Welcome! Cyberbullying: Prevention and Intervention in School Using a Three-Tier Model Presenters: Shietel Chhana and Laurel Tanner, Spring 2011 1 Workshop Outline • Cyberbullying – – – – – – – Youth’s use of media What is cyberbullying? Comparison to traditional bullying Statistics Types of cyberbullying Who’s involved? Effects of cyberbulling • BREAK • Legislation – Federal law – State laws – Cases 2 • Tier 1: First Level of Prevention – – – – – – Identifying cyberbullying in schools Schoolwide cyberbullying education Roles of administrators Roles of teachers Roles of parents Roles of students • BREAK • Tier 2 : Prevention/Intervention – Classwide and group curriculums • Tier 3: Intensive Intervention – Individual treatment of the victim – Individual treatment of the victim – Individual treatment of the bully-victim 3 Percentage of 8-18 year-olds who own each electronic device 76% 2009 66% 29% iPods/MP3 Players Cell phones 18% 2004 39% Laptops 12% 0% 10% 20% 30% 40% 50% 60% 70% 80% Rideout et al, (2010) 4 Youth Media Use, 1999, 2004, 2009 Average Hours and Minutes Per Day Spent With Each Medium In A Typical Day Among 8-18 Year-Olds TV Music/ Computer Video Content audio Games Print Movies Multitasking Total (Actual Time Total) 2009 3:47 1:48 1:29 1:13 38 25 10:45 (7:38) 2004 3:51 1:44 1:02 49 43 25 8:33 (6:21) 1999 4:29 2:31 27 26 43 18 7:29 (6:19) Rideout et al, (2010) Media Use is Part of a Child’s Environment “ . . . Like the air they breathe, the water they drink and the food they eat.” ---Dr. Michael Rich Quoted by Lewin, (2010) 6 Cyberbullying: Prevention and Intervention Using a Three Tier Model http://www.metacafe.com/watch/2610179/cyberbullying/ 7 E-Privacy “Once you hit send, privacy is gone.” ----Joseph P. Kahn (Kahn, 2010) 8 True or False • Cyberbullying does not result in physical harm to victims because it occurs (and is contained) completely online. • Traditional schoolyard bullies are also likely to be cyberbullies. 9 What is Bullying? “Aggression that is intentionally carried out by one or more individuals and repeatedly targeted toward a person who cannot easily defend him- or herself” Dan Olweus’s bullying definition restated by Smith, et al. (2008). 10 What is Cyberbullying? “An aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him-or herself” Smith et al., (2008) 11 A Practical Definition “Cyberbullying is any behavior performed through electronic or digital media by individuals or groups that repeatedly communicated hostile or aggressive messages intended to inflict harm or discomfort on others” Tokunaga, R. (2010). 12 Traditional vs. Cyberbullying Traditional A bully repeatedly says and/or does mean or threatening things in the presence of the victim and perhaps bystanders. Cyberbullying A cyberbully can post mean, threatening things online and which may potentially be accessed forever by almost anyone. 13 Traditional vs. Cyberbullying Traditional The bully usually bullies the victim face to face, therefore the identity of the bully is known to the victim. Cyberbullying The cyberbully can remain anonymous. 14 Traditional vs. Cyberbullying Traditional The bully is usually physically stronger than the victim. Cyberbullying Superior physical strength is not required. 15 Traditional vs. Cyberbullying Traditional Bullies at school are usually limited to attacking during school hours. Cyberbullying Cyberbullies can torment their victims 24 hours a day, 7 days a week. 16 Traditional vs. Cyberbullying Traditional In most physical bullying attacks, there are few witnesses. Cyberbullying An online post can potentially be available for access by anyone with an internet connection anywhere in the world, downloaded by others, and possibly reposted online endlessly. 17 Traditional vs. Cyberbullying Bullying Cyberbullying • Occurs on school property • Usually occurs off school property • Poor relationships with • Usually good relationships with teachers • Physical: Hitting, punching & shoving • Verbal: Teasing, name calling & gossip • Nonverbal: Use of gesture & exclusion teachers • Electronic aggression not easily observed • Electronic teasing and harassment are not easily observed • Electronic slights and exclusion are not easily observed McKenna & Bargh, 2004; Ybarra & Mitchell, (2004) 18 True or False • Most victims of cyberbullying tell an adult (parent or teacher) about their experience. • Boys are more likely to be victims of cyberbullying than girls. 