Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-qsmjn Total loading time: 0 Render date: 2024-04-23T14:58:38.693Z Has data issue: false hasContentIssue false

10 - Cyberbullying

Published online by Cambridge University Press:  05 June 2012

Ian Rivers
Affiliation:
Brunel University
Thomas Chesney
Affiliation:
Nottingham University
Iain Coyne
Affiliation:
University of Nottingham
Claire P. Monks
Affiliation:
University of Greenwich
Iain Coyne
Affiliation:
University of Nottingham
Get access

Summary

Since the mid 1990s developments in affordable personal computing and communication technology have resulted in the almost complete saturation of the household market in terms of internet connectivity and mobile telephone ownership. Most recent figures provided by the Office of Communications (Ofcom) indicate that, in the UK, while internet connectivity continues to rise, mobile telephony has almost reached saturation, with 73.5 million active subscriptions (1.25 subscriptions per head of the UK population; Ofcom, 2008). Within schools since 2002, it is estimated that 98 per cent of children and young people have had regular access to a computer (National Grid for Learning, 2002). As communication technologies have advanced and become a part of everyday life, the nature of social interaction has also changed. Where once a letter, memo or note, or a telephone call, would provide the means by which information was imparted with an expectation of a reply within a few days, today email, instant messaging and, of course, text messaging have become the norm, with the expectation of an immediate response. This is not only the way in which social interactions have changed among adults (both at home and in the workplace), it is also representative of the way children and young people now communicate with one another.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Besag, V.E. (2006). Understanding Girls' Friendships, Fights and Feuds: A Practical Approach to Girls' Bullying. Maidenhead: Open University Press.Google Scholar
Byron, T. (2008). Safer Children in a Digital World: The Report of the Byron Review, www.dcsf.gov.uk/byronreview (accessed 5 October 2008).
Campbell, M.A. (2005) ‘Cyber bullying: an old problem in a new guise?Australian Journal of Guidance and Counselling, 15: 68–76.CrossRefGoogle Scholar
Castronova, E. (2001). Virtual Worlds: A First-hand Account of Market and Society on the Cyberian. CESifo Working Paper Series No. 618, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=294828.
Chesney, T., Coyne, I., Logan, B. and Madden, N. (2009). ‘Griefing in virtual worlds: causes, casualties and coping strategies’. Information Systems Journal, 19: 525–48.CrossRefGoogle Scholar
,Childnet International (2007). Cyberbullying: A Whole-school Community Issue. When and How to Contact the Service Provider, www.digizen.org/cyberbullying/overview/contact.aspx (accessed 18 May 2009).
Companion, M. and Sambrook, R. (2008). ‘The influence of sex on character attribute preferences’. CyberPsychology and Behavior, 11: 673–74.CrossRefGoogle ScholarPubMed
,Department for Children, Schools and Families (2007). Cyberbullying. Safe to Learn: Embedding Antibullying Work in Schools, www.teachernet.gov.uk/_doc/11909/CYBERBULLYING.pdf (accessed 18 May 2009).
Finkelhor, S.Mitchell, K. and Wolak, J. (2000). Online Victimization: A Report on the Nation's Youth, www.unh.edu/ccrc/Youth_Internet_info_page.html (accessed 12 April 2009).
Foo, C.Y. and Koivisto, E.M.I. (2004). ‘Grief player motivations’. Paper presented at the Other Players Conference, Denmark, December.
Garbasz, Y. (1997). Flame Wars, Flooding, Kicking and Spamming: Expressions of Aggression in the Virtual Community, www.personal.u-net.com/~yandy/papers/PSA.html (accessed 12 April 2009).
Hinduja, S. and Patchin, J.W. (2008). ‘Cyberbullying: an exploratory analysis of factors related to offending and victimization’. Deviant Behavior, 29: 129–56.CrossRefGoogle Scholar
Kowalski, R.M. and Witte, J. (2006). ‘Youth internet survey’. Unpublished manuscript, Clemson University.
Kowalski, R.M., Limber, S. P. and Agatston, P.W. (2008). Cyberbullying: Bullying in the Digital Age. Malden: Wiley/Blackwell.Google Scholar
Li, Q. (2005). ‘Cyberbullying in schools: nature and extent of adolescents’ experience'. Paper presented at the Annual American Educational Research Association Conference, Montreal, April.
Li, Q. (2006a). ‘Computer-mediated communication: a meta-analysis of male and female attitudes and behaviors’. International Journal on E-Learning, 5: 525–70.Google Scholar
Li, Q. (2006b). ‘Cyberbullying in schools: a research of gender differences’. School Psychology International, 27: 157–70.CrossRefGoogle Scholar
Li, Q. (2007). ‘New bottle but old wine: a research of cyberbullying in schools’. Computers in Human Behavior, 23: 1777–91.CrossRefGoogle Scholar
