Verified Document

Cyber Bullying And Social Work Research Paper

Cyber Bullying and Its Impact Over the past decade, attention has been drawn to cyber-bullying by the media and researchers. Research on cyber-bullying has covered the various behavior aspects; focusing mainly on demographic and personal factors of the involved individuals. Particularly, the research has been targeted at factors among adolescents; who account for a majority of cyber-bullying cases. Nonetheless, it is important that other populations are studied too -- even adults where cyber-bullying may not be as common -- so that evaluations are made on the previous findings. Several personal factors linked to adolescent cyber-bullying, e.g. level of self-esteem, have been noted to change as one gets older (Obins et al., 2002). It is necessary therefore that studies be done whether or not such factors remain linked to cyber-bullying in various groups of different ages. Moreover, while research on cyber-bullying on adults is taking shape, they are limited to identifying individuals as either cyber victims or the cyber-bully (Zachilli & Valerio, 2011). Contrastingly, most of the research on adolescents makes distinctions on the various identities of cyber-bullies, which allows for the behavior to be better understood. This paper discusses 4 cyber-identities (cyber-bully, non-involved and cyber-victim/bully) among young adults, and the way self-esteem is connected to the four identities (Brack & Caltabiano, 2014).

Smit et al. (2008) broadly describes cyber-bullying as an intentional aggressive act that an individual or group carries using electronic contact means, repeatedly over a given time period against a victim that can't defend him/herself easily (p. 366). The description is the same as that given to the traditional bullying that takes place offline. It consists of three parts that differentiate bullying from such acts like assault and harassment (Sevcikova & Smahel, 2009). Specifically, a bullying act has to include aggression as well as identifiable power imbalance between the victim and the bully and the bullying act has to be done repeatedly over a given period of time (Newey & Magson, 2010). Nonetheless, using this definition to describe cyber-bullying raises questions on whether cyber-bullying is an extension of the traditional offline bullying and that they feature the same components (Beran & Li, 2005), whether it is distinctly different with very different characteristics (Ybara et al., 2007). In spite of these differences, there is agreement on the range of methods and activities used in cyber-bullying (Brack & Caltabiano, 2014).

Cyber-bullying can be done on several of the technological platforms, including: email, social media, text messaging, instant messaging, pictures and videos taken through phones and webcams, forums, chat rooms and also on some kinds of websites especially in the comment section (Smith et al., 2006). Further, cyber-bullying isn't limited to sending insulting and hurtful messages about a particular person. There are several components involved like revealing sensitive information about another person, to creating fake persona to get information or to humiliate someone (Willard, 2005). Further, research shows that there are many identities in cyber-bullying, not just cyber-victims and cyber-bullies. Instead, there are a number of identities, at times known as topologies, which discuss the various roles that are taken by individuals in cyber-bullying (Brack & Caltabiano, 2014).

The idea that there are different kinds of bullies was first introduced by Olweus (1997). He made the suggestion that bullying ought to be evaluated on a scale that accounted for the various groups of bullies, bystanders and victims. Typology use in classifying bullying has evolved since the initial categorization done by Olweus. Common among the literature is that four types of people are involved in an act of cyber-bullying: pure cyber-victims, pure cyber-bullies, cyber-bully/victims, and those people who have neither been cyber-bullied nor been cyber-bullies themselves (Florell & Wygant, 2013; Kowlaski et al., 2013). Several studies have reported a big overlap between cyber-victimization/cyber-bullying in comparison to other aspects of offline bullying factors. There is little explanation of this in cyber-bullying writings; however, logic shows that there may be characteristics of the cyber-bully/victim group that encourage more involvement in cyber-bullying (Brack & Caltabiano, 2014).

Estimates concerning cyber-bullying prevalence differ, with some studies making reports that 20-40% of children of school going age and adolescents experienced cyber-bullying in the position of a victim (Tokunaga, 2010), while around 2-21% have reported to being cyber-bullies themselves (Rasjauskas & Stoltz, 2007). While it has been suggested that cyber-bullying reduces as people get older (Sevcikova & Smahel, 2009), it has been shown that cyber-bullying...

Further, studies involving adults have used different methods (Zachilli & Valerio, 2011) or have included much bigger ranges in age (Sevcikova & Smahel, 2009) than have been seen in samples of adolescents. This has made it difficult to evaluate the suggestions. For instance, among non-adolescents, Sevcikova and Smahel (2009) discovered that just 10.7% reported that they had been cyber-bullied in their places of work. As regards to being the cyber-bully, it was reported by Zachilli and Valerio (2011) that just 3.6% of students in college noted that they have been involved in a form of bullying in college, while about 20% of the entire adults sample reported cyber-bullying behavior most of them being aged under 35. Few studies focusing on cyber-bullying among adults exist but it is apparent that the findings are varied amongst the studies (Brack & Caltabiano, 2014).
A background on cyber-bullying

The usage of the term 'bully' began a long time ago -- traceable to the 1530s (Harper, 2008). Basically, bullying involves an intimidator/bully and the victim. The victim is abused verbally, physically or through other methods so that the bully gets a sense of power and superiority over the victim. The actions might be direct (like face-to-face assault, hitting, etc.) or indirect (like gossip and rumors) (Donegan, 2012).

