Skip to main content Accessibility help
×
Hostname: page-component-788cddb947-rnj55 Total loading time: 0 Render date: 2024-10-19T17:13:13.623Z Has data issue: false hasContentIssue false

5 - Fostering Positive School Environments: Physical and Virtual

Published online by Cambridge University Press:  02 July 2009

Shaheen Shariff
Affiliation:
McGill University, Montréal
Get access

Summary

You don't know me …

But I know you …

I've been watching you at school …

And if you don't want to die … I'd sleep with one eye open

Down on your knees, bitch!

Raveger, Raveger

(Shariff, 2001)

INTRODUCTION

My first experience with cyber-bullying began with an e-mail from “Raveger, Raveger.” The e-mail was sent to our daughter Shelina (pseudonym), when she was about fifteen years old, in Grade 11 at a high school in British Columbia, Canada. We came home one afternoon and found her pale and frightened, which was unusual for this normally feisty teenager. She handed us a printout of the e-mail that is quoted above. As a parent, I was concerned about Shelina's safety. Was this a pedophile? Was it an adult at school? If a student was involved, did he know her walking route home from school? The reference to watching her at school brought the threat into the realm of the physical school environment, despite the fact that it was sent over the weekend from a home computer. School police liaison officers were unsuccessful in tracing the e-mail, and our efforts to trace the source of the e-mail through the Internet service provider (ISP) met a brick wall. First there was no response to our calls and e-mails. When eventually contacted, an ISP manager explained that he could not shut down the e-mail source to protect the client's free expression rights.

