Upload
sof1y
View
13.787
Download
5
Tags:
Embed Size (px)
Citation preview
The Impact of The Impact of Cyberbullying on Its Cyberbullying on Its
Victims and Victims and PerpetratorsPerpetrators
Erick PaulusErick Paulus
Argosy UniversityArgosy University
CyberbullyingCyberbullying
• Why do people Why do people cyberbully?cyberbully?
• Who does it?Who does it?• How it affects both How it affects both
victim and bully.victim and bully.• Compare & Compare &
Contrast with Contrast with traditional bully.traditional bully.
• Review of current Review of current empirical research.empirical research.
The Impact of The Impact of Cyberbullying on Its Cyberbullying on Its
Victims and Perpetrators Victims and Perpetrators • The new way to bully.The new way to bully.• More damaging than traditional More damaging than traditional
bullying.bullying.• Multiple ways to attack.Multiple ways to attack.• Increase in technology=new and more Increase in technology=new and more
ways to attack (Walker, 2010; Twyman ways to attack (Walker, 2010; Twyman et al., 2009; Katzer et al., 2009; Dooley et al., 2009; Katzer et al., 2009; Dooley et al., 2009; Spears et al., 2009; Coyne et al., 2009; Spears et al., 2009; Coyne et al., 2009; Raskauskas & Stoltz, 2007). et al., 2009; Raskauskas & Stoltz, 2007).
The Impact of The Impact of Cyberbullying on Its Cyberbullying on Its
Victims and Perpetrators Victims and Perpetrators • What is a What is a
cyberbully?cyberbully?• Different from Different from
traditional bullying traditional bullying (Spears et al., (Spears et al., 2009). 2009).
• Why it is more Why it is more harmful.harmful.
The Impact of The Impact of Cyberbullying on Its Cyberbullying on Its
Victims and Perpetrators Victims and Perpetrators • Completely Completely
Impersonal Impersonal (Walker, 2010). (Walker, 2010).
• Great detachment Great detachment from victim.from victim.
• Decreased Decreased remorse=increaseremorse=increased frequency and d frequency and potency.potency.
Effects on Self-Esteem and Effects on Self-Esteem and Self-ConceptSelf-Concept
• Amplified Effects (Walker, 2010). Amplified Effects (Walker, 2010). • Helplessness.Helplessness.• Poor outcomes for both bully and Poor outcomes for both bully and
victim. Nansel et al. (2001) (as cited victim. Nansel et al. (2001) (as cited by Walker, 2010).by Walker, 2010).
Effects on Self-Esteem and Effects on Self-Esteem and Self-ConceptSelf-Concept
• Victims=rejection by peers.Victims=rejection by peers.• Less likely to have friends, Hodges Less likely to have friends, Hodges
et al. (1999) (as cited in Raskauskas et al. (1999) (as cited in Raskauskas & Stoltz, 2007). & Stoltz, 2007).
• Disruption of emotional and social Disruption of emotional and social development.development.
• Profound and long-lasting effect.Profound and long-lasting effect.
Lit Review: Strengths & Lit Review: Strengths & WeaknessesWeaknesses
• Lack of consensus on Lack of consensus on definition and testing.definition and testing.
• Most agree: Most agree: Cyberbullying is more Cyberbullying is more damaging (Walker, damaging (Walker, 2010; Twyman et al., 2010; Twyman et al., 2009; Katzer et al., 2009; Katzer et al., 2009; Dooley et al., 2009; Dooley et al., 2009; Spears et al., 2009; Spears et al., 2009; Coyne et al., 2009; Coyne et al., 2009; Raskauskas & 2009; Raskauskas & Stoltz, 2007).Stoltz, 2007).
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Raskauskas & Weaknesses Raskauskas &
Stoltz (2007) Stoltz (2007) • Only eighty-four adolescents (small Only eighty-four adolescents (small
sample size).sample size).• Questionnaire=easy to lie.Questionnaire=easy to lie.• Hawthorne Effect? (Gerrig & Hawthorne Effect? (Gerrig &
Zimbardo, 2009). Zimbardo, 2009). • Ages thirteen to eighteen.Ages thirteen to eighteen.• Caucasions only.Caucasions only.
