CYBER harassment involves using
an electronic medium to threaten or harm others. E-mail,
chat rooms, cell phones, instant messaging, pagers, text
messaging, and online voting booths are tools used to
inflict humiliation, fear, and a sense of helplessness.
This type of intimidation differs from traditional
bullying in several important ways.
Unlike the incidents that most
adults recall from their youth, where the threatening
party is physically bigger and more powerful than the
victim, cyberbullies can be physically weaker than the
persons they attempt to frighten. Cyberbullies typically
hide behind the mask of anonymity that the Internet
provides by using fictitious screen names.
Because abusers may lack
face-to-face contact with the individuals being
persecuted, they may not know the level of duress that
is produced by their misconduct. Therefore, they are
unlikely to experience feelings of regret, sympathy, or
compassion toward the victim. More
Damaging
Harmful messages intended to
undermine the reputation of a victim can be far more
damaging than face-to-face altercations. Instead of
remaining a private matter or event known by only a
small group, text or photographs can be communicated to
a large audience in a short time.
Whereas bullies at school
usually can be identified easily by mistreated
individuals, cyberbullies typically are difficult to
trace. Consequently, they can avoid responsibility for
their misconduct, thereby reducing the fear of getting
caught and being punished.
Cyberspace represents new
territory for peer mistreatment, often leaving school
administrators with doubts about the boundaries of their
jurisdiction. School leaders may be unable to respond
when unknown parties have sent hate messages from a
location outside the school, such as from a home-based
computer or mobile phone.
Some students are reluctant to
tell adults about the anxiety they endure at the hands
of cyber enemies, fearing that parents may overreact by
taking away their computer, Internet access, or cell
phone. Many teenagers are unwilling to risk having their
parents choose such extreme forms of protection because,
without technology tools, they would feel socially
isolated and less able to stay in immediate contact with
their friends.
A misconception about cyber
abuse is that nothing can be done about it. In reality,
cyber harassment is a crime that resembles other forms
of unlawful behavior and is subject to prosecution.
The University of Dayton School
of Law offers numerous resources for the purpose of
understanding the legal issues which are related to
cyberbullying. The website http://www.cybercrimes.net/
describes cyber stalking and cyber intimidation,
identifies agencies which are available to be contacted
in order to find help in the matter of dealing with
cyber mistreatment, offers guidelines which can be used
for reporting abuse, and presents articles explaining
legal processes and penalties related to a wide range of
cyber crimes.
Until recently, the victims of
bullying considered their homes a place of safety, a
sanctuary which they could take from abusive peers. This
is no longer the case in an era of instant, electronic
communications.
Most students who are at the
secondary school level go online soon after they return
home from school. When they arrive there, some discover
that they are the target of threats, rumors, and lies
without knowing the identity of the persons creating
fear and frustration, and most of these students don't
know how to stop the damage. The following examples of
adolescent cyberbullying in several countries reveal the
range and complexity of the issues which are actually
involved here.
Shinobu is a high school
freshman in Osaka, Japan. When his gym period was over,
he got dressed in what he believed was the privacy of
the school changing room. However, a classmate who
wanted to ridicule him for being overweight secretly
used a cell phone to photograph him. Within seconds, the
picture of the naked boy was sent wirelessly by instant
messaging for many students to see. By the time he
finished dressing and went on to his next class, he had
already become a laughing stock of the school.
Sixteen-year-old Denise is a
high school junior in Los Angeles, California. Denise
had an argument with her boyfriend and broke up with
him. The rejected young man was angry and decided that
he would get even with her for having broken up with
him. The devious method that he chose to use was to post
Denise's contact numbers, including her e-mail address,
her cell phone number, and her street address, on
several sex-oriented websites and blogs.
As a result of her former
boyfriend's actions, Denise was hounded for months by
instant messages, prank callers, and car horns of
insensitive people who drove by her house to see whether
or not they could catch a glimpse of her. In this
particular case, the identity of the cyberbully, her
former boyfriend, was detected quickly. However, his
apprehension did not eliminate the sustained sense of
helplessness and embarrassment which Denise had
experienced. Often
Jealousy
Jealousy is a common motive for
cyber abuse. Fourteen-year-old Amy lives in Montgomery,
Alabama. She is enrolled in a home school curriculum and
plans to earn a high school diploma by the time she has
reached the age of 16 so she can start college early.
Darin, a neighbor who attends public school, is Amy's
friend. His girlfriend began sending Amy e-mail messages
threatening to cut herself if Amy did not stop talking
to Darin.
