This paper argues that while cyberbullying may not be an epidemic, it is still an issue affecting adolescents ages 13-17. It discusses the history of cyberbullying beginning in chat rooms in the early 2000s and expanding with social media sites and cell phones. Though some studies show cyberbullying rates are relatively low, it still causes emotional and psychological harm. The paper examines types of cyberbullying like flaming, trickery, and exclusion that are enabled by the affordances of social media technologies like write-ability and share-ability. Finally, it discusses how adolescents ages 13-17 are most severely impacted based on survey results showing high rates of name-calling, rumor spreading, and receiving explicit images online among this age
Presentation about cyberbullying, for the class of English, made by Manuela Pessoa Amorim ,9º A.
Cyberbullying refers to bullying through information and communication technologies, damaging words and photos are transmitted, and it allows predators to reach anonymously through online means.
Unlike physical oppressors, cyberbullies can torment students on tools like social media platforms, instant messaging, email, blogs and websites rather than face-to-face encounters.
#cyberbullying
#english
#bullying
Presentation about cyberbullying, for the class of English, made by Manuela Pessoa Amorim ,9º A.
Cyberbullying refers to bullying through information and communication technologies, damaging words and photos are transmitted, and it allows predators to reach anonymously through online means.
Unlike physical oppressors, cyberbullies can torment students on tools like social media platforms, instant messaging, email, blogs and websites rather than face-to-face encounters.
#cyberbullying
#english
#bullying
Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or cell phones. This presentation shows signs and ways to prevent cyber bullying
Cyberbullying-Identification-Prevention-Response.pdf
1
Cyberbullying:
Identification,
Prevention,
& Response
Sameer Hinduja, Ph.D.
Justin W. Patchin, Ph.D.
Cyberbullying Research Center
October 2014
2
ids have been bullying each other for gener-
ations. The latest generation, however, has
been able to utilize technology to expand
their reach and the extent of their harm. This phe-
nomenon is being called cyberbullying, defined as:
“willful and repeated harm inflicted through the use
of computers, cell phones, and other electronic de-
vices.” Basically, we are referring to incidents where
adolescents use technology to harass, threaten, hu-
miliate, or otherwise hassle their peers. For exam-
ple, youth can send hurtful text messages to others
or spread rumors using smartphones or tablets.
Teens have also created web pages, videos, and
profiles on social media platforms making fun of
others. With mobile devices, adolescents have tak-
en pictures in a bedroom, a bathroom, or another
location where privacy is expected, and posted or
distributed them online. Others have recorded un-
authorized videos of other kids and uploaded them
for the world to see, rate, tag, and discuss. Still oth-
ers are embracing anonymous apps or chat func-
tionality on gaming networks to tear down or hu-
miliate others.
What are some negative effects that cyber-
bullying can have on a person?
There are many detrimental outcomes associated
with cyberbullying that reach into the real world.
First, many targets report feeling depressed, sad,
angry, and frustrated. As one teenager stated: “It
makes me hurt both physically and mentally. It
scares me and takes away all my confidence. It
makes me feel sick and worthless.” Those who are
victimized by cyberbullying also reveal that they are
often afraid or embarrassed to go to school. In ad-
dition, research has revealed a link between cyber-
bullying and low self-esteem, family problems, aca-
demic difficulties, school violence, and various de-
linquent behaviors. Finally, cyberbullied youth also
report having suicidal thoughts, and there have
been a number of examples in the United States
and abroad where youth who were victimized end-
ed up taking their own lives.
Where does cyberbullying commonly occur?
Cyberbullying occurs across a variety of venues and
mediums in cyberspace, and it shouldn’t come as a
surprise that it occurs most often where teenagers
congregate. Initially, many kids hung out in chat
rooms, and as a result that is where most harass-
ment took place. In recent years, most youth are
have been drawn to social media (such as Insta-
gram, Snapchat, and Twitter) and video-sharing
sites (such as YouTube). This trend has led to in-
creased reports of cyberbullying occurring in those
environments. Voice chat, textual chat, and texting
via phones or tablets also can provide an environ-
ment in whi.
Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or cell phones. This presentation shows signs and ways to prevent cyber bullying
Cyberbullying-Identification-Prevention-Response.pdf
1
Cyberbullying:
Identification,
Prevention,
& Response
Sameer Hinduja, Ph.D.
Justin W. Patchin, Ph.D.
Cyberbullying Research Center
October 2014
2
ids have been bullying each other for gener-
ations. The latest generation, however, has
been able to utilize technology to expand
their reach and the extent of their harm. This phe-
nomenon is being called cyberbullying, defined as:
“willful and repeated harm inflicted through the use
of computers, cell phones, and other electronic de-
vices.” Basically, we are referring to incidents where
adolescents use technology to harass, threaten, hu-
miliate, or otherwise hassle their peers. For exam-
ple, youth can send hurtful text messages to others
or spread rumors using smartphones or tablets.
Teens have also created web pages, videos, and
profiles on social media platforms making fun of
others. With mobile devices, adolescents have tak-
en pictures in a bedroom, a bathroom, or another
location where privacy is expected, and posted or
distributed them online. Others have recorded un-
authorized videos of other kids and uploaded them
for the world to see, rate, tag, and discuss. Still oth-
ers are embracing anonymous apps or chat func-
tionality on gaming networks to tear down or hu-
miliate others.
What are some negative effects that cyber-
bullying can have on a person?
There are many detrimental outcomes associated
with cyberbullying that reach into the real world.