19 Who’s involved? • • • • Bully Victim Bully-Victim Not Involved 20 The Bully 21 The Victim 22 The Bully-Victim 23 Not Involved Students not involved in either cyberbullying or cybervictimization 24 Prevalence • 20%-40% of youths report being victimized • More common in grades 6 and up • No particular gender difference in cyberbullying involvement • Boys slightly more likely to to be cyberbullies • Girls slightly more likely to be cybervictims Wang et al, (2009), Tokunaga, (2010) 25 Cyberbullying Prevalence Statistics Data collected from 7, 182 sixth-tenth grade students in the United States Of those students who said they were involved • 27.4% were bullies • 40% were victims • 32.6% were bully-victims Wang et al., (2009) 26 Types of Cyberbullying • Flaming – engaging in a heated online exchange • Harassment – causes emotional stress • Cyber Stalking—harassment that is repeated and threatening • Impersonation – communicating negatively and/or giving false information while acting as someone else • Outing – sharing or forwarding personal, private information • Exclusion – removing or blocking people Kowalski, (2008) 27 Where Does it Occur? Social networking sites Instant messaging Email Text messaging Chat rooms 28 Other Ways to Cyberbully Forums Websites/blogs YouTube Social networks 29 Social Network Privacy? “It’s a grave misunderstanding that if you post on social-network sites, it’s still somehow private.’’ --George Snell quoted by Kahn, (2010) 30 Question: On facebook, you have 100 friends and each of your friends have 100 friends. How many people could possibly see your post if your privacy setting is set to “Friends of friends?” 31 Answer: At least 10,000 people 32 True or False • Victims of cyberbullying are at an increased risk for traditional bullying victimization, and school problems. • Research has shown that victims of cyberbullying suffer from anger, frustration, and sadness. 33 Harmful Effects of Cyberbullying • • • • • • • Fear Social anxiety Depression Sadness Embarrassment Negative educational impact Lowered general feelings of well-being 34 Cybervictims Suffer the Most Types of Bullying •Physical •Verbal •Relational •Electronic Groups •Bully •Victim •Bully-victim •Noninvolved "Cyber victims reported higher depression than cyber bullies or bully-victims, which was not found in any other form of bullying“ —(Wang, Nansel and Iannotti, 2010) 35 Megan Meier (November 6, 1992 – October 17, 2006) • A teenager from Missouri • Committed suicide in 2006 just before her 14th birthday. • Her suicide was attributed to cyber-bullying through Myspace. • The mother of a friend of Meier, Lori Drew, was later indicted • In 2009, Drew was acquitted. 36 Phoebe Prince (November 24, 1994- January 14, 2010) • Moved from Ireland to Massachusetts • suffered months of bullying from • Bullied by classmates which included cyberbullying, • Prince committed suicide at the age of 15 • As a result of her death, an anti-bullying Massachusetts legislation was signed into law on May, 2010. • The suicide of Phoebe Prince, led to the criminal prosecution of six teenagers for charges including statutory rape and civil rights violations. • Pre-trial hearings began on September 15, 2010. 37 The e-landscape: A Minefield “The ease and speed with which . . . communications can now spread have turned the e-landscape into even more of a minefield than it was a few years ago” -- Tobe Berkovitz quoted by Kahn, (2010) 38 True or False • A school is protected from legal liability and not required to intervene in cyberbullying incidents that occur away from campus. • Research has shown that utilizing blocking and filtering software decreases the likelihood of experiencing cyberbullying. BREAK 39 Legislation No Federal law specifically against Cyberbullying 40 Federal Laws for Protection of Children on the Internet • Children’s Internet Protection Act - CIPA ’01 • S.1492 Broadband Data Improvement Act ’08 Title II: Protecting Children in the 21st Century 41 Children’s Internet Protection Act (CIPA) • A federal law enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers • Schools and libraries subject to CIPA are required to adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) measures restricting minors’ access to materials harmful to them. Federal Communications Commission (2010) 42 Broadband Data Improvement Act 2008 Title II – Protecting Children Section 215: require[s] elementary and secondary schools with computer access to the Internet to educate minors about appropriate online behavior, including interacting…on social networking websites and in chat rooms and cyberbullying awareness and response as a part of their Internet safety policy. 