This document discusses cyber psychology and cyberbullying. It begins with an introduction to cyber psychology and the online disinhibition effect, in which anonymity online can lead to both positive and negative behaviors. It then covers topics like cyber time, cyber space, and postmodern identities. Freudian concepts like transference are discussed in relation to online behaviors. The document defines bullying and cyberbullying, compares them, and provides examples of cyberbullying instances. It closes by outlining the effects of cyberbullying on young people such as increased risks of depression, substance abuse, and suicide.
defining Cyberpsychology and discussing its subject matters. Discussing the impact of social media and Facebook on youths.
Elaborating the positive and negative effects of Social Media and suggesting some preventive techniques.
defining Cyberpsychology and discussing its subject matters. Discussing the impact of social media and Facebook on youths.
Elaborating the positive and negative effects of Social Media and suggesting some preventive techniques.
Screen addiction is emerging as a behavioral challenge, especially in young children. The Gen X kids are exposed to several screens like TV, Computers, Smart Phones, Gaming consoles, that causes huge impact on their mental health.
The design of such system appears to be flawed and to create addiction.
This presentation dwells on the addiction, digital detox and how to use screen/technology effectively.
According to psychologist Gordon Allport, social psychology is a discipline that uses scientific methods "to understand and explain how the thought, feeling and behavior of individuals are influenced by the actual, imagined or implied presence of other human beings" (1985).
Briefly this field has been discussed.
Protective Test - HFD- Personality AnalysisArora Mairaj
Aim of this lecture is to discuss HFD- as a technique for the assessment of Personality, with a brief review of Test , Types of Psychological Tests & Techniques.
Presentation made in one of my academic class, Based on a book from Baron, Robert A., Nyla Branscombe. Social Psychology, 13th Edition. Pearson Learning Solutions, 09/2011.
Screen addiction is emerging as a behavioral challenge, especially in young children. The Gen X kids are exposed to several screens like TV, Computers, Smart Phones, Gaming consoles, that causes huge impact on their mental health.
The design of such system appears to be flawed and to create addiction.
This presentation dwells on the addiction, digital detox and how to use screen/technology effectively.
According to psychologist Gordon Allport, social psychology is a discipline that uses scientific methods "to understand and explain how the thought, feeling and behavior of individuals are influenced by the actual, imagined or implied presence of other human beings" (1985).
Briefly this field has been discussed.
Protective Test - HFD- Personality AnalysisArora Mairaj
Aim of this lecture is to discuss HFD- as a technique for the assessment of Personality, with a brief review of Test , Types of Psychological Tests & Techniques.
Presentation made in one of my academic class, Based on a book from Baron, Robert A., Nyla Branscombe. Social Psychology, 13th Edition. Pearson Learning Solutions, 09/2011.
Character Development, for students, by students!mediaplaylab
Cyberwellness has always been a ministry initiative, but in recent years has increasingly gained importance nation-wide as the evolving Internet and media landscapes bring about various issues with it.
Innova JC’s JC1 Cyberwellness Civics Lesson was done in collaboration with Media Development Authority (MDA), to bring about character development to IJC students.
All JC1 New Media Arts CCA students (known as NMA Cyberwellness Ambassadors) researched on cyberwellness topics that interest and benefit them as youths (social networking and gaming addiction). The students then collated materials (videos, case studies) to be used in the lessons.
They then leveraged on the weekly Civics Programme to extend its reach to the entire JC1 cohort of students. This programme is also part of Innova New Media Education Programme where students equip Innovians with the skills to be safe and responsible users of the Internet.
Want to know more about social networking and gaming addiction? Read Up! on the pertinent issues now!
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...Jim "Brodie" Brazell
NETWORK WORLD: Cyber Bullying, Digital Citizenship, and Learning. South Carolina CTE Conference Featured Session with Jim Brazell of Ventureramp.com on August 30, 2011. Topics: Cyber Bullying, Digital Citizenship, Digital Rights, Digital Ethics, Digital Culture, Digital Communication, STEM, TEAMS, STEAM, Digital Art and Digital Criticism. Jim Brazell, http://www.ventureramp.com, jimbrazell@ventureramp.com.