First, many targets report feeling depressed, sad,
angry, and frustrated. As one teenager stated: “It
makes me hurt both physically and mentally. It
scares me and takes away all my confidence. It
makes me feel sick and worthless.” Those who are
victimized by cyberbullying also reveal that they are
often afraid or embarrassed to go to school. In ad-
dition, research has revealed a link between cyber-
bullying and low self-esteem, family problems, aca-
demic difficulties, school violence, and various de-
linquent behaviors. Finally, cyberbullied youth also
report having suicidal thoughts, and there have
been a number of examples in the United States
and abroad where youth who were victimized end-
ed up taking their own lives.
Where does cyberbullying commonly occur?
Cyberbullying occurs across a variety of venues and
mediums in cyberspace, and it shouldn’t come as a
surprise that it occurs most often where teenagers
congregate. Initially, many kids hung out in chat
rooms, and as a result that is where most harass-
ment took place. In recent years, most youth are
have been drawn to social media (such as Insta-
gram, Snapchat, and Twitter) and video-sharing
sites (such as YouTube). This trend has led to in-
creased reports of cyberbullying occurring in those
environments. Voice chat, textual chat, and texting
via phones or tablets also can provide an environ-
ment in whi.
Bullying: A Case Study
Essay On Cyberbullying
Cyber Bullying Essay example
Essay about Cyber Bullying
Cyber Bullying Essay
Essay about Dealing with Cyberbullying
Social Media: To Fear or Not - What's the Facts? Presented @ Atlantis Rising Campus in Second Life for Bernajean Porter. See AtlantisSeekers.ning.com for more details and information to join us in more conversations.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Monitoring Java Application Security with JDK Tools and JFR Events
Cyberbullying: A Technology Issue Affecting Adolescents and What Needs to Be Done
1. Running head: Cyberbullying: A Technology Issue Affecting Adolescents
Cyberbullying:
A Technology Issue Affecting Adolescents and What Needs to Be Done
Samantha Hauck
Western Oregon University
2. 2
Cyberbullying: A Technology Issue Affecting Adolescents
Abstract
Part of growing up, unfortunately, means dealing with name-calling, rumor spreading, and
sometimes even physical encounters with peers, who are otherwise known as bullies. These
encounters, usually performed in front of others, are cruel, and they leave the victim feeling
embarrassed, isolated, and powerless. In the last decade, adolescents, ages 13-17, have found a
new way to target others by using technology: cyberbullying. This paper argues even though
cyberbullying might not be an epidemic sweeping the nation, cyberbullying through social media
is still an issue affecting adolescents ages 13-17 by causing emotional and psychological
problems, and schools need to focus more on preventing this problem. Since most cyberbullying
is found in the adolescent age group, it only makes sense to create solutions that will be
implemented in schools. School personnel work with adolescents almost every day, so they are
the first line of defense when it comes to preventing cyberbullying. Topics discussed in this
paper will include affordances that have led to cyberbullying and the effects it is having on
adolescents. This paper will suggest that schools adopt solutions such as teaching the 5Cs,
teaching students to be peer by standards, and making policy changes, schools should be
adopting to help prevent cyberbullying will be suggested as well.
3. 3
Cyberbullying: A Technology Issue Affecting Adolescents
Introduction
Part of growing up, unfortunately, means dealing with name-calling, rumor spreading,
and sometimes even physical encounters with peers, who are otherwise known as bullies. Bully
encounters, usually performed in front of others, are cruel, and they leave the victim feeling
embarrassed, isolated, and powerless. According to Donegan (2012), certain children will take
their frustrations out on others, and “in the past, these actions could be better controlled because
they were limited to face-to-face interactions” (p. 33). In the last decade though, adolescents,
ages 13-17, have found a new way to target others by using technology. With access to
technology, bullies can now target a person and spread it all across the web. These encounters
can happen through posts, videos, messages, images, and hashtags making it easier for others to
join the bullying. Donegan (2012) wrote, “cell phones, social media sites, chat rooms, and other
forms of technology have allowed bullying to expand into cyberspace” (p. 33). In other words,
technology has allowed bullying to be carried out online. This type of bullying has become
popular in the last decade and has been named cyberbullying.
Even though cyberbullying may not be as widespread as many have claimed (Magid,
2011; Freitas, 2017; Boyd, 2014; Patchin, 2013), it has gained traction because it gives the
aggressor more time to attack their victims on a constant basis, unlike face-to-face bullying
(Siegel, 2009). Cyberbullying can be done beyond school grounds due to how accessible
technology is now becoming. The purpose of this paper is to illustrate that even though
cyberbullying might not be an epidemic sweeping the nation, cyberbullying through social media
is still an issue affecting adolescents ages 13-17 by causing emotional and psychological
problems, and schools need to focus more on preventing this problem. Cyberbullying may seem
like an issue only for parents and adolescents who are being targeted by cyberbullies, but
4. 4
Cyberbullying: A Technology Issue Affecting Adolescents
anyone, who works with this age group, particularly those who work in schools, should be aware
of what cyberbullying is and what they can do to help prevent it.
The History of Cyberbullying
The general consensus is cyberbullying started around the early 2000s (Bark, 2018). The
early 2000s was when chat rooms started to become a popular thing to participate in on the
Internet. The first chat rooms were created by AOL and allowed teens to talk to one another
online privately or in group chat rooms. The chat rooms created a place where adolescents could
bully each other online (Donegan, 2012). The group chat rooms created a problem because a
group of teens could easily create a private chat room to talk about others or gang up on a person
(Donegan, 2012). As computers and chat rooms started gaining in popularity, so did the
cellphone.
