Professional Documents
Culture Documents
me 2
0
Volu
G
&Contents
C Editorial ________________________________________________________iii
Marilyn Campbell
Articles
Cyberbullying: Labels, Behaviours and Definition in Three European ______129
Countries
Annalaura Nocentini, Juan Calmaestra, Anja Schultze-Krumbholz, Herbert Scheithauer, Rosario Ortega
and Ersilia Menesini
RI
&C
O
IT
ED
Editorial
Research on Cyberbullying
Welcome to this special edition on cyberbullying. The articles in the issue are from
early career and established researchers from Australia and Europe who attended a
training school entitled ‘From Research to Policy and Practice: Innovation and
Sustainability in Cyberbullying Prevention’, held in Melbourne in April 2010. The
training school was funded by COST, an intergovernmental framework for
European Cooperation in Science and Technology and the Australian Government
Department of Innovation, Industry, Science and Research (DIISR). The training
school was the first COST-funded school outside of Europe. This was also the first
training school in Australia for early researchers on cyberbullying as it is a concept
that Australia has not yet widely embraced. It provided an opportunity for early
career researchers (usually PhD and post-doc students) to learn from experienced
researchers in a particular field, as well as from each other. For the Europeans, the
training school gave advanced standing or credit towards their higher degree. It was
an opportunity for early career researchers to network as well as address, along
with other researchers, the main challenges facing the field of cyberbullying. This
opportunity would not have occurred without the support of the Australian govern-
ment in funding both Australian faculty and Australian early career researchers.
The field of cyberbullying is relatively new and there are many research difficul-
ties, such as agreement on definition, measurement issues and the most productive
methodologies for this area. Although the definition of cyberbullying is still not uni-
versally agreed upon, most researchers concur it is ‘an aggressive, intentional act
carried out by a group or individual, using electronic forms of contact, repeatedly
and over time against a victim who cannot easily defend him or herself’ (Smith,
Mahdavi, Carvalho, & Tippett, 2006, p.1). There is, however, still controversy
about the necessity for repetition in cyberbullying because of the medium’s ability
iii
▲
for the abuse to go viral. There is also debate about the concept of imbalance of
power in this form of bullying. Of course, until the definition is agreed upon, it is
difficult for research to be compared, especially the prevalence. Some researchers
have asked if students have ever received a nasty text message, and labelled this as
bullying, which it is clearly not. However, measurement issues, such as the benefits
of including a definition in cyberbullying surveys, the different frequencies of
cyberbullying (Every day, Every month or more often) and the time period reported
(In the last month, In the past year, Ever) make comparison of studies extremely
difficult. The use of methodologies other than surveys also needs to be explored in
relation to this research area. Of course, what practitioners want to know is how to
prevent cyberbullying and how to intervene. This involves all the aforementioned
problems that need to be resolved. However, as a society we want quick answers
and a quick fix. There are researchers worldwide who are now trialling intervention
programs for cyberbullying, but we need to be sure that these interventions are evi-
dence-based for positive outcomes before widespread implementation.
▲
The first article in this issue is by Annalaura Nocentini, Juan Calmaestra, Anja
Schultze-Krumbholz, Herbert Scheithauer, Rosario Ortega and Ersilia Menesini.
Their research examined students’ perception of the term used to label cyberbully-
ing, together with the perception of different forms and behaviours and of the cri-
teria used for its definition in three different European countries: Italy, Spain and
Germany. The following paper by Dorothy Grigg also looks at the definition of
cyberbullying by identifying words, terms and definitions used for internet and
mobile phone negative acts in both young people and adults in the United
Kingdom. Following is an article by Simone Paul using the Quality Circle approach
to discuss cyberbullying in a high school.
The next set of articles examines some of the issues in cyberbullying in an educa-
tional setting. Thomas Jäger, João Amado, Armanda Matos & Teresa Pessoa
obtained the views, not of students, but of experts and trainers on the issues of
cyberbullying. The article by Magdalena Marczak and Iain Coyne considers the
legal issues associated with cyberbullying in schools in the United Kingdom. A com-
parison between Australian and Austrian help-seeking behaviours of cyber-victims
and traditional victims is presented by Julian Dooley, Petra Gradinger, Therese
Shaw, Donna Cross, Dagmar Strohmeier and Christiane Spiel. It was found that in
both countries, students who were cyber-victimised compared to those who were
victimised by more traditional methods were less likely to seek help. Andreas
König, Mario Gollwitzer and Georges Steffgen examined the role of revenge and
retaliation as motives to engage in acts of cyberbullying and the implications this
has for prevention and intervention programs in the following paper. The last
article reports on a study by Donna Tangen and Marilyn Campbell comparing the
frequency of ‘traditional’ and cyberbullying of students who had been exposed to
Philosophy for Children for seven years of their primary schooling with a matched
sample of students who had no such exposure.
I hope you enjoy reading this issue and find it helpful in your work.
Cyberbullying knows no boundaries and is an international problem. This special
edition of the journal represents a significant outcome from members of the train-
ing school. It is gratifying therefore that international researchers are actively col-
laborating to attend to matters of prevention and intervention.
iv
▲
T
his study aims to examine students’ perception of the term used to label cyberbully-
ing, the perception of different forms and behaviours (written, verbal,
visual, exclusion and impersonation) and the perception of the criteria
used for its definition (imbalance of power, intention, repetition,
anonymity and publicity) in three different European countries: Italy,
Spain and Germany. Seventy adolescents took part in nine focus
groups, using the same interview guide across countries. Thematic
analysis focused on three main themes related to: (1) the term used to
label cyberbullying, (2) the different behaviours representing cyberbul-
lying, (3) the three traditional criteria of intentionality, imbalance of
power and repetition and the two new criteria of anonymity and public-
ity. Results showed that the best word to label cyberbullying is ‘cyber-
mobbing’ (in Germany), ‘virtual’ or ‘cyber-bullying’ (in Italy), and
‘harassment’ or ‘harassment via Internet or mobile phone’ (in Spain).
Impersonation cannot be considered wholly as cyberbullying behaviour.
In order to define a cyberbullying act, adolescents need to know
whether the action was done intentionally to harm the victim, the effect
on the victim and the repetition of the action (this latter criterion evalu-
ated simultaneously with the publicity). Information about the
129
▲
Since the year 2000, a new form of aggression using modern information and com-
munication technologies has attracted large attention in the media cross-nationally.
Led by Anglophone countries (e.g., Australia, United Kingdom and the United
Address for Correspondence: Annalaura Nocentini, Department of Psychology, Via S. Salvi, 12 – Padiglione 26,
50135 Firenze, Italia. E-mail: annalaura.nocentini@virgilio.it
▲
tradict this criterion and state that the victim is rather in a more powerful situation
than it would be in traditional bullying because they have the possibility to terminate
negative interactions easily. However, they allow that this might not be given con-
cerning the posting of information or negative comments in ‘public’ virtual places
(e.g., websites).
New cyber-specific criteria: anonymity and publicity. Anonymity that occurs when the
victim does not know the identity of the bully may increase feelings of frustration
and powerlessness (e.g., Dooley et al., 2009; Slonje & Smith, 2008) and may
reduce the need for power imbalance as a criterion (Fauman, 2008). Publicity — as
opposed to private exchanges between two parties — characterises the acts where a
large audience is involved (i.e., e-mails, SMSs, MMSs sent to a large audience, or
offences occurring in a public forum, or videos and pictures distributed via social
networking). In previous studies, students declared cyberbullying acts including a
large and public audience as the most severe type of cyberbullying (Slonje & Smith,
2008). Incorporating these two criteria (anonymity and publicity) may represent
cyberbullying more adequately than previous common definitions.
Method
Participants
Overall, 70 adolescents in nine focus groups took part in the study. Twenty-seven
adolescents were part of the Italian study, 23 participated in the study in Spain and
20 participants were recruited in Germany (for further sample details see Table 1).
Schools were selected using convenience sampling.
Materials and Procedures
Youths were invited to participate in a group discussion. The school staff was
instructed to select students who they thought would be comfortable in a group
setting. For all the students, their parents’ permission was requested. Nine focus
groups were held using the same interview guide across countries and they were
132
▲
conducted in the native language of the participants. The groups were conducted at
the students’ schools or a youth club, respectively; the moderator and the recorder
TA B LE 1
Sample Characteristics
Italy Spain Germany
Total 27 23 20
Gender distribution 20 boys, 7 girls 9 boys, 14 girls 11 boys, 9 girls
Age 16–18 12–13, 16 11–12, 12–13, 13–16
Number of focus groups 4 2 3
Recruited from School School Schools,
youth club
City Florence and Lucca Cordoba Berlin
Cyberbullying: Labels, Behaviours and Definition in Three European Countries
were the only adults present during the group discussion, except in the oldest
German focus group, which was assisted by the person in charge of the youth club.