Cyberbullying is a pervasive problem in society. This presentation explores (a) definitions and common forms of cyberbullying, (b) the prevalence and characteristics of cyberbullying, (c) the targets, victims. and outcomes of cyberbullying, and (d) practical advice to confront this societal problem. Hopefully, one day, through research and active intervention, we will see a decline of this destructive behavior in schools.
Join the discussion at www.wvucommmooc.org!
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Warren Blumenfeld
Throughout the ages, a recurring cycle has developed against the Jewish people: from Conversion (you can’t live among us as Jews), to Expulsion (you can’t live among us), to Extermination (you can’t live). This unique PowerPoint presentation investigates the long history of anti-Jewish oppression and some of the reasons for its formation and perpetuation.
This presentation outlines the early history of the town of Amherst, Massachusetts and its controversial namesake, Jeffery Amherst who conspired to commit genocide upon indigenous peoples in the area.
Though politicians and members of their constituencies argue immigration policy from seemingly infinite perspectives and sides, one point stands clear and definite: decisions as to who can enter the United States and who can eventually gain citizenship status generally depends of issues of “race,” for U.S. immigration systems reflect and serve as the country’s official “racial” policies.
The U.S. ranks first among 230 countries for the highest rate of firearm ownership. On average, each year firearms account for approximately 11,000 homicides, another 22,000 suicides and accidental deaths, and many more injuries. In the wake of these fatalities and high-visibility mass shootings, a very contentious debate has continued in the U.S. regarding the role and future of firearms. This unique PowerPoint presentation addresses many of the concerns and suggests practical solutions.
This presentation includes the most banned and censored books in the United States between 2000 - 2020 as documented by the American Library Association's finding, and the reasons given by those who challenged these books.
An essential tenet of liberation is having the freedom to define oneself and the power over one’s own life. The presentation offers educational resources to discuss the concept of “liberation” on the personal, interpersonal, institutional, and larger societal levels.
Hegemonic Representations of Minoritized Peoples in U.S. Popular CultureWarren Blumenfeld
Throughout history, many dominant groups have represented target groups (sometimes called “minoritized” groups) in negative ways to maintain control & domination. This is expressed often through Myths, Stereotypes, Proverbs, Commentary, Literature, Jokes, Epithets, Pictorial Depictions, “Art,” Advertisements, & Other Forms. This presentation views some of those representations in popular U.S. culture.
Social Reproduction Theory and Cultural & Social CapitalWarren Blumenfeld
This presentation outlines Social Reproduction Theory, which asserts that schools reproduce the social inequities, especially in terms of socioeconomic class and race, that exist in the larger society. In addition, it addresses the concepts of social and cultural capital arguing that culture and education are central in the affirmation of differences between social classes and in the reproduction of those differences.
This presentation investigates how notion of “race” is socially constructed. It arose concurrently with the advent of European exploration as a justification and rationale for conquest and domination of the globe beginning in the 15th century of the Common Era. Therefore, “race” is an historical, “scientific,” and biological myth. It is an idea. Geneticists tell us that there is often more variability within a given so-called “race” than between “races,” and that there are no essential genetic markers linked specifically to “race.”
On the Social Construction of Homosexuality and Trans Identities as Deviancy ...Warren Blumenfeld
Rather than considering homosexuality, bisexuality, and gender diversity merely as emotional, gender, and sexual differences along a broad spectrum of human potential, some sectors of the medical, psychological, political, and religious communities force pathologizing language onto people with same-sex and both-sex attractions, and those who cross traditional constructions of gender identities and expression. This presentation investigates the history of the "medicalization" of LGBT people from without, and the struggles to reclaim the liberty of self-defining themselves from within.
Conversion, Expulsion, Extermination: A History of Anti-Jewish Oppression – P...Warren Blumenfeld
Throughout the ages, a recurring cycle has developed against the Jewish people: from Conversion (you can’t live among us as Jews), to Expulsion (you can’t live among us), to Extermination (you can’t live). This unique PowerPoint presentation investigates the long history of anti-Jewish oppression and some of the reasons for its formation and perpetuation.