The guilt that someone might do
herself bodily harm because of her led Amy to tell Darin
about the e-mails. Darin confessed that his girlfriend
had cut herself once before. Amy wanted to do the right
thing, but she did not know who to contact. She told her
mother, and the police were called to investigate the
matter.
Donna attends eighth grade at a
parochial school in Montreal, Quebec, Canada. She and
her mother traveled to Toronto for a week to visit her
grandmother, who was recuperating from cancer surgery.
When Donna returned to school, a cyberbully circulated a
rumor alleging that Donna had contracted SARS (Severe
Acute Respiratory Syndrome) during the course of her
stay in Toronto. Donna's girlfriends were scared and
unwilling to be around her or even to talk over the
phone. Without exception, her classmates moved away from
Donna whenever she went near them.
Some cases may involve more than
one bully and a single victim. Others could involve a
gang of bullies that persecute multiple parties. The
latter occurs when students respond to online trash
polling sites.
These sites, which are growing
in number, invite students to identify individuals by
unflattering characteristics, such as the most obese
person at their school, the boys who are most likely to
be gay, and the girls who have slept with the most boys.
The predictable consequences for students who have been
subjected to this shameful treatment are depression,
hopelessness, and withdrawal.
Students are not the only people
at school who are bullied. Teachers often are targets
too. When students make disrespectful comments to a
teacher or challenge the authority of the school to
govern their behavior on campus, they usually are sent
to the office, where an administrator examines the
situation and determines a suitable course of
disciplinary action. Only
So Far
The limitations of this type of
practice for use in preventing student harassment of
faculty members are illustrated by the experience of
Joseph, a high school teacher in Phoenix, Arizona. He
offered computer classes to juniors and seniors and
consistently received high ratings from students for his
instruction. He was known for preparing students to
obtain a good-paying job immediately after
graduation.
Joseph felt disappointment and
shock when told of a website on which he was the focus
of messages on "What I hate about my teacher, Mr…." The
site contained statements that Joseph recognized as
characteristic of a particular student and comments he
recalled saying to the student. Joseph related, "I
taught this young man how to apply a technological tool
for constructive purposes, and he decided to use it
against me."
Some sophisticated adolescent
cyberbullies target schools or other institutions by
releasing worms that can compromise the integrity of
computers or make them unavailable. The result is often
disruption leading to significant loss of time and
money.
The U.S. Department of Justice
website, www.cybercrime.gov, lists prosecuted criminals
and a summary of computer intrusion cases, including the
juvenile or adult status of perpetrators, type of harm
done, estimated dollar loss, target group, geography,
and punishment.
That list includes one hacker
who directed worm-infected computers to launch a
distributed denial of service attack against the
Microsoft main website, causing a shutdown and making it
inaccessible to the public for four hours. The hacker
was 14 years old and pleaded guilty in 2004 to
intentionally causing damage and attempting to disable
protected computers.
What actions should be taken to
reduce the scale of cyberbullying? State departments of
education have begun to provide training for
administrators in middle and high schools to build
awareness of available options in confronting such
problems.
Other individuals at schools
also should assume responsibility for prevention. The
district's information technology staff members could be
given the task of designing and delivering K-12
curriculum to acquaint students, teachers, and parents
with etiquette on the Internet, methods of
self-protection, and ways of responding to
persecution.
A related initiative would be to
help the adult public recognize that adolescents
interact with technology differently than older people.
Most grown-ups think of computers as practical tools
that can be used to locate information and send
electronic mail without the expense of postage stamps.
In contrast, teenagers consider instant messaging and
chat rooms to be an essential aspect of their social
lives — a vital connection with peers. Chat is the
number one online activity among teenagers. Why
Adults Fail
These generational differences
account for why few adults are able to provide wise
counsel on dealing with cyberbullies. The solutions most
often proposed are simplistic and result in minimal
protection.
For example, purchasing and
setting online filters would appear to be suitable
solutions, because these preventive measures block
reception of unwanted messages. However, by altering
their screen names, bullies can override these
obstructions easily.
Responding to bullies online in
an attempt to persuade them to stop the harassment also
might seem to be a reasonable counter. Yet, student
experience shows that this approach can motivate a bully
to apply even more severe methods of intimidation.
Parents and teachers can follow
some practical guidelines to minimize the likelihood of
cyberbullying:
- Adults should develop close
communications with adolescents and encourage them to
relate problems such as episodes of digital
harassment.
- Students should be told not to share
personal information, such as their e-mail password,
with anyone except a parent.
- Students, parents, educators, and
law enforcement personnel should know where to go for
information about online abuses, such as cyber
intimidation, con artists, identity thieves,
predators, stalkers, criminal hackers, financial
fraud, security, and privacy problems.
