Cyber Bullying Paper

advertisement
Cyber Bullying: How to Beat Down Your Bully
“Digital sticks and stones can’t break
my bones, but they can hurt even more.”
Introduction
Cyber bullying is a serious issue that many are affected by and struggle to avoid. Cyber
bullying has the potential to affect all online users and the consequences are damaging.
Cyberspace is a dangerous and many internet users abuse online technology. It is important that
young internet users are taught the correct ways to use the internet in order to protect themselves
from being victim to being bullied online. The Beat Down Bully campaign is one step towards
addressing the issue and raising awareness. Similar attempts should be executed in order to put
an end to cyber bullying.
Background
Cyber bullying has been prevalent in online chat rooms, emails, and other social media
since the invention of the Internet. As the sphere of global cyber communication continues to
grow, so do the possibilities for cyber bullying to become a more prevalent, dangerous problem,
and it has. The cyber bullying phenomenon involves the usage of communication technologies to
support deliberate, repeated, and hostile behavior by an individual or group that is intended to
harm others. Again, this can occur through a variety of technological mediums including email,
instant messaging, text messaging, and social media such as Myspace and Facebook.
Past Prevalence and Prevention
To exemplify the seriousness of this issue throughout history, the University of New
Hampshire’s Crimes against Children Research Center reported that one in seventeen children
between ages ten and seventeen were threatened or harassed in cyberspace as of the year 2000.
In 2006, a Harris Interactive poll found that 43 percent of teens in the United States reported
some form of experience regarding cyber bullying in the previous year. Other speculation from
various newscasts and stories suggest that at least half or more children and youth experience
this type of bullying on a regular basis now, in 2012. But, what are we as a country doing in
order to stop this from happening?
There are numerous websites that attempt to account for what cyber bullying is, why
people do it, and how to handle it. Stopcyberbullying.org is one of the most clear and helpful. It
urges everyone to be educated on this important fact of life and to beware and know how to
handle cyber bullying when and if it does occur. In the sites “take action” section, it urges us to
“stop, block, and tell,” which is obviously a spin-off of the well-known phrase, stop, drop and
roll in case of fire. This phrase explains that when we are faced with a cyber bully, we should
stop and take a few minutes to cool down. Then, block the person or limit conversations to only
your buddy list or contacts, and then tell someone like a parent, adult, or friend what has
happened.
Another step that has emerged with the invention of search engines is the ability to
“Google it.” Not only can we Google items and ideas, but we can search for people too. With
Google, it is possible to search for our own name and see where it pops up on the Internet. This
is a good prevention tool because if our name is out there, we may track the source and have our
name removed. Or, we would at least know what information about us is available to the public.
Cyber bullying is in the here and now and it is something that requires constant attention
and study. There are tools available for those who want to learn about this issue and all of its
facets. Most of all, this type of bullying kills people, oftentimes young children, who begin to
feel as if they have no way to get away from the treatment they are receiving online. Cyber
bullying cannot be prevented in its entirety, but teaching children to be aware and to know how
to deal with it is very possible and should be taught more in schools and in homes across the
world.
Audience Analysis
Almost everyone is somewhat in touch with social media in some way or form. There is
such a vast array of different pages and profiles one can make today. It is estimated that in
December 2011, 58% of the United States population between the ages of sixteen and fifty-four
years old takes part in social media. This has increased an entire 25% in the past three years.
With this constantly rising throughout the entire world, cyber bullying is on the rise (Hutton &
Fosdick, 2011). During the school year of 2008-2009, a survey was taken of students between
the ages of 12 to 18 nationwide. In this survey 1,521,000 students reported being cyber bullied
on and off school property (DeVoe, 2011).Sadly, students aren’t the only ones partaking in cyber
bulling. In October of 2006, there was a cyber-bullying case that resulted in a teenager’s suicide.
The harasser pretended to be a fellow teenage boy that cared about Megan Meier; later he started
to harass and insult her. After some investigation it was discovered that the teenager was actually
a 48 year old mother that lived four doors down from Megan. The mother claimed that she was
making sure that Megan wasn’t talking about her daughter online. This is proof that cyberbullying doesn’t take place with school aged kids. There are numerous cases where adults
pretend to be a teenager to harass younger people.