Clubs and Pubs have been historically places where lesbians, gay men, bisexuals, and trans* people have gone to meet and to socialize. This presentations presents some of the bittersweet history.
Unpacking Christian Privilege in a Nation Asserting "Religious Pluralism"Warren Blumenfeld
Christian hegemony I define as the overarching system of advantages bestowed on Christians. It is the institutionalization of a Christian norm or standard, which establishes and perpetuates the notion that all people are or should be Christian, thereby privileging Christians and Christianity, and excluding the needs, concerns, religious cultural practices, and life experiences of people who are not Christian. At times subtle and often overt, Christian hegemony is oppression by neglect, omission, erasure, and distortion, and also by design and intent. This unique slide presentation investigates the concept and realities of Christian privilege.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
1. CYBER PSYCHOLOGY
& CYBERBULLYING:
Life in a
Virtual World
Dr. Warren J. Blumenfeld
University of Massachusetts
Amherst, Massachusetts
warrenblumenfeld@gmail.com
2. The Birth of CyberPsychology
John Suler
Introductory Video
3. AGENDA
1. Cyber Psychology
2. The “Online Disinhibition Effect”
3. Cyber Time
4. Cyber Space & Postmodernism
5. Freud Peering from the Computer
6. Bullying & Cyberbullying
7. Instances of Cyberbullying
8. What Can Be Done?
9. Suggestions for Targets of Cyberbullying
4. Cyber Psychology
• The nature of social communication
technologies combined with relative
anonymity of cyberspace create
conditions for users to experience less
behavioral inhibitions than in Real Life
(RL) or Face-To-Face (f2f) situations.
• Altered state of consciousness
5. The “Online Disinhibition Effect”
(Suler)
• Positive:
– through anonymity of cyberspace, users
can exhibit extraordinary acts of kindness
or charity that they may have felt
inhibited from expressing in RL
6. The “Online Disinhibition Effect”
• Negative:
– this anonymity and altered psychological
environment may allow users to
communicate more objectionable needs
and desires onto others.
7. Cyber Time
• Exists Asynchronically:
– people often do not have to interact in
real time, which can add to the
disinhibition effect when one does not
have to deal with the immediate reactions
of others.
(Turkel)
8. Cyber Space
• Transcends Distance:
– virtually shrinking space making geography
irrelevant.
– Advantages: can bring people closer together,
making a virtual world community.
– Disadvantages: for people with anti-social
motives, the nature of social communication
technologies can enable users to abuse others
not only next door, but also on other side of
planet.
9. Cyber Space
• Personae:
– people can alter, change, emphasize different
aspects of their personalities or identities,
– or totally reinvent themselves
– show different personae (Latin “that through
which the sound comes” or the actor’s mask)
(Turkel)
11. Cyber Space
• Communicating only with typed text in
social communication technologies,
• Users have options:
–being oneself
–expressing only parts of one’s identity
– assuming imagined identities
–remaining completely anonymous
(Suler)
13. Cyber Space: Postmodernism
Identity destabilization presents many possibilities
• Positive:
– can allow individuals to relate in genuinely open and
honest ways about themselves that might be frightening
offline to discuss in real life personal encounters.
• Negative:
– with anonymity, individual can act out hostile or
sadistic emotions by abusing others online.
(Suler)
14. Cyber Space: Postmodernism
• Equalizing Effect:
– People begin on a relatively level playing field.
– Virtual net democracy dependent largely on technical
skills of user.
– Regardless of social status:
• Wealth, Race, Sex, Sexual & Gender Identity & Expression,
Physical & Mental Attributes, & many other social identities
(Suler)
15. Cyber Space
• Altered Perceptions:
– transitional space that becomes extension of
user’s intrapsychic world
– cyberspace communication can alter perceptions
and one’s state of consciousness by becoming:
• make-believe world
• dream-like experience
• even a game where rules of RL no longer apply
This may explain forms of computer and cyberspace
addictions.
19. Freud Peering from the Computer
• Transference:
– individual’s unconscious redirection of feelings from
one person to another.
– Kapelovitz: “the inappropriate repetition in the present
of a relationship that was important in a person's
childhood.”