Cellphones started to become the next big tech item that everyone, especially adolescents,
had to have in the early 2000s. New features like texting, video recording, and image capturing
came with these phones, which made it easy for people to communicate back and forth and with
others (Donegan, 2012). At the same time, websites such as MySpace and Facebook were
gaining traction. These sites allowed a user to publicly post online about their life or create posts
that target an individual (Donegan, 2012).
Most recently, cyberbullying has been seen happening on social media sites and apps,
such as Yik Yak, Secret, Juicy Campus, and Whisper (Donegan, 2012; Armerding, 2014). These
sites and apps use an open forum layout where people can comment anonymously and under
different harsh topics like “most attractive” and “worst hookup” (Donegan, 2012; Armerding,
2014). On some of these sites, users can "like" posts to upvote them, which puts them to the top
of the forums (Armerding, 2014). These popular posts are then the first thing anyone sees when
5. 5
Cyberbullying: A Technology Issue Affecting Adolescents
they log on. Popular posts appearing at the top of a forum guarantee the victim will see the posts
when they log on. These sites have been gaining in popularity because the users are anonymous.
This makes it extremely hard to track down the people who are bullying others (Armerding,
2014). Cyberbullying has a long history, but there are those who argue that it is not the epidemic
others are claiming it to be.
Not an Epidemic, but Still an Issue
One of the most prominent arguments when it comes to cyberbullying is it is not the
wide-spreading epidemic everyone thinks it is. An epidemic is defined as "affecting or tending to
affect a disproportionately large number of individuals within a population, community, or
region at the same time" (Merriam-Webster, 2018). In other words, an epidemic is something
that affects a huge number of people at the same time. This is what many claim cyberbullying is
becoming in our society (Ditch the Label, 2017; Morgan, 2013; Donegan, 2012). Magid (2011)
wrote “about one in five teens have been cyberbullied at least once in their lifetimes. That’s bad,
but not an epidemic”(p. 8) and Professor Olweus argued “…cyberbullying is a basically low-
frequent phenomenon and that there has not occurred a marked increase in the prevalence rates
of cyberbullying over the past five or six years” (Patchin, 2013, p. 2). These two scholars might
be correct about cyberbullying not being an epidemic that is taking over the lives of adolescents.
What they fail to realize is that it is still affecting adolescents and many believe that it still calls
for attention (Patchin, 2013; Magid, 2011; Freitas, 2017; Boyd, 2014).
Cyberbullying allows for the bully to target their victim constantly whereas traditional
bullying is face-to-face and the incident stops once the bully walks away. A victim cannot escape
cyberbullying. A study done by Ditch the Label (2017) surveyed 10,000 teens to measure their
experiences with cyberbullying. Of the 10,000 teens surveyed “seventeen percent of respondents
6. 6
Cyberbullying: A Technology Issue Affecting Adolescents
reported being cyber bullied — with 42% saying they were bullied on Instagram. Facebook
wasn't far behind, at 37%, Snapchat was next at 31%. Twitter (9%) and Tumblr (3%) were at the
bottom” (Gibbs, 2017, p. 3). This study showed that even though the percentages might be small,
adolescents were still experiencing cyberbullying on popular social media sites and something
needed to be done to prevent it.
A study done by Crimes Against Children Research Center at the University of New
Hampshire collected data from students across the U.S. in 2000, 2005, and 2010 and saw a
modest but steady increase from 6% to 11% in cyberbullying between 2000 and 2010. This
means a statement made by Olweus (2012) that cyberbullying had not seen an increase in five or
six years might not actually be correct (Patchin, 2013). These numbers may seem insignificant
and small to some people, but cyberbullying is still a problem because these are only the reported
numbers. Some adolescents do not report cyberbullying incidents. This means the numbers could
be higher, and it is still happening to adolescents even though the percentage of those affected
are smaller than most claim. (Patchin, 2013; Magid, 2011; Ditch the Label, 2017). Freitas (2017)
has argued, “that any teen or young adult should have to endure such terror, humiliation, cruelty,
and total rejection by their peers is unacceptable. We should not tolerate it. Period” (p. 168). No
adolescent should be a victim of any type of cyberbullying, whether it is an epidemic or not.
Types of Cyberbullying
Cyberbullying can be performed in many ways. Siegel (2009) identified eight different
types of cyberbullying:
1. Flaming: Online fights using electronic messages with angry and vulgar language.
2. Harassment: Repeatedly sending nasty, mean, and insulting messages.
3. Denigration: “Dissing” someone online. Sending or posting gossip or rumors
7. 7
Cyberbullying: A Technology Issue Affecting Adolescents
about a person to damage his or her reputation or friendships.
4. Impersonation: Pretending to be someone else and sending or posting material to
get that person in trouble or danger or to damage that person’s reputation or
friendships.
5. Outing: Sharing someone’s secrets or embarrassing information or images online
6. Trickery: Talking someone into revealing secrets or embarrassing information to
image inline
7. Exclusion: intentionally and cruelly excluding someone from an online group.
8. Cyberstalking: repeated, intense harassment and denigration that includes threats
or creates significant fear. (p. 15)
These forms of cyberbullying have only grown with the introduction of popular social
networking sites like Facebook and apps like Snapchat and Yik Yak and show no signs of
slowing down (Morgan, 2013).