Moderators and recorders were active in the field of psychology as psychology
researchers, young graduate psychologists or psychology students. In conducting
the focus groups, the guidelines of Krueger (1994) and Morgan (1988) were fol-
lowed. A moderator and a recorder greeted the adolescents as they arrived to par-
ticipate (Welcome). The moderator informed the youths about the purpose of and
procedure for conducting focus group (Our topic is ...). To facilitate the focus
groups, the moderator followed an interview guide that considered the following
sections: Opening Questions (participants presentations), Introductory Questions
(general introduction of the topic without using the term Cyberbullying), Key
Questions (see below), Ending Questions (leave students to discuss other topics if
they want to), Summary (the moderator try to give a summary) and Thanks/
Dismissal (thank students for their help and participation).
The structure of the focus groups followed three key questions: (1) Which is the
best term to label four scenarios describing different situations or behaviours that
could be considered cyberbullying or not? (see Table 3 for the scenarios descrip-
tion). For this purpose, four posters were presented describing four scenarios. For
each scenario we asked students to write or say the word considered as the best
term to label the scenario. (2) Do all the four typologies of behaviours represent
the cyberbullying construct? Referring to the four posters, we asked adolescents if
any differences existed between the scenarios, if one behaviour is more severe as
compared to the others, and if we can speak about different forms of cyberbully-
ing. (3) Are the three criteria for defining bullying (intentionality, imbalance of
power and repetition) relevant in order to define a cyberbullying act? Are the two
additional specific criteria for cyberbullying (publicity and anonymity) relevant in
order to define a cyberbullying act? This was investigated using one control sce-
nario (where no criteria were present) and five experimental scenarios, one for each
criterion (for the definition of criteria see Table 2). After the presentation of the
two scenarios for each criterion (i.e., for the criterion of intentionality: ‘Control:
M. sent a nasty text message to C. as a joke’; ‘Experimental: M. sent a nasty text
message to C. intentionally to hurt C’) we asked participants to discuss the differ- 133
▲
ence between them. Some of the questions proposed were: ‘Is there any difference
between the two scenarios? If yes, what are the differences? Are both scenarios
good examples of cyberbullying? Why?’
TA B LE 2
Definition of the Criteria Used in the Control and Experimental Condition
Criterion Control condition Experimental condition
All focus groups were audiotaped and lasted between 40 and 90 minutes,
depending on age and participants’ concentration. The audiotapes were transcribed
verbatim and the content of the text was coded in relation to the key questions in
the interview guide (Morgan, 1988). The report for each focus group was prepared
in a question-by-question format using amplifying quotes and a descriptive
summary. These coded statements were then compiled under general headings or
themes (e.g., adolescents’ term for each scenario): results by categories of individ-
ual focus groups were compared and contrasted. The main themes and quotes were
edited and summarised, reducing the transcripts to a more manageable size. We
selected the most descriptive quotes for each question, capturing the essence of the
conversation.
Results
Theme 1: The Label
Results will be presented separately for the four different scenarios. The specific
terms used in each country, including the words in the original language, can be
found in Table 3. Excerpts from the transcripts translated in English are included
to illustrate students’ perceptions and reasoning in the adolescents’ words.
Written-verbal behaviours. Some of the terms used for this behaviour in Italy
referred to more general constructs, such as abuse, stalking and psychological vio-
lence, whereas others described more specific behaviours, such as offences, threat
and blackmail. ‘Abuse’ was used to stress the repetition across time, while ‘stalk-
ing’ emphasised the persecuting nature of the behaviour. Psychological violence
was used to underline the indirect nature of aggressive behaviour, particularly to
exclude physical behaviour. In Spain, the majority of adolescents called this behav-
iour ‘harassment’. However, there were age differences when for younger students
the terms ‘nuisance’, and for older students ‘psychological damage’ or ‘abuse’,
seemed to be more relevant. The difference between harassment and nuisance lies
of the frequency of the behaviours: harassment is more frequent than nuisance.
Students in all three countries mentioned the label ‘bullying’ for this behaviour. In
134
▲
Germany, it was the first word that came to mind, followed by harassment and
‘knocking’ someone. Spanish adolescents mentioned that they had received school
sessions about bullying during the previous school year. They also referred to TV
programs and newspapers about the topic, as did the German participants later on
in the discussion. However, the Spanish participants could not agree on the exact
meaning of the term ‘bullying’. In contrast to the other countries, German partici-
pants emphasised the emotional level of the behaviour in friendships by proposing
terms such as ‘backstabbing’, ‘vicious’, ‘dishonest’ and ‘upsetting’.
It is bullying when someone sends a message to another person to ruin him. (Italy)
Bullying is a kind of harassment, like the abuse against women: the first is harass-
ment between peers, the second one is harassment against women. (Spain)
You probably hurt others with it. (Germany)
Visual behaviours. Apart from some of the previously used terms, Italian adolescents
also mentioned privacy violation, stressing the relevance of using other people’s pic-
Cyberbullying: Labels, Behaviours and Definition in Three European Countries
TA B LE 3
Examples of the Four Different Behaviours (Written–Verbal, Visual, Impersonation and Exclusion) and
Terms Used for Each Scenario — English and Original Language Words
Scenarios Italy Spain Germany
‘Take off from the Exclusion (esclusione), Exclusion (exclusión), Knock someone (runtermachen),
online group’ isolation (isolamento) contempt (desprecio), Put someone down
(exclusion) neglect (marginación), (fertigmachen),
discrimination Bullying (mobbing),
(discriminación), dissing (dissen),
evil (maldad), cyberbullying ,
teasing (fastidiar), (cyber-mobbing)
anguish (angustiar), Exclusion
bullying (bullying) (ausgeschlossenwerden)
135
▲
tures or images. The term ‘virtual bullying’ was spontaneously proposed in order to
differentiate bullying across contexts. Spanish participants also stressed the violation
of the personal image or intimacy, with both having the same meaning. The intention
to harm the victim was a very important aspect for their definition. The younger
Spanish students also proposed harassment, as did the German participants. Further,
German students labelled the behaviour bullying and also public humiliation, putting
their focus not on the intention, but rather on the effect, as compared to the Spanish
participants. The German students even created a new word for this: ‘photing’,
which represents a mixture of mobbing (the German term for bullying) and photos.
Virtual because you don’t show your own identity using these electronic means.
(Italy).
steal money (Germany) or identity theft more generally (Italy). Both Italians and
Spanish specifically labelled the behaviour as privacy violation. Further, Spanish
and German adolescents pointed out the aspect of betrayal when the act was com-
mitted by friends. One German group also mentioned an overlap with the visual
scenario as having access to someone’s password also gives the person access to
photos, videos and personal secrets.
It is a betrayal: it is not a crime but hurt. (Spain)
Theme 3: The Three Traditional Criteria of Bullying and the Two Additional Criteria
for Cyberbullying
Imbalance of power. As became evident from the discussion in all three countries, the
imbalance of power cannot be viewed independently of the intent to harm.
However, all participants agreed that if the victim is affected by the behaviour then
the behaviour constitutes bullying. The experimental condition may not be well
chosen though, as Italian adolescents pointed out that there is always a way to
defend oneself, such as asking for help. They suggested further aspects of power
imbalance as the cyberbully can be characterised by higher levels of technological
skills compared to the victim, but only in the case of more technological sophisti-
cated behaviour such as impersonation, and not for others. One German group
even went as far as to say that it is still bullying, even when independent of the
victim’s feelings, because they did not believe that the person in the scenario actu-
ally does not care, but rather interpret this as a protective function.
Cyberbullying: Labels, Behaviours and Definition in Three European Countries
Repetition. In all three countries the adolescents agreed that the criterion of repeti-
tion can differentiate between a joke and an intentional attack and it can charac-
terise the severity of the action. One of the German groups stated explicitly that the
behaviour cannot be unintentional if it is repeated. Thus, repetition and intention
are perceived as related. One of the German focus groups disagreed and said that
defining this behaviour as bullying does not depend on repetition, but rather on the
content of the text messages. Also, when the Italian moderator asked the Italian
participants to think about the visual scenario, where the behaviour is done once
but is then spread to a large audience through the internet, females said that it can
be damaging for the victim although it is a single act.
Given that in this case the picture was sent also to other people, even if it is done
once it can be very bad for the victim. (Italy)
It is harassment if it is repeated and it is constant, but if it is done once it is not
harassment. (Spain)
Yes, then it is not a joke anymore. (Germany) 137
▲
Publicity. For Italian males publicity can change the intention of the acts, connoting
blackmail or defamation. Italian females paid more attention to the relation
between anonymity, publicity and intentionality: for example, if the behaviour is
done by an anonymous person to a large audience, they cannot perceive if the act is
done intentionally or not. In all countries, students rated public cyberbullying as
the most serious incident, because of the role of the bystanders. The victims might
worry about what others think about them. However, this criterion is not necessary
to define bullying. In the German focus groups, each person receiving the informa-
tion about the victim seemed to be counted as an additional incident, manifested in
the terms used for this behaviour such as ‘mass bullying’ or ‘multiple bullying’.
If it is private it is blackmail; if it is public it is defamation. (Italy)
If it’s a joke between two friends, does not care; if other people are involved maybe
they can’t understand if it’s a joke or not. (Spain)
Discussion
The present study contributes significantly to our knowledge of adolescents’ under-
standing of cyberbullying and provides suggestions about which are the best behav-
iours to represent the construct and the relevant criteria to define the phenomenon.