– Suler: “we recreate in our relationship with the
computer some aspect of how we related to our family
members.”
– cyberspace can recreate & replay past relationships,
satisfy unmet, frozen, or thwarted needs from childhood
20. Freud Peering from the Computer
• Erotic Transference:
– Suler: does not consist of sexual feeling per se toward
computers
– “the perception of the computer as powerful, perhaps in
ways similar to how parents are perceived as powerful.”
21. Freud Peering from the Computer
• Erotic Transference & Cyber Abuse:
– Technologies provide users means to act out unmet
needs for power and control over others,
– to transfer frozen needs for attention or
acknowledgement not sufficiently satisfied within
the family constellation
24. Bullying Defined
“Bullying is a specific type of aggression
in which:
1. the behavior is intended to harm or
disturb,
2. The behavior occurs repeatedly over
time,
3. There is an imbalance of power, with
a more powerful person or group
attacking a less powerful one.”
(JAMA, 2001)
25. Bullying Can Take At Least
Three Forms:
1. Physical: hitting, kicking, spitting,
pushing, taking personal belongings.
2. Verbal: taunting, malicious teasing,
name calling, making threats.
3. Psychological: spreading rumors,
manipulating social relationships, or
engaging in social exclusion, extortion,
or intimidation.
(U.S. Department of Justice, 2001)
26. Harassment Defined
• Harassment is victimization based upon one’s real or
perceived race, color, national origin, religion,
disability, gender, sexual orientation, or marital
status, physical appearance, or personality
characteristics.
• May include but not limited to:
– Verbal, nonverbal, physical, or written harassment
– Repeated remarks of demeaning nature
– Implied or explicit threats
– Demeaning jokes, stories, or activities
– Unreasonable interference with a student’s performance
(Iowa Department of Education)
27. Family Risk Factors:
Some child-rearing styles found to predict whether
young people will grow up to exhibit aggressive
bullying behaviors:
– Lack of warmth & involvement by parents.
– Overly-permissive overly-harsh parenting
– Harsh, physical discipline.
– Family/community model/support bullying behaviors.
– Victimization by older siblings
Loeber & Stouthamer-Loeber
28. Peer Risk Factors:
– Lack maturity or insight
– Friends have positive attitudes about violence.
– High status aggressive persons seek to enhance
their social power and protect their prestige with
peers.
– Low social status people seek to deflect taunting
and aggression, or enhance their social position
with higher status peers.
– Social/relational aggression creates excitement,
alleviates boredom, & secures friendships.
34. Cyberbullying Defined
“Cyberbullying involves the use of
information and communication
technologies such as e-mail, cell
phone and pager text messages,
instant messaging, defamatory
personal Web sites, and defamatory
online personal polling Web sites, to
support deliberate, repeated, and
hostile behaviour by an individual
or group, that is intended to harm
others.”
(Belsey)
35. Similarities & Differences Between
Face-To-Face Bullying &
Cyberbullying
• Similar: Both are about human
relationships, power, and control, and
actions can occur on numerous occasions
(www.bullying.org).
• Similar: Both may involve what
psychologists call the “Leveling Effect”:
people who bully often do so to diminish
others to inflate their own egos reflecting
their insecurities.
36. • Similar: Both do not simply involve those who
bully and those who are bullied (the “dyadic
view,”) but rather involve a number of “actors”
or roles across the social/school environment.
– People Who Bully
– Assistant or Follower of People Who Bully
– Encourager or Reinforcer of People Who Bully
– Outsider or “Bystander” Who Does Nothing
– Potential Defender or Ally of People Who Are Bullied
– Defender or Ally of People Who Are Bullied
– People Who Are Bullied
• (Sutton & Smith, 1999; Olweus, 1993)
37. • Different: Users of technology often do
things in cyberspace that they would not
ordinarily do in face-to-face (F2F) or real
life (RL) interactions—the “disinhibition
effect.” (Suler, 2001)
• Different: Cyberbullying is often even more
invisible to adults than other forms of
bullying.