Survival is an instinctual desire and is common to all organisms. Survival is linked to competition because of the high number of species around and the limited resources available for them to utilize. From the beginning, organisms have instinctively competed and desired to outcompete other organisms so as to survive. This instinct has not changed even with the evolution of the species. Competition and the survival instinct can be identified in economic, social and educational realms. The competitive hierarchy, while common in several societies, is different with each society given the different traditions, ethical values, and the level of control that the government exerts. Unfortunately, the capitalistic society in the United States has pushed the agenda that wealth and success go together. This way of thinking has influenced the nation and bullying has unintentionally been instilled as a tactic for survival from childhood (Donegan, 2012).

From the instance a child in America joins grade school, he/she is taught to be the best s/he can. While this lesson might be innocent, it might morph as the children go on with their education. Some of the students adopt corrupt means of getting ahead in the very competitive educational system as well as the social environment. Bullying might also be adopted and may encompass pressuring other people to give them answers for their assignments so as to get better grades, which in turn leads to them going to better colleges. The tactics are dangerous since when a student realizes that they are effective, he or she may build a lifestyle around these tactics. Being a habitual bully can lead to negative effects on a large number of people and also corruption at places of work (Donegan, 2012).

Progression in technology is always associated with human advancement. Critical innovations like the Internet has changed the way humans interact. While such technologies come with their advantages, some disadvantages come with them and some people might make use of them to advance selfish goals that are not good for humanity. This is true, considering the evolution of bullying to an extent that it has been brought to online portals. Cyber-bullying is different from traditional bullying in that the bully can hide their identity. The anonymity allows the offender to attack the victim without seeing the physical responses he or she has. The distance created makes the offenders do even crueler things than they would otherwise do had physical contact been made (Donegan, 2012).

With the evolution of technology, bullying has increased. The advent of the internet and associated means of communication has given bullies an opportunity to assault other people (Subrahmanyam & Greenfield, 2008). AOL Instant Messenger supplemented chat rooms. Forums on the internet gave the youth a ground upon which they could assault one another. Forums and chat rooms have allowed people to spend several hours on the internet talking privately on the internet. The forums are always about subjects that interest the members of the group and this can include gossiping (Donegan, 2012).

There has been advancement in the areas of technology. The invention of the cell phones about half a century ago changed the way people communicate (Shiels, 2003). However, the devices were not owned by many people at the time. It is only until the 1990s that the second generation cell phones came around and their uptake exploded such that the…

Sources used in this document:
References

Adams, C. (2010). Cyber-bullying: How to make it stop. Instructor. 120(2), 44-49.

Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32, 265-277.

Boulton, M., Lloyd, J., Down, J., & Marx, H. (2012). Predicting undergraduates' self-reported engagement in traditional and cyber-bullying from attitudes. Cyber psychology, Behavior, and Social Networking, 15(3), 141-147.