Furthermore the cross-cultural comparison between the three non-English speaking
countries — Italy, Spain and Germany — is the first attempt to disentangle some diffi-
culties related to the use of English terms to label cyberbullying.
Overall, although the term ‘bullying’ emerged spontaneously through all the
focus groups in each country, the term ‘cyberbullying’ was spontaneously proposed
only by German adolescents (‘cyber-mobbing’). This could be related to the effec-
tiveness of an awareness-raising campaign in Germany, supported by the European
Union. Apart from this, the subject of cyber-mobbing has been covered widely and
regularly in the German media during the last year. In Italy, adolescents sponta-
neously proposed the term ‘virtual bullying’ and other terms involving electronic
138 bullying, internet or on-line bullying. However, at the end the majority of them
▲
chose ‘cyberbullying’. The best labels for cyberbullying in Spain were harassment
and abuse. These are the two terms most often used to label bullying behaviour
(Ortega et al., 2001) without any reference to the cyber or virtual network.
In line with the studies on bullying (Smith et al., 2002) cultural specificities for
the translation of bullying are still present; for example, the use of specific words in
each culture such as bullismo in Italy, acoso in Spain and mobbing in Germany. In
relation to the word ‘cyber’, results from focus groups suggested that not all the
adolescents need to differentiate bullying across contexts. Furthermore, the word
‘cyber’ is not widely used by adolescents, particularly in Latin languages, although
it is present in each dictionary.
Thus, trying to answer to the key question which term best to use to label cyber-
bullying in each country we propose to use cyber-mobbing in Germany, virtual or
cyber- bullying in Italy, and harassment or harassment via Internet or mobile phone
in Spain.
Cyberbullying: Labels, Behaviours and Definition in Three European Countries
ticipants in Italy and Germany paid attention to the relation between repetition
and publicity: if the act is public and thus it is sent (or showed) to several people,
although it is done only once this can be considered as done several times. The
terms proposed by German adolescents well represent this meaning: ‘mass bullying’
or ‘multiple bullying’. The other two additional criteria, anonymity and publicity,
do not constitute a requisite for labelling an action as cyberbullying, but they are
relevant because they connote the severity and the nature of the attack and the
victim reaction. Overall, we think that the results associated with the criteria used
for the definition of cyberbullying are particularly relevant. It seems that in order
to define a cyberbullying act, adolescents need to know if the action is done inten-
tionally to harm the victim, the effect on the victim, and the repetition of the action
(this latter criterion evaluated simultaneously with the publicity). Our results par-
tially confirm the necessity of the three traditional criteria used to define bullying.
In particular, it seems that intention is needed, together with the effects on the
victim. Repetition is needed, with the exception of public behaviours. Definitions
proposed by the literature for power imbalance in the cyber context (Hinduja &
Patchin, 2007; Menesini & Nocentini, 2009a) were not supported by our results.
Thus we may ask whether the problem is the definition of power imbalance or if
this criterion is appropriate in order to define a cyberbullying act. In relation to the
new criteria proposed by the literature, anonymity and publicity, our results
suggest that they are not necessary to label an action as cyberbullying, but they can
connote the context (the severity and nature of the attacks, the relationship
between actor and victim, the victim’s reactions).
In conclusion, the present study gives some relevant suggestions to researchers
and practitioners working on cyberbullying with adolescents. Using the same
words and the same defining aspects as adolescents do to call and to describe this
phenomenon can help adults to better understand what is the meaning, the nature
and the severity of the cyber attack, in order to suggest appropriate guidelines and
intervention strategies. The use of the same qualitative methodology across coun-
tries resulted in a useful strategy to compare terms and definitions of cyberbullying
across three non-English speaking countries. In spite of these strengths, the study
also has some limitations. First, the small number of participants for each country
and the convenience sampling limits the generalisability of the results. Second, dif-
ferences in ages across countries can affect results; however, we found similarity
across countries although different ages characterise the samples. Finally, cultural
aspects related to the European regions can be present and they cannot be gener-
alised; for instance, we might ask if results related to the impersonation typology
can be the same for other non-European cultures.
Acknowledgments
The authors acknowledge the COST Action IS0801 ‘Cyberbullying: Coping with
negative and enhancing positive uses of new technologies, in relationships in educa-
tional settings’, the Training School ‘From research to policy and practice: Innovation
and sustainability in cyber bullying prevention’ (funded by the COST Action
IS0801), and the Australian Government Department of Innovation, Industry,
Science and Research, for making this collaboration possible. Anja Schultze-
140
▲
Krumbholz and Herbert Scheithauer thank Jana Fiebig (2010) and Jonas Höher
(2010) for their invaluable support in recruiting participants and collecting data.
References
Belsey, B. (2005). Cyberbullying: An emerging threat to the ‘always on’ generation.
Retrieved Jan 14, 2010, from http://www.cyberbullying.ca/pdf/Cyberbullying_Article
_by_Bill_Belsey.pdf
COST Training School. (2010). Personal communication — Discussion group at the
Training School ‘Research to policy and practice: Innovation and sustainability in
cyberbullying prevention’, hosted by P.K. Smith, G. Steffgen, M. Valimaki, E. Menesini,
P. Slee, D. Cross, M. Campbell & B. Spears. Melbourne, 11-16 April 2010.
Dooley, J.J., Pyzalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying - A
theoretical and conceptual review. Zeitschrift für Psychologie / Journal of Psychology,
217(4), 182–188.
Cyberbullying: Labels, Behaviours and Definition in Three European Countries
Fauman, M.A. (2008). Cyber bullying: Bullying in the digital age. The American Journal of
Psychiatry, 165(6), 780–781.
Fiebig, J. (2010). Anonymität und Öffentlichkeit — Eine Untersuchung der neuen Kriterien
zur Beschreibung des Phänomens Cyberbullying. Unpublished bachelor thesis, Freie
Universität Berlin, Berlin.
Fonzi, A., Genta, M. L., Menesini, E., Bacchini, D., Bonino, S. & Constabile, A. (1999).
Italy. In P.K. Smith, Y. Morita, J. Junger-Tas, D. Olweus, R. Catalano & P. Slee (Eds.),
The nature of school bullying: A cross-national perspective (pp. 140–156). London:
Routledge.
Garzanti. (2007). Il grande dizionario Garzanti della lingua italiana. Milan: Garzanti.
Hinduja, S., & Patchin, J.W. (2007). Offline consequences of online victimization - School
violence and delinquency. Journal of School Violence, 6(3), 89-112.
Hinduja, S., & Patchin, J.W. (2009). Bullying beyond the schoolyard: Preventing and
responding to cyberbullying. Thousand Oaks, CA: Corwin Press.
Höher, J. (2010). Cyberbullying: Eine Evaluation der Bullyingkriterien im Cyberspace —
Qualitative Auswertung von Gruppeninterviews mit Jugendlichen. Unpublished bache-
lor thesis, Freie Universität Berlin, Berlin.
Kowalski, R.M., Limber, S.P., & Agatston, P.W. (2008). Cyber bullying: Bullying in the
digital age. Malden, MA: Blackwell Publishing.
Krueger, R.A. (1994). Focus groups: A practical guide for applied research (2 ed.).
Thousand Oaks: Sage.
Langenscheidt. (2010). Fremdwörterbuch. Retrieved July 20, 2010, from http://services.
langenscheidt.de/fremdwb/fremdwb.html
Menesini, E., & Nocentini, A. (2009a). Personal communication (during the meetings of the
COST Action IS0801).
Menesini, E., & Nocentini, A. (2009b). Cyberbullying definition and measurement —
Some critical considerations. Zeitschrift für Psychologie / Journal of Psychology,
217(4), 230-232.
Morgan, D.L. (1988). Focus groups as qualitative research. Newbury Park, CA: Sage.
Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford, UK:
Blackwell.
Ortega, R., Del Rey, R., & Mora-Merchán, J.A. (2001). Violencia entre escolares:
Conceptos y etiquetas verbales que definen el fenómeno del maltrato entre iguales.
Revista interuniversitaria de formación del profesorado, 41, 95–113.
RAE. (2010). Diccionario de la lengua española. Advance of the twenty-third edition.
Retrieved July 14, 2010, from http://buscon.rae.es/draeI/SrvltConsulta?TIPO_BUS= 141
▲
3&LEMA=ciber
Schultze-Krumbholz A, Scheithauer H. (2009). Measuring Cyberbullying and
Cybervictimisation by Using Behavioral Categories – The Berlin Cyberbullying-
Cybervictimisation Questionnaire (BCCQ), COST ACTION ISO801 Workshop, Post
Conference XIV ECDP, 18–22 August, 2009, Vilnius, Lithuania.
Slee, P.T., Ma, L. & Taki, M. (2003). Bullying in schools. In J.P. Keeves & R. Watanabe
(Eds.), International handbook of educational research in the Asia-Pacific region (pp.
425–439). Dordrecht: Kluwer Academic Press.
Slonje, R., & Smith, P.K. (2008). Cyberbullying: Another main type of bullying?
