ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Implications of Cyber Bullying- Part 1

Updated on February 7, 2014
Diane Lockridge profile image

Lockridge holds an EdS in Curriculum and Instruction, an MS in Elementary Education, and a BA in History. She also homeschools her children.

Computers are a great benefit, but they can also be a source of struggle for children.
Computers are a great benefit, but they can also be a source of struggle for children. | Source

Adolescents often fear being teased in school or being bullied on the playground, however modern adolescents also need to fear being bullied through their phone or online. Words can and do hurt and can leave a mark on the emotional growth of students far worse than a punch on the playground or a bloody nose.

Watch almost any movie geared toward adolescents and one is bound to witness a scene of aggression between the main character and minor characters.

Unfortunately, these incidents of aggression and bullying aren't relegated to the silver screen. Today’s youth are subject to a different type of bullying than ever before- cyberbullying. Cyberbullying, where children bully others through internet chatboards, and demeaning texts are a form of relational aggression that is less confrontational, since the aggressors don't always make themself known. Although some people view bullying in as a commonality and a “right of passage” into adulthood, teasing of any kind can be harmful to the victim (Suffolk Public Schools, 2011).

According to Feinberg and Robey (2008), approximately 93% of US adolescents use the Internet (p. 10). This constant connection to others over the Internet through smart phones and increased computer usage also increases the likelihood of exposure to relational aggression (RA) in the form of cyber bullying. Cyber bullying, or harassment over electronic devises, has become an epidemic and has altered the course of life for many students.

Due to the covert nature of cyber bullying, it is often unobservable by adults not involved in the experience, notes Gomes (2007), which makes the situation far more dangerous (p. 511). Unlike the traditional bullying and name-calling on the playground, RA is mostly non-physical and takes on a covert form. Instead of pushing a child into the lockers, a cyber bully texts friends a joke about the victim. Instead of stealing the victim’s clothes in the locker room, a cyber bully circulates compromising photos of the victim. Victims of traditional bullying know who their attacker is, however cyber bullying is often anonymous, leaving the victim wondering who is harassing them and why.

Relational aggression is often divided into two categories: intimidation and ignoring.

What is Cyber Bullying?

RA is divided into two categories: intimidation and ignoring. Cyber bullying falls into the former category — intimidation— by using the electronic mediums of text messages, email, chat rooms, and social media sites to invade the victim’s personal space and degrade them in a public forum. Herrenkohl, et al (2009) note “Tactics used by relationally aggressive youth include excluding peers from one’s group activities, withdrawing affection, and threatening to tell lies or rumors about another child to cause him or her emotional harm” (p. 4).

The Advisory Centre for Education (ACE, 2010) notes that cyber bullying is not necessarily a type of bullying, but rather it is a method of bullying (p. 1). Cyber bullying manifests quite differently than traditional forms of bullying. For example, if a bully name-calls the victim on the playground or in the hallway, only a few people may hear the teasing. However, if a cyber bully attacks the victim using electronic media hundreds of people can receive the same degrading comment at the same time. Feinberg and Robey (2008) note “the boundaryless [sic] nature of cybercommunications [sic] means that students can experience bullying wherever they have access to their phones or a computer: at home, at a friend’s house, during school, and even on the bus or at the mall” (p. 10). Constant bombardment is the mantra of the cyber bully.

Herrenkohl et al. (2009) note that although RA and cyber bullying are most commonly non-violent, it may lead to acts of physical violence if not resolved (p. 4). Often aggressors will ignore the victim to the point of exclusion, and when called on the behavior, claim something such as that “there is no rule” against not including someone in an activity.

Pellegrini and Long (2002) as cited in Herrenkohl et al. note that in both relational aggression and physical aggression the bully desires dominance over the relationship with the victim (p. 4). Gomes (2007) notes that the power struggle is a main issue in relational aggression, in that the aggressor wants to exert power over the victim:

The desire for manipulation is present in the concept of relational aggression. The need to change another’s view of an unsuspecting victim, in a negative way, is salient. Consequently, the desire to disrupt interpersonal relationships and feelings of attachment stem from the longing to [maneuver] a situation in such a way that best suits the goals of the perpetrator (Gomes, p. 513).