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Walker (2010) Weaknesses Walker (2010) • Comprehensive review of other Comprehensive review of other
articles.articles.• Recommendations for future studies.Recommendations for future studies.• Critiques.Critiques.• Increase in potency and frequency of Increase in potency and frequency of
cyberbullying.cyberbullying.• Not a new study.Not a new study.
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Weaknesses Spears et al. Spears et al.
(2009) (2009) • Qualitative Study.Qualitative Study.• Greater impact of Greater impact of
cyberbullying than cyberbullying than traditional.traditional.
• Group sessions give Group sessions give victims a ‘voice’.victims a ‘voice’.
• Qualitative study Qualitative study does not offer does not offer statistical relevance.statistical relevance.
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Weaknesses Dooley, Dooley,
Pyzalski, & Cross (2009) Pyzalski, & Cross (2009) • Combine other’s works with their Combine other’s works with their
own.own.• Single voice perspective AND group Single voice perspective AND group
voice perspective.voice perspective.• Not an actual study or naturalistic Not an actual study or naturalistic
observation.observation.
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Weaknesses Smith (2009) Smith (2009) • Points out the similarities and Points out the similarities and
differences between cyber vs. differences between cyber vs. traditional bullying.traditional bullying.
• Multiple avenues for attack.Multiple avenues for attack.• Increasing number of attacks.Increasing number of attacks.• Emotional impact on the victim.Emotional impact on the victim.• Weakness=Summary of information Weakness=Summary of information
already obtained.already obtained.
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Weaknesses Smith (2009)Smith (2009)
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Katzer, Weaknesses Katzer,
Fetchenhauer, & Belschak Fetchenhauer, & Belschak (2009) (2009) • A very large A very large
sample size.sample size.• Located in Located in
Germany only.Germany only.• Validity reduced Validity reduced
(only focuses on (only focuses on internet internet chatrooms).chatrooms).
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Twyman et al. Weaknesses Twyman et al.
(2010) (2010) • Discusses the limitations of current Discusses the limitations of current
research on cyberbullying vs. research on cyberbullying vs. traditional bullying.traditional bullying.
• Increased potential for damage over Increased potential for damage over traditional bullying.traditional bullying.
• Low number of participants.Low number of participants.• Questionnaire only.Questionnaire only.• Raffle incentive?Raffle incentive?
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Brubacher et Weaknesses Brubacher et
al. (2009) al. (2009) • Very large sample size.Very large sample size.• Sixth to eighth graders only.Sixth to eighth graders only.• Self-report survey.Self-report survey.
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Gradinger, Weaknesses Gradinger,
Strohmeier, & Spiel (2009) Strohmeier, & Spiel (2009) • Large survey.Large survey.• Co-occurrence of Co-occurrence of
cyberbullying and cyberbullying and cyberbullying cyberbullying study.study.
Lit Review: Strengths & Lit Review: Strengths & Weaknesses Coyne, Weaknesses Coyne,
Chesney, Logan, & Madden Chesney, Logan, & Madden (2009) (2009) • Online survey.Online survey.
• Eighty-six residents of a virtual Eighty-six residents of a virtual online community of Second Life.online community of Second Life.
• Exclusive focus only on this new Exclusive focus only on this new form.form.
• Postulating the impact of Postulating the impact of cyberbullying is more psychological cyberbullying is more psychological than traditional.than traditional.
Support or Refute Support or Refute
• Differences of opinion.Differences of opinion.• No clear and agreed upon definition.No clear and agreed upon definition.• Power imbalance exclusion.Power imbalance exclusion.• Merely the electronic form of face-Merely the electronic form of face-
to-face bullying?to-face bullying?• No need for repetition?No need for repetition?