Scandinavian Journal of Psychology, 49, 147-154.
Smith, P.K., Cowie, H., Olafsson, R.F., & Liefooghe, A.P.D. (2002). Definitions of bullying:
A comparison of terms used, and age and gender differences, in a fourteen-country
international comparison. Child Development, 73(4), 1119-1133.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child
Psychology and Psychiatry, 49(4), 376–385.
Spears, B., Slee, P., Owens, L. & Johnson, B. (2009). Behind the scenes and screens —
Insights into the human dimension of covert and cyberbullying. Zeitschrift für
Psychologie / Journal of Psychology, 217(4), 189–196.
Willard, N. (2003). Off-campus, harmful online student speech. Journal of School Violence,
2(1), 65–93.
Willard, N. (2007). Educator’s guide to cyberbullying and cyberthreats. Center for Safe and
Responsible Use of the Internet. Retrieved July 14, 2010, from http://www.cyberbully.org
/docs/cbctparents.pdf
Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Does online harassment constitute bullying?
An exploration of online harassment by known peers and online-only contacts. Journal
of Adolescent Health, 41, S51–S58.
142
▲
Cyber-Aggression: Definition
and Concept of Cyberbullying
Dorothy Wunmi Grigg
Goldsmiths University of London, United Kingdom
T
his study examined definitions and concepts of cyberbullying. It identified words,
terms and definitions used for negative acts on the internet and mobile
phones across different age groups in the United Kingdom. Young
people and adults’ (N = 32; age = 8–54) constructs and perceptions of
negative online behaviours were also reported. Focus groups and indi-
vidual interviews were employed using qualitative triangulation:
Thematic Analysis and Interpretative Phenomenological Analysis. The
study examined current definitions and concepts of cyberbullying and
how these differ in its findings; and considered different ways to foster
positive online behaviour for the context of practitioners. The concept
of cyber-aggression is used to describe a wide range of behaviours
other than cyberbullying. The findings indicate that there is a need to
include a broader definition in line with the current trend of a range of
behaviours that are common with internet and mobile phone usage.
■ KEYWORDS: definitions, concepts, cyberbullying, cyber-aggression
Using mobile phones and the internet for communication purposes is a fast and
reliable means of communication, particularly with the instant feedback they give
to the sender(s) of such messages. Examples of these are short messaging services
(SMSs; Gillespie, 2006) delivery status on mobile phones and ‘message sent’
reports of emails on the internet. On the one hand, mobile phones open possibili-
ties for verbal communications, independent of restrictions of mobility and porta-
bility that is associated with landline telephones. The internet, on the other hand, 143
▲
enhances communication across the globe via emails and/or chat rooms. While
these instances can be seen as advantages, some experiences can make the use of
mobile phones and internet more devastating than the enjoyment of the spontane-
ity they offer. Among such distressing experiences are receiving unwanted aggres-
sive messages (Smith, Mahdavi, Carvalho, Fisher, Russell et al., 2008; Vandebosch
& Van Cleemput, 2008), happy slapping (Smith et al., 2008); flaming (Gillespie,
2006; Smith et al., 2008), sexting (Bocij & McFarlane, 2003; Gillepsie, 2006;
Spears, Slee, Owens, & Johnson, 2009), and other forms of aggressive behaviours
using various media of communication (Slonje & Smith, 2008).
Address for Correspondence: Dorothy W. Grigg, Unit for Schools and Family Studies, Department of Psychology,
Goldsmiths’ University of London, 16 Lewisham Way, New Cross, London, SE14 6NW, United Kingdom.
E-mail: d.grigg@gold.ac.uk
▲
Some negative acts that have been identified within these media of communica-
tion are bullying, harassment, assault, abuse and stalking (Gillespie, 2006; Smith et
al., 2008; Dooley, Pyzaski, & Cross, 2009). In the United Kingdom, for instance,
cyberbullying has been used as a common phrase for most of these subsets of
aggressive acts. Cyberbullying is defined as ‘an aggressive intentional act carried
out by a group or individual, using electronic forms of contact, repeatedly and over
time against a victim who cannot easily defend him or herself’ (Smith et al., 2008,
p. 376). This definition follows traditional definitions of bullying (Olweus, 1993)
where one person or a group of people repeatedly demonstrate aggressive behav-
iour towards another person or group of persons with an ‘imbalance of power’
(Monks, Smith, & Swettenham, 2005; Menesini, Fonzi, & Smith, 2002).
In summary, both definitions share three common criteria and one difference:
First, traditional bullying and cyberbullying include an intentional harm and there-
fore can be seen as special cases of aggression (for aggression see Anderson &
Bushman, 2002; Krahé, 2001). Second, the imbalance of power is another common
aspect, which is an advantage of the perpetrator(s) of aggression. Third, repetition
of victimisation is seen as a common criterion for traditional as well as for cyber-
bullying. However, the difference to traditional bullying lies in the fact that in
cyberbullying, technological devices are being used for carrying out such aggressive
acts (Campbell, 2005; Slonje & Smith, 2008; Smith et al., 2008; Spears, et al.,
2009; Dooley et al., 2009).
Some researchers have suggested that there is a need to address the definition
issues within the area of aggression and bullying via communication devices
(Coyne, Chesney, Logan, & Madden, 2009; Menesini & Nocentini, 2009). I
suggest that the definitions of intended harm and the use of technological devices
are not controversial. This study therefore focuses on two criteria for cyberbullying
that merit more attention: the imbalance of power, and repetition.
Imbalance of Power
If a target of cyberbullying ‘cannot easily defend him or herself’, there exists an
144 imbalance of power in favour of the perpetrator(s) of the aggressive act. But how
▲
repeated by the primary offender that will, in other words, classify as cyberbully-
ing. However, when repetition is likened to the amount of time that the negative
contents are viewed or passed along by other people, it is suggested that perhaps
there is a need to include bystanders in this definitional analogy, as these online
acts are viewed by bystanders and may have been videoed by them. Thus, cyber-
bystanders can reinforce the harassment by passing on the information, or they can
support the victim by devaluing the negative behaviour or simply ignoring it (Smith
et al., 2008). Therefore, when we as researchers refer to a one-time act by the
primary aggressor, it may be plausible to include bystanders in the definition of
cyberbullying, due to the abovementioned ‘pass along’ nature. Research has also
shown that the role of definition may play a part in how civil, criminal and
common law punishment and policies could apply within cyberbullying (Bocij &
McFarlane, 2003; Gillespie, 2006). Consequently, extreme cases of aggressive inter-
net acts do go unpunished (Bocij & McFarlane, 2003; Gillespie, 2006; Spears, et
al., 2009). The definition of cyberbullying may ignore the seriousness of a particu-
lar behaviour, as pointed out in happy slapping and sexting, due to the unclear
concept as to who repeatedly carries out the negative acts.
Aims of the Article
Past and current researchers have looked at the impact of cyberbullying on stu-
dents’ interrelationships both at home and in schools (Smith et al., 2008; Slonje &
Smith, 2008; Menesini & Nocentini, 2009). Others have examined cyberbullying
experiences from the points of view of cyber-victims and even cyber-bullies and
practitioners (Campbell, 2005; Dooley et al., 2009; Spears et al., 2009); however,
there is no empirical study that has looked at terminologies used for such negative
behaviours from the viewpoint of pupils, students and adults. The aim of this
article is to determine what pupils, students and adults perceive as cyberbullying;
to examine the broad aspect of negative acts that occur with the use of mobile
phones and the internet; and to test participants’ knowledge about cyberbullying.
Definitions have focused on ‘unwanted messages’; it would be worth examining
this further by looking at a range of negative behaviours associated with internet
and mobile phone use.
It is proposed that it would be worth examining from a general perspective a
layperson’s overview of this phenomenon. It is not suggested that the lay notion
would elucidate our way of defining concepts, rather that it would help practition-
ers better understand the experience.
Methodology
A qualitative, interpretative approach, using purposive and convenience sampling
was employed.
Participants
N = 32, 8–54 years old.
146 Subsample 1:
▲
Procedure
Ethical approval was sought from the Department of Psychology Ethics Committee
at Goldsmiths University. Permission was also sought from various school authori-
ties to work with children in primary and secondary schools. Permissions from the
authorities involved were granted. Primary and secondary school participants were
selected from different schools in England. Interviews were carried out during
school visits. Some of the participants were selected by head teachers, while some
were selected by school program coordinators. Students signed additional consent
forms to give their approval for participating in the study.
The adult participants were recruited through online social networking sites
‘tagged’ and ‘FaceBook’. Participants were then added as ‘buddies’ and interviewed
on instant messaging Microsoft Network (MSN). This method of recruitment pro-
vided participants with the opportunity to remember some of the negative acts that
take place on the internet as they are within the area of research under investiga-
tion. Consequently, participants can easily be distracted and lose concentration
because of the absence of a face-to-face interaction. This was evident during three
of the interviews: a participant received a phone call and became unresponsive;
after a reminder ‘nudge’ (a form of tone alert that a message was waiting for a
response); he then apologised and wanted a reschedule. Another participant with-
drew from the study, saying he wanted a ‘nice’ chat instead. The last of the three
participants withdrew from the study because he was not comfortable giving his
name as a sign of consent to participating in the study.
