What is bullying?
Bullying is generally viewed as a repetitive aggressive behavior which focuses on deliberately causing harm to another individual. The individual eliciting such behavior is generally termed the bully and the individual who is the recipient of the behavior is generally termed the victim. Bullying exposes the victim to negative, detrimental, and undesirable situations which can be elicited from one or more individuals over an extended period of time (Katzer et al., 2009). The victim usually finds it difficult to defend him or herself (Slonje et al., 2013), such that the victim does not feel as though he or she can stop the interaction from occurring (Cohen et al, 2012). Bullying is based on an imbalance of power or strength between the victim and bully. The interaction between the bully and his or her victims, ultimately leads this individual to systematically abuse and misuse power (Slonje et al., 2013). Bullying can take many forms including physical, verbal, or psychological (Katzer et al., 2009) and each form leaves its mark on the victim.
Traditional vs. Cyber-bullying
Bullying is not one sided. With the increase in technology use over the last decade, bullying can now be divided into two separate entities originating from similar roots. Bullying today takes on two separate personas, including traditional face to face bullying and the twentieth century method termed cyber-bullying.
Traditional face to face bullying generally refers to an intentional act of aggression by an individual toward one of his or her peers who cannot easily defend him or herself (Coyne et al., 2009). The aggressive behavior is undesired by the victim and occurs in close proximity with aggressor. Traditional bullying commonly occurs in a school setting; either it in the classroom or during recess. Traditional bullying can also occur outside of school (i.e. Community Park, a party, a local classmate hangout; pizza parlor).
In contrast, cyber- bullying generally refers to an intentional act of aggression using electronic forms of communication, “against a victim who cannot easily defend his or herself” (Coyne et al., 2009). The electronic modes of communication used by the bully to elicit such intentional aggressive acts vary and include a variety of methods. Various methods of implementation include, computer mediated communication (instant messaging and e-mail), cell phone text messages and calls, social networking sites (i.e. Facebook), chat rooms, discussion boards, blogs and Internet gaming networks. Unlike traditional bullying, cyber- bullying is anonymous. The victim is unaware of who is responsible for the aggressive acts against them.
Although traditional and cyber- bullying share similar overlaps in terms of purpose, each method exhibits their own unique characteristics in terms of implementation and sequence of events. Research has shown distinct differences between traditional face to face bullying and cyber- bullying.
Bullying is generally viewed as a repetitive aggressive behavior which focuses on deliberately causing harm to another individual. The individual eliciting such behavior is generally termed the bully and the individual who is the recipient of the behavior is generally termed the victim. Bullying exposes the victim to negative, detrimental, and undesirable situations which can be elicited from one or more individuals over an extended period of time (Katzer et al., 2009). The victim usually finds it difficult to defend him or herself (Slonje et al., 2013), such that the victim does not feel as though he or she can stop the interaction from occurring (Cohen et al, 2012). Bullying is based on an imbalance of power or strength between the victim and bully. The interaction between the bully and his or her victims, ultimately leads this individual to systematically abuse and misuse power (Slonje et al., 2013). Bullying can take many forms including physical, verbal, or psychological (Katzer et al., 2009) and each form leaves its mark on the victim.
Traditional vs. Cyber-bullying
Bullying is not one sided. With the increase in technology use over the last decade, bullying can now be divided into two separate entities originating from similar roots. Bullying today takes on two separate personas, including traditional face to face bullying and the twentieth century method termed cyber-bullying.
Traditional face to face bullying generally refers to an intentional act of aggression by an individual toward one of his or her peers who cannot easily defend him or herself (Coyne et al., 2009). The aggressive behavior is undesired by the victim and occurs in close proximity with aggressor. Traditional bullying commonly occurs in a school setting; either it in the classroom or during recess. Traditional bullying can also occur outside of school (i.e. Community Park, a party, a local classmate hangout; pizza parlor).