43 The First Amendment Freedom of Speech – Two philosophies – English Common Law Government has the power to control what speech goes against the public good – Natural Rights Government’s role is to enforce the rights of individuals 44 Case Law • Tinker v. Des Moines Students wearing armbands protesting the Vietnam War did not disrupt the school or threaten the rights of the students of the school • Bethel v. Fraser Student given disciplinary actions for giving a speech with sexual innuendos at school 45 California Education Codes • 48950: Students have the right to free speech • 48907: Student can be disciplined by the school if the off-campus speech is • “obscene, libelous, or slanderous” • “incites students as to create a clear and present danger of the commission of unlawful acts on school premises” or • “the violation of lawful school regulations or the substantial disruption of the orderly operation of the school” 46 The Effects at School “After a off-campus cyberbullying incident, students were “depressed, angry, or simply unable to focus on school. It might have been happening off campus . . . but the effects carry on into the school” ---J. Guidetti, Principal at Calabasas High School, CA Paulson, (2003) 47 What Can We Do? • Should we forbid kids from using the internet? • How can adults teach children about electronic media awareness and safety? • How can we provide cyberbullying awareness to people involved in student’s life? 48 Should we forbid kids from using the internet? • It is impractical if not impossible to ban it completely from their lives. • What is most important is for adults to teach children about appropriate internet use. 49 • Tier 1: First Level of Prevention – – – – – – Identifying cyberbullying in schools Schoolwide cyberbullying education Roles of administrators Roles of teachers Roles of parents Roles of students • Tier 2 : Prevention/Intervention – Classwide and group curriculums • Tier 3: Intensive Intervention – Individual treatment of the victim – Individual treatment of the victim – Individual treatment of the bully-victim 50 A Multilevel Triangle of Prevention and Intervention Tier 3 Tier 2 Tier 1 51 Prevention Tier 3 Identification Education Tier 2 Being Prepared for Cyberbullying Incidents Tier 1 52 Prevention: Everyone Plays A Role Administrators Teachers Parents Students 53 Administrators • Promote and maintain a safe school climate • Provide staff training • School-wide education/assemblies • Policies and procedures should be developed based on current law and research – Use of schoolwide and classroom curriculum as well as computer use 54 Teachers’ Role • Enforce school policy and procedure • Communicate clear classroom rules about electronic media use • Teach character building • Reinforce schoolwide programs with classroom lessons 55 Parents’ Role Rideout, (2010) • Communicate • Keep up with the latest technology • Speak to children early about internet safety • Have clear expectations and rules for computer use • Monitor computer activities 56 Observable Signs of Cyberbullying Involvement Emotional distress, anger, depression, fear – especially after cell phone calls, checking email, being online Avoidance of friends Disrupted sleep patterns Reluctance to use a computer, or always online Reluctance to go to school Declining grades 57 Students’ Role • Use of electronics is a privilege • Be careful about what is posted • Do not give out personal information • Keep passwords private • Use different passwords for different accounts • Use unique security questions 58 Kiss and Tell “In the age of blogs, video cameras, social networks—once someone hears, sees, or reads something, it goes viral. The concept of kiss-and-tell seems quaint compared to what we have now.” --Tobe Berkovitz quoted by (Kahn, 2010) 59 You Can’t Take it Back. • http://www.netsmartz.org/RealLifeStories/Ca ntTakeItBack 60 How do you determine the needs of your school in relation to cyberbullying? 