Welcome! Cyberbullying: Prevention and Intervention in School Using a Three-Tier Model Presenters:

advertisement
Welcome!
Cyberbullying: Prevention and Intervention in
School Using a Three-Tier Model
Presenters:
Shietel Chhana and Laurel Tanner, Spring 2011
1
Workshop Outline
• Cyberbullying
–
–
–
–
–
–
–
Youth’s use of media
What is cyberbullying?
Comparison to traditional bullying
Statistics
Types of cyberbullying
Who’s involved?
Effects of cyberbulling
• BREAK
• Legislation
– Federal law
– State laws
– Cases
2
• Tier 1: First Level of Prevention
–
–
–
–
–
–
Identifying cyberbullying in schools
Schoolwide cyberbullying education
Roles of administrators
Roles of teachers
Roles of parents
Roles of students
• BREAK
• Tier 2 : Prevention/Intervention
– Classwide and group curriculums
• Tier 3: Intensive Intervention
– Individual treatment of the victim
– Individual treatment of the victim
– Individual treatment of the bully-victim
3
Percentage of 8-18 year-olds who own
each electronic device
76%
2009
66%
29%
iPods/MP3
Players
Cell phones
18%
2004
39%
Laptops
12%
0%
10%
20%
30%
40%
50%
60%
70%
80%
Rideout et al, (2010)
4
Youth Media Use, 1999, 2004, 2009
Average Hours and Minutes Per Day Spent With Each
Medium In A Typical Day Among 8-18 Year-Olds
TV
Music/ Computer Video
Content audio
Games
Print
Movies
Multitasking
Total
(Actual Time
Total)
2009
3:47
1:48
1:29
1:13
38
25
10:45
(7:38)
2004
3:51
1:44
1:02
49
43
25
8:33
(6:21)
1999
4:29
2:31
27
26
43
18
7:29
(6:19)
Rideout et al, (2010)
Media Use is Part of a
Child’s Environment
“ . . . Like the air they breathe, the water
they drink and the food they eat.”
---Dr. Michael Rich
Quoted by Lewin, (2010)
6
Cyberbullying:
Prevention and Intervention Using a
Three Tier Model
http://www.metacafe.com/watch/2610179/cyberbullying/
7
E-Privacy
“Once you hit send,
privacy is gone.”
----Joseph P. Kahn
(Kahn, 2010)
8
True or False
• Cyberbullying does not result in physical harm
to victims because it occurs (and is contained)
completely online.
• Traditional schoolyard bullies are also likely to
be cyberbullies.
9
What is Bullying?
“Aggression that is intentionally carried out by
one or more individuals and repeatedly
targeted toward a person who cannot easily
defend him- or herself”
Dan Olweus’s bullying definition restated by Smith, et al. (2008).
10
What is Cyberbullying?
“An aggressive, intentional act carried out by
a group or individual, using electronic forms
of contact, repeatedly and over time against
a victim who cannot easily defend him-or
herself”
Smith et al., (2008)
11
A Practical Definition
“Cyberbullying is any
behavior performed through
electronic or digital media by
individuals or groups that
repeatedly communicated
hostile or aggressive
messages intended to inflict
harm or discomfort on
others”
Tokunaga, R. (2010).
12
Traditional vs. Cyberbullying
Traditional
A bully repeatedly
says and/or does
mean or threatening
things in the
presence of the
victim and perhaps
bystanders.
Cyberbullying
A cyberbully can post mean,
threatening things online and
which may potentially be
accessed forever by almost
anyone.
13
Traditional vs. Cyberbullying
Traditional
The bully usually
bullies the victim
face to face,
therefore the
identity of the bully
is known to the
victim.
Cyberbullying
The cyberbully can
remain anonymous.
14
Traditional vs. Cyberbullying
Traditional
The bully is usually
physically stronger
than the victim.
Cyberbullying
Superior physical
strength is not
required.
15
Traditional vs. Cyberbullying
Traditional
Bullies at school are
usually limited to
attacking during
school hours.
Cyberbullying
Cyberbullies can
torment their victims
24 hours a day, 7 days a
week.
