By Marian Wilde , GreatSchools Staff
New technologies — cell phones with cameras, social-networking sites, and instant messaging — have been speedily embraced by teens and pre-teens alike. While these technologies provide easy access to information and make communication among family and friends easier, they also provide new platforms for kids to tease and torment each other.
Cyberbullying has become such a concern in some states that laws have been introduced to address it and school districts are establishing policies to combat it.
Face-to-face bullying, defined as repeated, abusive behavior toward another person, can be both physical and psychological. Cyberbullying, however, is purely psychological, and the repertoire of tactics used in cyberspace has grown over time to include these methods:
Real-life cyberbullying looks like this:
The schoolyard bully has nothing on the cyberbully.
Cyberbullying is a new phenomenon, hence little scientific research exists to date on its true extent. However, a handful of survey results are starting to become available. For example, a 2005 survey of 1,500 adolescents, conducted by researchers Sameer Hinduja, Ph.D., and Justin Patchin, Ph.D., found that over one-third of those surveyed reported that they had been bullied online.
According to Hinduja, cyberbullying can occur among children as young as 9 or 10 years old, or as soon as they're comfortable typing on keyboard. "This is happening among all ages, to be honest," he says. "Kids are embracing technology at such an early age. Our online research indicates that middle-schoolers are just as likely to be cyberbullies or victims of cyberbullying as are high schoolers."
A 2005 survey of UK teens, found that 20% said that they had experienced some form of cyberbullying.
An Australian study, reports that cyberbullying incidents are occurring around the globe, in such places as Japan, Australia, Canada and Scandinavia.
Cyberbullying happens because there is little supervision of kids in the cyberworld and because the media provides anonymity for the bully. "There's no monitoring in cyberspace," says Hinduja, "plus parents do not — and I believe should not — always stand there looking over children's shoulders when they're on the computer, because there needs to be a level of trust there. It would certainly help for parents to regularly go online with their kids and discuss issues related to Internet safety with them. Nevertheless, just like offline behaviors, parents cannot supervise their kids 100% of the time and must establish appropriate Internet usage rules even when those parents aren't around. Also, there's the fact that when you're behind the keyboard and the computer monitor, it takes less fortitude to express really malicious comments, because of the anonymity and because they're physically distant from the victim. It's much easier to be cruel."
There are many steps to take before bringing in the police, but parents should know that law enforcement can assist when, and if, necessary.
Sgt. John Geraty, of the San Francisco Police Internet Crimes Against Children unit, explains that while there are no laws specific to cyberbullying, there are times when a line is crossed and law enforcement can step in. "Cases that involve threats of death or injury to a person or their family, and which the recipient believes to be credible, should be reported to law enforcement immediately."
In such cases, it's important to preserve the evidence. "A copy of the email with the full header information should be given to the police," says Geraty. "This will provide law enforcement with the information needed to trace the sender. The option for viewing the full header is often located in the Mail Preferences tab of your email service browser. If threats of injury or death occur via a chat session, the sender's screen name, the time and date the threats occurred, and the Internet Service Provider should be provided to the police."
Evidence should be given to the police as soon as possible, urges Gerity. "ISPs vary in terms of how long they save information. AOL, for example, will save information of chat users, such as their IP addresses, for seven days before purging. Other ISPs save information for only 30 days. The sooner incidents of crime are reported to law enforcement, the sooner information can be preserved for an investigation."
Some states, such as Washington, are introducing legislation that will specifically address cyberbullying in the schools. Currently, however, the only tool that many states have in their legal toolboxes are anti-stalking statutes that mention electronic communications.
Cyberbullying often takes place outside of school, leaving the schools with limited ability to prevent it.
"I've had a kid come to me to say that she received abusive emails from an online chat room and that she felt scared about it," says Sara Spence, a middle and high school counselor in San Francisco. "From a school counselor's perspective, it's a relatively new phenomenon. I feel like my hands are tied. I mean, when you receive emails from an unknown person, I don't really know if there's a protocol in place for me to do anything."
A growing number of schools are starting to develop policies and procedures to address some of the behaviors associated with cyberbullying, such as blocking access to problematic Web sites and controlling usage of cell phones on campus, especially in locker rooms, restrooms or by pools.
The key to cyberbullying prevention just might be the parent. Children and teens are often unsupervised on the family computer, know more about technology than their parents or are not taught proper social skills regarding electronic media. As a parent you can help prevent cyberbullying by:
Hinduja advises parents to take a measured approach when dealing with a child's access to the Internet. "The child needs to know that the parent is not going to take away their Internet privileges if they tell them about something bad that's happening. They need to know that the parent is going to respond very calmly and intelligently, and help them without taking away this privilege that is really important to them. Then, of course, the child has to agree that they're not going to do such things as talk to strangers online and so forth."
Students can protect themselves from cyberbullying by:
Hinduja cautions against expecting too much from "blocking" email addresses or instant messenger names. "You could be on instant messenger being flooded with all kinds of hateful comments and you could block that one sender, but that person could just use another email address or screen name and continue the harassment."
Parents can always notify Internet service providers of abuse, which may or may not stop the perpetrator. Hinduja explains how that works: "When emails travel from sender to recipient, they hop across multiple computers on multiple networks. Each of those computers stamps information covertly on the emails, which we can use to tell the IP (Internet Protocol) address of each and track back to see which ISP owns the IP address of the computer where the message originated. This information is found in the header of the email, and is not usually displayed by default in email programs. If you enable the viewing of header information, you can identify whether the sender was connected to Earthlink or BellSouth or AOL or Adelphia or any other ISP. Once you identify the ISP, you can forward the email — including all header information — to the ISP's abuse mailboxes, which are typically abuse@ispdomainname. For example, Earthlink's abuse mailbox would be email@example.com. By doing this you're providing them with evidence of harassment and misuse of their network resources, which violates the ISP's Terms of Service and then they can terminate the account."
"But the perpetrator can always just sign up for another account."
If you have tips on how to prevent cyberbullying or if you've had experience with cyberbullying, please fill in the box below and we will post some of your comments.