in
the school‟s anti-cyberbullying
policy.
Why do cyberbullies bully others?
 Cyberbullies:
 Think that it is funny and want to see a reaction; 81% of
teenagers said that others cyberbully because they think
it is funny (National Crime Prevention Council, 2012a).
 Do it for entertainment because they are bored
 Do not consider the consequences of their actions
 Are motivated by anger, revenge, or frustration
 Do it to torment others and for their ego
 Do it to bolster their own social standing
 To get revenge for being bullied themselves
(Wired Kids, n.d.).
Four Types of Cyberbullies
 For each type of
cyberbully, the
motives differ:
 The Vengeful
Angel
 The Power-Hungry
and Revenge of
the Nerds
 Mean Girls
 Inadvertent
Cyberbully
The Vengeful Angel
 They do not see themselves as a bully at all.
 They see themselves righting wrongs or
protecting themselves or others from the
“bad guy” they are now cyberbullying.
 Includes when the victim becomes the bully.
 They are teaching the new victim (initial
bully) a lesson.
 They are getting revenge on the new victim.
 Get involved to protect their cybervictim
friends.
 We need to help them see that they
themselves are bullies and should not take
justice into their own hands. (Wired Kids, n.d.)
The Victim‟s Revenge
Power-Hungry & Revenge of the
Nerds
 They want to exert their authority and show
that they are powerful enough to make
others do what they want
 They also want to control others with fear
 They want an audience so they can brag
 This type of bully is usually a victim of offline
bullying
 They may be physically smaller and usually
picked on for not being popular or cool
 “Revenge of the Nerds” cyberbullying
 Intention is to frighten and embarrass others
 Act tough online but not in real life
(Wired Kids, n.d.)
Mean Girls
 They are bored and looking for entertainment
 Ego-based cyberbullying
 Usually female and bullying other girls
 Usually done in a group (virtually or
physically)
 Requires an audience
 They want others to know who they are and
that they have power to cyberbully others
 Grows when fed by group admiration, cliques
and silence of bystanders
 Quickly dies if they do not get the
entertainment value they are seeking
(Wired Kids, n.d.)
The Inadvertent Cyberbully
 They do not think they are cyberbullies
 May be pretending to be tough online like
role playing for fun
 May be reacting to hateful messages they
received feel hurt or angry from what was
sent
 They do not lash out intentionally like
Revenge of the Nerds cyberbullies
 They respond without thinking about the
consequences of their actions
 Respond out of anger and frustration, they
do not think before clicking “send”
 Sometimes they pick on their friends for fun (Wired Kids, n.d.)
What Do the 4 Types Tell Us
 “Because the motives differ from each type
of cyberbully, the solutions need to address
their special issues. There is no „one size fits
all‟ when cyberbullying is concerned. But
understanding more about why they
cyberbully others will help” (Wired Kids,
n.d.).
 We have to address the motives and our
awareness campaigns need to address the
problem using several different messages.
Why is cyberbullying so common?
 Cyberbullies do not consider
the consequences of their
actions.
 Due to the fact that
cyberbullying is a faceless
harassment, cyberbullies are
not able to see the physical
and immediate reaction or the
nonverbal feedback cues of
their victims. As a result, they
lack empathy towards their
victim, feel remorseless, and
will continue in their
tormenting process.
Feeling of Anonymity
 Due to its elusive nature, cyberbullies
feel that they are unidentifiable and
invisible. Therefore, this sense of
anonymity enables cyberbullies to
become less inhibited or less restrained
from saying hurtful things. By acquiring
a false identity, cyberbullies are able to
disguise themselves and are more
willing to act in ways that they would
not do if their identity was known.
 By being able to hide behind their avatar, online personality, they
are able to avoid being held accountable or responsible for their
actions and escape punishment. If caught, the perpetrator can
always reason that someone else hacked into their account and
posted those hurtful things thus eluding the consequences.
Quiz Time
How much do you know
about cyberbullying?
Facts About Cyberbullying Quiz
 Please complete the “Facts About
Cyberbullying” Quiz. This ten true
and false quiz is taken from the
Cyberbullying Research Center.
 You have five minutes to complete
the quiz.
Questions 1-5
1.) Victims of cyberbullying are at an increased risk for
traditional bullying victimization, substance abuse, and
school problems.
2.) A school is protected from legal liability and not required
to intervene in cyberbullying incidents that occur away from
campus.
3.) Most victims of cyberbullying tell an adult (parent or
teacher) about their experience.
4.) Research has shown that victims of cyberbullying suffer
from anger, frustration, and sadness.
5.) Cyberbullying does not result in physical harm to victims
because it occurs (and is contained) completely online.
Questions 6-10
6.) Cyberbullying is just a problem in the United States.
7.) Victims report that they are primarily cyberbullied by
strangers.
8.) Traditional schoolyard bullies are also likely to be
cyberbullies.
9.) Boys are more likely to be victims of cyberbullying than
girls.
10.) Research has shown that utilizing blocking and filtering
software decreases the likelihood of
experiencing cyberbullying.
Question 1
 Victims of cyberbullying are at an increased risk for
traditional bullying victimization, substance use, and school
problems.
TRUE
 “According to an article published in the journal Deviant
Behavior, victims of cyberbullying were significantly more
likely to report experiences with traditional bullying, to use
illicit substances, and to have other problems at school”
(Cyberbullying Research Center, 2012a).
Question 2
 A school is protected from legal liability and not required to
intervene in cyberbullying incidents that occur away from
campus.
FALSE
 “If any off-campus behavior results in a substantial
disruption at school, [schools] can intervene. Moreover, if
students are denied the opportunity to learn in a safe
environment (because of cyberbullying), school officials
who fail to act may also be found liable under the Civil
Rights Act of 1964 and Title IX of the Educational
Amendments of 1972” (Cyberbullying Research Center,
2012a).
Question 3
 Most victims of cyberbullying tell an adult (parent or
teacher) about their experience.
FALSE
 According to Hinduja‟s and Patchin‟s book, Bullying Beyond
the Schoolyard: Preventing and Responding to
Cyberbullying, “only about 40% of middle school victims of
cyberbullying told their parents and less than 30% told a
teacher. The book also points out that these numbers are
much improved from just 4 years ago when fewer than
15% of victims told an adult” (Cyberbullying Research
Center, 2012a).
Question 4
 Research has shown that victims of cyberbullying suffer
from anger, frustration, and sadness.
TRUE
 “According to a study published in the Journal of School
Violence, victims of cyberbullying were angry (30.6%),
frustrated (34%), and sad (21.8%)” (Cyberbullying
Research Center, 2012a).
Question 5
 Cyberbullying does not result in physical harm to victims
because it occurs (and is contained) completely online.
FALSE
 “While most of the harm associated with cyberbullying is
emotional, relational, or psychological (all important harms
to prevent) there are many examples where cyberbullying
has resulted in very serious physical consequences for
victims. The most extreme example of this is the several
cases reported in the media of adolescents committing
suicide after experiencing cyberbullying” (Cyberbullying
Research Center, 2012a).
Question 6
 Cyberbullying is just a problem in the United States.
FALSE
 “There have been a number of recent studies which have
demonstrated that cyberbullying is also a problem in a
number of other countries (Australia, Canada, Sweden,
Turkey)” (Cyberbullying Research Center, 2012a).
Furthermore, “several other studies are underway
exploring cyberbullying across the world” (Cyberbullying
Research Center, 2012a).
Question 7
 Victims report that they are primarily cyberbullied by
strangers.