16
Traditional vs. Cyberbullying
Traditional
In most physical bullying
attacks, there are few
witnesses.
Cyberbullying
An online post can
potentially be available
for access by anyone
with an internet
connection anywhere
in the world,
downloaded by others,
and possibly reposted
online endlessly.
17
Traditional vs. Cyberbullying
Bullying
Cyberbullying
• Occurs on school property
• Usually occurs off school property
• Poor relationships with
• Usually good relationships with
teachers
• Physical: Hitting, punching &
shoving
• Verbal: Teasing, name calling
& gossip
• Nonverbal: Use of gesture &
exclusion
teachers
• Electronic aggression not easily
observed
• Electronic teasing and harassment are
not easily observed
• Electronic slights and exclusion are not
easily observed
McKenna & Bargh, 2004; Ybarra & Mitchell, (2004)
18
True or False
• Most victims of cyberbullying tell an adult
(parent or teacher) about their experience.
• Boys are more likely to be victims of
cyberbullying than girls.
19
Who’s involved?
•
•
•
•
Bully
Victim
Bully-Victim
Not Involved
20
The Bully
21
The Victim
22
The Bully-Victim
23
Not Involved
Students not
involved in either
cyberbullying or
cybervictimization
24
Prevalence
• 20%-40% of youths report being victimized
• More common in grades 6 and up
• No particular gender difference in
cyberbullying involvement
• Boys slightly more likely to to be
cyberbullies
• Girls slightly more likely to be cybervictims
Wang et al, (2009), Tokunaga, (2010)
25
Cyberbullying Prevalence Statistics
Data collected from 7, 182 sixth-tenth grade students
in the United States
Of those students who said they were involved
• 27.4% were bullies
• 40% were victims
• 32.6% were bully-victims
Wang et al., (2009)
26
Types of Cyberbullying
• Flaming – engaging in a heated online exchange
• Harassment – causes emotional stress
• Cyber Stalking—harassment that is repeated
and threatening
• Impersonation – communicating negatively
and/or giving false information while acting as
someone else
• Outing – sharing or forwarding personal, private
information
• Exclusion – removing or blocking people
Kowalski, (2008)
27
Where Does it Occur?
Social networking sites
Instant messaging
Email
Text messaging
Chat rooms
28
Other Ways to Cyberbully
Forums
Websites/blogs
YouTube
Social networks
29
Social Network Privacy?
“It’s a grave misunderstanding that if
you post on social-network sites, it’s
still somehow private.’’
--George Snell
quoted by Kahn, (2010)
30
Question:
On facebook, you have
100 friends and each of
your friends have 100
friends. How many
people could possibly
see your post if your
privacy setting is set to
“Friends of friends?”
31
Answer:
At least 10,000 people
32
True or False
• Victims of cyberbullying are at an increased
risk for traditional bullying victimization, and
school problems.
• Research has shown that victims of
cyberbullying suffer from anger, frustration,
and sadness.
33
Harmful Effects of Cyberbullying
•
•
•
•
•
•
•
Fear
Social anxiety
Depression
Sadness
Embarrassment
Negative educational impact
Lowered general feelings of well-being
34
Cybervictims Suffer the Most
Types of Bullying
•Physical
•Verbal
•Relational
•Electronic
Groups
•Bully
•Victim
•Bully-victim
•Noninvolved
"Cyber victims reported higher
depression than cyber bullies or
bully-victims, which was not found
in any other form of bullying“
—(Wang, Nansel and Iannotti, 2010)
35
Megan Meier
(November 6, 1992 – October 17, 2006)
• A teenager from Missouri
• Committed suicide in 2006
just before her 14th birthday.
• Her suicide was attributed to
cyber-bullying through
Myspace.
• The mother of a friend of
Meier, Lori Drew, was later
indicted
• In 2009, Drew was acquitted.
36
Phoebe Prince
(November 24, 1994- January 14, 2010)
• Moved from Ireland to Massachusetts
• suffered months of bullying from
• Bullied by classmates which included
cyberbullying,
• Prince committed suicide at the age of 15
• As a result of her death, an anti-bullying
Massachusetts legislation was signed into law on
May, 2010.