• Different: Cyberbullying is a particularly
cowardly form of bullying. Cyberbullies can
often hide in the anonymity of cyberspace.
38. • Different: With anonymity, cyberbullies
do not have to “own” their actions, and
often do not fear being punished.
• Different: Cyberbullies can inflict pain
without having to see the effects, which
can result in a “deeper level of
meanness.” (Harmon, 2004)
• Different: The technology can shelter the
user from tangible feedback about
consequences of one’s actions, which can
result in minimized empathy or remorse.
(Media Awareness Network)
39. • Different: People can alter, change, or
emphasize different aspects of their
personalities or identities in
cyberspace—they can reinvent
themselves or show different per sonae
(Latin for “that through which the
sound comes” or the actor’s mask).
(Turkle, 1995)
40. • Different: Cyberbullies can
communicate their hurtful messages to
a very wide audience with remarkable
speed.
• Different: Cyberbullying is often
outside the legal reach of schools and
school boards when it occurs outside of
school.
41. • Different: Victims are often fearful of
telling others about being bullied because
they fear that reporting it would result in
adults taking away cell phones, computers,
or other forms of technology.
• Different: Victims may not know who the
cyberbully is since they may not be easily
identifiable.
• Different: Cyberbullying can occur any
time and any place. Home, therefore, is no
longer a refuge from peer bullying.
42. Similarities & Differences Between
Face-To-Face Bullying &
Cyberbullying
• Similar: Both are about human
relationships, power, and control, and
actions can occur on numerous occasions
(www.bullying.org).
• Similar: Both may involve what
psychologists call the “Leveling Effect”:
people who bully often do so to diminish
others to inflate their own egos reflecting
their insecurities.
43. • Similar: Both do not simply involve those who
bully and those who are bullied (the “dyadic
view,”) but rather involve a number of “actors”
or roles across the social/school environment.
– People Who Bully
– Assistant or Follower of People Who Bully
– Encourager or Reinforcer of People Who Bully
– Outsider or “Bystander” Who Does Nothing
– Potential Defender or Ally of People Who Are Bullied
– Defender or Ally of People Who Are Bullied
– People Who Are Bullied
• (Sutton & Smith, 1999; Olweus, 1993)
44. • Different: Users of technology often do
things in cyberspace that they would not
ordinarily do in face-to-face (F2F) or real
life (RL) interactions—the “disinhibition
effect.” (Suler, 2001)
• Different: Cyberbullying is often even more
invisible to adults than other forms of
bullying.
• Different: Cyberbullying is a particularly
cowardly form of bullying. Cyberbullies can
often hide in the anonymity of cyberspace.
45. • Different: With anonymity, cyberbullies
do not have to “own” their actions, and
often do not fear being punished.
• Different: Cyberbullies can inflict pain
without having to see the effects, which
can result in a “deeper level of
meanness.” (Harmon, 2004)
• Different: The technology can shelter the
user from tangible feedback about
consequences of one’s actions, which can
result in minimized empathy or remorse.
(Media Awareness Network)
46. • Different: People can alter, change, or
emphasize different aspects of their
personalities or identities in
cyberspace—they can reinvent
themselves or show different per sonae
(Latin for “that through which the
sound comes” or the actor’s mask).
(Turkle, 1995)
47. • Different: Cyberbullies can
communicate their hurtful messages to
a very wide audience with remarkable
speed.
• Different: Cyberbullying is often
outside the legal reach of schools and
school boards when it occurs outside of
school.
48. • Different: Victims are often fearful of
telling others about being bullied because
they fear that reporting it would result in
adults taking away cell phones, computers,
or other forms of technology.
• Different: Victims may not know who the
cyberbully is since they may not be easily
identifiable.
• Different: Cyberbullying can occur any
time and any place. Home, therefore, is no
longer a refuge from peer bullying.
49. Instances of Cyberbullying
• People sending hurtful, cruel, and oftentimes
threatening messages to other people.
– “Flame Mail”: designed to inflame, insight, or
enrage.
– “Hate Mail”: hate-inspired and oppressive--
racist, ethnocentric, sexist, homophobic, anti-
religious, ableist, classist, ageist, etc. (Also
known as “Cyberharassment.”)