Affordances of Social Media That Have Led to Cyberbullying
Social media is the biggest contributor when it comes to cyberbullying. Brandau and
Evanson (2018) found that of most cyberbullying incidents, 87% happened on Facebook with
other students reporting incidents happening on Instagram, Snapchat, Kik, and Twitter. Social
media sites and apps all have similar affordances that have led to cyberbullying becoming an
issue (Hinduja & Patchin, 2014). Affordances can be described as the following: “the
affordances of the environment are what it offers the animal, what it provides or furnishes, either
for good or ill” (Gibson, 2014 p. 1). In other words, affordances are what is offered or provided
by a new item to a user, and it can be good or bad. Postman’s (1998) first idea about
technological change was “for every advantage a new technology offers, there is always a
8. 8
Cyberbullying: A Technology Issue Affecting Adolescents
corresponding disadvantage” (p. 1). Gibson’s (2014) and Postman’s (1998) ideas of affordances
and technological change are extremely useful because these ideas shed light on how social
media makes cyberbullying easy to perform and the advantages and disadvantages it offers.
These are difficult topics to cover. They are, however, extremely important to think about for
social media sites and people developing new social platforms since the majority of
cyberbullying happens on social media (Hinduja & Patchin, 2014). There are many good things
social media technology offers (affordances), but, as Postman stated, there are some others that
have led to the issue of cyberbullying.
Bower (2008) created a media affordance classification system that helped group together
the different kinds of affordances based on what they offer. A media affordance of social media
technology that has contributed to cyberbullying is write-ability. Write-ability provides a person
a place to write what they are thinking or feeling, which can be harmful to others. Temporal
affordances of social media technology that has contributed to cyberbullying are record-ability
and accessibility. Record-ability provides a person with the ability to record video, which can be
embarrassing and has become an issue in the last decade, and accessibility offers a person easy
access to social media anywhere and at any time using electronic devices. An access-control
affordance that has led to cyberbullying is share-ability. Share-ability offers a person to share
posts, videos, and images easily with others, which can then lead to more cyberbullying. Another
affordance of social media technology that has led to cyberbullying is anonymous-ability, which
provides a person the opportunity to create a fake profile and be anonymous when
communicating with others. This is also called catfishing or impersonation (Siegel, 2009). A new
affordance that has become popular is hashtag-ability. Hashtag-ability offers a person to create a
hashtag to target another person across multiple platforms making it easier for others to find and
9. 9
Cyberbullying: A Technology Issue Affecting Adolescents
join in. These are not all of the affordances that have led to the issue of cyberbullying, but they
are the ones most commonly talked about when discussing the part of society affected most by
cyberbullying.
The Affected Party
Postman's (1998) second idea of technological change was "the advantages and
disadvantages of new technologies are never distributed evenly among the population…there are
even some who are not affected at all" (p. 2). In other words, the positives and negatives
technology offers are not going to be spread out evenly among people. Not everyone is affected
by cyberbullying. As Postman (1998) has stated, the disadvantages of cyberbullying are not
distributed evenly among the population at all.
The area of society affected most by cyberbullying is youth ages 13 to 17 (Hinduja &
Patchin, 2014; Anderson, 2018; Smith et al., 2008). In her study about teens affected by
cyberbullying, Anderson (2018) found “59% of U.S. teens have been bullied or harassed online.”
this translated to about every 1 in 6 teens. This is the time in their lives where youth are
developing into their own person (p. 1). Hormones are flying and perceptions are changing. This
is also the age where they are begging for cell phones and more access to technology, which can
give them access to cyberbullying. In the same study by Anderson (2018), 743 teens, ages 13 to
17, were interviewed about the types of cyberbullying they have experienced. The study found
that “overall, 60% of girls and 59% of boys have experienced at least one of six abusive online
behaviors” (Anderson, 2018. p. 1). From the study, 42% stated they had been called offensive
names online or through their cell phones, 32% said they have had false rumors spread about
them, 21% said someone other than their parents had been constantly asking where they were
and who they were with (stalking), 16% said they have been the target of physical threats online,
10. 10
Cyberbullying: A Technology Issue Affecting Adolescents
and 7% said someone had shared explicit photos of them without his or her consent (Anderson,
2018). Anderson (2018) also found certain forms of cyberbullying such as false rumors,
receiving explicit images, and being asked for explicit images were more common for girls than
boys.
In another study, Smith et al. (2008) found the duration of cyberbullying events for
adolescents lasted anywhere from two weeks (56%), to a month (18%), six months (5%), a year
(8%), and even up to several years (10%). Other research studies (Zalaquett & Chatters, 2014;
Brandau & Evanson, 2018) showed the same results about adolescent cyberbullying, and
recently, research was being done about cyberbullying following students to college (Brandau &
Evanson, 2018). Cyberbullying is an issue that affects adolescents the most and these studies
show it is only growing. As adolescent cyberbullying grows, so do the effects it has on its
victims.
