o Cyberbullying has many definitions but can
be summed up as any inappropriate use of
technology that is intended to harass,
humiliate, stalk, threaten, terrorize, or
o It is not uncommon for cyberbullying to be
prevalent in students ages 8-15 and
o Cell phones
o Text messages
o Picture messages
o Social networking sites
o Chat tools and more…
o Approx. 160,000 children
miss school because they
o One in three teens (ages
12-17) have been victims
o One in six pre-teens
(ages 6-11) have been
victims of cyberbullying
o Children are just as likely
to receive threatening
messages at school as
they are at home
o The impact on the victims
of bullying often include
truancy, depression, poor
and sometimes suicide
In the First Amendment we are all given the
right of freedom of speech.
There have been numerous court cases concerning
cyberbullying, however each is individual and rulings
remain just as unique and difficult to predict.
o Fifteen states (including Illinois) have legislation
requiring districts to create policies about
o On this website, each state receives a letter
grade based on the occurrences of cyberbullying
cases and how they are handled.
o Also in Illinois schools are required to provide a
minimum of two hours of Internet safety
instruction annually to their K-12 students.
o What constitutes an offense of
o Is bullying that takes place at home able to
be disciplined within the school?
o When do teachers step in?
o What steps should be taken to decrease
None of these questions can be answered
What does the research say?
Bullying is a relatively recent research focus
with work beginning in the early 70’s.
Because of the even more recent nature of
cyberbullying, there are several issues that
characterize research in this area, and there
are not many helpful conclusions.
With frequent and considerable advances in
technology, the issue of cyberbullying is quickly
growing, but very little research exists that deals with
intervention methods or programs. These are two
questions teachers may ask:
→ What are some effective methods proven to reduce
instances of cyberbullying in school settings?
→ What are some effective intervention methods from
previous studies in traditional bullying that could effect
work on cyberbullying?
There is a significant body of research on the
phenomenon itself, but not any research on
Several pieces of cyberbullying research cite
previous studies of traditional bullying, but it is
difficult to transfer any prevention methods because
of the often secretive nature of cyberbullying
Flaws in research
For now, short of conducting more
research, teachers can choose to follow
their school’s technology policy and/or
compose their own. Having a classroom
technology policy could prevent problems
from happening before they occur. It can
also provide teachers with a set of fair and
equal consequences for policy violations.
A good policy:
o is informative (defining cyberbullying and other terms
that may be unfamiliar) and directed toward both
parent(s)/guardian(s) and student
o clearly states the goals that the teacher intends to
achieve by using technology and names any known
activities that will use certain technologies
o shows compliance and understanding by both
parent(s)/guardian(s) and student (preferably by means
of a signature) and returned to the teacher to be filed
A good policy:
o refers parent(s)/guardian(s) to sources of additional
information if they wish to access it
o provides the teacher and administrator’s contact
o is thoroughly checked for correct spelling, grammar,
o is approved by an administrator before being sent home
with students (Some schools require this, others do not,
but it’s still a good idea!)
Between the previous two slides and several additional slides that
will be seen shortly in this presentation, you will be easily able to
compose a technology policy for your desired setting and fulfill the
assignment requirements. Note those slides!
o Be proactive in presenting classroom
expectations, outlining acceptable usages,
and introducing policy early.
o Remind students of the policies in place
frequently throughout the duration of a project
or school year.
o Post your policy in the classroom or computer
lab so students have no excuse for being
unfamiliar with it.
Locate the Cyberbullying Activity on WesternOnline.
Read it carefully and complete it by the posted due
date. Worth 40 pts.
Don’t forget to review the rubric before starting!
The following slides will help you create your
submission. Read the instructions and use this
presentation to guide your progress.
An introduction should begin by stating the need for
keeping our students safe while using technology and
defining unfamiliar terms like “cyberbullying.”
Next, it should mention what types of technology
students may use in the classroom, for which activities
they will be used, and what this document actually is.
Lastly, the introduction should provide additional
resources for parents/guardians or students to find
more information on different computer programs,
processes or devices you might be using.
Divide your policy into two or three paragraphs
depending upon the age of your students.
¶ - Expectations (i.e. …)
• students are expected to treat all technological equipment
with care and respect.
• Students are expected to follow teacher instructions with
regard to internet usage and website viewing with no
• Students are prohibited from…
¶ - Consequences (might be identical to school’s
¶ - Student usage expectations of outside
• Cell phones
• Mp3 players
• Gaming devices
Many schools simply prohibit use of these during school hours
or on school grounds.
This consists of a couple simple sentences.
All the sentences need to state is that a
signature at the bottom of the document
represents agreement with the policies outlined
in the document, and that students who do not
comply will not be allowed to participate in such
Both student and parent(s)/guardian(s)
signatures should be present.
Finally, include your personal as well as school
office contact information for families to use if
they have any questions.
• Ms. Doe, 3rd grade, 555-1234, firstname.lastname@example.org
• Elementary office, West Best School: 555-5678
Bully Police U.S.A. (2009). Retrieved from website: www.bullypolice.org
Meyers, J. J. (2009). Censoring cyber speech on campus??? Unpublished
manuscript. Presented September 29, 2009 at Western Illinois University.
Meyers, J. J., & Carper, G. T. (2009). Cyberbullying: The legal challenge for
educators. West’s Educational Law Reporter.
Meyers, J. J., Carper, G. T., & Hemphill, L. S. (2009). Cyber Bullies Come to
Campus: Are Administrators and Faculty Ready?
Roskamp, T. J. (2009). Cyberbullying in Illinois public schools. Unpublished
doctoral dissertation, Western Illinois University.
Backer, T. E., & Russ, A. (2007). Implementing evidence-based youth violence
prevention programs: one community’s experiences. Human Interaction
Research Institute, Retrieved from:
Hirschstein, M. K., Van Schoiack Edstrom, L., Frey, K. S., Snell, J. L., & MacKenzie,
E. P. (2007). Walking the talk in bullying prevention: teacher implementation
variables related to initial impact of the Steps to Respect program. School
Psychology Review, 36(1), 3-21.
Hoff, D. L., & Mitchell, S. N. (2008). Cyberbullying: causes, effects, and remedies.
Journal of Educational Administration, 47(5), 652-665.
Juvonen, J., & Gross, E. F. (2008). Extending the school grounds? Bullying
experiences in cyberspace. Journal of School Health, 78(9), 496-505.
Salmivalli, C., Kaukiainen, A., & Voeten, M. (2005). Anti-bullying intervention:
implementation and outcome. British Journal of Educational Psychology, 75, 465-487.
Slonje, R., & Smith, P. K. (2007). Cyberbullying: another main type of bullying?
Scandinavian Journal of Psychology, 49, 147-154.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
Cyberbullying: its nature and impact in secondary school pupils. The Journal of Child
Psychology, 49(4), 376-385.
Wright, V. H., Burnham, J. J., Inman, C. T., & Ogorchock, H. N. (2009). Cyberbullying: using
virtual scenarios to educate and raise awareness. Journal of Computing in Teacher
Education, 26(1), 35-42.
Yasuda, H. (2009). Preventing cyberbullying without prohibitions: looking at web science
from an educational perspective. In: Proceedings of the WebSci ‘09: Society On-line, 18-
20 March 2009, Athens, Greece. (In Press)