It is because of cases like Megan Meier’s that we cannot define our audience to simply a
younger audience. If we did that, we would be stunting the growth of our campaign and ignoring
many cases of cyber-bullying that happens. Cyber-bullying is going on worldwide and it happens
in all different ages in different ways. Our audience for our campaign needs to reach as many
people as possible. Our goal is to stop cyber-bullying all in all.
Campaign Strategy
Bully Beat Down is a campaign to raise awareness about cyber bullying. The Bully Beat
Down campaign has representatives’ who are victims to online bullying and they are spread
across the United States. Representatives from Bully Beat Down visit many schools within the
surrounding states of their location. These representatives meet with the guidance counselors at
middle schools, high schools, Colleges and Universities. The purpose of their visit is to persuade
school counselors into understanding that it is extremely important for students to be aware of all
consequences and effects of cyber bullying. Representatives also promote the idea of having
classroom workshops with students. In these workshops the Bully Beat Down representatives tell
their stories about the abuse that they endured from being bullied online. The reps have many
flyers, pamphlets, and other information about being cyber bullied that they provide to the
students. In the workshop a video is played, which is interview coverage from victims, survivors,
parents, friends, teachers, and other acquaintances that have personal experience of online abuse
or have been impacted by cyber bullying. At the end of the workshop there is a private/closed
discussion that is between students and the Bully Beat Down representative. All questions are
encouraged and there is no limitation to discussion topics. At the closing of the workshop the
representative gives the students their contact information for any questions or concerns and they
are welcome to contact the representative at any hour of the day. Every individual who
represents Bully Beat Down has signed a contract that promises their dedication and signs their
involvement around the clock.
September 1, 2012 will be the first Bully Beat Down campaign rally. The Bully Beat
Down campaign has marked September 1, 2012 as the date for national recognition of cyber
bullying. The campaign’s strategy for the rally is to get as many areas in the United States as
possible to host a rally that invites the community to join in a rally and have the opportunity to
learn, advise, and exchange knowledge all while raising awareness about the serious reality of
cyber bullying. On the Beat Down Bully campaign website, www.beatdownbully.com, there is a
link to upload videos of different rallies that took place on September 1, 2012. This chain of
videos will be spread throughout the media and other public networks to continue spreading
awareness. The Longwood campus will be participating in hosting a Beat Down Bully campaign
rally on September 1, 2012 at 4:00 PM. The rally will be held on the Student Union patio where
all the Longwood community can congregate and participate in the day of recognizing cyber
bullying. There will be a keynote speaker who is a psychologist will be opening the event with a
speech to talk about how to deal with cyber bullying and how to beat down your bully.
Throughout the rest of the event there will be several speakers who will talk about their personal
stories and experiences from being affected by cyber bullying. There will be information tables
set up on the Student Union patio where people are able to get informative pamphlets about
cyber bullying and hotline numbers will be available.
Explanation of Theoretical Support
In order to make our campaign a success we have decided to use theoretical persuasion
principles and theories which will socially influence our desired target audience. In order to
deliver strong and effective campaign points Aristotle’s Deliberative Speech Method is
beneficial. Aristotle’s Deliberative Speech Method is “designed to prove that some future action
should be taken that will convince an audience that a future action will produce some advantage
or prevent some harm” (P. 36, McGraw-Hill, 2005). This describes our team goal to persuade
individuals about the effects of cyber bullying and how the issue needs to be addressed
immediately.
We have also decided to take the approach of Cognitive Dissonance Theory and
Elaboration Likelihood Model which provides emotional explanation to why our campaign
banners and posters will produce a persuaded emotional connection to the audience. The banner
and posters state, “The Cyber-Bully has come to take your friend are you ready to let go? If not
speak up” and shown on the poster is a picture of high-school students who are making fun of
another girl, while the poster is implying she could potentially harm herself, which creates
cognitive dissonance with the headline and the scenario presented in the poster’s photo.
“Cognitive dissonance Theory, developed by Leon Festinger (1957), is concerned with the
relationships among cognitions. According to cognitive dissonance theory, there is a tendency
for individuals to seek consistency among their cognitions (i.e., beliefs, opinions). When there is
an inconsistency between attitudes or behaviors (dissonance), something must change to
eliminate the dissonance. In the case of a discrepancy between attitudes and behavior, it is most
likely that the attitude will change to accommodate the behavior.”