FALSE
 According to Hinduja‟s and Patchin‟s book, Bullying Beyond
the Schoolyard: Preventing and Responding to
Cyberbullying, “21.1% of victims said the cyberbully was a
friend, 20% said it was an ex-friend, and 26.5% said it
was someone else from school. Only 6.5% said the
cyberbully was a stranger” (Cyberbullying Research Center,
2012a).
Question 8
 Traditional schoolyard bullies are also likely to be
cyberbullies.
TRUE
 “According to an article published in Deviant Behavior,
traditional bullies are 2.5 times more likely to be a
cyberbully than someone who does not bully offline”
(Cyberbullying Research Center, 2012a).
Question 9
 Boys are more likely to be victims of cyberbullying than
girls.
FALSE
 “Overall it appears that girls are slightly more likely to
report being the victim of cyberbullying than boys. More
studies have reported that girls are more likely to be
victims” (Cyberbullying Research Center, 2012a).
Question 10
 Research has shown that utilizing blocking and filtering
software decreases the likelihood of experiencing
cyberbullying.
FALSE
 “According to an article published in Journal of Child
Psychology and Psychiatry, using filtering software is NOT
significantly related to a decreased chance of Internet
harassment victimization. Some adults believe that by simply
purchasing and installing such software, they have „done
their part‟ in safeguarding their child‟s participation online.
Software solutions only go so far in controlling certain actions
in cyberspace” (Cyberbullying Research Center, 2012a).
What did this quiz show?
 Cyberbullying affects all
races and genders and is a
worldwide problem.
 The majority of students do
not tell an adult about their
victimization.
 The severe negative
repercussions that
cyberbullying causes to
victims can no longer be
ignored.
Statistics on Cyberbullying
 According to cyberbullying
statistics from i-SAFE foundation:
 Over half of teens have been
bullied online
 Half have engaged in cyberbullying
 Over 25% of teens have been
bullied repeatedly through cell
phones and Internet
 Over half of victims do not tell their
parents when cyberbullying occurs
(Bullying Statistics, 2009).
More Statistics
 In another study, only 1 in 10
tell a parent if they have been
a cybervictim (Li, 2010; Patchin
& Hinduja, 2006).
 1 in 10 teens have had
embarrassing or damaging
pictures taken without
permission
 1 in 5 teens have engaged in
sexting
 Girls are more likely than boys
to be involved in cyberbullying
Even More Statistics
 38% of teen girls have been cyberbullied
 26% of teen boys have been cyberbullied
 13% of teens have had a rumor spread about
them on the Internet
 20% of teens have been repeatedly threatened
online
 53% of teens have admitted to saying cruel things
online
 There is a 70% increase in your likelihood of being
cyberbullied if you use a social networking site
(Brain Pop, 2012).
Permanence of Cyberbullying
 Once it is posted on the Internet, it will
never go away. It could circulate and then
resurface at later times to renew the pain of
cyberbullying (Bullying Statistics, 2009).
Consequences of Cyberbullying
 Cyberbullying can:
 Undermine the school climate and environment
 Interfere with the victim‟s school functioning by
diminishing his/her ability to concentrate academically
and by increasing his/her number of absences
 Lead to “bullicide” and school shootings (Holladay, 2011).
 Cause the development of other mental health problems
 Can emotionally scar the victim with its long-term effects
that can persist into adulthood
Emotional Consequences
 Very damaging effects:
 Increased anxiety
 Depression
 Low self-esteem
 Distress
 Stress
 Loneliness
 Loss of Interest
 Irritability
 Fear
 Suicide ideation
 Suicide
Suicide and Cyberbullying
 Cyberbullying
repercussions can be
deadly:
 Cybervictims are twice as
likely to attempt suicide
when compared with peers
who experience traditional
bullying and were not
targeted with online abuse
and harassment (Holladay,
2011).
Public humiliation and a
worldwide audience that
joins in to participate in
the harassment could be
contributing factors that
lead to suicide.
Megan Meier
 In 2006, days before her 14th birthday, Megan
Meier, a teen from Missouri, committed suicide by
tragically hanging herself.
 Her suicide was a result of the constant
cyberbullying from Lori Drew who used the
pseudonym “Josh Evans” to destroy Megan on
MySpace.
 Minutes before she hung herself in her closet,
Megan read Josh‟s last message to her saying,
“the world would be a better place without you”
(Miller & Hufstedler, 2009, p. 2).
Result of the Megan Meier Tragedy
 After Megan‟s death,
Missouri passed a law
making cyberbullying a
“crime that can result in
jail time, fines or both”
(Snakenborg, Van Acker, &
Gable, 2011, p. 90).
 Megan‟s tragedy is just
one of the many other
tragic incidents that occur
due to cyberbullying.
Legal Implications
 In some states, laws have been
passed to punish cyberbullies:
 Suspension
 Expulsion
 Fines
 Prison Time
 In situations where sexting is
involved, a “sex offender” label
could be placed on the cyberbully
regardless if they are a minor.
 Furthermore, libel, harassment,
identity theft, invasion of privacy,
and civil defamation could be used
in a lawsuit against cyberbullies.
Anti-Cyberbullying Laws
 As of right now, 34 states have anti-
cyberbullying laws.
 TEXAS: “H.B. 1942 Act applies beginning with
the 2012-2013 school year. Schools must
have a policy. „…„bullying‟ means…engaging
in written or verbal expression, expression
through electronic means, or physical
conduct that occurs on school property, at a
school-sponsored or school-related activity,
or in a vehicle operated by the district.‟
Nothing in the law about behaviors that occur
away from school or about substantial
disruption to the learning environment”
(Hinduja & Patchin, 2012c).
What Can Schools Do?
 Educate the school community about it
 Educate students that it is wrong and if
found doing so, they will be subject to
discipline
 Review their harassment and bullying
policy to see if cyberbullying is included
 If it covers cyberbullying, incidents that
occur at school or that originate off campus
but ultimately result in substantial
disruption of the learning environment are
well within a school‟s legal authority to
intervene (Hinduja & Patchin, 2010).
What Can We Do as School Counselors?
 Educate all stakeholders especially
parents and students about
cyberbullying and its effects.
 Because the majority of students
do not inform an adult, we need to
teach them the importance of doing
so and how to do it.
 In regards to parents, we need to
teach them the importance of
monitoring.
 Incorporate cyberbullying lessons in
the school counseling program.
Students Need to Know
 Let students know about the consequences:
 Causes some serious emotional damage to the
victim (depression, suicide, etc.)
 What they post reflects negatively towards
them and may affect their future college and
job applications
 Can lose their cell phone and computer usage
 Legal ramifications: libel, harassment, etc.
 Sexting can label them as a “sex offender”
 Pseudonyms do not protect them and they can
be tracked (IP address and phone companies)
One Activity We Could Use
 Have all students take out a sheet
of paper.
 Tell them to crumple it up.
 Afterwards, tell them to smooth it
back out again as much as possible
so that there are no wrinkles.
 Then ask: “The wrinkles won‟t ever
completely come out, will they?”
(Diaz, Evans, & Gallagher, n.d.).
 Compare it to: Information we post
will always be there and it is
impossible to remove.
