View
214
Download
1
Category
Tags:
Preview:
Citation preview
A Survey Analysis Carol M. Walker, MEd, MADoctoral Candidate, IUP
◦ The use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, personal Web sites or blogs and online personal polling Web sites. The technology is used to promote deliberate, repeated and hurtful behavior by an individual or group, with the intent to harm others (Haber & Haber, 2007, p. 52).
◦ Cyberbullying should be considered the use of interactive technologies such as social networking sites, cell phones (text, video, voice, or picture messaging), instant messaging, or other newly developed technology-based communication tools. These tools are used to repeatedly deliver slanderous, hurtful, obsessive, or obscene messages that result in harm to the recipient (Walker, 2010.
Cyberbullying DefinedCyberbullying Defined
Who? Why?
CyberbullyingCyberbullying
Growth in technology◦ Cell phones◦ Social Networking
Age
Extent◦ Varies greatly
Age and Extent of Age and Extent of CyberbullyingCyberbullying
Theory◦ Social Dominance Theory
Survey◦ 27 item survey◦ 6 Demographic and 21 cyberbullying
120 undergraduate college students◦ 70 female, 50 male: age 18 – 24
16% live at home, 53% on campus housing, and 31% off campus but not at home
Grades: 51% A-B, 47% B-C, 2% C-D
Technology use:◦ 14% between 1 & 2 hours daily◦ 31% between 3 & 4 hours daily◦ 55% over 4 hours daily
54% of respondents know someone who has been cyberbullied
100% of male respondents know someone who has been cyberbullied
Technologies used: Facebook (56%), Cell Phones (45%), AIM (43%) most frequently reported
11% of participants reported being cyberbullied ~ 43% of them 4 or more times
Statistically significant results:
Suicidal ideation Eating disorders Chronic illness Depression (often long-term) Low self-esteem Poor academic performance Problem behaviors Drinking and drugs
Psychological Impact Psychological Impact
Several court cases to date◦ J.S. v. Bethlehem Area School District◦ Layshock v. Hermitage School District◦ Emmett v. Kent School District
Legal IssuesLegal Issues
Gather all forces
System level◦ Establish guidelines for appropriate use of
computer networks
Classroom Interventions◦ Incorporate lessons on cyberbullying ◦ Implement effective social skills and conflict
resolution
Intervention and Intervention and PreventionPrevention
1. Don’t engage the person2. Print everything out3. Change your screen name4. Don’t share personal info in chat rooms5. Identify the sender6. Contact the service provider7. Think before you send8. Parents, get involved9. Teachers, get involved10. Comprehensive action is neededStover, D. (2006) www.eddigest.com
Prevention techniques for Prevention techniques for studentsstudents
Enhancing Child Safety & Online Technologies◦ December 2008◦ http://wiredsafety.org/resources/pdf/
2009_isttf_final_report.pdf Wired Safety
◦ http://wiredsafety.org/ iSafe
◦ http://www.isafe.org/ National Criminal Justice Reference Service
◦ http://www.ncjrs.gov/InternetSafety/cyber.html Stop Bullying Now
◦ http://stopbullyingnow.hrsa.gov/adults/default.aspx Stop Cyberbullying
◦ http://www.illinoisattorneygeneral.gov/cyberbullying/for_educators.html
Strom, P. & Strom, R. (2005) When teens turn cyberbullies. Education Digest, 71(4), 35-41
Stover, D. (2006). Treating cyberbullying as a school violence issue. School Board News, 26 (8)
Mason, K.L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in Schools 45(4), 323-348
Pickett, A.D., & Thomas, C. (2006). Turn off that phone. American School Board Journal
Recommended