Brack, K., & Caltabiano, N. (2014). Cyber-bullying and self-esteem in Australian adults. Cyber psychology: Journal of Psychosocial Research on Cyberspace, 8(2), article 7.
Center for Disease Control and Prevention. (2011a). Understanding bullying: Fact sheet. Retrieved from http://www.cdc.gov/violenceprevention/pdf/bullying_factsheet-a.pdf
Center for Disease Control and Prevention. (2011b). Bullying among middle school and high school students - Massachusetts, 2009. Morbidity and Mortality Weekly Report, 60(15), 465-471. Retrieved from http://www.cdc.gov/mmwr/preview/mmwrhtml/mm6015a1.htm
Far From Being Harmless, the Effects of Bullying Last Long Into Adulthood (2013). Retrieved from http://www.psychologicalscience.org/index.php/news/releases/far-from-being-harmless-the-effects-of-bullying-last-long-into-adulthood.html
Harper, D. (2008, October 10). Online etymology dictionary. Retrieved from http://www.etymonline.com/index.php?allowed_in_frame=0&search=bully&searchmode=none
Lenhart, A. (2010). Teens, cell phones, and texting. Pew Internet & American Life Project, Retrieved from http://pewresearch.org/pubs/1572/teens-cell-phones-text-messages
Pappas, S. (2013, February 20). The Pain of Bullying Lasts into Adulthood. Retrieved from http://www.livescience.com/27279-bullying-effects-last-adulthood.html
Shiels, M. (2003, April 21). A chat with the man behind mobiles. BBC News. Retrieved from http://news.bbc.co.uk/2/hi/uk_news/2963619.stm
Smith, P., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into cyber-bullying, its forms, awareness and impact, and the relationship between age and gender in cyber-bullying. (Research Brief no RBX03-06). Retrieved from http://www.education.gov.uk/publications/eOrderingDownload/RBX03-06.pdf
Subrahmanyam, K., & Greenfield, P. (2008). Online communication and adolescent relationships. The Future of Children, 18(1). Retrieved from http://140.234.17.9:8080/EPSessionID=e8bdf326b7d3eefecf6df508ffd832a/EPHost=muse.jhu.edu/EPPath/journals/future_of_children/v018/18.1.subrahmanyam.pdf
The Psychological Effects of Bullying and the Consequences of Bullying, (modified 2014, November 23). Retrieved from http://nobullying.com/the-psychological-effects-of-bullying/
U.S. Department of Health & Human Services. (2013). Bullying and children and youth with disabilities and special health needs. Retrieved from http://www.stopbullying.gov/at-risk/groups/special-needs/
Wang, J. & Iannottti, R.J. (2012). Bullying among U.S. adolescents. The Prevention Researcher, 9(3), 3-6. Retrieved from http://www.tpronline.org/download-free?article.cfm?id=603
When Teasing Turns to Bullying (n.d). Retrieved from http://www.hebron.k12.nd.us/files/2014/04/Bullying-Article.pdf
Zacchilli, T., & Valerio, C. (2011). The knowledge and prevalence of cyber-bullying in a college sample. Journal of Scientific Psychology, 12-23. Retrieved from http://www.psyencelab.com/images/The_Knowledge_and_Prevalence_of_Cyber-bullying_in_a_College_Sample.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber-Bullying Bullying May Be a Practice That
Words: 2037 Length: 8 Document Type: Research Paper

Cyber-Bullying Bullying may be a practice that has been around since the beginnings of human history, but with the increasing access that people have to technology a new medium is now used by aggressors. Cyber bullying is an act that involves using computers, cell phones and other sorts of media to consistently harass others. The object of the bullying, to cause physical or psychological damage to another, is the same, but

Social Media and Suicide Social Media Internet
Words: 2737 Length: 8 Document Type: Research Paper

Social Media and Suicide Social Media Internet has become a gadget of everyday use for people of 21st century. As it is offering many benefits to the users in terms of information communcaition, interaction, entertainment, socialization and earning livelihhod, there are certain dark factors related to it. The dark factors are as severe as forcing people to commit suicide. It is no exaggeration to mention that Intenet is used as a medium

Social Psychology
Words: 1591 Length: 5 Document Type: Research Paper

Social Psychology Statement of the learner intends to research What I would like to be informed about regarding social psychology is all the ways and applications in which this concept can be understood and applied. Not just in scholarly situations but in every-day activities, among friends, at work, or in social situation. Having a good understanding of any aspect of psychology for a student (or any alert person) in these times is

Social Networking Sites What a Secondary School Counselor Should...
Words: 1203 Length: 4 Document Type: Introduction

Social Networking Sites: Implications for Secondary School Counselors Social Networking Sites (SNS) first rose to popularity with teens with the advent of MySpace, in 2003, and Facebook, in 2004. The two web sites became widely used to communicate though messaging and online chatting and to share personal updates, photos, and music. Reviews by education researchers such as Gri-th and Liyanage (2008) suggest that SNS have immense value for promoting academic dialogue and

Social Psychology
Words: 3123 Length: 10 Document Type: Essay

Social psychology is the study of human behavior in social situations, showing how social pressures and sociological variables can impact psychological phenomenon such as identity, motivation, personality, or behavior. A quintessential topic in the field of social psychology is bullying. Bullying can be studied from a public health perspective, showing how the external variables such as how a school is designed and the leadership and organizational culture of the school

Bullying Warning Signs Tips to Help Kids
Words: 559 Length: 2 Document Type: Essay

Bullying Warning Signs TIPS TO HELP KIDS PREVENT BULLYING Cool Down -- Try to be calm when resolving conflict! Describe the conflict, try to be logical! What caused the conflict -- what can be done about it? Describe feelings during conflict! Listen respectfully, wait until other person has finished before talking! Brainstorm solutions TOGETHER Comes home with torn, damaged, or missing pieces of clothing, books, or other belongings; Has unexplained cuts, bruises, and scratches; Has few, if any friends, with

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now