Help Students who are Victims
 As school counselors, we
need to:
 Encourage teens to tell an adult
if cyberbullying is occurring
 Reassure them that it is not
their fault
 Inform them to NOT delete the
messages but rather print them
and save them as proof that
cyberbullying is occurring
 Show them how to use Print
Screen, Report Abuse, and
Block Users
Show Students Safety Strategies
 As school counselors, we need to show students
how:
 To keep private information from being public (ex. Not
posting too much personal information about themselves
on the Internet)
 To never choose a password that can be easily guessed
 To never give out their password to anyone except their
parents (aka digital hygiene)
 To never post confidential information to others because
secrecy is never guaranteed especially when the other
person can easily inform others
 To take advantage of privacy settings and prevention
tools
Prevention Tools Usage
 Even though students are aware of the
availability of prevention tools and
techniques such as blocking and reporting
abuse, the majority of victims do not utilize
these cyberbullying prevention tools. Why?
 One reason: The victim would like to know what
was posted about them that way the victim
does not feel that she is in the dark in not
knowing what was said about her.
Bystanders Need to Speak Up
Martin Luther King Jr. once said:
“In the end, we will remember not the
words of our enemies, but the silence of
our friends.”
Encourage Bystanders to Speak Up
 Teach students how to be courageous bystanders
that:
 “Don‟t stand by – Stand Up!”
 Do not engage in or support mean comments online or
talk about it at school
 Support the cybervictim by posting positive comments
 Invite the cybervictim to spend time with you
 Print the evidence and share with an adult
 Tell an adult at home or at school
 Confront the cyberbully when it is safe
Take 5
 Do not fight back. Do not respond to
cyberbullying messages (Stop Bullying, n.d.;
Hinduja & Patchin, 2012a).
 Step away from computer for 5 minutes
 Go do an activity that is calming:
 Yoga
 Deep-breathing
 Watch TV
 Read a book
 Exercise
Stop, Block, and Tell
 STOP: Do not fight back.
 BLOCK: Block the cyberbullies. Use privacy
settings and prevention online tools. (Hinduja
& Patchin, 2012b).
 TELL: Tell an adult about it.
Videos To Show Our Students
 ABC Family Movie: Cyberbully
 BrainPop Video:Cyberbullying
 On Guard Online Video: Stand Up to Cyberbullying
(On Guard Online, n.d.b).
Parents
 Parents need to know that:
 Even though students have confidence that adults will
intervene in their cybervictimization, 90% of
cybervictims do NOT report their cyberbullying incidents
to an adult (Burnham et al., 2011; Juvonen & Gross,
2008).
 In another study, only 24% told a parent and 14% told
a teacher of their cybervictimization (Ybarra & Mitchell,
2004).
 According to a study conducted by Wong-Lo & Bullock,
41% of students in grades 5-12 stated that their
parents have no idea or clue of what they do when
using the Internet (2011).
Why Students Do Not Tell an Adult
 Students do not tell an adult about
their cybervictimization because:
 They feel adults will not understand
them
 They feel no one will believe them
 They feel they might get blamed
 Feel adults will not do anything
 Adults will place restrictions on their
internet and cell phone usage
 Peers will make fun of them
 It will exacerbate the problem (Price
& Dalgleish, 2010).
What Can Parents Do?
 Learn more about social media
 Become a “friend” of theirs on their social network
 Monitor their child‟s internet usage and get their passwords
 Place a computer in a shared space such as a living room
 Not allow internet access (computer or cell phone) in private
rooms since this could expose them to being victims
 Have curfews on when the Internet is accessible
 Talk to their kids about what is and is not appropriate to
post online (oversharing, profanity, and bullying)
 Teach children when and how to speak up for help
 Know the warning signs of a cyberbully and cybervictim
(On Guard Online, n.d.a; On Guard Online, n.d.b).
How to Identify a Cybervictim
 Warning Signs for Parents:
 Unexpectedly stops using
their computer or cell phone
 Appears nervous or jumpy
when an instant message or
email appears
 Uneasy about going to
school
 Appears to be angry,
depressed, or frustrated
after using the computer or
cell phone
 Becomes withdrawn
 Avoids discussions of what
they are doing on the
computer or cell phone
How to Identify a Cyberbully
 Warning Signs for Parents:
 Quickly switches screens or
closes programs when you walk
by
 Gets unusually upset if computer
or cell phone privileges are
restricted
 Avoids discussions of what they
are doing on the computer and
cell phone
 Appears to be using multiple
online accounts
 Uses an account that is not theirs
Next Step for Parents of a Cybervictim
 After their child has confessed of being a victim,
parents need to:
 Believe the child and help the child feel safe and secure
with unconditional support
 Help the child seek help: school administrators and, if
necessary, law enforcement officers
Next Step for Parents of a Cyberbully
 Parents need to:
 Address the problem head on and not wait for it
to go away Talk to child firmly about his/her
actions and explain the negative effects it has
on victims
 Let the child know of the consequences of their
actions both at home and at school
 Restrict the privilege of using cell phones and
computers
 Refer their child to the counselor
(New, 2012).
Biggest Challenges We Face
 Three challenges today
make it difficult to
prevent cyberbullying:
 1.) Many people do not
see the harm associated
with it. They dismiss it
because there are “more
serious forms of
aggression to worry
about” (Hinduja &
Patchin, 2010).
Biggest Challenges We Face cont.
 2.) Not many people are willing to step up to respond to
cyberbullying. Parents say they do not have the technical
skills to keep up. Teachers are afraid to intervene in off-
campus behaviors. Law enforcement is hesitant to get
involved unless there is clear evidence of a crime or a
significant threat to the victim‟s physical safety (Hinduja &
Patchin, 2010).
Biggest Challenges We Face cont.
 3.) In some cyberbullying cases, schools have lost for
disciplining school children on their off campus online
activity and are seen as having violated the student‟s
freedom speech rights (Stop Bullying, n.d.; Brain Pop,
2012).
What Can We Do To Overcome These
Challenges?
 We collectively need to
create an environment
where students feel
comfortable in talking with
adults and feel confident
that they will intervene to
solve the problem.
 We also need to involve all
stakeholders in the process
of stopping cyberbullying.
 We also must raise awareness (NCPC, 2012b).
 Incorporate target lessons in school counseling program
 By doing all of the above, we are on our way in stopping it
Resources
 To keep up to date with the latest research
on cyberbullying visit the Cyberbullying
Research Center website (Cyberbullying
Research Center, 2012b).
 Also visit:
 StopBullying.gov
 StopCyberbullying.org
 NCPC.org
 WiredSafety.org
References
 Brain Pop. (2012). Cyberbullying (video). Retrieved July 10, 2012, from
http://www.brainpop.com/technology/computersandinternet/cyberbull
ying/
 Bullying Statistics. (2009). Cyberbullying statistics. Retrieved July 10,
2012, from http://www.bullyingstatistics.org/content/cyber-bullying-
statistics.html
 Burnham, J. J., Wright, V. H., & Houser, R. A. (2011). Cyberbullying:
Emergent concerns for adolescents and challenges for school
counselors. Journal of School Counseling, 9(15), 1-31. Retrieved
February 28, 2012, from ERIC database.