Ling, R. (2004). The Mobile Connection: The Cell Phone's Impact on Society. San Francisco, CA: Morgan Kaufmann.Google Scholar
,MSN (2006). MSN Cyberbullying Report: Blogging, Instant Messaging, and Email Bullying amongst Today's Teens, www.msn.co.uk/cyberbullying (accessed 6 October 2008).
Nansel, T., Overpeck, M., Pilla, R.S., Ruan, W.J., Simons-Morton, B. and Scheidt, P. (2001). ‘Bullying behaviors among US youth: prevalence and association with psychosocial adjustment’. Journal of the American Medical Association, 285: 2094–100.CrossRefGoogle ScholarPubMed
,National Grid for Learning (2002). Young People and ICT: Findings from a Survey Conducted in Autumn 2001. London: Department for Education and Skills.Google Scholar
,NCH (2002). NCH National Survey 2002: Bullying, www.nch.org.uk/itok/showquestion.asp?faq=9andfldAuto=145 (accessed 1 September 2003).
,NCH (2005) Putting U in the Picture: Mobile Bullying Survey, www.stoptextbully.com/files/textbully_inserts.pdf (accessed 12 October 2008).
Norris, K.O. (2004). ‘Gender stereotypes, aggression, and computer games: an online survey of women’. CyberPsychology and Behavior, 7: 714–27.CrossRefGoogle Scholar
Ofcom, (2006). Communications Market Report. London: Ofcom.Google Scholar
Ofcom, (2008). Communications Market Report. London: Ofcom.Google Scholar
Patchin, J. and Hinduja, S. (2006). ‘Bullies move beyond the schoolyard: a preliminary look at cyberbullying’. Youth Violence and Juvenile Justice, 4: 148–69.CrossRefGoogle Scholar
Rivers, I. and Noret, N. (2009). ‘“I h 8 u”: findings from a five-year study of text and e-mail bullying’. British Educational Research Journal, iFirst Article, 1–29.Google Scholar
Rivers, I., Duncan, N. and Besag, V.E. (2007). Bullying: A Handbook for Educators and Parents. Westport, CT: Greenwood/Praeger.Google Scholar
Smith, J.H. (2004). ‘Playing dirty – understanding conflicts in multiplayer games’. Paper presented at the 5th Annual Conference of the Association of Internet Researchers, Sussex, September.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008). ‘Cyberbullying: its nature and impact in secondary school pupils’. Journal of Child Psychology and Psychiatry, 49: 378–85.CrossRefGoogle ScholarPubMed
Suler, J. (1997). ‘The bad boys of cyberspace’. In The Psychology of Cyberspace, http://users.rider.edu/~suler/psycyber/badboys.html (article originally published 1997).
Suler, J. (2004). ‘The online disinhibition effect’. CyberPsychology and Behavior, 7: 321–26.CrossRefGoogle ScholarPubMed
Sutton, J., Smith, P.K. and Swettenham, J. (1999). ‘Social cognition and bullying: social inadequacy or skilled manipulation?British Journal of Developmental Psychology, 17: 435–50.CrossRefGoogle Scholar
Taylor, T.L. (2003). ‘Multiple pleasures: women and online gaming’. Convergence: The International Journal of Research into New Media Technologies, 9: 23–45.Google Scholar
Thompsen, P.A. (1994). ‘An episode of flaming: a creative narrative’. ETC: A Review of General Semantics, 51: 51–72.Google Scholar
Turkle, S. (1995). Life on the Screen: Identity in the Age of the Internet. London: Phoenix.Google Scholar
Valentine, G. and Holloway, S.L. (2002). ‘Cyberkids? Exploring children's identities and social networks in on-line and off-line worlds’. Annals of the Association of American Geographers, 9: 302–19.CrossRefGoogle Scholar
Warner, D.E. and Raiter, M. (2005). ‘Social context in Massively-Multiplayer Online Games (MMOGs): ethical questions in shared space’. International Review of Information Ethics, 4: 46–52.Google Scholar
Williams, K.R. and Guerra, N.G. (2007). ‘Prevalence and predictors of internet bullying’. Journal of Adolescent Health, 41: 14–21.CrossRefGoogle ScholarPubMed
Wolak, J., Mitchell, K.J. and Finkelhor, D. (2002). ‘Close online relationships in a national sample of adolescents’. Adolescence, 37: 441–55.Google Scholar
Ybarra, M.L. and Martin, S. (2008). ‘Unwanted sexual and harassing TXTs: a national survey of children and adolescents’. Personal communication.
Ybarra, M.L. and Mitchell, J.K. (2004). ‘Online aggressors/targets, aggressors and targets: a comparison of associated youth characteristics’. Journal of Child Psychology and Psychiatry, 45: 1308–16.CrossRefGoogle ScholarPubMed
Ybarra, M.L., Diener-West, M., Markow, D., Leaf, P.J. and Hamburger, M. (2008). ‘Linkages between internet violence and seriously violent behavior: findings from the Growing Up with the Media national survey’. Pediatrics, 122: 929–37.CrossRefGoogle Scholar
Young, R.M. (1996a). NETDYNAM: Some Parameters of Virtual Reality, www.human-nature.com/rmyoung/papers/paper17.html (accessed 12 April 2009).
Young, R.M. (1996b). Psychoanalysis and/of the Internet, www.human-nature.com/rmyoung/papers/paper36.html (accessed 12 April 2009).

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×