ConclusionConclusion• Relatively new concept.Relatively new concept.• Came with the internet.Came with the internet.• Many questions remain.Many questions remain.• Further research is needed.Further research is needed.• Is cyberbullying more damaging than traditional?Is cyberbullying more damaging than traditional?• Only a single incident can be considered Only a single incident can be considered
cyberbullying.cyberbullying.• Clear definition is needed.Clear definition is needed.• Co-occurrence of both cyber and traditional bullying Co-occurrence of both cyber and traditional bullying
needs to be studied more.needs to be studied more.• Longitudinal studies conducted on cyberbullies and Longitudinal studies conducted on cyberbullies and
their victims need to be addressed to assess their victims need to be addressed to assess psychological damage.psychological damage.
References References • Brubacher, M. R., Fondacaro, M. R., Brank, E. M., Brown, V. E., Brubacher, M. R., Fondacaro, M. R., Brank, E. M., Brown, V. E.,
& Miller, S. A. (2009). Procedural justice in resolving family & Miller, S. A. (2009). Procedural justice in resolving family disputes: Implications for childhood bullying. disputes: Implications for childhood bullying. Psychology, Public Psychology, Public Policy, and Law,Policy, and Law, 1515(3), 149-167. Retrieved online, May 14, 2011, (3), 149-167. Retrieved online, May 14, 2011, from from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/6145http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614506692/fulltextPDF?source=fedsrch&accountid=3489906692/fulltextPDF?source=fedsrch&accountid=34899
• Coyne, I., Chesney, T., Logan, B., & Madden, N. (2009). Griefing Coyne, I., Chesney, T., Logan, B., & Madden, N. (2009). Griefing in a virtual community: An exploratory survey of second life in a virtual community: An exploratory survey of second life residents.residents. Journal of Psychology, 217.4 Journal of Psychology, 217.4, 214-221. Retrieved , 214-221. Retrieved online, May 14, 2011, from online, May 14, 2011, from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/6145http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614512150/fulltextPDF?source=fedsrch&accountid=3489912150/fulltextPDF?source=fedsrch&accountid=34899
• Dooley, J. J., Pyzalski, J., & Cross, D. (2009). Cyberbullying versus Dooley, J. J., Pyzalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. face-to-face bullying: A theoretical and conceptual review. Journal Journal of Psychology, 217.4of Psychology, 217.4, 182-188. Retrieved online, May 14, 2011, , 182-188. Retrieved online, May 14, 2011, from from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/6145http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614512058/fulltextPDF?source=fedsrch&accountid=3489912058/fulltextPDF?source=fedsrch&accountid=34899
• Gerrig, R. J., & Zimbardo, P. G. (2009). Gerrig, R. J., & Zimbardo, P. G. (2009). An overview of An overview of psychology: Its past and present, your futurepsychology: Its past and present, your future (Custom ed.). (Custom ed.). Boston: Pearson Education. Retrieved from: Boston: Pearson Education. Retrieved from: http://digitalbookshelf.argosy.edu/#/books/055831743X/pages/12 http://digitalbookshelf.argosy.edu/#/books/055831743X/pages/12419811419811
ReferencesReferences• Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Traditional Bullying Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Traditional Bullying
and Cyberbullying: Identification of risk groups for adjustment and Cyberbullying: Identification of risk groups for adjustment problems. problems. Journal of Psychology, 217.4,Journal of Psychology, 217.4, 205-213. Retrieved online, 205-213. Retrieved online, May 14, 2011, from May 14, 2011, from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/61451016http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614510162/fulltextPDF?source=fedsrch&accountid=348992/fulltextPDF?source=fedsrch&accountid=34899
• Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Who are the victims? Who are the victims? Journal of Media Psychology: Theories, Methods, Journal of Media Psychology: Theories, Methods, and Applications, 21and Applications, 21(1), 25-36. Retrieved online, May 14, 2011, from (1), 25-36. Retrieved online, May 14, 2011, from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/61450429http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614504294/fulltextPDF?source=fedsrch&accountid=348994/fulltextPDF?source=fedsrch&accountid=34899
• Raskauskas, J. & Stoltz, A. D. (2007). Involvement in traditional and Raskauskas, J. & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying among adolescents. electronic bullying among adolescents. Developmental Psychology, Developmental Psychology, 43.343.3, 564-575. Retrieved online, may 14, 2011, from , 564-575. Retrieved online, may 14, 2011, from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/61446348http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614463488/fulltextPDF?source=fedsrch&accountid=348998/fulltextPDF?source=fedsrch&accountid=34899
• Smith, P. K. (2009). Cyberbullying: Abusive relationships in Smith, P. K. (2009). Cyberbullying: Abusive relationships in cyberspace. cyberspace. Journal of Psychology, 217.4Journal of Psychology, 217.4, 180-181. Retrieved online, , 180-181. Retrieved online, May 14, 2011, from May 14, 2011, from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/61450919http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614509193/fulltextPDF?source=fedsrch&accountid=348993/fulltextPDF?source=fedsrch&accountid=34899
ReferencesReferences• Spears, B., Slee, P., Owens, L., & Johnson, B. (2009). Behind the scenes Spears, B., Slee, P., Owens, L., & Johnson, B. (2009). Behind the scenes
and screens: insights into the human dimension of covert and and screens: insights into the human dimension of covert and cyberbullying. cyberbullying. Journal of Psychology, 217.4Journal of Psychology, 217.4, 189-196. Retrieved online, , 189-196. Retrieved online, May 14, 2011, from May 14, 2011, from http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614512091/http://search.proquest.com.wf2dnvr11.webfeat.org/docview/614512091/fulltextPDF?source=fedsrch&accountid=34899fulltextPDF?source=fedsrch&accountid=34899
• Twyman, K., Saylor, C., Taylor, L. A., & Comeaux, C. (2010). Comparing Twyman, K., Saylor, C., Taylor, L. A., & Comeaux, C. (2010). Comparing children and adolescents engaged in cyberbullying to matched peers. children and adolescents engaged in cyberbullying to matched peers. Cyberpsychology, Behavior, and Social NetworkingCyberpsychology, Behavior, and Social Networking, , 1313(2). Retrieved (2). Retrieved online, May 14, 2011, from: online, May 14, 2011, from: http://content.ebscohost.com.wf2dnvr11.webfeat.org/pdf25_26/pdf/2010/http://content.ebscohost.com.wf2dnvr11.webfeat.org/pdf25_26/pdf/2010/BABN/01Apr10/57656510.pdf?BABN/01Apr10/57656510.pdf?T=P&P=AN&K=57656510&S=R&D=pbh&EbscoContent=dGJyMNHX8kST=P&P=AN&K=57656510&S=R&D=pbh&EbscoContent=dGJyMNHX8kSep7I4y9f3OLCmr0meqK5Ssqy4TbGWxWXS&ContentCustomer=dGJyMPGrep7I4y9f3OLCmr0meqK5Ssqy4TbGWxWXS&ContentCustomer=dGJyMPGrsU2vp65KuePfgeyx44Hy7fEAsU2vp65KuePfgeyx44Hy7fEA
• Waslker, H. M. (2010). Relational aggression in schools: Implications for Waslker, H. M. (2010). Relational aggression in schools: Implications for future research on screening intervention and Prevention. future research on screening intervention and Prevention. School School Psychology Review, 39Psychology Review, 39(4), 594-600. Retrieved online, May 14, 2011, from (4), 594-600. Retrieved online, May 14, 2011, from http://content.ebscohost.com.wf2dnvr11.webfeat.org/pdf25_26/pdf/2010/http://content.ebscohost.com.wf2dnvr11.webfeat.org/pdf25_26/pdf/2010/SPZ/01Dec10/56581075.pdf?SPZ/01Dec10/56581075.pdf?T=P&P=AN&K=56581075&S=R&D=pbh&EbscoContent=dGJyMNHX8kST=P&P=AN&K=56581075&S=R&D=pbh&EbscoContent=dGJyMNHX8kSep7I4y9f3OLCmr0meqK9Ssae4S7WWxWXS&ContentCustomer=dGJyMPGrep7I4y9f3OLCmr0meqK9Ssae4S7WWxWXS&ContentCustomer=dGJyMPGrsU2vp65KuePfgeyx44Hy7fEAsU2vp65KuePfgeyx44Hy7fEA