In contrast, cyber- bullying generally refers to an intentional act of aggression using electronic forms of communication, “against a victim who cannot easily defend his or herself” (Coyne et al., 2009). The electronic modes of communication used by the bully to elicit such intentional aggressive acts vary and include a variety of methods. Various methods of implementation include, computer mediated communication (instant messaging and e-mail), cell phone text messages and calls, social networking sites (i.e. Facebook), chat rooms, discussion boards, blogs and Internet gaming networks. Unlike traditional bullying, cyber- bullying is anonymous. The victim is unaware of who is responsible for the aggressive acts against them.
Although traditional and cyber- bullying share similar overlaps in terms of purpose, each method exhibits their own unique characteristics in terms of implementation and sequence of events. Research has shown distinct differences between traditional face to face bullying and cyber- bullying.
Cyber Bullying
Modes of Cyber- bullying
The electronic modes of communication used by the bully to elicit such intentional aggressive acts vary and include a variety of methods. Various methods of implementation include, computer communication (instant messaging and e-mail), cell phone text messages and calls, social networking sites (i.e. Facebook), Websites, chat rooms, discussion boards, blogs and Internet gaming networks. Cyber- bullying also extends to picture and video clips elicited from the bully toward the victim. As technology continues to develop and new means of communication are established, new modes of cyber- bullying are most likely to emerge (Coyne et al., 2009; Jackson & Cohen, 2012; Slonje et al., 2012).
Types of Cyber- bullying
Each modern technological device enables a different act of aggression elicited from the bully onto the victim. The medium and its associated aggressive actions include;
Within Internet gaming networks, common acts of cyber- bullying occur as griefing and flaming. Griefing is the,“intentional harassment of other players… which utilizes aspects of the game structure or physics in unintended ways to causes distress for other players” (Coyne et al., 2009). Grief play is one of the most common conflicts found in Massively Multiplayer Online Games (MMOGs). Flaming also occurs in online communities, such as Second Life, and is defined as, “an uninhibited expression of hostility” (Coyne et al., 2009). Flaming involves swearing, calling the other players names, ridiculing and eliciting insults toward them, and insulting the players’ characteristics (i.e. character, religion, intelligence and physical or mental ability) (Coyne et al.,2009).
Common acts of cyber- bullying that occur through computer mediated communication (i.e.instant messaging and e-mail) and cell phone text messages and calls include abusive content. The actions elicited from the bully via these modes of communication include,“treats of physical violence, abusive or hate- related messages, name calling, death threats, ending of platonic relationships (i.e. friends or romantic), sexual acts such as inappropriate photographs or videos, demands and/ or instructions, threats to damage existing relationships and to the victims home and family, and frightening chain messaging” (Slonje et al., 2012).
Within Internet chat rooms common acts of cyber bullying that occur are generally verbal and psychological in nature. The acts most commonly used by those cyber bullies within Internet chat room include, “slander, blackmail, spreading rumors, and systematically excluding someone else,” (Katzer et al., 2009). Cyber bullies within Internet chat rooms are generally referred to as predators. Predators psychologically pressure those individuals who fall victim to cyber bullying in a variety of ways and for a variety of reasons. Internet chat rooms contain a vase number of users, who are anonymous in nature and therefore, the victim usually does not fall victim to just one predator, he or she will repeatedly fall victim to one or more predators at a given time.
Common acts of cyber bullying that occur through social networking sites (i.e. Facebook and MySpace) focus on the information posted on the site by the cyber victim. Ultimately, it is the content that can be obtained about the individual on his or her social networking sites that causes him or her to become a victim of cyber bullying. The acts directed toward the cyber victim include nasty comments about his or her personal pictures, videos, and personal information shared. Cyber bullies will negatively put down and harass the cyber victim based on the available content posted on his or her social networking site(Slonje et al., 2012). The cyber bully will share these aggressive acts with other individuals who also use the site and therefore the source is unknown to the victim. The effect on the victim can be even more detrimental then other sources of cyber bullying because of the vase distribution of material that various social networking sites allow.