References
 Cyberbullying Research Center. (2012a). Facts about cyberbullying
quiz. Retrieved July 10, 2012, from
http://www.cyberbullying.us/quiz.php?QUIZNUM=1
 Cyberbullying Research Center. (2012b). Identifying the causes and
consequences of cyberbullying. Retrieved July 10, 2012, from
http://www.cyberbullying.us/index.php
 Diaz, Y., Evans, L., & Gallagher, R. (n.d.). Anti-social networking: How
do texting and social media affect our children? A panel discussion by
CSC clinicians at the Nightingale-Bamford school. Retrieved July 10,
2012, from
http://www.aboutourkids.org/articles/antisocial_networking_how_do_t
exting_social_media_affect_our_children_panel_discussion_csc_
References
 Gurian, A. (n.d.). Texting and talking: Kids and cell phones. Retrieved
July 10, 2012, from
http://www.aboutourkids.org/articles/texting_talking_kids_cell_phones
 Hinduja, S., & Patchin, J. W. (2010). Cyberbullying: Identification,
prevention, and response. Retrieved July 10, 2012, from
http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_
Response_Fact_Sheet.pdf
 Hinduja, S., & Patchin, J. W. (2012a). Preventing cyberbullying: Top
ten tips for teens. Retrieved July 10, 2012, from
http://www.cyberbullying.us/Top_Ten_Tips_Teens_Prevention.pdf
 Hinduja, S., & Patchin, J. W. (2012b). Responding to cyberbullying:
Top ten tips for teens. Retrieved July 10, 2012, from
http://www.cyberbullying.us/Top_Ten_Tips_Teens_Response.pdf
References
 Hinduja, S., & Patchin, J. W. (2012c). State cyberbullying laws: A brief
review of state cyberbullying laws and policies. Retrieved July 10, 2012,
from http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf
 Holladay, J. (2011, January). Cyberbullying. Education Digest: Essential
Readings Condensed for Quick Review, 76(5), 4-9. Retrieved February
28, 2012, from Professional Development Collection database.
 Juvonen, J., & Gross, E. F. (2008, September). Extending the school
grounds? – Bullying experiences in cyberspace. Journal of School Health,
78(9), 496-505. Retrieved February 28, 2012, from Psychology and
Behavioral Sciences Collection database.
 Li, Q. (2010, June). Cyberbullying in high schools: A study of students‟
behaviors and beliefs about this new phenomenon. Journal of
Aggression, Maltreatment & Trauma, 19(4), 372-392. Retrieved February
28, 2012, from PsycINFO database.
References
 Mason, K. L. (2008, April). Cyberbullying: A preliminary assessment for
school personnel. Psychology in the Schools, 45(4), 323-348. Retrieved
February 28, 2012, from ERIC database.
 Miller, J. D., & Hufstedler, S. M. (2009). Cyberbullying knows no
borders. Refereed paper presented at „Teacher education crossing
borders: Cultures, contexts, communities and curriculum‟ the annual
conference of the Australian Teacher Education Association (ATEA),
Albury, 28 June – 1 July. Retrieved February 28, 2012, from ERIC
database.
 National Crime Prevention Council. (2012a). Cyberbullying. Retrieved
July 10, 2012, from
http://www.ncpc.org/resources/files/pdf/bullying/cyberbullying.pdf
References
 National Crime Prevention Council. (2012b). Cyberbullying. Retrieved
July 10, 2012, from http://www.ncpc.org/cyberbullying/
 New, M. (2012, January). Cyberbullying. Retrieved July 10, 2012, from
http://kidshealth.org/parent/positive/talk/cyberbullying.html
 On Guard Online. (2011, September). Cyberbullying. Retrieved July 10,
2012, from http://onguardonline.gov/articles/0028-cyberbullying
 On Guard Online. (n.d.a). Net cetera: Chatting with kids about being
online. Retrieved July 10, 2012, from
http://onguardonline.gov/articles/pdf-0001.pdf
 On Guard Online. (n.d.b). Stand up to cyberbullying (video). Retrieved
July 10, 2012, from http://onguardonline.gov/media/video-0005-stand-
cyberbullying
References
 Patchin, J. W., & Hinduja, S. (2006, April). Bullies move beyond the
schoolyard: A preliminary look at cyberbullying. Youth Violence and
Juvenile Justice, 4(2), 148-169. Retrieved February 28, 2012, from
PsycINFO database.
 Price, M., & Dalgleish, J. (2010). Cyberbullying: Experiences, impacts
and coping strategies as described by Australian young people. Youth
Studies Australia, 29(2), 51-59. Retrieved February 28, 2012, from
ERIC database.
 Snakenborg, J., Van Acker, R., & Gable, R. A. (2011). Cyberbullying:
Prevention and intervention to protect our children and youth.
Preventing School Failure, 55(2), 88-95. Retrieved February 28, 2012,
from ERIC database.
 Stop Bullying. (n.d.). Cyberbullying. Retrieved July 10, 2012, from
http://www.stopbullying.gov/cyberbullying/index.html
References
 Stop Bullying. (2011, May 9). Webisode 5: KB recalls her day (video).
Retrieved July 10, 2012, from
http://www.stopbullying.gov/videos/2011/05/webisode-5-kb-
recalls.html#playlist=p1174
 Wired Kids. (n.d.). What is cyberbullying, exactly? Retrieved July 10,
2012, from http://www.stopcyberbullying.org/
 Wong-Lo, M., & Bullock, L. M. (2011). Digital aggression: Cyberworld
meets school bullies. Preventing School Failure, 55(2), 64-70.
Retrieved February 28, 2012, from ERIC database.
 Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets,
aggressors, and targets: A comparison of associated youth
characteristics. Journal of Adolescence, 27(3), 319-336. Retrieved
February 28, 2012, from PsycINFO database.

Contenu connexe

Tendances

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 

Tendances (20)

Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Similaire à Cyberbullying

Similaire à Cyberbullying (18)

Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Edp 279 unit 2.4
Edp 279 unit 2.4Edp 279 unit 2.4
Edp 279 unit 2.4
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentation
 
Effects Of Bullying
Effects Of BullyingEffects Of Bullying
Effects Of Bullying
 
Angelo G. mendiola
Angelo G. mendiolaAngelo G. mendiola
Angelo G. mendiola
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Dernier (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Cyberbullying

  • 2. Technology Usage  The prevalence rates of technology usage among school children continues to climb:  Over 90% of youths use the Internet (Wong-Lo & Bullock, 2011).  Over 80% of teens use a cell phone regularly (Bullying Statistics, 2009).  Teens between the ages of 13-17 average 1,742 text messages each month (Gurian, n.d.).
  • 3. Raises a Big Question Are there any dangers with such usage?
  • 4. Dangers  The answer is yes. There are many dangers.  Even though technology has its many benefits and uses, if used improperly, it could cause some drastic consequences.  One misusage that will be discussed throughout this presentation is: CYBERBULLYING
  • 5. Video KB Recalls Her Day (Stop Bullying, 2011).
  • 6. Cyberbullying  Due to the continuous climb of technological advances in online and electronic communication and its heightened accessibility to the world, the typical school yard bully has found a new way and school yard to torment its vulnerable victims: this new avenue is the cyber world.
  • 7. Bullying in the 21st Century
  • 8. About Cyberbullying  A little over a decade ago, the term “cyberbullying” did not even exist nor was it a problem. Now it has taken traditional bullying by storm and has revolutionized it to a greater degree that it is now so widespread and pervasive that it has NO boundaries or limits.
  • 9. Definition of Cyberbullying  Cyberbullying is defined as an individual or group of people that intentionally and repeatedly inflict harm on another person through electronic forms of communication to the point where the victim feels harassed or unsafe (Mason, 2008; Miller & Hufstedler, 2009).