With the young participants, the interview atmosphere was calm and relaxing, with
the option of light refreshments. All participants were fully informed of their rights to
withdraw from the study at any time if they wished to do so. They were advised to
turn off their phones. Adult participants were told to close down any other messaging
applications if applicable, so as not to get distracted during interviews. They confirmed
that there were no distractions before the commencement of interviews.
Mainly open-ended questions were used, with one exception: participants were
asked whether or not they used mobile phones and the computers for internet pur-
poses. The open-ended questions included: ‘What are the negative things that can
147
▲
happen with people using mobile phones and the internet?’, ‘What does cyberbully-
ing mean to you?’, and ‘How useful is the term “cyberbullying”?’ Participants were
prompted at appropriate times in order to encourage them to stay within the
parameters of the matter under investigation.
Individual interviews were undertaken with primary school and adult partici-
pants, and four focus group interviews were conducted with secondary school stu-
dents. The individual interviews lasted about 20 minutes on average, and the focus
group interviews lasted about 30 minutes each. At the end of each contact, partici-
pants were thanked for contributing to the study and received help sheets regarding
what to do and who to contact in cases of cyberbullying (see Appendix A).
Analyses
Thematic analysis (Milles & Hubberman, 1994) and Interpretative Phenomenolog-
ical analysis (IPA: Smith, 1995) were used for individual and focus groups inter-
views. Pupils’ and students’ interviews were recorded with a digital recorder, while
adult participants typed out their answers on the MSN chat window. Participants’
responses were typed using their own words, then the raw data were coded into six
content areas according to the focus of the six questions posed: whether or not par-
ticipants use mobile phones and or internet, identifying the negative acts that occur
in the use of mobile phones and the internet, describing and naming negative behav-
iours that can occur via mobile phones and internet, what can be done about nega-
tive behaviours that happen on the internet and mobile phones, the meaning of
‘cyberbullying’, and whether or not ‘cyberbullying’ is a useful term. Subthemes were
extracted from the codes to build on participants’ thoughts and feelings. Themes
emerged after several revisitations of coded data and subthemes. Finally, using these
themes and participants’ cases, the phenomena under investigation was interpreted.
The purpose of these combined methods is to enquire into the general perception
of the phenomena under investigation from participants’ own perspective, and to
give a richer and deeper qualitative meaning to the study. Thus, on the one hand,
thematic analyses gave an insight into the contents and themes that emerged within
a cyberbullying arena; from the participants’ perspective on the other hand, IPA
allowed for generalisation of cases by comparing and contrasting emerging themes
and their usage by participants (Smith, 1995). The IPA also allows for implicitness
of data to be explicit (Smith, 1995).
Results
The themes that emerged from each research question are demonstrated in Table 1.
Data were interpreted with selected cases, using similar case responses, so as to
avoid repetition and ambiguity of results. Themes are in italics.
Participants Use of Internet and Mobile Phones
Basic media knowledge: All participants’ answers were in the affirmative to this ques-
tion; they use both mobile phones and the internet for communication purposes.
Naming and Identifying Negative Acts that Take Place on the Internet and
Mobile Phones
148 Participants’ lists of negative behaviours were broad. These acts were described as
▲
TA B LE 1
Emerging Themes for the 6 Interview Questions
Questions Themes Subthemes
Man 38: ‘Abusive texts and phone calls, threats, unwanted messages.’
Man 43: ‘Personal attacks, aggressive language and threats, malicious and false
information being provided by others to undermine relationships.’
Describing Negative Behaviour From Participants’ Perspective
Anger and frustration in the participants’ tone of voice were deciphered, resulting
from the feeling of invasion of privacy. From the participants’ points of view,
people tend to act in a way they would not normally do on a face-to-face basis due
to the anonymity involved. There was no age difference in participants’ feelings in
describing these negative acts. The feelings are also the same across gender.
Invasion of privacy, anger and frustration:
Boy 8: ‘They are just nasty, upsetting, rude and false.’
149
▲
Girl 11: ‘Frustrating, hurtful, swearing … just upset the other person.’
Group 4: ‘They can be described as cowards because they do not say things to
people’s faces … they act immature and inappropriate.’
Woman 24: ‘Not very social behaviour … there could be chance that people can
act colder than they are in real life.’
Man 28: ‘It’s possibly exaggerated compared to how it would be face to face.’
Man 2, 28: ‘Cruel, vindictive, and sad. It’s usually done by people with low self-
esteem; cowardly … if they want to be negative they should have the decency to
say it to someone’s face rather than via a phone.’
Man 29: ‘Hostile, inappropriate behaviour … people say things they wouldn’t say
to a person’s face …different personality when using remote technology.’
Man 42: ‘It is criminal act and also frustrating.’
Man 43: ‘I think it is fraudulent, especially when they try to steal your details for
their own selfish purposes.’
Media knowledge:
Boy 10: ‘Fighting on the internet.’
Boy 11:‘Bullying on the internet and mobile phones.’
Group 2: ‘On internet forums, people can talk nasty to you, they can easily attack
personally.’
Group 4: ‘Bullying over the internet or mobile phones.’
Man 29: ‘Using internet as a tool for bullying as well as phones, not just through
texts and calls … it’s now happening through applications — you can download
them.’
Man 38: ‘Bullying via the internet.’
Man 38: ‘I don’t know what it means.’
Man 43: ‘I have no idea what cyberbullying is.’
Man 54: ‘Nothing, never heard of it.’
Definition and Concept of Cyberbullying
Discussion
It is apparent that there are various acts that take place via mobile phones and 151
▲
internet beyond the scope and concept of cyberbullying, like hacking into people’s
accounts, changing passwords to pose as the original owners so as to send
unwanted messages to potential victims; targeting actions of people and businesses;
downloading and uploading viruses. The results suggest that various aggressive
acts can occur when people are involved with mobile phone and internet communi-
cations. Some of these acts are cyberbullying, others are forms of aggressive acts,
and some are neither bullying nor aggression. Nevertheless, the findings support
previous research that describes negative internet behaviours as upsetting and psy-
chologically frustrating.
Generally, it is apparent that owning a mobile phone or having a computer with
internet access creates an avenue not only for positive experiences, but can also
render one vulnerable in the sense that having these media of communication may
allow for invasion of privacy by receiving unwanted contents and messages at any
time of the day at the whim of the perpetrator. The sense of vulnerability can be
and adults. It is recommended that future studies use more female participants
among the adult samples, so as to determine whether or not there would be dif-
ferences in perception of the measured phenomenon. Also, as cyber-aggression is
intended to cover online activities that are not considered acts of bullying, it
would be interesting to have some data that attempts to categorise these in future
research. Furthermore, in terms of its methodology, the application of online
methods for qualitative analysis may not have the same effect that face-to-face
interviews may have on participants in terms of the tone of prompts, probes and
body language analysis.
Following from the findings are some ideas for prevention of cyberbullying and
cyber-aggression. Research on prevention and intervention of cyberbullying is at its
early stage, therefore only few insights for empirically established measures of
reduction of aggression and bullying via internet or mobile phones exist (Menesini,
2009). For example, Pfetsch, Steffgen and König (2009) highlighted that banning
mobile phones at school will neither reduce the frequency of mobile phone use nor
the prevalence of cyberbullying inside or outside of school. Therefore, a complete
ban of mobile phones and internet at school will not solve the problem. However,
preventive and educational measures should combine to set a functional founda-
tion embedded in School Charta and Policy so as to express a zero tolerance for
cyber-aggression and cyberbullying (Pfetsch, 2010). These processes should encom-
pass the participation of teachers, school governors, heads of school and students,
and may be supplemented by technological approaches like password protection of
school computers and filter software for internet browsers (Pfetsch 2010).
Curricular materials focusing on media literacy and cyberbullying could raise
awareness among students about the consequences of cyber-aggression and effec-
tive ways to deal with it. This may also include training in media competencies and
the positive use of communication technology, like a video film project or school
radio project (Pfetsch, 2010). Furthermore, general prevention of traditional bully-
ing and aggression can help sustain specific proactive measures against cyberbully-
ing — for example, fostering a positive school climate, developing prosocial class
rules, and training in constructive conflict resolution (see Wilson & Lipsey, 2007,
for an overview). If schools were effective in establishing a prosocial and helping 153
▲
norm system among all students, the prevalence of aggression may diminish
(Pfetsch, 2010). For example, in an evaluation study of over 1000 participants, stu-
dents reported significantly less passive bystanding behaviour, more cognitive and
affective empathy, and less victimisation among students. By transferring these
ideas to the prevention of cyber-aggression, schools could foster cyber-civil courage
of online or offline bystanders of cyberbullying and cyber-aggression. Also, peers’
support for cyber-victims may be a promising way to counteract cyberbullying and
cyber-aggression (Smith et al. 2008).