• People stealing other peoples’ screen names
and sending inflammatory messages under
those screen names to other people. (Harmon, 2004)
50. Instances of Cyberbullying
• People creating online “polling booths” to
rate a school’s girls as “hottest,” “ugliest,” or
“most boring.” (Harmon, 2004)
• Individuals taking pictures of others in
locker rooms with digital phone cameras and
sending those pictures to others, or posting
them on Internet websites.
51. Instances of Cyberbullying
• People creating web sites with stories,
cartoons, caricatures, pictures, or jokes
ridiculing or mocking others.
• Posting material about a person involving
private, sensitive, or embarrassing
information.
– e.g., www.juicycampus.com
• Sending intimidating or threatening
messages (also known as “Cyberstalking”).
52. CYBERBULLYING & EFFECTS ON YOUNG PEOPLE
• Increased school absenteeism.
• School difficulties.
• Dropping out of school.
• May be perpetrators of school violence (75% of perpetrators
during last decade were victims of bullying).
• Increased risk of alcohol and drug use.
• Psychosomatic symptoms.
• Linked to serious mental health problems:
– Depression
– Anxiety Disorders
– Fear and Withdrawal
– Low Self Esteem
– Substance Abuse
– Suicidal Ideation, Attempts, Completion
53. Suicide is third leading cause of
death among adolescents, & is
responsible for more deaths than
all illnesses combined.
Karch et al., (2004)
54. CYBERBULLYING & EFFECTS ON YOUNG PEOPLE
• From Dardenne, Prairie, Missouri
• Committed suicide, Oct. 2006, 13
years old.
• Cyberbullied on MySpace.
• Thought she was communicating
with 16-year-old male named
"Josh Evans.”
• Mother of a friend of Meier,Lori
Janine Drew.
• Drew indicted on three counts of
accessing protected computers to
inflict emotional distress, and one
count of criminal conspiracy.
Megan Meier
55. CYBERBULLYING & EFFECTS ON YOUNG PEOPLE
• He had a speech and language
learning disability.
• Rumors spread that he was gay.
• Students cyberbullied him
continually in middle school.
• October 7, 2003, he took his life.
• He was 13 years old.
Ryan Patrick Halligan
This site is dedicated to the memory of our son Ryan and for all young people
suffering in silence from the pain of bullying and having thoughts of suicide. We
hope young people become less ashamed to ask for help when feeling suicidal.
We hope adults gain knowledge from our tragedy. As a society, we need to find
better ways to help our young people through their most difficult growing years.
John P. Halligan (RyanPatrickHalligan.org)
56. What Can Be Done?
www.bullying.org
1. Awareness & Education:
Educate yourself and your
school to the problem.
2. Be aware of sharing personal
information in person or online:
name, address, phone number,
school name, pictures of
yourself, e-mail address. Never
give your password except to
parents or guardians.
57. 3. Don’t believe everything you read
online: Sometimes people will not tell
you the truth about who they are or
what they want.
4. Use Netiquette: Be polite to others
online just as you would offline. Do not
respond if anyone treats you rudely or
hatefully.
58. 5. Never send a message to anyone
when you are angry: Wait until
you have calmed down. Make sure
your messages are calmly and
factually written.
6. Do not open messages from
someone you don’t know: If in
doubt, ask your parents,
guardians, or another adult.
7. If it doesn’t look or “feel right,” it
probably isn’t: Trust your
instincts.
59. 8. Disconnect or Unplug: You don’t have
to be “Always On.” Take a break.
9. Contract with parents/guardians: Ask
them to read the information about
cyberbullying and Internet safety
issues.
10. Allies come to the defense of those who
are bullied. There is no such thing as
an “innocent bystander” in bullying. If
you are aware that bullying is
occurring, intervene on behalf of those
being bullied. This may include telling
a trusted adult. There is a difference
between “tattling” and “reporting.”
60. 11. Parents install “Keystroke Logger” software: to
monitor their child’s computer interactions, for
those who may be engaging in cyberbullying.
12. Information Sessions: Schools can present
information sessions to students and
parents/guardians about cyberbullying.