  • 10. Technology Used in Cyberbullying  Cyberbullying harassment includes the following uses of technology for the purpose to deliberately antagonize the victim:  Social networks (Facebook, Twitter, MySpace, etc.)  Mobile phone texting  Videos  Picture messages  Instant messages  Emails  Chat rooms  Blogs  Phone calls
  • 11. Intent of Cyberbullying  The intent of cyberbullying is to tease, taunt, name call, embarrass, humiliate, threaten, and spread defamatory lies and libelous rumors to ruin the cybervictim‟s reputation (Miller & Hufstedler, 2009).
  • 12. Its Pervasive Nature Traditional Bullying  Not many know it is being done and only a few witness it  Usually done by one bully or a small group of bullies  Lasts for short periods of time each day and the victim can usually escape once at home Cyberbullying  Worldwide audience that knows and is watching it being done  Is initiated by one bully and then many others join in to participate  In a matter of seconds, it can reach a multitude. 24/7 - attacked, home is no longer a sanctuary
  • 13. Examples of Cyberbullying  Sending mean messages or threats through email or cell phone  Posting hurtful messages on social networks or web pages  Spreading rumors online or through texts  Posting embarrassing photos or secrets and spreading them  Recording unauthorized videos and uploading them  Hacking into account and posting damaging messages  Stealing identity of person  Leaving someone out of online groups  Creating a fake online persona to bully others  Sexting  (Bullying Statistics, 2009; Brain Pop, 2012).
  • 14. What is Sexting?  Sexting is defined as the action of sending sexually explicit photos, videos, or text through one‟s own phone or computer to friends or potential suitors.  20% of teenagers participate in sexting  1 in 10 have shared a naked image of themselves
  • 15. Why Do Teens Engage in Sexting  Most Common: To be fun or flirtatious  To date or hook-up with that person  Peer pressure especially by males (51%)  To send a “sexy present” to their boyfriend or girlfriend  To joke around  To feel sexy
  • 16. Sexting Ramifications  Can ruin reputations  Can spread like wild-fire to others thus cause embarrassment and even suicide  Could be considered as distributing child pornography  Could be labeled as a sex offender
  • 17. Sexting, What Can We Do?  We need to teach students about the legal ramifications and embarrassment that could be incurred.  We also need to help parents understand this growing epidemic and inform them of what they can do to protect their child.  Furthermore, because sexting can turn into cyberbullying especially when spread for others‟ amusement, it must be included in the school‟s anti-cyberbullying policy.
  • 18. Why do cyberbullies bully others?  Cyberbullies:  Think that it is funny and want to see a reaction; 81% of teenagers said that others cyberbully because they think it is funny (National Crime Prevention Council, 2012a).  Do it for entertainment because they are bored  Do not consider the consequences of their actions  Are motivated by anger, revenge, or frustration  Do it to torment others and for their ego  Do it to bolster their own social standing  To get revenge for being bullied themselves (Wired Kids, n.d.).
  • 19. Four Types of Cyberbullies  For each type of cyberbully, the motives differ:  The Vengeful Angel  The Power-Hungry and Revenge of the Nerds  Mean Girls  Inadvertent Cyberbully
  • 20. The Vengeful Angel  They do not see themselves as a bully at all.  They see themselves righting wrongs or protecting themselves or others from the “bad guy” they are now cyberbullying.  Includes when the victim becomes the bully.  They are teaching the new victim (initial bully) a lesson.  They are getting revenge on the new victim.  Get involved to protect their cybervictim friends.  We need to help them see that they themselves are bullies and should not take justice into their own hands. (Wired Kids, n.d.)
  • 22. Power-Hungry & Revenge of the Nerds  They want to exert their authority and show that they are powerful enough to make others do what they want  They also want to control others with fear  They want an audience so they can brag  This type of bully is usually a victim of offline bullying  They may be physically smaller and usually picked on for not being popular or cool  “Revenge of the Nerds” cyberbullying  Intention is to frighten and embarrass others  Act tough online but not in real life (Wired Kids, n.d.)
  • 23. Mean Girls  They are bored and looking for entertainment  Ego-based cyberbullying  Usually female and bullying other girls  Usually done in a group (virtually or physically)  Requires an audience  They want others to know who they are and that they have power to cyberbully others  Grows when fed by group admiration, cliques and silence of bystanders  Quickly dies if they do not get the entertainment value they are seeking (Wired Kids, n.d.)
  • 24. The Inadvertent Cyberbully  They do not think they are cyberbullies  May be pretending to be tough online like role playing for fun  May be reacting to hateful messages they received feel hurt or angry from what was sent  They do not lash out intentionally like Revenge of the Nerds cyberbullies  They respond without thinking about the consequences of their actions  Respond out of anger and frustration, they do not think before clicking “send”  Sometimes they pick on their friends for fun (Wired Kids, n.d.)
  • 25. What Do the 4 Types Tell Us  “Because the motives differ from each type of cyberbully, the solutions need to address their special issues. There is no „one size fits all‟ when cyberbullying is concerned. But understanding more about why they cyberbully others will help” (Wired Kids, n.d.).  We have to address the motives and our awareness campaigns need to address the problem using several different messages.
  • 26. Why is cyberbullying so common?  Cyberbullies do not consider the consequences of their actions.  Due to the fact that cyberbullying is a faceless harassment, cyberbullies are not able to see the physical and immediate reaction or the nonverbal feedback cues of their victims. As a result, they lack empathy towards their victim, feel remorseless, and will continue in their tormenting process.
  • 27. Feeling of Anonymity  Due to its elusive nature, cyberbullies feel that they are unidentifiable and invisible. Therefore, this sense of anonymity enables cyberbullies to become less inhibited or less restrained from saying hurtful things. By acquiring a false identity, cyberbullies are able to disguise themselves and are more willing to act in ways that they would not do if their identity was known.  By being able to hide behind their avatar, online personality, they are able to avoid being held accountable or responsible for their actions and escape punishment. If caught, the perpetrator can always reason that someone else hacked into their account and posted those hurtful things thus eluding the consequences.
  • 28. Quiz Time How much do you know about cyberbullying?
  • 29. Facts About Cyberbullying Quiz  Please complete the “Facts About Cyberbullying” Quiz. This ten true and false quiz is taken from the Cyberbullying Research Center.  You have five minutes to complete the quiz.
  • 30. Questions 1-5 1.) Victims of cyberbullying are at an increased risk for traditional bullying victimization, substance abuse, and school problems. 2.) A school is protected from legal liability and not required to intervene in cyberbullying incidents that occur away from campus. 3.) Most victims of cyberbullying tell an adult (parent or teacher) about their experience. 4.) Research has shown that victims of cyberbullying suffer from anger, frustration, and sadness. 5.) Cyberbullying does not result in physical harm to victims because it occurs (and is contained) completely online.
  • 31. Questions 6-10 6.) Cyberbullying is just a problem in the United States. 7.) Victims report that they are primarily cyberbullied by strangers. 8.) Traditional schoolyard bullies are also likely to be cyberbullies. 9.) Boys are more likely to be victims of cyberbullying than girls. 10.) Research has shown that utilizing blocking and filtering software decreases the likelihood of experiencing cyberbullying.
  • 32. Question 1  Victims of cyberbullying are at an increased risk for traditional bullying victimization, substance use, and school problems. TRUE  “According to an article published in the journal Deviant Behavior, victims of cyberbullying were significantly more likely to report experiences with traditional bullying, to use illicit substances, and to have other problems at school” (Cyberbullying Research Center, 2012a).