• The suicide of Phoebe Prince, led to the criminal
prosecution of six teenagers for charges including
statutory rape and civil rights violations.
• Pre-trial hearings began on September 15, 2010.
37
The e-landscape: A Minefield
“The ease and speed with which . . .
communications can now spread have turned
the e-landscape into even more of a minefield
than it was a few years ago”
-- Tobe Berkovitz
quoted by Kahn, (2010)
38
True or False
• A school is protected from legal liability and
not required to intervene in cyberbullying
incidents that occur away from campus.
• Research has shown that utilizing blocking and
filtering software decreases the likelihood of
experiencing cyberbullying.
BREAK
39
Legislation
No Federal law specifically against Cyberbullying
40
Federal Laws for Protection of Children on
the Internet
• Children’s Internet Protection Act - CIPA ’01
• S.1492 Broadband Data Improvement Act ’08
 Title II: Protecting Children in the 21st Century
41
Children’s Internet Protection Act
(CIPA)
• A federal law enacted by Congress to address concerns about access to
offensive content over the Internet on school and library computers
• Schools and libraries subject to CIPA are required to adopt and implement
an Internet safety policy addressing: (a) access by minors to inappropriate
matter on the Internet; (b) the safety and security of minors when using
electronic mail, chat rooms, and other forms of direct electronic
communications; (c) unauthorized access, including so-called “hacking,”
and other unlawful activities by minors online; (d) unauthorized
disclosure, use, and dissemination of personal information regarding
minors; and (e) measures restricting minors’ access to materials harmful
to them.
Federal Communications Commission (2010)
42
Broadband Data
Improvement Act 2008
Title II – Protecting Children
Section 215:
require[s] elementary and secondary schools with
computer access to the Internet to educate minors
about appropriate online behavior, including
interacting…on social networking websites and in
chat rooms and cyberbullying awareness and
response as a part of their Internet safety policy.
43
The First Amendment
Freedom of Speech – Two philosophies
– English Common Law
Government has the power to control what speech
goes against the public good
– Natural Rights
Government’s role is to enforce the rights of individuals
44
Case Law
• Tinker v. Des Moines
Students wearing armbands protesting the
Vietnam War did not disrupt the school or
threaten the rights of the students of the
school
• Bethel v. Fraser
Student given disciplinary actions for giving a
speech with sexual innuendos at school
45
California Education Codes
• 48950: Students have the right to free speech
• 48907: Student can be disciplined by the school
if the off-campus speech is
• “obscene, libelous, or slanderous”
• “incites students as to create a clear and present danger
of the commission of unlawful acts on school premises”
or
• “the violation of lawful school regulations or the
substantial disruption of the orderly operation of the
school”
46
The Effects at School
“After a off-campus cyberbullying incident, students
were “depressed, angry, or simply unable to focus
on school. It might have been happening off
campus . . . but the effects carry on into the
school”
---J. Guidetti, Principal at Calabasas High School, CA
Paulson, (2003)
47
What Can We Do?
• Should we forbid kids from
using the internet?
• How can adults teach
children about electronic
media awareness and
safety?
• How can we provide
cyberbullying awareness to
people involved in student’s
life?
48
Should we forbid kids from
using the internet?
• It is impractical if not impossible to ban it
completely from their lives.
• What is most important is for adults to teach
children about appropriate internet use.