61 Schoolwide Surveys • Allows proactive rather than reactive behavior • Measures the degree of bullying • Surveys should be short and simple • Surveys should be anonymous 62 Categories to Address in a Survey • • • • • • • • Has the student observed bullying Has the student been involved in bullying Who or what group is most bullied Who or what group is most likely to bully Where does bullying occur When does it occur Do those who are bullied ask for help What do students do when they witness bullying • What is the school response to reports of bullying Roberts (2006) 63 • BREAK 64 Intervention Tier 3 Tier 2 Understand Risk Factors: Recognizing profiles Small Group Intervention Tier 1 Classroom Curriculum 65 Tier Two Programs Can teach students: • There is something that can be done about cyberbullying • They are not alone—help is available • To tell others that cyberbullying is happening • Cyberbullying tips (save the evidence, change passwords etc.) • Skills so they can take action to prevent the cyberbullying from reoccurring 66 Choosing a Program • Determine the area of need • Consider what is available • Consider what is appropriate 67 Classroom and Small Group Curriculum Hazelden Curriculum for grades 3-5 and 6-12 • Not research-tested for effectiveness but based on current research • Lessons and activities are patterned after prevention models that are researchbased • Geared generally toward victims 68 Cybersmart! Student Curriculum – Safety and security online – Manners and cybercitizenship – Authentic learning and creativity – Research and information fluency – Twenty-first century challenges – Useful for bullies and victims – Can be adapted for use in Tier 1 69 Seattle Public Schools Middle School Cyberbullying Curriculum • Based on the Olweus Bullying Prevention programs • Lessons are flexible • Designed with teachers in mind • Includes 9 complete lessons 70 i-Safe • Online curriculum for grades K-12 • Meets the needs of the Children’s Internet Protection Act for schools that receive E-Rate funding • Provides video’s on how to teach lessons • Includes outreach programs 71 Tier 3 Intensive Individual Intervention Cybervictims Tier 2 Cyberbullies Tier 1 Cyber Bully-Victims 72 Assess Psychological Needs • Cyber victims and bully-victims often suffer similar emotional strains – Anxiety – Depression – Low self-esteem – Suicidal feelings 73 Risk Assessment for Those Involved in Cyberbullying • Determine student’s role (bully, victim or bully-victim) • Screen for reaction to event(s) • Judge pain • Consider emotional support system • Judge feelings of hopelessness and isolation • If necessary, formal suicide risk assessment • Counseling referrals when necessary 74 Working with Cybervictims • • • • • It’s not their fault Address mental health concerns first Perform risk assessment Inform parents Refer to outside counseling 75 Working with Cyberbullies • Address them as you would other relational behavioral problems • Help them understand consequences • Teach responsibility • Teach alternate behaviors and skills • Reinforce appropriate behaviors • Teach appropriate boundaries • Anger management 76 Working with Bully-Victims • Few interventions are available for this group • Does he or she have feelings of depression? 77 Group Activity • Karen is a very devout teenager who leads a prayer meeting every morning by the high school flag pole. Many boys and girls are simply drawn to Karen as a friend because of her sweet nature and hopeful innocence. Other girls in her school, however, feel threatened by Karen’s piety and commitment to holy living, and they begin to drum up ideas to expose her as a fraud. Specifically, they begin to spread rumors via the High School’s social network on MySpace.com that Karen is sleeping around with the boy’s track team. Karen is alerted to the online rumors by a close friend and is heartbroken. She tells her teachers and pastor, who then contact the school administration. • What would you do if you were the principal in this situation? What would you do if you were Karen? What would you do if you were Karen’s close friend and really wanted to help? How could those who spread the rumors understand how hurtful their actions were? 78 Digital Citizens “ . . . It's up to us to practice due diligence as we govern ourselves in our digital lives . . . . It all comes back to us as digital citizens, and how far we're willing to stretch to protect ourselves and others. --Jason Ohler Posted by Jason Ohler in response to the Boston Globe’s article, Dec 11, 2010 79 80 References • • • • • • • • • • • • Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., et al. (2008). Cyberbullying among Turkish adolescents. CyberPsychology & Behavior, 11, 253–261. Beckerman, L. & Nocero, J. (2003). High-tech student hate mail. EducationDigest, 37-40. Belsey, B. (2010). What are the forms that cyberbullying might take? Here are some potential examples. Retrieved November 15, 2010 from http://www.cyberbullying.org/ CAL Educ Code §§ 48907 