  • 33. Question 2  A school is protected from legal liability and not required to intervene in cyberbullying incidents that occur away from campus. FALSE  “If any off-campus behavior results in a substantial disruption at school, [schools] can intervene. Moreover, if students are denied the opportunity to learn in a safe environment (because of cyberbullying), school officials who fail to act may also be found liable under the Civil Rights Act of 1964 and Title IX of the Educational Amendments of 1972” (Cyberbullying Research Center, 2012a).
  • 34. Question 3  Most victims of cyberbullying tell an adult (parent or teacher) about their experience. FALSE  According to Hinduja‟s and Patchin‟s book, Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying, “only about 40% of middle school victims of cyberbullying told their parents and less than 30% told a teacher. The book also points out that these numbers are much improved from just 4 years ago when fewer than 15% of victims told an adult” (Cyberbullying Research Center, 2012a).
  • 35. Question 4  Research has shown that victims of cyberbullying suffer from anger, frustration, and sadness. TRUE  “According to a study published in the Journal of School Violence, victims of cyberbullying were angry (30.6%), frustrated (34%), and sad (21.8%)” (Cyberbullying Research Center, 2012a).
  • 36. Question 5  Cyberbullying does not result in physical harm to victims because it occurs (and is contained) completely online. FALSE  “While most of the harm associated with cyberbullying is emotional, relational, or psychological (all important harms to prevent) there are many examples where cyberbullying has resulted in very serious physical consequences for victims. The most extreme example of this is the several cases reported in the media of adolescents committing suicide after experiencing cyberbullying” (Cyberbullying Research Center, 2012a).
  • 37. Question 6  Cyberbullying is just a problem in the United States. FALSE  “There have been a number of recent studies which have demonstrated that cyberbullying is also a problem in a number of other countries (Australia, Canada, Sweden, Turkey)” (Cyberbullying Research Center, 2012a). Furthermore, “several other studies are underway exploring cyberbullying across the world” (Cyberbullying Research Center, 2012a).
  • 38. Question 7  Victims report that they are primarily cyberbullied by strangers. FALSE  According to Hinduja‟s and Patchin‟s book, Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying, “21.1% of victims said the cyberbully was a friend, 20% said it was an ex-friend, and 26.5% said it was someone else from school. Only 6.5% said the cyberbully was a stranger” (Cyberbullying Research Center, 2012a).
  • 39. Question 8  Traditional schoolyard bullies are also likely to be cyberbullies. TRUE  “According to an article published in Deviant Behavior, traditional bullies are 2.5 times more likely to be a cyberbully than someone who does not bully offline” (Cyberbullying Research Center, 2012a).
  • 40. Question 9  Boys are more likely to be victims of cyberbullying than girls. FALSE  “Overall it appears that girls are slightly more likely to report being the victim of cyberbullying than boys. More studies have reported that girls are more likely to be victims” (Cyberbullying Research Center, 2012a).
  • 41. Question 10  Research has shown that utilizing blocking and filtering software decreases the likelihood of experiencing cyberbullying. FALSE  “According to an article published in Journal of Child Psychology and Psychiatry, using filtering software is NOT significantly related to a decreased chance of Internet harassment victimization. Some adults believe that by simply purchasing and installing such software, they have „done their part‟ in safeguarding their child‟s participation online. Software solutions only go so far in controlling certain actions in cyberspace” (Cyberbullying Research Center, 2012a).
  • 42. What did this quiz show?  Cyberbullying affects all races and genders and is a worldwide problem.  The majority of students do not tell an adult about their victimization.  The severe negative repercussions that cyberbullying causes to victims can no longer be ignored.
  • 43. Statistics on Cyberbullying  According to cyberbullying statistics from i-SAFE foundation:  Over half of teens have been bullied online  Half have engaged in cyberbullying  Over 25% of teens have been bullied repeatedly through cell phones and Internet  Over half of victims do not tell their parents when cyberbullying occurs (Bullying Statistics, 2009).
  • 44. More Statistics  In another study, only 1 in 10 tell a parent if they have been a cybervictim (Li, 2010; Patchin & Hinduja, 2006).  1 in 10 teens have had embarrassing or damaging pictures taken without permission  1 in 5 teens have engaged in sexting  Girls are more likely than boys to be involved in cyberbullying
  • 45. Even More Statistics  38% of teen girls have been cyberbullied  26% of teen boys have been cyberbullied  13% of teens have had a rumor spread about them on the Internet  20% of teens have been repeatedly threatened online  53% of teens have admitted to saying cruel things online  There is a 70% increase in your likelihood of being cyberbullied if you use a social networking site (Brain Pop, 2012).
  • 46.
  • 47.
  • 48. Permanence of Cyberbullying  Once it is posted on the Internet, it will never go away. It could circulate and then resurface at later times to renew the pain of cyberbullying (Bullying Statistics, 2009).
  • 49. Consequences of Cyberbullying  Cyberbullying can:  Undermine the school climate and environment  Interfere with the victim‟s school functioning by diminishing his/her ability to concentrate academically and by increasing his/her number of absences  Lead to “bullicide” and school shootings (Holladay, 2011).  Cause the development of other mental health problems  Can emotionally scar the victim with its long-term effects that can persist into adulthood
  • 50. Emotional Consequences  Very damaging effects:  Increased anxiety  Depression  Low self-esteem  Distress  Stress  Loneliness  Loss of Interest  Irritability  Fear  Suicide ideation  Suicide
  • 51. Suicide and Cyberbullying  Cyberbullying repercussions can be deadly:  Cybervictims are twice as likely to attempt suicide when compared with peers who experience traditional bullying and were not targeted with online abuse and harassment (Holladay, 2011). Public humiliation and a worldwide audience that joins in to participate in the harassment could be contributing factors that lead to suicide.
  • 52. Megan Meier  In 2006, days before her 14th birthday, Megan Meier, a teen from Missouri, committed suicide by tragically hanging herself.  Her suicide was a result of the constant cyberbullying from Lori Drew who used the pseudonym “Josh Evans” to destroy Megan on MySpace.  Minutes before she hung herself in her closet, Megan read Josh‟s last message to her saying, “the world would be a better place without you” (Miller & Hufstedler, 2009, p. 2).
  • 53. Result of the Megan Meier Tragedy  After Megan‟s death, Missouri passed a law making cyberbullying a “crime that can result in jail time, fines or both” (Snakenborg, Van Acker, & Gable, 2011, p. 90).  Megan‟s tragedy is just one of the many other tragic incidents that occur due to cyberbullying.
  • 54. Legal Implications  In some states, laws have been passed to punish cyberbullies:  Suspension  Expulsion  Fines  Prison Time  In situations where sexting is involved, a “sex offender” label could be placed on the cyberbully regardless if they are a minor.  Furthermore, libel, harassment, identity theft, invasion of privacy, and civil defamation could be used in a lawsuit against cyberbullies.
  • 55. Anti-Cyberbullying Laws  As of right now, 34 states have anti- cyberbullying laws.  TEXAS: “H.B. 1942 Act applies beginning with the 2012-2013 school year. Schools must have a policy. „…„bullying‟ means…engaging in written or verbal expression, expression through electronic means, or physical conduct that occurs on school property, at a school-sponsored or school-related activity, or in a vehicle operated by the district.‟ Nothing in the law about behaviors that occur away from school or about substantial disruption to the learning environment” (Hinduja & Patchin, 2012c).
  • 56. What Can Schools Do?  Educate the school community about it  Educate students that it is wrong and if found doing so, they will be subject to discipline  Review their harassment and bullying policy to see if cyberbullying is included  If it covers cyberbullying, incidents that occur at school or that originate off campus but ultimately result in substantial disruption of the learning environment are well within a school‟s legal authority to intervene (Hinduja & Patchin, 2010).