Type
Chapter
Information
Confronting Cyber-Bullying
What Schools Need to Know to Control Misconduct and Avoid Legal Consequences
, pp. 127 - 158
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adam, A. (2002). Cyberstalking and Internet pornography: Gender and the gaze. Ethics and Information Technology, 4, 133–142.CrossRefGoogle Scholar
Artz, S. (1998). Where have all the school girls gone? Violent girls in the school yard. Child & Youth Care Forum, 27(2), n.p.Google Scholar
Boulton, M., & Hawker, D. (1997). Verbal bullying: The myth of “sticks and stones.” In Tattum, D. & Herbert, G. (Eds.), Bullying: Home, school and community (pp. 53–63). London: David Fulton.Google Scholar
Boyd, N. (2000). The beast within: Why men are violent. Vancouver, Canada: Greystone Books.Google Scholar
Canadian Charter of Rights and Freedoms, Schedule B, Constitution Act, 1982, Canada Act, c. 11 (UK).
Chu, J. (2005, August 8). You wanna take this online? Cyberspace is the 21st century bully's playground where girls play rougher than boys. Time, Canadian Edition, 42–43.Google Scholar
DiGiulio, R. C. (2001). Educate, mediate, or litigate? What teachers, parents, and administrators must do about student behavior. Thousand Oaks, CA: Corwin Press.Google Scholar
Foster, W. F. (1991). Child abuse in schools: The statutory and common law obligations of educators. Education & Law Journal, 4, 1–59.Google Scholar
Garbarino, J. (1999). Lost boys: Why our sons turn violent and how we can save them. New York: Free Press.Google Scholar
Gregson, K. S. (2005). What if the lead character looks like me? Girl fans of Shoujo anime and their Web sites. In Mazzarella, S. R. (Ed.), Girl wide web: Girls, the Internet and the negotiation of identity. New York: Peter Lang.Google Scholar
Hall, M. T. (1999). Administrative discretion and youth violence in schools: An analysis. Unpublished doctoral dissertation, Simon Fraser University, Burnaby, Canada.Google Scholar
Harmon, A. (2004, August 24). Internet gives teenage bullies weapons to wound from afar [Electronic version]. New York Times. Retrieved August 26, 2004, from http://www.nytimes.com/2004/08/26/education.Google Scholar
Healey, J. B. (2005). Peer abuse as a legislated child protection issue for schools. Australia & New Zealand Journal of Law & Education, 10, 59–71.Google Scholar
Herring, S. C. (2002). Cyberviolence: Recognizing and resisting abuse in online environments. Asian Women, 14, 187–212.Google Scholar
Lanctot, N. (2001). Violence among females from adolescence to adulthood: Results from a longitudinal study. Paper presented at the Vancouver Conference on Aggressive and Violent Girls. Simon Fraser University, Vancouver, Canada.Google Scholar
Leishman, J. (2002, October 10). Cyber-bullying: The Internet is the latest weapon in a bully's arsenal [Electronic version]. CBC News. The National. Retrieved January 27, 2003, from http://cbc.ca/news/national/news/cyberbullying/index.html.Google Scholar
Lenhart, A. (2007, June 27). Data memo [Electronic version]. Pew Internet & American Life Project. Retrieved August 14, 2007, from http://www.pewinternet.org/pdfs/PIP%20Cyberbullying%20Memo.pdf.Google Scholar
McMillin, D. C. (2005). Teen crossings: Emerging cyberpublics in India. In Mazzarella, S. R. (Ed.), Girl wide web: Girls, the Internet, and the negotiation of identity (pp. 161–178). New York: Peter Lang.Google Scholar
National Crime Prevention Council. (1997). Report on bullying. Retrieved July 24, 2005, from http://www.crime-prevention.org.
Nelson, G. E., & Lewak, R. W. (1988). Delinquency and attachment. In Jenkins, R. L. & Brown, W. K. (Eds.), The abandonment of delinquent behaviour: Promoting the turnaround (pp. 85–98). New York: Praeger.Google Scholar
Olweus, D. (2001). Peer harassment: A critical analysis and some important issues (Introduction). In Juvonen, J. & Graham, S. (Eds.), Peer harassment in school: The plight of the vulnerable and victimized (pp. 3–20). New York: Guildford Press.Google Scholar
Pollack, W. (1998). Real boys. Markham, Canada: Fitzhenry & Whiteside.Google Scholar
Reiss, A. J., Roth, J. A., & the National Research Council (U.S.) Panel on the Understanding and Control of Violent Behavior. (1993). Understanding and preventing violence. Washington, DC: National Academy Press.Google Scholar
Shariff, S. (2000). Identifying successful school and community programs for youth: An evaluation rubric and compendium of sources. A research project of Youth Justice Education Partnerships supported by Justice Canada [Electronic version]. Retrieved July 23, 2005, from http://www.acjnet.ca.Google Scholar
Shariff, S. (2001). E-mail from “Raveger, Raveger.” In Legal Context of Education, EDUC 445. Course Study Guide. Burnaby, BC: Centre for Distance Education, Simon Fraser University.Google Scholar
Shariff, S. (2006). Cyber-Hierarchies: A new arsenal of weapons for gendered violence in schools. In Mitchell, C. & Leech, F. (Eds.), Combating gender violence in and around schools (pp. 33–41). London: Trentham Books.Google Scholar
Shariff, S. (2007a). Adult perceptions of cyber-bullying. Compiled by research assistant Julie d'Eon. Unpublished research conducted as part of a three-year research project on cyber-bullying, funded by Social Science and Humanities Research Council of Canada (SSHRC). Shaheen Shariff, McGill University, Principal Investigator.
Shariff, S. (2007b). Unpublished research conducted as part of a three-year research project on cyber-bullying, funded by Social Science and Humanities Research Council of Canada (SSHRC). Shaheen Shariff, McGill University, Principal Investigator.
Shariff, S. (2007c). What's the school's role? What about rights? and would you report it? Data compiled by research assistants Andrew Churchill, Julie d'Eon, and Tomoya Tsutsumi. Tables and figures prepared by Andrew Churchill. Unpublished research conducted as part of a three-year research project on cyber-bullying, funded by Social Science and Humanities Research Council of Canada (SSHRC). Shaheen Shariff, McGill University, Principal Investigator.
Shariff, S., & Gouin, R. (2006). Cyber-dilemmas: Gendered hierarchies, new technologies and cyber-safety in schools. Atlantis – A Women's Studies Journal, 31, 26–36.Google Scholar
Shariff, S., & Strong-Wilson, T. (2005). Bullying and new technologies: What can teachers do to foster socially responsible discourse in the physical and virtual school environments? In Kincheloe, J. (Ed.), Classroom teaching: An introduction (pp. 219–240), New York: Peter Lang.CrossRefGoogle Scholar
Suler, J. R., & Phillips, W. L. (1998). The bad boys of cyberspace: Deviant behavior in a multimedia chat community. Cyberpsychology & Behavior, 1, 275–294.CrossRefGoogle Scholar
Tolman, D. L., Spencer, R., Rosen-Reynoso, M., & Porches, M. (2001). “He's the man!” Gender ideologies and early adolescents’ experiences with sexual harassment. Paper presented at the American Educational Researchers Association (AERA) Conference, Seattle WA.Google Scholar
Wolak, J., Mitchell, K. J., & Finkelhor, D. (2003). Escaping or connecting? Characteristics of youth who form close online relationships. Journal of Adolescence, 26, 105–119.CrossRefGoogle ScholarPubMed
Ybarra, M. L., & Mitchell, K. J. K. (2004). Online aggressor/targets, aggressors and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45, 1308–1316.CrossRefGoogle ScholarPubMed
Ybarra, M. L., Mitchell, K. J. K., Finkelhor, D., & Wolak, J. (2007). Internet prevention messages: Targeting the right online behaviors. Archives of Pediatric and Adolescent Medicine, 161(2), 138–145.Google ScholarPubMed
Davis v. Monroe County Bd. of Ed., 526 U. S. 629 (1999).
Jubran v. North Vancouver School District et al., No. 44 B. C. H.R. T.D. No. 10 (Q. L.) 221 (2002).
Robichaud v. Canada (Treasury Board), 2 S. C.R. 84 (1987).
Ross v. New Brunswick School District No. 15, 1 S. C.R. 825 (1996).

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×