49
• Tier 1: First Level of Prevention
–
–
–
–
–
–
Identifying cyberbullying in schools
Schoolwide cyberbullying education
Roles of administrators
Roles of teachers
Roles of parents
Roles of students
• Tier 2 : Prevention/Intervention
– Classwide and group curriculums
• Tier 3: Intensive Intervention
– Individual treatment of the victim
– Individual treatment of the victim
– Individual treatment of the bully-victim
50
A Multilevel Triangle of Prevention and
Intervention
Tier 3
Tier 2
Tier 1
51
 Prevention
Tier 3
 Identification
 Education
Tier 2
 Being Prepared
for Cyberbullying
Incidents
Tier 1
52
Prevention: Everyone Plays
A Role
Administrators
Teachers
Parents
Students
53
Administrators
• Promote and maintain
a safe school climate
• Provide staff training
• School-wide education/assemblies
• Policies and procedures should be developed
based on current law and research
– Use of schoolwide and classroom curriculum
as well as computer use
54
Teachers’ Role
• Enforce school policy
and procedure
• Communicate clear
classroom rules about
electronic media use
• Teach character
building
• Reinforce schoolwide
programs with
classroom lessons
55
Parents’ Role
Rideout, (2010)
• Communicate
• Keep up with the latest
technology
• Speak to children early
about internet safety
• Have clear expectations
and rules for computer
use
• Monitor computer
activities
56
Observable Signs of Cyberbullying
Involvement
Emotional distress, anger, depression, fear –
especially after cell phone calls, checking email,
being online
Avoidance of friends
Disrupted sleep patterns
Reluctance to use a computer, or always online
Reluctance to go to school
Declining grades
57
Students’ Role
• Use of electronics is
a privilege
• Be careful about
what is posted
• Do not give out
personal information
• Keep passwords
private
• Use different
passwords for
different accounts
• Use unique security
questions
58
Kiss and Tell
“In the age of blogs, video cameras,
social networks—once someone hears,
sees, or reads something, it goes viral.
The concept of kiss-and-tell seems quaint
compared to what we have now.”
--Tobe Berkovitz
quoted by (Kahn, 2010)
59
You Can’t Take it Back.
• http://www.netsmartz.org/RealLifeStories/Ca
ntTakeItBack
60
How do you determine the
needs of your school in relation
to cyberbullying?
61
Schoolwide Surveys
• Allows proactive rather than
reactive behavior
• Measures the degree of
bullying
• Surveys should be short and
simple
• Surveys should be
anonymous
62
Categories to Address in a Survey
•
•
•
•
•
•
•
•
Has the student observed bullying
Has the student been involved in bullying
Who or what group is most bullied
Who or what group is most likely to bully
Where does bullying occur
When does it occur
Do those who are bullied ask for help
What do students do when they witness
bullying
• What is the school response to reports of
bullying
Roberts (2006)
63
• BREAK
64
Intervention
Tier 3
Tier 2
Understand Risk
Factors: Recognizing
profiles
Small Group Intervention
Tier 1
Classroom Curriculum
65
Tier Two Programs
Can teach students:
• There is something that can be done
about cyberbullying
• They are not alone—help is available
• To tell others that cyberbullying is
happening
• Cyberbullying tips (save the evidence,
change passwords etc.)
• Skills so they can take action to prevent
the cyberbullying from reoccurring
66
Choosing a Program
• Determine the area of need
• Consider what is available
• Consider what is appropriate
67
Classroom and Small Group
Curriculum
Hazelden
Curriculum for grades 3-5 and 6-12
• Not research-tested for effectiveness but
based on current research
• Lessons and activities are patterned after
prevention models that are researchbased
• Geared generally toward victims
68
Cybersmart! Student Curriculum
– Safety and security online
– Manners and cybercitizenship
– Authentic learning and creativity
– Research and information fluency
– Twenty-first century challenges
– Useful for bullies and victims
– Can be adapted for use in Tier 1
69
Seattle Public Schools Middle School
Cyberbullying Curriculum
• Based on the Olweus Bullying Prevention
programs
• Lessons are flexible
• Designed with teachers in mind
• Includes 9 complete lessons
70
i-Safe
• Online curriculum for grades K-12
• Meets the needs of the Children’s Internet
Protection Act for schools that receive E-Rate
funding
• Provides video’s on how to teach lessons
• Includes outreach programs
71
Tier 3
Intensive
Individual
Intervention
 Cybervictims
Tier 2
 Cyberbullies
Tier 1
 Cyber Bully-Victims
72
Assess Psychological Needs
• Cyber victims and
bully-victims often
suffer similar
emotional strains
– Anxiety
– Depression
– Low self-esteem
– Suicidal feelings
73
Risk Assessment for Those Involved in
Cyberbullying
• Determine student’s role
(bully, victim or bully-victim)
• Screen for reaction to event(s)
• Judge pain
• Consider emotional support system
• Judge feelings of hopelessness and isolation
• If necessary, formal suicide risk assessment
• Counseling referrals when necessary
74
Working with Cybervictims
•
•
•
•
•
It’s not their fault
Address mental health concerns first
Perform risk assessment
Inform parents
Refer to outside counseling
75
Working with Cyberbullies
• Address them as you would
other relational behavioral
problems
• Help them understand
consequences
• Teach responsibility
• Teach alternate behaviors
and skills
• Reinforce appropriate
behaviors
• Teach appropriate
boundaries
• Anger management
76
Working with Bully-Victims
• Few interventions are available for this group
• Does he or she have feelings of depression?