Over the last couple of years, smart – phones have emerged which allow individuals to use his or her phone both for the Internet and to send and receive text messages and phone calls (Slonje et al., 2012). With the increase in social networking site usage among adolescents and young adults, the smart- phone phenomenon has become a gateway for a more invasive means of cyber bullying. The ability to engage in cyber bullying acts is more convenient for the cyber bully because the content posted on the victims social networking sites is more accessible. The information available on the cyber victim’s social networking sites can be distributed more frequently and to a larger audience of bystanders.
The electronic modes of communication used by the bully to elicit such intentional aggressive acts vary and include a variety of methods. Various methods of implementation include, computer communication (instant messaging and e-mail), cell phone text messages and calls, social networking sites (i.e. Facebook), Websites, chat rooms, discussion boards, blogs and Internet gaming networks. Cyber- bullying also extends to picture and video clips elicited from the bully toward the victim. As technology continues to develop and new means of communication are established, new modes of cyber- bullying are most likely to emerge (Coyne et al., 2009; Jackson & Cohen, 2012; Slonje et al., 2012).
Types of Cyber- bullying
Each modern technological device enables a different act of aggression elicited from the bully onto the victim. The medium and its associated aggressive actions include;
Within Internet gaming networks, common acts of cyber- bullying occur as griefing and flaming. Griefing is the,“intentional harassment of other players… which utilizes aspects of the game structure or physics in unintended ways to causes distress for other players” (Coyne et al., 2009). Grief play is one of the most common conflicts found in Massively Multiplayer Online Games (MMOGs). Flaming also occurs in online communities, such as Second Life, and is defined as, “an uninhibited expression of hostility” (Coyne et al., 2009). Flaming involves swearing, calling the other players names, ridiculing and eliciting insults toward them, and insulting the players’ characteristics (i.e. character, religion, intelligence and physical or mental ability) (Coyne et al.,2009).
Common acts of cyber- bullying that occur through computer mediated communication (i.e.instant messaging and e-mail) and cell phone text messages and calls include abusive content. The actions elicited from the bully via these modes of communication include,“treats of physical violence, abusive or hate- related messages, name calling, death threats, ending of platonic relationships (i.e. friends or romantic), sexual acts such as inappropriate photographs or videos, demands and/ or instructions, threats to damage existing relationships and to the victims home and family, and frightening chain messaging” (Slonje et al., 2012).
Within Internet chat rooms common acts of cyber bullying that occur are generally verbal and psychological in nature. The acts most commonly used by those cyber bullies within Internet chat room include, “slander, blackmail, spreading rumors, and systematically excluding someone else,” (Katzer et al., 2009). Cyber bullies within Internet chat rooms are generally referred to as predators. Predators psychologically pressure those individuals who fall victim to cyber bullying in a variety of ways and for a variety of reasons. Internet chat rooms contain a vase number of users, who are anonymous in nature and therefore, the victim usually does not fall victim to just one predator, he or she will repeatedly fall victim to one or more predators at a given time.
Common acts of cyber bullying that occur through social networking sites (i.e. Facebook and MySpace) focus on the information posted on the site by the cyber victim. Ultimately, it is the content that can be obtained about the individual on his or her social networking sites that causes him or her to become a victim of cyber bullying. The acts directed toward the cyber victim include nasty comments about his or her personal pictures, videos, and personal information shared. Cyber bullies will negatively put down and harass the cyber victim based on the available content posted on his or her social networking site(Slonje et al., 2012). The cyber bully will share these aggressive acts with other individuals who also use the site and therefore the source is unknown to the victim. The effect on the victim can be even more detrimental then other sources of cyber bullying because of the vase distribution of material that various social networking sites allow.
Over the last couple of years, smart – phones have emerged which allow individuals to use his or her phone both for the Internet and to send and receive text messages and phone calls (Slonje et al., 2012). With the increase in social networking site usage among adolescents and young adults, the smart- phone phenomenon has become a gateway for a more invasive means of cyber bullying. The ability to engage in cyber bullying acts is more convenient for the cyber bully because the content posted on the victims social networking sites is more accessible. The information available on the cyber victim’s social networking sites can be distributed more frequently and to a larger audience of bystanders.