In general, cyber-aggression and cyberbullying are quite prevalent among chil-
dren and youth (e.g., Ybarra, Diener-West & Leaf, 2007; Steffgen, Pfetsch, König
& Bredemus, 2009; Slonje & Smith, 2008; Smith et al., 2008) and all persons
involved can be affected negatively (Gradinger, Strohmeier & Spiel, 2009; Ortega,
Elipe, Mora-Merchán, Calmaestra, & Vega, 2009). Therefore, practitioners should
not relent in their actions against these negative human phenomenon.
References
Anderson, C.J., & Bushman, B.J. (2002). Human aggression. Annual Review of Psychology,
53, 27–51.
Baron, R.A., & Richardson, D.R. (1994). Human aggression (2nd edition). New York: Plenum.
Berkowitz, L. (1993). Aggression. Its causes, consequences and control. New York:
McGrath-Hill.
Bocij, P., & McFarlane, L. (2003). The technology of hate. Police Journal, 76, 204.
Campbell, M. A. (2005). Cyber-bullying. An old problem in a new guise? Australian Journal
of Guidance and Counselling, 15, 68–76.
Coyne, I., Chesney, T., Logan, B., & Madden, N. (2009). Griefing in a virtual community:
An exploration survey of second life residents. Zeitschrift für Psychologie/Journal of
Psychology, 217(4), 214–221.
Dooley, J.J., Pyzalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A
theoretical and conceptual review. Zeitschrift für Psychologie/Journal of Psychology,
217(4), 182–188.
Geen, R.G. (2001). Human aggression (2nd ed.). Buckingham: Open University Press.
154 Gillespie, A.A. (2006). Cyber-bullying and harassment of teenagers: The legal response.
▲
Monks, C.P., Smith, K.P., & Swettenham, J. (2005). Psychological correlates of peer victimi-
sation in preschool: Social cognitive skills, executive function and attachment profiles.
Journal of Aggressive Behaviour, 31, 571–588.
Olweus, D. (1993). Bullying at school: What we know and what we can do. Cambridge,
MA: Blackwell.
Ortega, R., Elipe, P., Mora-Merchán, J.A., Calmaestra, J., & Vega1, E. (2009). The emo-
tional impact on victims of traditional bullying and Cyberbullying. A study of Spanish
adolescents. Zeitschrift für Psychologie/Journal of Psychology, 217(4), 197–204.
Pfetsch, J. (2010). Zivilcourage in der Schule. Konzeption und Evaluation eines
Zivilcourage-Trainings zur Prävention aggressiven Verhaltens unter Schülern [Civil
courage in schools. Development and evaluation of a bystander intervention training
for the prevention of aggressive behaviour among students]. Doctoral dissertation,
University of Luxembourg.
Pfetsch, J., Steffgen, G., & König, A. (2009, November). Banning solves the problem!?
Effects of banning mobile phone use in schools on cyberbullying. Poster presentation at
the 14th Workshop Aggression, 2009, Berlin, Germany.
Slonje, R., & Smith, P.K. (2008). Cyberbullying: Another main type of bullying?
Scandinavian Journal of Psychology, 49, 147–154.
Smith, J.A. (1995) Qualitative Psychology: A practical guide to research methods. London:
Sage.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child
Psychology and Psychiatry, 49(4), 376–385.
Spears, B., Slee, P., Owens, L., & Johnson, B. (2009). Behind the scenes and screens: Insights
into the human dimension of covert and cyberbullying. Zeitschrift für
Psychologie/Journal of Psychology, 217(4), 189-196.
Steffgen, G., Pfetsch, J., König, A., & Bredemus, L. (2009). Cyberbullying among school
aged children in Luxembourg. Poster, Abstract in COST Action IS0801 Workshop
Cyberbullying: Definition and measurement (p. 25). Vilnius, Lithuania: Mykolas
Romeris University Publishing Centre.
Tajfel, H., Billig, M., Bundy, R.P., & Flament, C. (1971). Social categorization and inter-
group behavior. European Journal of Social Psychology, 1(2), 149–178.
Vandebosch, H., & Van Cleemput, K. (2008). Defining cyberbullying: A qualitative research
into the perceptions of youngsters. Cyber Psychology & Behaviour, 11, 499–503.
Wilson, S.J., & Lipsey, M.W. (2007). School-based interventions for aggressive and disrup-
tive behavior. Update of a meta-analysis. American Journal of Preventive Medicine,
33(2S), S130–S143. 155
▲
Ybarra, M.L., Diener-West, M., & Leaf, P.J. (2007). Examining the overlap in internet
harassment and school bullying: Implications for school intervention. Journal of
Adolescent Health, 41, S42–S50.
Appendix A
156
▲
Addressing Cyberbullying in School
Using the Quality Circle Approach
Simone Paul, Peter K. Smith, and Herbert H. Blumberg
Goldsmiths, University of London, United Kingdom
C
yberbullying has become a significant area of concern, yet research is still at an
early stage. The Quality Circle approach allows explorative analysis
of cyberbullying in school settings by identifying issues for further
consideration. In this study of cyberbullying in one UK secondary
school, Quality Circle participants were required to establish a small
anti-bullying taskforce, and then with the guidance of a facilitator,
embark on a problem-solving exercise over a period of time. The
process involves identifying key issues and prioritising concerns,
analysing problems and generating solutions, through participation
in a series of themed workshops. Six Quality Circle groups were
formed, and the work produced during practical activities was docu-
mented and discussions recorded as evidence of emerging themes.
The areas of interest regarding cyberbullying were the differing per-
ceptions reported by each representative group, and collectively the
range of problems and solutions identified.
■ KEYWORDS: bullying, cyberbullying, quality circles, school
(ECM) aims are defined as ‘be healthy, stay safe, achieve economic well being,
enjoy and achieve, and make a positive contribution’. The reduction of incidences
relating directly to bullying is linked with two outcomes within the ECM frame-
work. A prerequisite of ‘stay safe’ is that ‘children and young people are safe from
bullying and discrimination’. Another detail in ‘make a positive contribution’ refers
to the importance of ensuring ‘children develop positive relationships and choose
not to bully or discriminate’. Schools’ collaboration with support service providers
is anchored in improving outcomes and inspectorates judging the ability of educa-
tional institutions to meet these targets.
Address for Correspondence: Simone Paul, Psychology Department, Unit for School & Family Studies, Goldsmiths,
University of London, New Cross Gate, SE14 6NW, United Kingdom. E-mail: psp01sp@gold.ac.uk
▲
Similar recommendations were also made during a review of effective action taken
by secondary schools in the prevention of bullying by the Office for the Standards
Addressing Cyberbullying in School
Methods
The primary source of information gathered was in the form of QC project ideas
and work produced by students during each session. Additional consideration was
given to the anecdotal evidence from group discussion transcripts and comments
reported by the whole school survey. This highlighted key issues of concern by
noting responses to questions regarding bullying and cyberbullying problems.
Education Setting 159
▲
This was a secondary school with academy status, educating approximately 900
male and female students aged between 11 and 18 since September 2007. The
borough in which the school was located ranked as the 9th most deprived of 33 in
London, with 80% of secondary students of non-British background, 60% speak
English as a second language, and 36% eligible for free school meals; these
socioeconomic indicators are also representative of the student population in the
school studied.
The school is part of a new educational enterprise that engages in positive use of
technology to promote prosocial behaviour, using a computerised database for
reporting student conduct and performance and an online electronic reward
scheme for pupil behaviour modification. The student population is divided verti-
cally to incorporate all the year groups into three houses. This enables students to
develop a sense of identity, include a wider age range in their social networks, and
strengthen peer-support systems. Students follow an integrated curriculum with
Results
An overview of project work is provided, along with themes identified through
group discussions and school survey. Detailed information about each QC is
addressed in the case studies, including a summary of group membership along
with highlights of group discussions and project proposals.
Project Proposals
Each group was directed to produce three project proposals for consideration and
then collect votes for the most popular idea from other students and teachers. The
161
▲
Student Perspective
Notable information obtained from recorded group discussions (five transcripts
lasting approximately 30 minutes each) and whole school survey (21 respondents)
reflected a similar perspective and incorporated into a general overview below. In
subsequent results sections the anecdotal evidence collected from each QC group
work will be provided and presented in the form of individual case studies. Each
summarise qualitative information obtained during the initial problem analysis
stage and the process involved in completing the solution formation and project
planning stages.
With regard to general bullying, the overwhelming response noted was of verbal
bullying. Students casually rely on racist, homophobic, sexually explicit or offen-
sive language to communicate with each other. ‘Cussing matches’ are a regular
occurrence with insulting remarks most commonly relating to cultural heritage or
physical appearance. This event is generally tolerated by the students and not nec-
162 essarily considered as bullying; the teachers are typically unaware of this due to the
▲
range of slang words being used. This activity is often initiated as an attempt to
introduce humour but will frequently escalate and other methods of bullying
become evident such as physical (to conclude) or cyber forms (to prolong the argu-
ment). Cussing is not necessarily considered a form of bullying but instead as a
platform for promoting other forms of bullying and therefore identified as a
problem for the students.