The Effects of Cyberbullying on its Victims
Victims of cyberbullying are affected in many ways, and one of the most common effects
is the victim losing their sense of self. Victims of cyberbullying experience a change in their
activities, values, family dynamics, and personalities (Brandau & Evanson, 2018). Losing their
sense of self leads them to lose who they really are (Brandau & Evanson, 2018). Victims have
reported “withdrawing from extracurricular activities and avoiding social events” (p. 1588)
because they fear that their classmates will target them online more than they already are
(Brandau & Evanson, 2018). In other words, victims who were once outgoing and social
reported they now feel alone and isolated because they have given up everything they were
interested in (Gordon, 2018). Other effects cyberbullying victims face include feeling
overwhelmed due to the amount they are being targeted, vulnerable because anything they do
11. 11
Cyberbullying: A Technology Issue Affecting Adolescents
can become a target, and powerless because, in their mind, there is nothing they can do to stop
the cyberbullying (Gordon, 2018). Some victims feel angry and want revenge, so they add to the
cyberbullying cycle by targeting others to make themselves feel better. Continuing the
cyberbullying cycle only makes the problem worse. Cyberbullying can also lead to anxiety,
depression, and thoughts/attempts of suicide because the adolescent feels it is their only way out
of what is going on (Gordon, 2018).
The effects of cyberbullying are starting to show up in college-age students as well. In
their study, Zalaquett and Chatters (2014) found college-age students dealing with cyberbullying
showed signs of being sad, angry, upset, and stressed. These effects can lead to distress, fear, and
suicide (Dilmac, 2009; Hartwell-Walker, 2010; Lindsay & Krysik, 2012; Zacchilli & Valerio,
2011; Zalaquett & Chatters, 2014). Just because college-age students are maturing and growing,
does not mean they grow out of the effects that cyberbullying has on them. Ultimately, what is at
stake here is the emotional and psychological health of adolescents who are victims of
cyberbullying. The effects can be brutal and long lasting for adolescents. If something is not
done to help prevent cyberbullying, then they are only going to suffer more. The type of
cyberbullying varies from person to person, but the effects it has on an adolescent are the same,
and something needs to be done about it.
Holding Social Media Accountable
Social media sites need to take more preventative action when it comes to handling
cyberbullying (Ditch the Label, 2017; Gibbs, 2017; Palfrey, 2009; BBC 2018). In a study done
by Ditch the Label (2017), where 10,000 teens were surveyed to measure their experiences with
cyberbullying, “seventy-one percent of study participants said social networks don't do enough to
prevent cyber bullying” (p. 26). In other words, over half of the teens surveyed thought social
12. 12
Cyberbullying: A Technology Issue Affecting Adolescents
networks did not do enough to protect them. Social media sites like Facebook and Instagram
have ways to report cyberbullying. They provide resources and information on cyberbullying,
but it is often a long process and hard to find the correct areas of the sites to get the help users
need (Gibbs, 2017; Palfrey, 2009). Palfrey (2009) has suggested,
“the large social networks — Facebook, MySpace, BlackPlanet, LiveJournal, Bebo, and
so forth — can help to set a tone for behavior that is permissible and that which is not.
Online communities can be given the tools to self-police and rules on the site can ban
harmful speech” (p. 12)
In other words, social media sites need to help set a standard for what is appropriate behavior
while being online, and they also need to create and distribute tools to help educate people.
In a survey and research study done by Safety Net (reported by the BBC, 2018), about
cyberbullying, one girl stated “social media companies should take complaints more seriously. If
someone reports something, they shouldn't take days to review it, they should literally just
remove it straight away” (p. 5). This complaint echoes the complaints of hundreds of other
adolescents who want to see changes to how social media handles cyberbullying. Almost half of
the 1,089 11 to 25-year-olds questioned for the Safety Net report had experienced threatening or
nasty social media messages, emails or texts and 83% of them want social media companies to
do more to prevent cyberbullying on the sites (BBC, 2018). Social media sites need to start
taking responsibility for dealing with cyberbullying that is happening, but schools can and should
also help prevent this issue.
Solutions to Cyberbullying That Will Have an Impact on the Future
Cyberbullying is an issue only increasing as technology becomes more accessible to
adolescents and something needs to be done. This issue is something that is never going to fully
13. 13
Cyberbullying: A Technology Issue Affecting Adolescents
go away. There are, however, certain steps schools need to take to help decrease its influences on
adolescents. In their book, Cyberbullying Prevention and Response: Expert Perspectives, Patchin
and Hinduja (2011) explained, “cyberbullying awareness, prevention, and intervention education
is required as part of a school’s ongoing bullying prevention and intervention efforts” (p. 113). In
other words, schools that put intervention programs in place to decrease traditional bullying help
decrease cyberbullying (Patchin & Hinduja, 2011). Since most cyberbullying is found in the
adolescent age groups, it only makes sense to create solutions that will be implemented at that
age level and in schools. These people work with adolescents almost every day, so they are the
first line of defense when it comes to preventing cyberbullying. There are a few important things
schools at all levels, administration, staff, and teachers need to be doing together to help create
this change.
Teaching the 5Cs
One thing schools need to do to help prevent cyberbullying is to start teaching students
about the 5 Cs: cyber-security, cyber-literacy, cyber-citizenship, cyber-safety, and
cyberbullying/peer aggression (Patchin, 2011). Cyber-security teaches adolescents about specific
technologies like hardware, software, and networks that protect equipment and personal
information. Cyber-literacy teaches adolescents they have power and that power is shown
through how they use their tech tools. Cyber-citizenship teaches about the freedom and
responsibility adolescents have when using different online tools. Cyber-safety teaches about
being safe online when interacting with others. Finally, Cyberbullying/peer aggression teaches
students what cyberbullying is, what it looks like, and how it affects people (Goerner, 2018;
Patchin, 2011).