77
Group Activity
• Karen is a very devout teenager who leads a prayer meeting
every morning by the high school flag pole. Many boys and
girls are simply drawn to Karen as a friend because of her
sweet nature and hopeful innocence. Other girls in her school,
however, feel threatened by Karen’s piety and commitment to
holy living, and they begin to drum up ideas to expose her as a
fraud. Specifically, they begin to spread rumors via the High
School’s social network on MySpace.com that Karen is
sleeping around with the boy’s track team. Karen is alerted to
the online rumors by a close friend and is heartbroken. She
tells her teachers and pastor, who then contact the school
administration.
• What would you do if you were the principal in this
situation? What would you do if you were Karen? What
would you do if you were Karen’s close friend and really
wanted to help? How could those who spread the rumors
understand how hurtful their actions were?
78
Digital Citizens
“ . . . It's up to us to practice due
diligence as we govern ourselves in
our digital lives . . . . It all comes
back to us as digital citizens, and
how far we're willing to stretch to
protect ourselves and others.
--Jason Ohler
Posted by Jason Ohler in response to the Boston Globe’s article, Dec 11, 2010
79
80
References
•
•
•
•
•
•
•
•
•
•
•
•
Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., et al. (2008).
Cyberbullying among Turkish adolescents. CyberPsychology & Behavior, 11, 253–261.
Beckerman, L. & Nocero, J. (2003). High-tech student hate mail. EducationDigest, 37-40.
Belsey, B. (2010). What are the forms that cyberbullying might take? Here are some potential examples.
Retrieved November 15, 2010 from http://www.cyberbullying.org/
CAL Educ Code §§ 48907 9 (2010).
CAL Educ Code §§ 48950 (2010).
Cassidy W., Jackson M., and Brown K. N. (2009). Sticks and stones can break my bones, but how can
pixels hurt me? : Students' experiences with cyber-bullying. School Psychology International 30(4),
383-402.
Character Education Partnership (2010). Cyberbullying curriculum. Retrieved on November 29, 2010, from
http://www.character.org/cyberbullyingcurriculum
Committee for Children (2001). Steps to respect: A bullying prevention program. Seattle, WA: Author.
Counsel for Exceptional Children (2010). Bullying of children with exceptionalities: Tackling It in your
school and your classroom. Retrieved on November 13, 2010, from Cyberbullying.org.
Darden, E. C., (2009). The cyber jungle. American School Board Journal, 55-56.
Dehue, F., Bolman, C., & Vollink, T. (2008). Cyberbullying: Youngsters’ experiences and parental
perception. CyberPsychology & Behavior, 11, 217–223.
Didden, R., Scholte, R. H. J., Korzilius, H., De Moor, J. M. H., Vermeulen, A., O’Reilly, M., et al. (2009).
Cyberbullying among students with intellectual and developmental disability in special education
settings. Developmental Neurorehabilitation, 12, 146–151.
81
References Continued
•
•
•
•
•
•
•
•
•
•
Dooley, J.J., Pyzalski, J., Cross, D. (2009). Cyberbullying and face-to-face bullying: Similarities and
differences. Zeitschrift für Psychologie/Journal of Psychology, 217(4), 182-188.
Englander, E., & Muldowney, A. M. (2007). Just turn the darn thing off: Understanding cyberbullying. In
Proceedings of The National Conference On Safe Schools And Communities, (pp.83–92), USA.
Federal Communications Commissions (2009). Children’s internet protection act. Retrieved on February 8,
2011, from http://www.fcc.gov/cgb/consumerfacts/cipa.html
Flanigan, A. and O’Sullivan, P. (2003). An interactional reconceptualization of "flaming” and other
problematic pessages. SAGE Publications, 5(1), 67–93.