The greatest cause for concern with regard to cyberbullying was hacking into
and misusing personal computer accounts or mobile phone records. The popularity
of instant messaging picture images is a cost-free communication available through
Bluetooth on mobile phones. A growing problem was reported whereby hacking
devices activate mobile phone handsets to cause unnecessary distress to others or
disruption to learning in class, with the owner powerless to prevent this. The
general attitude towards cyberbullying is light-hearted and taken with good
humour by the recipients; harassment through this method is not necessarily
Addressing Cyberbullying in School
regarded as bullying by students. Abusive emails are frequently sent via the school
computer system; students consider this to be more of a nuisance than bullying.
‘Prank calling’ is perceived as an amusing activity to prevent boredom and the
recipients react more with anger rather than fear. Sending videos and picture
images are of huge entertainment value during the school day; participation in this
activity is rife and few consider themselves victims.
QC Case Studies
Collectively, QC groups suggested the school consider introducing the following
ideas: security spot checks, bag searches and handheld metal detectors, classrooms
scanned to detect activated Bluetooth devices, a free phone number for offensive text
messages to be passed on, themed school assemblies and lessons run by students,
lunchtime and after school activities for bullies and victims to attend together, safe
places for vulnerable students and private areas for distressed students.
WAC. The youngest group initially presented challenging behaviour but quickly
gained enthusiasm and engaged in self-directed learning. As part of the discussion
about general bullying issues, the group considered physical fighting to be the most
common form, this was thought to happen most often at lunch because the system
in place causes long wait times, resulting in aggressive pushing and shoving. During
the discussion about cyberbullying problems, students revealed mobile phones are
used most often to send threatening messages and hurt emotions. The reasons were
believed to be different for prank calls (‘Wind people up, to be funny or cause psy-
chological damage’), text messages (‘Don’t want to fight but want to get at the
person’, ‘Bit scared and don’t want to get in trouble’), and Video Imaging
(‘Humiliate the person to show that they are weak and prove it to other people’).
When deciding on the final project proposal, students made preparations for
changing the lunch line and were very excited to put this idea into place, with
detailed plans drawn up. After completing the school opinion poll they began to
work on the idea with the most votes: a room with privacy for distressed students
to compose themselves. As the structure of the program only permitted a set
number of sessions to complete work, this limited the potential for these ideas to
be realised and instead the students changed the agreed project for the more man-
163
▲
ageable option of designing bully boxes. Each student created one mailbox, to be
made available for everybody in the academy to report problems and concerns
anonymously and confidentially.
Anonymous Speakers. The largest group from the same class required continuous
autocratic leadership, direction and motivation. QC interactions were marked by
constant bickering and competition for power, thus hampering progress in com-
pleting final project work. As part of a group discussion about general bullying
issues, verbal bullying was believed to be most common ‘because teachers don’t
understand the slang words so students can get away with cussing each other’ and
racism in the academy is considered to be caused by ‘the different nationalities in
London all inside the school building’ and ‘the uniform makes every one wear the
same clothes so people look at other things like appearance’. During the group dis-
cussion about cyberbullying problems, students revealed text messaging and
picture imaging happens most often because it is cheap or free depending on the
mobile phone contract. Text messages are sent at break times when students can
move around the school and get reception, pictures are often taken when students
are unaware and images are sent to cause ridicule. When deciding on the final project
proposal, the group collected most votes for the bully club and even gained support
from teachers willing to volunteer time to run this with students. The QC group
believed this idea was being piloted already in school and felt that addressing racism
instead would deal with the matter of greatest concern in the school community. The
individual group members broke into smaller pairs to take on parts of the anti-bully-
ing booklet and produced different sections including; a glossary of terms used in
cussing and racist words, two stories about racist bullying, a case study report about
victims of racist bullying in the academy, and information about verbal bullying in
school from peer group surveys detailing responses from over 60 students.
Purple HAZL. These students developed a cooperative approach to working
together, despite the suspension of one member; they adjusted and overcame the
temporary disruption. The group also responded well to facilitation and required
little motivation to complete work independently. As part of the discussion about
general bullying issues, students identified the main problem was verbal bullying,
such as stirring and gossiping, cussing and racism. The group believe students do
this to prevent boredom, to have fun and be entertained. This happens when the
teacher is not in the class but will still occur if learning support or supply teachers
are present, and when outside for free time. It can ‘get serious and out of control’ a
lot of the time when onlookers are ‘bigging up’ the situation and this can also lead
to physical fights. During the group discussion about cyberbullying problems, stu-
dents considered email to be the most popular method, used mostly for gossiping,
hacking, cussing, sending nasty pictures, rude web links or viruses. This can be for
fun, to start fights by ‘mixing things up’, to annoy or embarrass someone, and for
retaliation ‘if the student is scared of the person because they are bigger or older and
they can’t be caught’. The student email support team was selected in response to the
reported need of the general student population. The QC group began investigating
the problem by interviewing the IT department, to discover that no abusive filter
exists and no designated member of staff monitored student emails for inappropriate
content. The group set up an anonymous inbox whereby students could forward
164
▲
emails to this designated account for peer review and reporting to senior staff.
Brite Starz. A group consisting of strong independent characters from the same
class, these students responded best to facilitator guidance instead of leadership.
The students agreed to participate but declined to engage in many of the activities
and instead selected one solution for top-down analysis. Students declined to par-
ticipate in the recorded group discussion activity about general bullying issues and
cyberbullying problems. Instead students reported concerns about knife crime and
the pressure to join gangs. They believed this was a problem because young people
are bored, so they hang around outside and get involved in the wrong friendship
groups. They then feel under pressure to get respect by fighting other gangs and
they carry knives to feel safe and protect themselves from other gang members.
Students designed a survey to find out more about why people carry knives and
decided that the way to reduce knife crime is to get people off the streets, away
from the gangs and encourage friendships by holding free time activities. The film
Addressing Cyberbullying in School
club was invented to educate young people on negative impact of crime and
encourage positive relationships. The group produced posters advertising the
lunchtime film club for students. The films selected were appropriate for the age
group and were screened during lunchtime.
Yungah Goonz. This was a well-established friendship group from the same class, self-
motivating and readily engaged in task completion, without the explicit direction of
the facilitator. These students required little guidance after group commitment to par-
ticipation was initially challenged. As part of group discussion about general bullying
issues, physical bullying was thought to be the most common activity resulting from
confrontation and the need to gain respect. Interestingly, verbal bullying also seemed
to act as a catalyst, whereby a cussing match that began as ‘something funny’ then
‘goes too far and gets personal’. This can happen in the playground (especially in the
lunch line), classroom and areas in the school building (e.g., staircase, corridors, or
toilets) and even if broken up will continue at a later date for students to save face.
The discussion about cyberbullying problems revealed a more common activity was
sending picture images and videos from mobiles via MSN. This can be for entertain-
ment (spread across social groups to ridicule and laugh at a victim), for ‘talking up’
‘hyping’ and saving face, or to scare and frighten someone. Sending images via MSN
gets noticed more than text messages and also attaches credit to the sender ‘people
get respect for knowing the sender and this stops other people getting rude to them’.
When deciding on the final project proposal, students opted to conduct a student
survey on prank calling. The group developed a questionnaire about prank calling,
which they handed out to 30 students. A third of respondents said they had been
prank-called in the past, and the typical reported response to this was anger; a third
also admitted to prank calling someone for fun because they were bored. The main
source of information for obtaining a number to prank call was through social net-
working sites, mutual friends, or hacking into personal details held on school
records.
Special MNAM International People. The oldest group and the largest number from
different classes, this presented problems during formation, but the maturity of
group members prevailed. Timetabling also disrupted QC meetings on a regular 165
▲
basis, yet project work was partially completed despite this setback. As part of the
discussion about general bullying issues, verbal bullying was revealed as the main
problem. Cussing occurs because ‘students are bored and have nothing better to
do’, ‘they want to show off and be funny’, ‘they are angry or have problems at
home’ and ‘want to make themselves feel better by taking it out on other people’.
During the group discussion about cyberbullying, MSN Instant Messenger was
considered to be the most popular way of ‘stirring up trouble’ by copying people
into gossip conversations to spread nasty lies or rumours: ‘Students want to start
trouble because they are bored and want excitement, they might be scared to do it
face to face and chose this bullying method because it is faster’. When deciding on
the final project proposal, the group collected most votes for the undercover report
on bullying. Questions were developed for student interviews with voices recoded
to protect anonymity. The interviews were to be typed up and presented in an
undercover report-style information leaflet to help educate everyone in school
about the problems of cyberbullying. Unfortunately, the group was unable to fully
complete this project in the time available.
Discussion
Qualitative information was gathered regarding general bullying, cyberbullying
and antisocial behaviour in school. Information was collected from a range of
sources incorporating the examination of evidence for themes emerging during
recorded group discussions, problems identified by the whole school survey, and
the solutions presented by QC project ideas. A summary is presented for the effec-
tiveness of QC methodology as measured by the impact of intervention for QC
participants and the forms of antisocial behaviour in school with particular refer-
ence to characteristics of cyberbullying.
Quality Circles
The feedback from staff and students regarding the impact of this approach on
the school community was positive and encouraging, although preventative
measures require a more educational aspect to inform teachers of the point in a
cussing situation where verbal bullying begins to take place and when escalation
to other forms may arise. In addition, the possible reduction of cyberbullying
may occur through peer education about the lasting negative impact these activi-
ties may have on the victims.