13. Inservice Training: For teachers, staff,
administrators, and school boards on the topic
of cyberbullying.
14. Curricular Inclusion: In-class curricula
addressing issues of bullying and cyberbullying.
61. 15. Schools need to institute school-wide bullying
prevention programs in conjunction with the
community on an on-going basis.
16. Schools institute students’ “anti-bullying
pledges,” which students can sign.
17. Update computer and Internet school policies:
This update should include harassment and
bullying done with new technologies such as
mobile and wireless Internet information
technologies. Policies should specifically prohibit
cyberbullying and clearly include consequences
for non-compliance.
62. Suggestions for Targets of
Cyberbullies
1. Speak out: Do not keep it to
yourself or do not isolate yourself.
Tell an adult you know and trust.
2. Inform your Internet, Instant
Messaging, or mobile phone
service providers.
3. Inform your local police.
63. 4. Don’t reply to messages from
cyberbullies!!! They want you to reply to
them to know that they have worried and
upset you. They are trying to control you.
Don’t give them that pleasure.
5. Save all cyberbully’s messages: You
don’t have to read them, but keep them
as evidence and documentation. Police;
Internet service providers; school
teachers, counselors, and administrators;
and telephone companies can use these
messages to help you.
64. 6. Protect yourself: Never arrange to meet
with someone you have met online
unless your parents/guardians go with
you. If you are meeting them, make
sure it is in a public place.
7. You may need to delete and change
your current e-mail accounts, cell
phone/pager accounts, and set up new
ones.
65. References
• Belsey, B. Cyberbullying.
http://www.cyberbullying.ca/main_frame.html.
• Ericson, N. (2001, June). Addressing the problem of juvenile bullying.
(OJJDP Fact Sheet #27). Washington, DC. U.S. Department of
Justice.
• Harmon, A. (2004, August 26). Internet gives teenage bullies weapons
to wound from afar. America Online. The New York Times Company.
• Iowa Department of Education Sample Policy on Bullying and
Harassment.
• JAMA: Journal of the American Medical Association, 285(16). April
25, 2001.
• Kapelovitz, L. H. (1987). To love and to work/A demonstration and
discussion of psychotherapy. Lanham, MD: Jason Aronson Inc.
66. References
• Loeber, R. & Stouthamer-Loeber, M. (1986). Family factors as
correlates and predictors of conduct problems and juvenile
delinquency. In M. Tonry and N. Morris (eds.), Crime and Justice,
Vol. 7. Chicago: University of Chicago Press
• Media Awareness Network, Challenging cyber bullying,
http://www.bewebaware.ca/english/CyberBullying.aspx.
• Olweus, D. (1993). Bullying at school: What we know and what we
can do. Oxford, UK: Blackwell.
• Rigby, K. (1996). Bullying in schools—And what to do about it.
Melbourne: ACER.
• Smith, P.K., & Sharp, S. (1994). School bullying: Insights and
perspectives. London: Routledge.
• Suler, J. (2001). Psychology of cyberspace—The online disinhibition
effect. http://www.rider.edu/~suler/psycyber/disinhibit.html.
67. References
• Sutton, J., & Smith, P.K. (1999). Bullying as a group process: An
adaptation of the participant role approach. Aggressive Behavior, 25
97-111.
• Tattum, D., & Tattum. E. (1992). Social education and personal
development. London. David Fulton.
• Turkle, S. (1995). Life on the screen: Identity in the age of the
internet. New York: Simon & Schuster
• Wolak, J., Mitchell, K., Finkelhor, D. (2006). Online victimization of
youth: Five years later. National Center for Missing & Exploited
Children.
•
68. References
• Ybarra, M., Mitchell, K., Wolak, J., Finkelhor, D. (2006). Examining
characteristics and associated distress related to Internet harassment:
Finding from the Second Youth Internet Safety Survey. Pediatrics,
118(4): E1169-E1177.
• Ybarra, M., Mitchell, K. (2004). Youth engaging in online
harassment: Associations with caregiver-child relationships, Internet
use, and personal characteristics. Journal of Adolescence, 27(3): 319-
336.