9 (2010). CAL Educ Code §§ 48950 (2010). Cassidy W., Jackson M., and Brown K. N. (2009). Sticks and stones can break my bones, but how can pixels hurt me? : Students' experiences with cyber-bullying. School Psychology International 30(4), 383-402. Character Education Partnership (2010). Cyberbullying curriculum. Retrieved on November 29, 2010, from http://www.character.org/cyberbullyingcurriculum Committee for Children (2001). Steps to respect: A bullying prevention program. Seattle, WA: Author. Counsel for Exceptional Children (2010). Bullying of children with exceptionalities: Tackling It in your school and your classroom. Retrieved on November 13, 2010, from Cyberbullying.org. Darden, E. C., (2009). The cyber jungle. American School Board Journal, 55-56. Dehue, F., Bolman, C., & Vollink, T. (2008). Cyberbullying: Youngsters’ experiences and parental perception. CyberPsychology & Behavior, 11, 217–223. Didden, R., Scholte, R. H. J., Korzilius, H., De Moor, J. M. H., Vermeulen, A., O’Reilly, M., et al. (2009). Cyberbullying among students with intellectual and developmental disability in special education settings. Developmental Neurorehabilitation, 12, 146–151. 81 References Continued • • • • • • • • • • Dooley, J.J., Pyzalski, J., Cross, D. (2009). Cyberbullying and face-to-face bullying: Similarities and differences. Zeitschrift für Psychologie/Journal of Psychology, 217(4), 182-188. Englander, E., & Muldowney, A. M. (2007). Just turn the darn thing off: Understanding cyberbullying. In Proceedings of The National Conference On Safe Schools And Communities, (pp.83–92), USA. Federal Communications Commissions (2009). Children’s internet protection act. Retrieved on February 8, 2011, from http://www.fcc.gov/cgb/consumerfacts/cipa.html Flanigan, A. and O’Sullivan, P. (2003). An interactional reconceptualization of "flaming” and other problematic pessages. SAGE Publications, 5(1), 67–93. Frey, K. S., Hirschstein, M. K., Edstrom, L. V., & Snell, J. L. (2009). Observed reductions in school bullying, nonbullying aggression, and destructive bystander behavior: A longitudinal evaluation. Journal of Educational Psychology, 101(2), 466-481. Frey, K. S., Hirschstein, M. K., Scell, J. L., Edstrom, L. V., MacKenzie, E. P., & Broderick, C. J. (2005). Reducing playground bullying and supporting beliefs: An experimental trial of the Steps To Respect program. Developmental Psychology, 41(3), 479–491. Hay, C. (2010) Traditional bullying, cyber bullying, and deviance: A general strain theory approach. Journal of Contemporary Criminal Justice, 26, 130-147 Hazelden (2010). Cyberbullying can happen anytime, anywhere. Retrieved on November 29, 2010, from http://www.hazelden.org/web/go/cyberbullying Henry J. Kaiser Family Foundation (2011). Daily media use among children and teens up dramatically from five years ago. Retrieved of February 8, 2011 from http://www.kff.org/entmedia/entmedia012010nr.cfm Hinduja, S. & Patchin, J. W. (2008). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Corwin Press. 82 References Continued • • • • • • • • • • • Hinduja, S., Ph.D. & Patchin, J. W. Ph.D. (2010). State cyberbullying laws. Cyber Bullying Research Center. Retrieved October 25, 2010, from http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws_20100701.pdf Holliday, J. (2011). Cyberbullying. Education Digest, 76(5), 4-9. Holt, M., & Keyes, M. (2004). Teachers’ attitudes toward bullying. In D. Espelage & S. Swearer (Eds.), Bullying in American schools: A social-ecological perspective on prevention and intervention, (pp.121–139). Mahwah, NJ: iSafe. Retrieved on February 8, 2011, from http://www.isafe.org/channels/?ch=ai iSafe (2009). Educators. Retrieved on February 8, 2011 from http://www.isafe.org/channels/?ch=ed Juvoven, J., & Gross, E. F. (2008). Bullying experiences in cyberspace. The Journal of School Health, 78, 496–505. Kahn, J. (2010, November 15). Once you hit send, privacy is gone. The Boston Globe. Retrieved from http://www.boston.com/lifestyle/article/2010/11/15/once_you_hyou_can_forget_privacy/ Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Who are the victims? A comparison of victimization in internet chatrooms and victimization in school. Journal of Media Psychology, 21, 25–36. Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2008). Cyber bullying: Bullying in the digital age. Health, 78, 496 Erlbaum. iSafe (2009). About - 505. Kowalski, R. M., (2008). Cyber bullying. Psychiatric Times, 25(11) 45-47. Lewin, T. (2010, January 20). If your kids are awake, they’re probably online. The New York Times. Retrieved of February 8, 2011 from http://www.nytimes.com/2010/01/20/education/20wired.html?