The site WiredSafety,
http://wiredsafety.org, is an organization that provides
assistance in this area. The U.S. Department of Justice,
www.cybercrime.gov, offers guidelines on cyber ethics
for students, parents, and teachers and identifies
government contacts for reporting Internet crimes. Bill
Belsey, recipient of the Canadian Prime Minister's Award
for Teaching Excellence in Science, Mathematics, and
Technology, maintains www.cyberbullying.ca, a website
for students, parents, and the public that describes the
emotional costs of cyberbullying, forms of mistreatment,
and prevention strategies.
- Adults should ensure that students
realize that people may not be who they say they are
in a chat room. For example, someone could claim to be
a 14-year-old female, but in actuality be a
50-year-old male predator seeking to take advantage of
a vulnerable adolescent.
- Teenagers should never agree to meet
someone they have chatted with online unless their
parents go with them and the meeting is in a public
place.
- People should avoid sending impulse
messages or staying online when they are angry. Wait
until self-control and a sense of calm is restored so
that the message is more sensibly written and excludes
hostility. People typically regret sending a "flame"
(angry) message that could motivate someone to become
a cyberbully as an act of revenge for it. Keep in mind
that messages written in capital letters are
interpreted as shouting by some recipients.
- When adolescents tell teachers or
parents about cyber harassment, the cooperating adults
should immediately inform the police and the Internet
instant messaging or mobile phone service provider.
- Victims never should respond to
cyberbullies, but always should keep messages as
evidence, including the text and source of information
detailing the originating address of the e-mail.
Whether or not they are read, messages should not be
erased. The police, the Internet service provider, or
the telephone company often can use the narratives for
tracking purposes.
- Those who are persecuted might
notice words used by certain people they know. Most
cyberbullies who post anonymous messages are not as
anonymous as they may think. If a legitimate threat
exists, law enforcement officials can subpoena records
of all web users for a particular website. From there,
users can be tracked to their individual computers.
The mission of Channel One, a
broadcast network viewed daily in some American
classrooms, is to keep secondary school students
informed of current events and teach them how the media
works. Its website presents an interactive quiz that
adolescents, parents, and teachers can complete to check
their knowledge about coping with bullies in
Cyberspace.
The quiz includes questions on
instant messaging, threatening e-mails, revealing
photographs, personal information, screen name
selection, cell phone flames, chat room conflicts,
blocking options, and group persecution. Immediate
feedback is provided for every response, along with an
explanation of the correct answers and a final score.
The website, www.channelone.com/
news/2004/01/30/cyberbullies/index.html, provides
complete information on this interactive quiz.
Cyberbullying is of such recent
origin that current understanding is limited. Many
parents misinterpret adolescents' time on the Internet
as learning rather than considering that it might be
related to peer abuse.
This preliminary assessment
hopes to begin conversations and encourage studies on
ways to confront this new form of abuse. Some challenges
include the identification of cyberbullies,
encouragement for victims to report abuse, access to
counseling for those who suffer persecution, curriculum
to guide civil behavior online, rehabilitation programs
to help dysfunctional youngsters, parent education to
improve their monitoring and guidance functions, and the
linkage of institutions for cooperation across
jurisdictions.
No Such Magic
In fiction, Harry Potter
possessed magical powers that he relied on to silence
his bully, the abominable Dudley Dursely. In real life,
however, adolescents, parents, teachers, and principals
do not have such magic at their disposal.
Creativity and persistence are
powerful resources that can be applied. Effective
methods must be developed for protecting students from
being bullied and preventing others from becoming
tyrants on the cyber stage. Dumbledore, the Headmaster
of Hogwarts School, urged the young wizard Harry to
remember, "It is our choices, Harry, that show what we
truly are, far more than our abilities."
~~~~~~~~
By Paris S. Strom and Robert D.
Strom
Paris S. Strom is Assistant
Professor, Educational Foundations, Leadership, and
Technology, Auburn University, 4036 Haley Center,
Auburn, AL 36849. Condensed from The Educational Forum,
70 (Fall 2005), 21-36.
Robert D. Strom is Professor of
Educational Psychology, Arizona State University, P.O.
Box 870611, Tempe, AZ 85287. Condensed from The
Educational Forum, 70 (Fall 2005), 21-36.
Copyright of
Education
Digest is the
property of Prakken Publications. The copyright in
an individual article may be maintained by the
author in certain cases. Content may not be copied
or emailed to multiple sites or posted to a
listserv without the copyright holder's express
written permission. However, users may print,
download, or email articles for individual
use. Source:
Education Digest,
20051201, Vol. 71 Issue 4, p35, 7p Item: EJ741205 | |