14. 14
Cyberbullying: A Technology Issue Affecting Adolescents
It is important to note each of the 5 Cs needs to be taught and that there is no picking and
choosing when it comes to which areas to teach and which to leave behind. Patchin and Hinduja
(2011) stated, “online safety includes the whole range of cyber-citizenship, cyber-safety, cyber-
literacy, and cyber-security issues. These weave in and out of each other” (p. 112). In other
words, to ignore and not teach one of these areas is doing a great disservice to adolescents
because they are connecting with hundreds of people online every day through social media and
other apps and many of them do not entirely understand privacy, account security, online
predators, and sharing etiquette when connecting with people online (Goerner, 2018). Patchin
and Hinduja (2011) and Goerner’s (2018) idea of teaching the 5Cs to students before they start
using technology on a daily basis is extremely useful because it sheds light on the difficult
problem of reaching out and teaching students about cyberbullying before they really start to
become involved with social media and technology. If students are given and taught the right
tools for using technology, then they are better prepared to stay away from and not be involved
with cyberbullying.
Peer Bystanders
Patchin and Hinduja (2011) also recommended that schools need to teach adolescents
how to be peer bystanders. A peer bystander is someone who witnesses cyberbullying happening
to one of his or her peers and chooses to intervene to keep the situation from escalating (Patchin
& Hinduja, 2011; Cornell Social Media Lab, 2016). Peer bystanders try to take the negative
things the victim is thinking about from being targeted and shift it to the positive. Staying silent
and doing nothing about cyberbullying only makes the issue worse. The Cornell Social Media
Lab (2016) stated, “studies show that bystander intervention can stop up to half of aggressive
events,” so teaching adolescents how to be peer bystanders can help stop cyberbullying
15. 15
Cyberbullying: A Technology Issue Affecting Adolescents
incidents. Teaching adolescents how to be a peer bystander also teaches them about empathy. A
peer bystander is able to understand how the victim is feeling and make a connection with them,
which could help end the cycle of cyberbullying because adolescents would be able to really
understand how it affects victims (Patchin & Hinduja, 2011).
According to Patchin and Hinduja (2011), being a peer bystander also teaches students
how to appropriately respond to cyberbullying by way of practicing in the classroom. This way,
when a real incident occurs, the peer bystander knows how to intervene without making things
worse (Patchin & Hinduja, 2011). Social connections between peers are incredibly important.
Studies show positive results when peer bystanders spend time with, talk to, encourage, and
listen to their victimized peers (Patchin & Hinduja, 2011; Palfrey, 2009). Some victims do not
feel safe or believed when telling adults about cyberbullying and would rather talk to a peer, and
a peer bystander offers the opportunity to do that (Palfrey, 2009). Teaching about and practicing
being a peer bystander in school gives adolescents a chance to make a positive change on their
own, and it is something they can take with them as they grow into adults.
Policy Change
As much as they may want to, schools cannot simply ban electronics. The most important
thing schools need to do is make sure the school policy for acceptable use of technology is
updated to include prohibiting the use of technology, school or personal, for bullying (Morgan,
2013; Simmons, 2014). This includes specifically defining cyberbullying, prohibiting, and
having clear consequences that will ensue if a student is found using technology to cyberbully
someone (Morgan, 2013; Smith et al., 2008; Hinduja & Patchin, 2014). Even though some
cyberbullying events happen outside of school grounds, the effects of it often follow students to
school. Having a clear policy about cyberbullying makes it clear to students that it will not be
16. 16
Cyberbullying: A Technology Issue Affecting Adolescents
tolerated on and off school grounds and that there will be consequences. Schools also need to
make sure they enforce the policy once a report of cyberbullying occurs. Otherwise, students are
not going to report an incident because they know the policy has no real authority (Juvonen &
Gross, 2008). Schools that do not enforce or even have a cyberbullying policy have a hard time
implementing long-term behavioral consequences when cyberbullying has happened (Boucek,
2009), which is why it is extremely important for schools to look over and update their current
policies regarding technology use and cyberbullying.
Create a Safe School Climate
Patchin and Hinduja (2011) explained victims of cyberbullying often do not tell adults
about what was going on because they feared being told it is “no big deal” or to “go handle it on
your own.” To overcome this issue, schools need to create a school climate where students feel
safe reporting about cyberbullying to any adult in the school in order to prevent cyberbullying
(Simmons, 2014). Hinduja and Patchin (2007) suggested that schools provide an empathetic and
understanding environment where students feel comfortable talking to adults. Actually listening,
talking with, and getting to know students as the young people they are is a great way to build
that trust (Patchin & Hinduja, 2011). Students who feel comfortable at school report not feeling
as hesitant about reporting cyberbullying incidents to the adults there (Hinduja & Patchin, 2007).
Building relationships with students is important if administration, staff, and teachers want to
make an impact concerning cyberbullying in their schools.
Provide Cyberbullying Education to Students and Parents
Schools need to also provide student and parent education about cyberbullying (Morgan,
2013; Simmons, 2014). For students, this would look like classroom activities, presentations
from community speakers, and peer mentoring (Morgan, 2013). Students who are given
17. 17
Cyberbullying: A Technology Issue Affecting Adolescents
education about cyberbullying are more likely to not take part in it and report it when it happens
(Morgan, 2013; Simmons, 2014). Education for parents would look like a mailed newsletter or
community night with presentations about cyberbullying (Morgan, 2013). Some parents
desperately want to help the situation but have no idea how or where to start due to a lack of
information about the technology their children are using (Lenhart et al., 2006). Due to the ever-
growing technology changes, Bullen and Hare (2000) have suggested the best approach for
parents who want to help prevent cyberbullying is continuous education and training. By
providing information about cyberbullying to parents, schools are helping and encouraging them
to get involved and help (Simmons, 2014). When students and parents are properly educated
about what cyberbullying is, what it looks like, and its effects on victims, then they are better
prepared to deal with it and have a conversation about it at home (Brunner & Lewis, 2009).