  • 57. What Can We Do as School Counselors?  Educate all stakeholders especially parents and students about cyberbullying and its effects.  Because the majority of students do not inform an adult, we need to teach them the importance of doing so and how to do it.  In regards to parents, we need to teach them the importance of monitoring.  Incorporate cyberbullying lessons in the school counseling program.
  • 58. Students Need to Know  Let students know about the consequences:  Causes some serious emotional damage to the victim (depression, suicide, etc.)  What they post reflects negatively towards them and may affect their future college and job applications  Can lose their cell phone and computer usage  Legal ramifications: libel, harassment, etc.  Sexting can label them as a “sex offender”  Pseudonyms do not protect them and they can be tracked (IP address and phone companies)
  • 59. One Activity We Could Use  Have all students take out a sheet of paper.  Tell them to crumple it up.  Afterwards, tell them to smooth it back out again as much as possible so that there are no wrinkles.  Then ask: “The wrinkles won‟t ever completely come out, will they?” (Diaz, Evans, & Gallagher, n.d.).  Compare it to: Information we post will always be there and it is impossible to remove.
  • 60. Help Students who are Victims  As school counselors, we need to:  Encourage teens to tell an adult if cyberbullying is occurring  Reassure them that it is not their fault  Inform them to NOT delete the messages but rather print them and save them as proof that cyberbullying is occurring  Show them how to use Print Screen, Report Abuse, and Block Users
  • 61. Show Students Safety Strategies  As school counselors, we need to show students how:  To keep private information from being public (ex. Not posting too much personal information about themselves on the Internet)  To never choose a password that can be easily guessed  To never give out their password to anyone except their parents (aka digital hygiene)  To never post confidential information to others because secrecy is never guaranteed especially when the other person can easily inform others  To take advantage of privacy settings and prevention tools
  • 62. Prevention Tools Usage  Even though students are aware of the availability of prevention tools and techniques such as blocking and reporting abuse, the majority of victims do not utilize these cyberbullying prevention tools. Why?  One reason: The victim would like to know what was posted about them that way the victim does not feel that she is in the dark in not knowing what was said about her.
  • 63.
  • 64. Bystanders Need to Speak Up Martin Luther King Jr. once said: “In the end, we will remember not the words of our enemies, but the silence of our friends.”
  • 65. Encourage Bystanders to Speak Up  Teach students how to be courageous bystanders that:  “Don‟t stand by – Stand Up!”  Do not engage in or support mean comments online or talk about it at school  Support the cybervictim by posting positive comments  Invite the cybervictim to spend time with you  Print the evidence and share with an adult  Tell an adult at home or at school  Confront the cyberbully when it is safe
  • 66. Take 5  Do not fight back. Do not respond to cyberbullying messages (Stop Bullying, n.d.; Hinduja & Patchin, 2012a).  Step away from computer for 5 minutes  Go do an activity that is calming:  Yoga  Deep-breathing  Watch TV  Read a book  Exercise
  • 67. Stop, Block, and Tell  STOP: Do not fight back.  BLOCK: Block the cyberbullies. Use privacy settings and prevention online tools. (Hinduja & Patchin, 2012b).  TELL: Tell an adult about it.
  • 68. Videos To Show Our Students  ABC Family Movie: Cyberbully  BrainPop Video:Cyberbullying  On Guard Online Video: Stand Up to Cyberbullying (On Guard Online, n.d.b).
  • 69. Parents  Parents need to know that:  Even though students have confidence that adults will intervene in their cybervictimization, 90% of cybervictims do NOT report their cyberbullying incidents to an adult (Burnham et al., 2011; Juvonen & Gross, 2008).  In another study, only 24% told a parent and 14% told a teacher of their cybervictimization (Ybarra & Mitchell, 2004).  According to a study conducted by Wong-Lo & Bullock, 41% of students in grades 5-12 stated that their parents have no idea or clue of what they do when using the Internet (2011).
  • 70. Why Students Do Not Tell an Adult  Students do not tell an adult about their cybervictimization because:  They feel adults will not understand them  They feel no one will believe them  They feel they might get blamed  Feel adults will not do anything  Adults will place restrictions on their internet and cell phone usage  Peers will make fun of them  It will exacerbate the problem (Price & Dalgleish, 2010).
  • 71. What Can Parents Do?  Learn more about social media  Become a “friend” of theirs on their social network  Monitor their child‟s internet usage and get their passwords  Place a computer in a shared space such as a living room  Not allow internet access (computer or cell phone) in private rooms since this could expose them to being victims  Have curfews on when the Internet is accessible  Talk to their kids about what is and is not appropriate to post online (oversharing, profanity, and bullying)  Teach children when and how to speak up for help  Know the warning signs of a cyberbully and cybervictim (On Guard Online, n.d.a; On Guard Online, n.d.b).
  • 72. How to Identify a Cybervictim  Warning Signs for Parents:  Unexpectedly stops using their computer or cell phone  Appears nervous or jumpy when an instant message or email appears  Uneasy about going to school  Appears to be angry, depressed, or frustrated after using the computer or cell phone  Becomes withdrawn  Avoids discussions of what they are doing on the computer or cell phone
  • 73. How to Identify a Cyberbully  Warning Signs for Parents:  Quickly switches screens or closes programs when you walk by  Gets unusually upset if computer or cell phone privileges are restricted  Avoids discussions of what they are doing on the computer and cell phone  Appears to be using multiple online accounts  Uses an account that is not theirs
  • 74. Next Step for Parents of a Cybervictim  After their child has confessed of being a victim, parents need to:  Believe the child and help the child feel safe and secure with unconditional support  Help the child seek help: school administrators and, if necessary, law enforcement officers
  • 75. Next Step for Parents of a Cyberbully  Parents need to:  Address the problem head on and not wait for it to go away Talk to child firmly about his/her actions and explain the negative effects it has on victims  Let the child know of the consequences of their actions both at home and at school  Restrict the privilege of using cell phones and computers  Refer their child to the counselor (New, 2012).
  • 76. Biggest Challenges We Face  Three challenges today make it difficult to prevent cyberbullying:  1.) Many people do not see the harm associated with it. They dismiss it because there are “more serious forms of aggression to worry about” (Hinduja & Patchin, 2010).
  • 77. Biggest Challenges We Face cont.  2.) Not many people are willing to step up to respond to cyberbullying. Parents say they do not have the technical skills to keep up. Teachers are afraid to intervene in off- campus behaviors. Law enforcement is hesitant to get involved unless there is clear evidence of a crime or a significant threat to the victim‟s physical safety (Hinduja & Patchin, 2010).
  • 78. Biggest Challenges We Face cont.  3.) In some cyberbullying cases, schools have lost for disciplining school children on their off campus online activity and are seen as having violated the student‟s freedom speech rights (Stop Bullying, n.d.; Brain Pop, 2012).