Frey, K. S., Hirschstein, M. K., Edstrom, L. V., & Snell, J. L. (2009). Observed reductions in school bullying,
nonbullying aggression, and destructive bystander behavior: A longitudinal evaluation. Journal of
Educational Psychology, 101(2), 466-481.
Frey, K. S., Hirschstein, M. K., Scell, J. L., Edstrom, L. V., MacKenzie, E. P., & Broderick, C. J. (2005).
Reducing playground bullying and supporting beliefs: An experimental trial of the Steps To Respect
program. Developmental Psychology, 41(3), 479–491.
Hay, C. (2010) Traditional bullying, cyber bullying, and deviance: A general strain theory approach. Journal
of Contemporary Criminal Justice, 26, 130-147
Hazelden (2010). Cyberbullying can happen anytime, anywhere. Retrieved on November 29, 2010, from
http://www.hazelden.org/web/go/cyberbullying
Henry J. Kaiser Family Foundation (2011). Daily media use among children and teens up dramatically
from five years ago. Retrieved of February 8, 2011 from
http://www.kff.org/entmedia/entmedia012010nr.cfm
Hinduja, S. & Patchin, J. W. (2008). Bullying beyond the schoolyard: Preventing and responding to
cyberbullying. Thousand Oaks, CA: Corwin Press.
82
References Continued
•
•
•
•
•
•
•
•
•
•
•
Hinduja, S., Ph.D. & Patchin, J. W. Ph.D. (2010). State cyberbullying laws. Cyber Bullying Research Center.
Retrieved October 25, 2010, from
http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws_20100701.pdf
Holliday, J. (2011). Cyberbullying. Education Digest, 76(5), 4-9.
Holt, M., & Keyes, M. (2004). Teachers’ attitudes toward bullying. In D. Espelage & S. Swearer (Eds.), Bullying
in American schools: A social-ecological perspective on prevention and intervention, (pp.121–139).
Mahwah, NJ: iSafe. Retrieved on February 8, 2011, from http://www.isafe.org/channels/?ch=ai
iSafe (2009). Educators. Retrieved on February 8, 2011 from http://www.isafe.org/channels/?ch=ed
Juvoven, J., & Gross, E. F. (2008). Bullying experiences in cyberspace. The Journal of School Health, 78, 496–505.
Kahn, J. (2010, November 15). Once you hit send, privacy is gone. The Boston Globe. Retrieved from
http://www.boston.com/lifestyle/article/2010/11/15/once_you_hyou_can_forget_privacy/
Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Who are the victims? A comparison of
victimization in internet chatrooms and victimization in school. Journal of Media Psychology, 21, 25–36.
Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2008). Cyber bullying: Bullying in the digital age. Health, 78, 496
Erlbaum.
iSafe (2009). About - 505.
Kowalski, R. M., (2008). Cyber bullying. Psychiatric Times, 25(11) 45-47.
Lewin, T. (2010, January 20). If your kids are awake, they’re probably online. The New York Times. Retrieved of
February 8, 2011 from http://www.nytimes.com/2010/01/20/education/20wired.html?_r=3
83
References Continued
•
•
•
•
•
•
•
•
•
•
Li, Q. (2010). Cyberbullying in high schools: A study of students’ behavior and beliefs about this new
phenomenon. Journal of Aggression, Maltreatment, and Trauma, 19 (4), 372 – 392.
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. Social Psychology International, 27,
157–170.
Li, Q. (2007a). Bullying in the new playground: Research into cyberbullying and cyber victimization.
Australasian Journal of Educational Technology, 23, 435–454.
Li, Q. (2007b). New bottle but old wine: A research of cyberbullying in schools. Computers in Human
Behavior, 23, 1777–1791.
Li, Q. (2008). A cross-cultural comparison of adolescents’ experience related to cyberbullying. Educational
Research, 50, 223–234.