Conclusion
Ninety percent of the adolescents in Anderson’s (2018) study stated they believe
cyberbullying was a problem that affects people their age, and 59% of the parents from the study
said they worry about their child being the target of cyberbullying. Adolescents should not have
to worry about being the target of online harassment every time they use technology. This only
increases fear, isolation, depression, anxiety, and a host of other issues. Adolescents and young
adults should never feel that the only way to escape a cyberbully is by committing suicide (Bark,
2017). This is a time where adolescents should be focused on school, hobbies, and their families
and not about what is being spread about them across the web. Postman’s (1998) fourth idea
about technological changes is “the consequences of technological change are always vast, often
unpredictable and largely irreversible” (p. 4). Cyberbullying is a direct result of technological
changes affecting millions of adolescents. Cyberbullying may seem like something that is largely
18. 18
Cyberbullying: A Technology Issue Affecting Adolescents
irreversible, but if schools start taking the issue seriously and understand the effects it has on
adolescents, then some of it can be reversed.
19. 19
Cyberbullying: A Technology Issue Affecting Adolescents
References
Anderson, M. (2018, September 27). A majority of teens have experienced some form of
cyberbullying. Pew Research Center. Retrieved November 7, 2018, from
http://www.pewinternet.org/2018/09/27/a-majority-of-teens-have-experienced-some-
form-of-cyberbullying/
Armerding, T. (2014, March 24). Teen cyberbullying grows with 'anonymous' social chat apps.
CSO from IDG. Retrieved March 11, 2019, from
https://www.csoonline.com/article/2134508/teen-cyberbullying-grows-with--
anonymous--social-chat-apps.html
Bark Technologies. (2017, March 22). The history of cyberbullying. Retrieved November 7,
2018, from https://www.bark.us/blog/the-history-of-cyberbullying/
BBC. (2018, February 26). Social media firms 'failing' to tackle cyber-bullying. Retrieved
February 1, 2019, from https://www.bbc.com/news/technology-43197937
Boucek, S. G. (2009). Dealing with the nightmare of “Sexting.” Education Digest, 75(3), 10–12.
Retrieved February 10, 2019, from
https://www.aasa.org/SchoolAdministratorArticle.aspx?id=4386
Bower, M. (2008). Affordance analysis–matching learning tasks with learning technologies.
Educational Media International, 45(1), 3-15. Retrieved November 7, 2018, from
https://moodle.wou.edu/pluginfile.php/23408/mod_page/content/15/affordances_analysis.
Pdf
boyd, Danah. (2014). It's Complicated: The Social Lives of Networked Teens. New Haven: Yale
University Press.
Brandau, M., & Evanson, T. A. (2018). Adolescent victims emerging from cyberbullying.
20. 20
Cyberbullying: A Technology Issue Affecting Adolescents
Qualitative Health Research, 28(10), 1584–1594. Retrieved November 7, 2018, from
https://doi.org/10.1177/1049732318773325
Brunner, J., & Lewis, D. (2008). Tattling ends but bullying continues. Principal Leadership,
8(6), 38–42. Retrieved February 10, 2019, from
https://www.researchgate.net/publication/234697114_Tattling_Ends_but_Bullying_Conti
nues
Bullen, P., & Hare, N. (2000). The internet: Its effects on safety and behavior. Implications for
adolescents. Retrieved February 10, 2019, from
https://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=1912&context=thesesdisse
rtations
Cornell Social Media Lab. (2016, December 9). Designing to stop cyberbullying: Current
solutions. Retrieved February 1, 2019, from https://medium.com/social-media-
stories/designing-to-stop-cyberbullying-current-solutions-f78d2fada84f
Ditch the Label. (2017). The annual bullying survey 2017. Retrieved February 1, 2019, from
https://www.ditchthelabel.org/wp-content/uploads/2017/07/The-Annual-Bullying-
Survey-2017-1.pdf
Dilmac, B. (2009). Psychological needs as a predictor of cyber bullying: A preliminary report on
college students. Educational Sciences: Theory and Practice, 9, 1307-1325. Retrieved
February 1, 2019, from https://files.eric.ed.gov/fulltext/EJ858926.pdf
Donegan, R. (2012). Bullying and cyberbullying: History, statistics, law, prevention and
analysis. The Elon Journal of Undergraduate Research in Communications, 3(1), 33-42.
Retrieved February 1, 2019, from https://www.elon.edu/docs/e-
web/academics/communications/research/vol3no1/04doneganejspring12.pdf
21. 21
Cyberbullying: A Technology Issue Affecting Adolescents
Epidemic. (2018). Merriam-Webster Dictionary. Retrieved February 15, 2019, from
https://www.merriam-webster.com/dictionary/epidemic
Freitas, D. (2017). The happiness effect: How social media is driving a generation to appear
perfect at any cost. New York: Oxford University Press.
Goerner, P. (2018). Digital citizenship: New teaching strategies. School Library Journal.