_r=3 83 References Continued • • • • • • • • • • Li, Q. (2010). Cyberbullying in high schools: A study of students’ behavior and beliefs about this new phenomenon. Journal of Aggression, Maltreatment, and Trauma, 19 (4), 372 – 392. Li, Q. (2006). Cyberbullying in schools: A research of gender differences. Social Psychology International, 27, 157–170. Li, Q. (2007a). Bullying in the new playground: Research into cyberbullying and cyber victimization. Australasian Journal of Educational Technology, 23, 435–454. Li, Q. (2007b). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23, 1777–1791. Li, Q. (2008). A cross-cultural comparison of adolescents’ experience related to cyberbullying. Educational Research, 50, 223–234. Love Our Children USA (2010). Cyber Bullying. Retrieved from http://www.loveourchildrenusa.org/parent_cyberbullying.php Make A Difference For Kids, Inc. (2010). Cyberbullying. Retrieved October 25, 2010, from http://www.makeadifferenceforkids.org/cyberbullying.html National Institutes of Health (September 21, 2010). Depression high among youth victims of school cyber bullying, NIH researchers report. Retrieved from http://www.nichd.nih.gov/news/releases/092110-cyber-bullying.cfm Olweus, D. (1993). Bullying at school: What we know and what we can do. Cambridge, MA: Blackwell. Online Safety and Technology Working Group (2010). Youth safety on a living internet. Retrieved November 13, 2010, from http://www.ntia.doc.gov/reports/2010/OSTWG_Final_Report_070610.pdf 84 References Continued • • • • • • • • • Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 148–169. Paulson, A. (2003). Internet bullying. Christian Science Monitor. Retrieved on December 3, 2011, from http://www.csmonitor.com/2003/1230/p11s01-legn.htm Rideout, V.J., Foehr, U.G., & Roberts, D. F. (2010). Generation M2: Media in the lives of 8- to 18-year-olds. Henry J. Kaiser Family Foundation. Retrieved on February 8, 2011 from http://www.kff.org/entmedia/8010.cfm Roberts, W. B. (2006). Bullying From Both Sides: Strategic Interventions for Working Wit Bullies & Victims. Thousand Oaks, CA: Corwin Press. St. George, D (2010, September 21). Cyber-bullying linked to spike depression. The Washington Post. Retrieved from http://www.washingtonpost.com/wp-yn/content/ticle/2010/09/20/ AR2010092006150.html Slonje, R., & Smith, P. K. (2007). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154. Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376–385 Sourander, A., Klomek A. B., Ikonen M., Lindroos J., Luntamo T., Koskelainen M., Ristkari T., Helenius H., (2010). Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. Arch Gen Psychiatry. 67(7):720-728. Sulkowski, M., Nichols, R., & Storch, E. A. (2009). Peer victimization in cyberspace: Prevalence and relationship to psychosocial adjustment. Psychology in the Schools, 46, 962-972. 85 References Continued • • • • • • • • • • Tokunaga, R. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26, 277-287. Topcu, C., Erdur-Baker, O., & Capa-Aydin, Y. (2008). Examination of cyberbullying experiences among Turkish students from different school types. CyberPsychology & Behavior, 11, 643–648. Trolley, B. C. & Hanel, C. (2010). Cyber kids, cyber bullying, cyber balance. Thousand Oaks, CA: SAGE Publications. Vandebosch, H., & van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior, 11, 499–503. Wang, J., Nansel, T. R.., and Iannotti R. J., (2009). School bullying among adolescents in the United States: physical, verbal, relational, and cyber. Journal of Adolescent Health, 45 (4):368-75. Wang, J., Nansel, T. R.., and Iannotti R. J., (2010). Depression high among youth victims of school cyber bullying, NIH researchers report. US Department of Health and Human Services National Institutes of Health. Retrieved on December 3, 2010 from http://www.nichd.nih.gov/news/releases/092110-cyber-bullying.cfm Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. Journal of Adolescent Health, 41, S51–S58. Worthen, M. R. (2007). Education policy implications from the expert panel on electronic media and youth violence. Journal of Adolescent Health, 41, 61-63. Ybarra, M. L. (2004). Linkages between depressive symptomatology and internet harassment among young regular Internet users. CyberPsychology & Behavior, 7, 247–257. Ybarra, M. L., & Mitchell, J. K. (2008). How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics, 121, e350–e357. 86