The Department for Children Schools and Families (DCSF, 2007) discusses the feelings that go along with being a victim of cyber bullying, noting that it can leave the victim feeling helpless and alone. Victims of traditional bullying “have been told to walk away from someone who is trying to bully them. However, it is not possible to walk away from constant phone messages or from a website which has been created to hurt you” (Department for Children Schools and Families, p. 14).

Even when the victim things the situation is resolved, it is difficult to know the activities of the aggressor. Due to the nature of cyber bullying, where recipients can save and send messages to others, it is difficult to ensure harassing content will not resurface later, notes DCSF (2007, p. 13). In many instances, a victim may not realize that the problem has resurfaced (DCSF, p. 14).

Article Series Information

This is part 1 in a 3-Part series. Please visit HERE for part 1, HERE for part 2 and HERE for part 3.

The Department for Children Schools and Families (DCSF, 2007) discusses the feelings that go along with being a victim of cyber bullying, noting that it can leave the victim feeling helpless and alone. Victims of traditional bullying “have been told to walk away from someone who is trying to bully them. However, it is not possible to walk away from constant phone messages or from a website which has been created to hurt you” (Department for Children Schools and Families, p. 14).

Even when the victim things the situation is resolved, it is difficult to know the activities of the aggressor. Due to the nature of cyber bullying, where recipients can save and send messages to others, it is difficult to ensure harassing content will not resurface later, notes DCSF (2007, p. 13). In many instances, a victim may not realize that the problem has resurfaced (DCSF, p. 14).

References

Advisory Centre for Education. (2010). Tackling bullying: a practical guide to parent’s legal rights.

Behavior; Bullying among sixth graders a daily occurrence. (2005). Science Letter, 162. doi: 821655901

Bloom, A. (2009). The cyberbully girls who hide behind false identity. The Times Educational Supplement : TES,(4860), 9. doi: 1894028121

Bully OnLine. (2011). “Cyberbullying on the internet”.

Childnet International. (2007). Cyberbullying: a whole-school community issue.

Department for Children, Schools and Families. (2007). Cyberbullying- safe to learn: embedding anti-bullying work in schools.

Feinberg, T. & Robey, N. (2008). Cyberbullying. Principal Leadership, 9(1), 10-14. doi: 1555016271

Goldstein, S. & Tisak, M. (2010). Adolescents’ social reasoning about relational aggression. Journal of Child and Family Studies. 19(4) 471-482. doi: 2077338021

Gomes, M. (2007). A concept analysis of relational aggression. Journal of Psychiatric & Mental Health Nursing, 14(5), 510-515. Retrieved from EBSCOhost.

Herrenkohl, T., Catalano, R., Hemphill, S., & Toumbourou, J. (2009). Longitudinal examination of physical and relational aggression as precursors to later problem behaviors in adolescents. Violence and Victims, 24(1), 3-19. Retrieved from EBSCOhost.

Megan Meier Foundation. (2011). “Megan meier’s story.”

Remillard, A. & Lamb, S. (2005). Adolescent girls' coping with relational aggression. Sex Roles, 53(3-4), 221-229. doi: 924608391

Schaffner, L. Violence against girls provokes girls' violence: From private injury to public harm. Violence Against Women, 13(12) 1229-1248. doi: 10.1177/1077801207309881

Stomfay-Stitz, A. & Wheeler, E. (2007). Cyberbullying and our middle school girls. Childhood Education, 83(5), 308J-308K. doi: 1295272691

Suffolk Public Schools. (2011). “Mean girls- realities of relational aggression.” Retrieved online on October 9, 2011.

Wade, A. & Beran, T. (2011). Cyberbullying: The new era of bullying. Canadian Journal of School Psychology, 26(1), 44-61. doi: 2333968401

Young, E., Nelson, D., Hottle, A., Warburton, B., & Young, B. (2011). Relational Aggression Among Students. The Education Digest, 76(7), 24-29. doi: 2253484481xs

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)