  • 79. What Can We Do To Overcome These Challenges?  We collectively need to create an environment where students feel comfortable in talking with adults and feel confident that they will intervene to solve the problem.  We also need to involve all stakeholders in the process of stopping cyberbullying.  We also must raise awareness (NCPC, 2012b).  Incorporate target lessons in school counseling program  By doing all of the above, we are on our way in stopping it
  • 80. Resources  To keep up to date with the latest research on cyberbullying visit the Cyberbullying Research Center website (Cyberbullying Research Center, 2012b).  Also visit:  StopBullying.gov  StopCyberbullying.org  NCPC.org  WiredSafety.org
  • 81. References  Brain Pop. (2012). Cyberbullying (video). Retrieved July 10, 2012, from http://www.brainpop.com/technology/computersandinternet/cyberbull ying/  Bullying Statistics. (2009). Cyberbullying statistics. Retrieved July 10, 2012, from http://www.bullyingstatistics.org/content/cyber-bullying- statistics.html  Burnham, J. J., Wright, V. H., & Houser, R. A. (2011). Cyberbullying: Emergent concerns for adolescents and challenges for school counselors. Journal of School Counseling, 9(15), 1-31. Retrieved February 28, 2012, from ERIC database.
  • 82. References  Cyberbullying Research Center. (2012a). Facts about cyberbullying quiz. Retrieved July 10, 2012, from http://www.cyberbullying.us/quiz.php?QUIZNUM=1  Cyberbullying Research Center. (2012b). Identifying the causes and consequences of cyberbullying. Retrieved July 10, 2012, from http://www.cyberbullying.us/index.php  Diaz, Y., Evans, L., & Gallagher, R. (n.d.). Anti-social networking: How do texting and social media affect our children? A panel discussion by CSC clinicians at the Nightingale-Bamford school. Retrieved July 10, 2012, from http://www.aboutourkids.org/articles/antisocial_networking_how_do_t exting_social_media_affect_our_children_panel_discussion_csc_
  • 83. References  Gurian, A. (n.d.). Texting and talking: Kids and cell phones. Retrieved July 10, 2012, from http://www.aboutourkids.org/articles/texting_talking_kids_cell_phones  Hinduja, S., & Patchin, J. W. (2010). Cyberbullying: Identification, prevention, and response. Retrieved July 10, 2012, from http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_ Response_Fact_Sheet.pdf  Hinduja, S., & Patchin, J. W. (2012a). Preventing cyberbullying: Top ten tips for teens. Retrieved July 10, 2012, from http://www.cyberbullying.us/Top_Ten_Tips_Teens_Prevention.pdf  Hinduja, S., & Patchin, J. W. (2012b). Responding to cyberbullying: Top ten tips for teens. Retrieved July 10, 2012, from http://www.cyberbullying.us/Top_Ten_Tips_Teens_Response.pdf
  • 84. References  Hinduja, S., & Patchin, J. W. (2012c). State cyberbullying laws: A brief review of state cyberbullying laws and policies. Retrieved July 10, 2012, from http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf  Holladay, J. (2011, January). Cyberbullying. Education Digest: Essential Readings Condensed for Quick Review, 76(5), 4-9. Retrieved February 28, 2012, from Professional Development Collection database.  Juvonen, J., & Gross, E. F. (2008, September). Extending the school grounds? – Bullying experiences in cyberspace. Journal of School Health, 78(9), 496-505. Retrieved February 28, 2012, from Psychology and Behavioral Sciences Collection database.  Li, Q. (2010, June). Cyberbullying in high schools: A study of students‟ behaviors and beliefs about this new phenomenon. Journal of Aggression, Maltreatment & Trauma, 19(4), 372-392. Retrieved February 28, 2012, from PsycINFO database.
  • 85. References  Mason, K. L. (2008, April). Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools, 45(4), 323-348. Retrieved February 28, 2012, from ERIC database.  Miller, J. D., & Hufstedler, S. M. (2009). Cyberbullying knows no borders. Refereed paper presented at „Teacher education crossing borders: Cultures, contexts, communities and curriculum‟ the annual conference of the Australian Teacher Education Association (ATEA), Albury, 28 June – 1 July. Retrieved February 28, 2012, from ERIC database.  National Crime Prevention Council. (2012a). Cyberbullying. Retrieved July 10, 2012, from http://www.ncpc.org/resources/files/pdf/bullying/cyberbullying.pdf
  • 86. References  National Crime Prevention Council. (2012b). Cyberbullying. Retrieved July 10, 2012, from http://www.ncpc.org/cyberbullying/  New, M. (2012, January). Cyberbullying. Retrieved July 10, 2012, from http://kidshealth.org/parent/positive/talk/cyberbullying.html  On Guard Online. (2011, September). Cyberbullying. Retrieved July 10, 2012, from http://onguardonline.gov/articles/0028-cyberbullying  On Guard Online. (n.d.a). Net cetera: Chatting with kids about being online. Retrieved July 10, 2012, from http://onguardonline.gov/articles/pdf-0001.pdf  On Guard Online. (n.d.b). Stand up to cyberbullying (video). Retrieved July 10, 2012, from http://onguardonline.gov/media/video-0005-stand- cyberbullying
  • 87. References  Patchin, J. W., & Hinduja, S. (2006, April). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148-169. Retrieved February 28, 2012, from PsycINFO database.  Price, M., & Dalgleish, J. (2010). Cyberbullying: Experiences, impacts and coping strategies as described by Australian young people. Youth Studies Australia, 29(2), 51-59. Retrieved February 28, 2012, from ERIC database.  Snakenborg, J., Van Acker, R., & Gable, R. A. (2011). Cyberbullying: Prevention and intervention to protect our children and youth. Preventing School Failure, 55(2), 88-95. Retrieved February 28, 2012, from ERIC database.  Stop Bullying. (n.d.). Cyberbullying. Retrieved July 10, 2012, from http://www.stopbullying.gov/cyberbullying/index.html
  • 88. References  Stop Bullying. (2011, May 9). Webisode 5: KB recalls her day (video). Retrieved July 10, 2012, from http://www.stopbullying.gov/videos/2011/05/webisode-5-kb- recalls.html#playlist=p1174  Wired Kids. (n.d.). What is cyberbullying, exactly? Retrieved July 10, 2012, from http://www.stopcyberbullying.org/  Wong-Lo, M., & Bullock, L. M. (2011). Digital aggression: Cyberworld meets school bullies. Preventing School Failure, 55(2), 64-70. Retrieved February 28, 2012, from ERIC database.  Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Adolescence, 27(3), 319-336. Retrieved February 28, 2012, from PsycINFO database.

Notes de l'éditeur

  1. Stop Bullying. (2011, May 9). Webisode 5: KB recalls her day (video). Retrieved July 10, 2012, from http://www.stopbullying.gov/videos/2011/05/webisode-5-kb-recalls.html#playlist=p1174
  2. Cyberbullying Research Center. (2012). Facts about cyberbullying quiz. Retrieved July 10, 2012, from http://www.cyberbullying.us/quiz.php?QUIZNUM=1
  3. Cyberbullying Research Center. (2012). Facts about cyberbullying quiz. Retrieved July 10, 2012, from http://www.cyberbullying.us/quiz.php?QUIZNUM=1
  4. H.B. 283; Tex. Educ. Code Ann 25.0342, 37.217, 37.001, 37.083; http://www.legis.state.tx.us/tlodocs/82R/billtext/pdf/HB01942F.pdf#navpanes=0 http://www.statutes.legis.state.tx.us/Docs/ED/pdf/ED.37.pdf
  5. Brain Pop. (2012). Cyberbullying (video). Retrieved July 10, 2012, from http://www.brainpop.com/technology/computersandinternet/cyberbullying/On Guard Online. (n.d.). Stand up to cyberbullying (video). Retrieved July 10, 2012, from http://onguardonline.gov/media/video-0005-stand-cyberbullyingFull movie of Cyberbully: http://www.youtube.com/watch?v=Id5eMH9hyMY&feature=fvwrel