Retrieved November 7, 2018, from https://www.slj.com/?authorName=Phil%20Goerner
Gordon, S. (2018, September 21). What are the effects of cyberbullying?. Very Well Family.
Retrieved November 7, 2018, from https://www.verywellfamily.com/what-are-the-
effects-of-cyberbullying-460558
Gibbs, C. (2017, July 19). Instagram is the worst social network for cyber bullying: study. New
York Daily News. Retrieved February 13, 2019, from https://www.nydailynews.com/life-
style/instagram-worst-social-network-cyber-bullying-study-article-1.3339477
Gibson, J. J. (2014). The ecological approach to visual perception: classic edition. Psychology
Press. Retrieved November 7, 2018, from
https://pdfs.semanticscholar.org/eab2/b1523b942ca7ae44e7495c496bc87628f9e1.pdf
Hartwell-Walker, M. (2010). Cyberbullying and teen suicide. Psych Central. Retrieved
November 7, 2018, from http://psychcentral.com/lib/2010/cyberbullying-and-teen-
suicide/
Hinduja, S., & Patchin, J. W. (2014). Bullying beyond the schoolyard: Preventing and
responding to cyberbullying. Corwin Press. Retrieved November 7, 2018, from
https://goo.gl/9WfEft
Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: School
violence and delinquency. Journal of School Violence, 6(3), 89-112. Retrieved February
22. 22
Cyberbullying: A Technology Issue Affecting Adolescents
10, 2019, from
https://www.researchgate.net/publication/234727840_Offline_Consequences_of_Online_
Victimization_School_Violence_and_Delinquency
Juvonen, J., & Gross, E. F. (2008). Extending the school grounds: Bullying experiences in
cyberspace. Journal of School Health, 78(9), 496-505. Retrieved February 10, 2019, from
https://www.cdmc.ucla.edu/wp-content/uploads/sites/170/2018/05/sheva-3.pdf
Lenhart, A., Madden, M., & Hitlin, P. (2005). Teens and technology: Youth are leading the
transition to a fully wired and mobile nation. Retrieved February 10, 2019, from
https://www.immagic.com/eLibrary/ARCHIVES/GENERAL/PEW/P050727L.pdf
Lindsay, M., & Krysik, J. (2012). Online harassment among college students. Information,
Communication, & Society, 15, 703-719.
Magid, L. (2011, September 14). Cyberbullying: A serious problem, but not an epidemic.
Retrieved February 1, 2019, from https://www.connectsafely.org/cyberbullying-a-
serious-problem-but-not-an-epidemic/
Morgan, H. (2013). Malicious use of technology. Childhood Education, 89(3), 146–151.
Retrieved November 7, 2018, from
https://www.researchgate.net/publication/271665506_Malicious_Use_of_Technol
ogy_What_Schools_Parents_and_Teachers_Can_Do_to_Prevent_Cyberbullying
Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford:
Blackwell.
Palfrey, J. (2009, April 1). Searching for solutions to cyberbullying. Harvard Law Today.
Retrieved February 1, 2019, from
https://today.law.harvard.edu/palfrey-searching-for-solutions-to-cyberbullying/
23. 23
Cyberbullying: A Technology Issue Affecting Adolescents
Patchin, J. (2013, March 21). Cyberbullying: Neither an epidemic or a rarity. Cyberbullying
Research Center. Retrieved February 1, 2019, from
https://cyberbullying.org/cyberbullying-neither-an-epidemic-nor-a-rarity
Patchin, J. W., & Hinduja, S. (Eds.). (2011). Cyberbullying prevention and response: expert
perspectives. Retrieved November 7, 2018, from
https://ebookcentral.proquest.com/lib/wou/detail.action?docID=714029
Postman, N. (1998). Five things we need to know about technological change. [Transcript of
Talk]. Retrieved November 7, 2018, from
https://moodle.wou.edu/pluginfile.php/23390/mod_book/chapter/279/postman-
%20Five%20Things%20We%20Need%20to%20Know%20About%20Technological%20
Change.pdf
Siegle, D. (2009). Cyberbullying and sexting: Technology abuses of the 21st Century. Gifted
Child Today, 33, 15. Retrieved November 7, 2018, from
https://files.eric.ed.gov/fulltext/EJ881324.pdf
Simmons, K. D., Bynum, Y. P. (2014). Cyberbullying: Six things administrators can do.
Education., 134(4), 452. Retrieved November 7, 2018, from
https://www.questia.com/library/journal/1G1-374694688/cyberbullying-six-things-
administrators-can-do
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008),
Cyberbullying: its nature and impact in secondary school pupils. Journal of Child
Psychology and Psychiatry, 49: 376-385. doi:10.1111/j.1469-7610.2007.01846.x
Zacchilli, T. L., & Valerio, C. Y. (2011). The knowledge and prevalence of cyberbullying in a
college sample. Journal of Scientific Psychology, 11-23, Retrieved November 7, 2018,
24. 24
Cyberbullying: A Technology Issue Affecting Adolescents
from
http://www.psyencelab.com/images/The_Knowledge_and_Prevalence_of_Cyberbullying
_in_a_College_Sample.pdf
Zalaquett, C. P., & Chatters, S. J. (2014). Cyberbullying in college: Frequency, characteristics,
and practical implications. Sage Open, 4(1), 2158244014526721. Retrieved November 7,
2018, from
https://www.researchgate.net/publication/270671954_Cyberbullying_in_College_Freque
ncy_Characteristics_and_Practical_Implications