Love Our Children USA (2010). Cyber Bullying. Retrieved from
http://www.loveourchildrenusa.org/parent_cyberbullying.php
Make A Difference For Kids, Inc. (2010). Cyberbullying. Retrieved October 25, 2010, from
http://www.makeadifferenceforkids.org/cyberbullying.html
National Institutes of Health (September 21, 2010). Depression high among youth victims of school cyber
bullying, NIH researchers report. Retrieved from
http://www.nichd.nih.gov/news/releases/092110-cyber-bullying.cfm
Olweus, D. (1993). Bullying at school: What we know and what we can do. Cambridge, MA: Blackwell.
Online Safety and Technology Working Group (2010). Youth safety on a living internet. Retrieved
November 13, 2010, from
http://www.ntia.doc.gov/reports/2010/OSTWG_Final_Report_070610.pdf
84
References Continued
•
•
•
•
•
•
•
•
•
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying.
Youth Violence and Juvenile Justice, 4, 148–169.
Paulson, A. (2003). Internet bullying. Christian Science Monitor. Retrieved on December 3, 2011, from
http://www.csmonitor.com/2003/1230/p11s01-legn.htm
Rideout, V.J., Foehr, U.G., & Roberts, D. F. (2010). Generation M2: Media in the lives of 8- to 18-year-olds. Henry
J. Kaiser Family Foundation. Retrieved on February 8, 2011 from http://www.kff.org/entmedia/8010.cfm
Roberts, W. B. (2006). Bullying From Both Sides: Strategic Interventions for Working Wit Bullies & Victims.
Thousand Oaks, CA: Corwin Press.
St. George, D (2010, September 21). Cyber-bullying linked to spike depression. The
Washington Post. Retrieved from http://www.washingtonpost.com/wp-yn/content/ticle/2010/09/20/
AR2010092006150.html
Slonje, R., & Smith, P. K. (2007). Cyberbullying: Another main type of bullying? Scandinavian Journal of
Psychology, 49, 147–154.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and
impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376–385
Sourander, A., Klomek A. B., Ikonen M., Lindroos J., Luntamo T., Koskelainen M., Ristkari T., Helenius H., (2010).
Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study.
Arch Gen Psychiatry. 67(7):720-728.
Sulkowski, M., Nichols, R., & Storch, E. A. (2009). Peer victimization in cyberspace: Prevalence and relationship to
psychosocial adjustment. Psychology in the Schools, 46, 962-972.
85
References Continued
•
•
•
•
•
•
•
•
•
•
Tokunaga, R. (2010). Following you home from school: A critical review and synthesis of research on
cyberbullying victimization. Computers in Human Behavior, 26, 277-287.
Topcu, C., Erdur-Baker, O., & Capa-Aydin, Y. (2008). Examination of cyberbullying experiences among Turkish
students from different school types. CyberPsychology & Behavior, 11, 643–648.
Trolley, B. C. & Hanel, C. (2010). Cyber kids, cyber bullying, cyber balance. Thousand Oaks, CA: SAGE
Publications.
Vandebosch, H., & van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the
perceptions of youngsters. CyberPsychology & Behavior, 11, 499–503.
Wang, J., Nansel, T. R.., and Iannotti R. J., (2009). School bullying among adolescents in the United States:
physical, verbal, relational, and cyber. Journal of Adolescent Health, 45 (4):368-75.
Wang, J., Nansel, T. R.., and Iannotti R. J., (2010). Depression high among youth victims of school cyber
bullying, NIH researchers report. US Department of Health and Human Services National Institutes of
Health. Retrieved on December 3, 2010 from
http://www.nichd.nih.gov/news/releases/092110-cyber-bullying.cfm
Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of
online harassment by known peers and online-only contacts. Journal of Adolescent Health, 41, S51–S58.
Worthen, M. R. (2007). Education policy implications from the expert panel on electronic media and youth
violence. Journal of Adolescent Health, 41, 61-63.
Ybarra, M. L. (2004). Linkages between depressive symptomatology and internet harassment among young
regular Internet users. CyberPsychology & Behavior, 7, 247–257.
Ybarra, M. L., & Mitchell, J. K. (2008). How risky are social networking sites? A comparison of places online
where youth sexual solicitation and harassment occurs. Pediatrics, 121, e350–e357.
86
Download