(http://www.istheory.yorku.ca/cognitivedissonancetheory.htm)
The picture accompanying the photo produces a sense of dissonance which the audience
will feel an emotional response to. We will place these posters and banners around schools, so
there is a good chance our campaign to affect a major portion of our target audience. The
individuals who are affected by the posters and banners and then response are displaying the use
of cognitive route (peripheral-route processing), which helps to raise the awareness of the issue
for the individual by producing a poster that gets the exact message we want across. The poster
explains the situation very quickly and grabs the individual’s attention instead of making them
think extremely hard to understand the point the campaign is trying to make. By viewers
understanding the meaning faster they are more likely to seek out ways to get help for their
family and friends who may be affected by this issue and research the signs and effects of cyberbullied individuals. “The Elaboration Likelihood Model (ELM) of persuasion is a model of how
attitudes are formed and changed (see also attitude change). Central to this model is the
"elaboration continuum", which ranges from low elaboration (low thought) to high elaboration
(high thought). The ELM distinguishes between two routes to persuasion: the central route and
the peripheral route.” (http://dictionary.sensagent.com/elaboration+likelihood+model/en-en/) By
using the peripheral route our team can get our message across on the posters and banners much
faster, because it doesn’t take as much thinking to figure out the meaning as Central route does,
which is a message based on logical thinking and motivation to understand while peripheral-
route can be cues, images, sounds, or spokespeople who deliver a message very quickly to their
audience.
Plan for Evaluation the Success of the Campaign
In order to measure the success of our strategies and campaigns, we will need numerous
tactics. We plan on outreaching to as many different groups as possible and so we have different
ways to do so.
For our school aged audience, the first thing we will do is send a general survey to be
taken before our campaign comes to the school. It will be a simple survey asking questions such
as “How many hours do you spend on the internet a day?” “What type and how much social
media do you take part in?”, “Do you do any other activities online?”, “How would you define
cyber-bullying?” and “Have you ever been cyber-bullied or cyber-bullied someone?” In doing
this, we will get a general idea of our audience of this particular age. After visiting a school, We
will wait a couple months and then send another survey to the school. This survey will be a little
different than the first one that the school took; however, we it will still have the same concepts.
The survey will ask questions such as “Since our campaign has come to your school have you
seen and heard less about cyber bullying around your campus?”, “Did the campaign help you
recognize cyber bullying better?”, and “Did the campaign help you figure out what to do when
your approached by cyber bully?” Along with giving a survey, we will also be in contact with the
schools’ counselors. We will ask them about the students they see that suffer from cyberbullying and also the students that participate in it. We will contact them a couple weeks after the
campaign has come to the school and ask them how those students we discussed are doing. We
hope to find that the campaign has had a positive impact on the students of the school and has
helped combat the issue of cyber-bullying at the schools we visit.
With the general public, or post high school audience, we plan to take general surveys of
the area we are visiting. If we are at a business we will send a similar survey that we send to the
schools to the employees of the company and have them answer it before we come to visit. We
plan on doing a very similar thing for the employees or general public as we do at school, except
a more mature approach.
Conclusion
The Beat Down Bully campaign should serve as a model for other people to make an
effort in ending cyber bullying. The result of this campaign will hopefully influence more people
to speak out about the harm that this causes the online population. There are supportive resources
to seek out in getting more information about the issue of cyber bullying. These resources are
easily available to contact for any questions or concerns. Before entering an online conversation
or relation, ask yourself who is this person? What is their name? Where are they from? What are
their intentions of contact? What are the positive and negative results that will come from this
online interaction?
Bibliography
DeVoe, J., Murphy, C., & National Center for Education Statistics, (. (2011). Student Reports of
Bullying and Cyber-Bullying: Results from the 2009 School Crime Supplement to the
National Crime Victimization Survey. Web Tables. NCES 2011-336. National Center
For Education Statistics,
Hutton, G., & Fosdick, M. (2011). The Globalization of Social Media. Journal Of Advertising
Research, 51(4), 564-570. doi:10.2501/JAR -51-4-564-570
McQuade, S. C., Colt, J. P., & Meyer, N. B. (2009). Cyber bullying : protecting kids and adults
from online bullies / Samuel C. McQuade III, James P. Colt, Nancy B.B. Meyer.
Westport, Conn. : Praeger Publishers, c2009.
Download