The influence of this work on participants themselves was assessed through a
database of student behaviour records. Analysis of incidents logged by teaching
staff indicated an overall reduction in the number of negative reports and increase
in positive reports during the time since students commenced participation in the
program. An interesting pattern emerged within each group; the most notable
change was evident in Y8 groups sharing an increase in positive behaviour records,
and a slight positive change in Y7 and Y9, demonstrating the opposite, with an
increase in negative behaviour reports. The general improvement in behaviour
might be a naturally occurring change and not attributed to participation but
remains a noteworthy finding worth further exploration in future research.
166
▲
Each group and the individual members presented a unique set of challenges and
potential learning opportunities. Establishing and maintaining QC groups proved
to be most demanding, although once project ideas had taken form, students were
able to self motivate and undertake project work with minimal facilitator contribu-
tion. The level of involvement required for this method of investigation highlights
the need for a standardised approach to ensure the direction of QC projects are not
unwittingly influenced by experimenter bias when working with impressionable
young people.
Cyberbullying
Overall findings about general bullying in the academy based on information
reported by QC groups is that of verbal bullying in the form of ‘cussing’, namely
insulting remarks, frequently with racial undertones. Cyberbullying appears to take
the form of activities enabled through use of Bluetooth as a convenient method of
sharing inappropriate picture or video images. Another opportunistic activity
Addressing Cyberbullying in School
Conclusion 167
▲
Managing the initial stages of the QC process was essential for establishing the
solution-focused approach; similarly, maintaining a positive focus required contin-
ued guidance and group mediation. Conversely, the student-led proposals relating
to anti-social behaviour in school produced a wider range of new ideas and alterna-
tives (creating an alternative lunchtime queue system, designing a bully hat to iden-
tify bullies and victims, introducing a new break time, hall monitor rota). This
non-directional approach, allowing students a free choice in developing plans,
demonstrates how anti-bullying QC groups can differ considerably and requires
further consideration in analysis, but the possibility of results varying quite drasti-
cally among schools presents limitations for future comparative studies.
The study also responds to recommended guidance on cyberbullying (DCSF, 2007).
One approach outlined in the framework of preventative actions is promoting an
understanding of cyberbullying through activities similar to that of the QC approach.
Group project ideas also contribute to the requirement for schools to make reporting
cyberbullying easier and promote positive use of technology. The future direction of
research will incorporate additional guidelines and evaluate prevention activities as
well as update existing practices and policies adopted in education.
References
Department for Children, Schools and Families. (2007). Safe to learn: Embedding anti-bul-
lying work in schools (Cyberbullying Guidance). Nottingham, UK: DCSF Publications.
Department for Education and Skills. (2000). Don’t suffer in silence: An anti-bullying pack
for schools. London: The Stationery Office.
Department for Education and Skills. (2002). Don’t suffer in silence: An anti-bullying pack
for schools. London: Author.
Department for Education and Skills. (2004). Every child matters: Change for children.
Norwich: The Stationery Office.
Gillespie, A.A. (2006). Cyber-bullying and harassment of teenagers: The legal response.
Journal of Social Welfare & Family Law. 28, 123–136.
House of Commons Education and Skills Committee. (2007). Bullying: Third Report of
Session 2006–2007. London: The Stationery Office.
Hutchins, D.C. (1985). The Quality Circles handbook. New York: Pitman Press.
168
▲
Lovett, A., & Gilmore, S. (2003). Teachers learning journeys: The Quality Learning Circle
as a model of professional development. School Effectiveness and School Improvement,
14, 189–211.
Office for Standards in Education. (2003). Bullying: Effective action in secondary schools.
London: Author.
Samara, M., & Smith, P.K. (2008). How schools tackle bullying, and the use of whole
school policies: Changes over the last decade. Educational Psychology, 28, 663–676.
Slonje, R., & Smith, P.K. (2008). Cyberbullying: Another main type of bullying?
Scandinavian Journal of Psychology, 49, 147–154.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child
Psychology and Psychiatry. 49, 376–385.
Smith, P.K., & Sharp, S. (1994). Tackling bullying in your school: Practical handbook for
teachers. London: Routledge.
Sweeting, H., & West, P. (2001). Being different: Correlates of the experience of teasing and
bullying at age 11. Research Papers in Education, 16, 225–246.
Analysis of Experts’ and Trainers’
Views on Cyberbullying
Thomas Jäger,1 João Amado,2 Armanda Matos2 and Teresa Pessoa2
1 Zentrum für empirische pädagogische Forschung, University of Koblenz-Landau, Germany
2 Faculdade de Psicologia e de Ciências da Educação, University of Coimbra, Portugal
P
artners from nine European countries developed a cyberbullying training manual
for the benefit of trainers working with parents, school staff and
young people.1 The development of the training manual built on a
two-level qualitative research process that combined elements of the
Delphi method and online focus groups. The two studies outlined in
this article aimed to assess trainers’ and experts’ views on the
problem of cyberbullying while also gathering insight in relation to
their preferences in terms of a training manual. This article outlines
the main outcomes of a content analysis of experts’ and trainers’
views. According to experts and trainers, the sources of cyberbully-
ing were specifically related to new technical developments and new
patterns of usage, a lack of media literacy and media education, and
the lack of appropriate laws, control and reporting mechanisms.
Approaches for tackling cyberbullying suggested by experts and
trainers included the provision of enhanced information on ICT and
e-safety, adequate rules, monitoring mechanisms and sanctions.
Furthermore a range of approaches targeting children and young
people, parents and other adults, schools as well as approaches run
by authorities and IT providers were suggested. In terms of the ele-
ments and style of a training manual, experts and trainers empha-
sised that it should be practically oriented, and that elements like
narratives, case examples or video clips would be vital for the imple-
mentation of training.
169
▲
In recent years the internet and communication technologies (ICT) have had an
increasingly important impact on our everyday life. Today, approximately 52% of
the European population is online. For young people in Europe aged 6 to 17 years,
internet use is even higher, with an average rate of 75% (Livingstone & Haddon,
2009). Also, cell phone use has increased. In 1996, just seven mobile phone lines
were available per 100 inhabitants, 10 years later this figure had risen to 106 lines
per 100 inhabitants (EuroStat, 2010).
Address for Correspondence: Thomas Jäger, Zentrum für empirische pädagogische Forschung, University of
Koblenz-Landau; Bürgerstrasse 23, 76259 Landau, Germany. E-mail: jaegerth@zepf.uni-landau.de
▲
Despite the numerous benefits of ICT, rapid and constant development has
created a number of rather negative side effects. One of these is the problem of
cyberbullying. According to one widely used definition, cyberbullying is an ‘aggres-
sive, intentional act carried out by a group or individual, using electronic forms of
contact, repeatedly and over time against a victim who cannot easily defend him or
herself’ (Smith et al., 2008, p. 376).
While some researchers suggest that cyberbullying is simply an electronic form
of traditional bullying (Kowalski, Limber, & Agaston, 2008), there are indications
that it is a rather new, distinct phenomenon. However, one factor that makes cyber-
bullying ‘hard to grasp’ is its complexity. For instance, following Willard’s widely
used taxonomy (2005, 2006) cyberbullying can take different forms, including
flaming, harassment, denigration, impersonation, outing and trickery, exclusion,
and cyberstalking. Another popular classification relates to the media channels
used by perpetrators — for example, with phone-call bullying, text-message bully-
ing, picture/videoclip-bullying when using mobile phones, email bullying, bullying
through instant messaging, bullying via websites, chatroom bullying, and bullying
via social networking sites and virtual worlds (Smith, in press; Smith, Mahdavi,
Carvalho, & Tippett, 2006).
In spite of a number of overlaps with traditional bullying, there are aspects that
are unique to cyberbullying. For instance, perpetrators often can conceal their iden-
tity and stay anonymous. Also, cyberbullying transcends the boundaries of time
and space; it can occur 24 hours a day at any time of the day or night, and it is not
restricted to places such as a school, but can occur anywhere (Hinduja & Patchin,
2008; Smith et al., 2008; Willard, 2005).
In recent years, a number of studies have examined the prevalence of cyberbully-
ing in different countries around the globe. Interestingly, the studies suggest that
the frequency of cyberbullying varies considerably, both from country to country
and from study to study within the same country. This does not necessarily mean
that the prevalence of cyberbullying indeed varies considerably from country to
country but could also be an effect of differing cyberbullying definitions, measure-
ment methods and analytical strategies, samples and other factors (Gradinger,
Strohmeier, & Spiel, 2010). One of the few studies that provides a transnational
170 overview of cyberbullying in Europe showed that 29% of the young people consid-
▲
rather inexperienced trainers, the manual also introduces basic training principles
and strategies.
By autumn 2010 the training manual will be made available in form of an eBook
in English, Spanish, Portuguese, German and Bulgarian. The creation of the train-
ing manual builds on an initial research-oriented phase. In order to ensure that the
training manual meets the needs of trainers, the project emphasises the value of
involving its target group — trainers working with parents, school staff and young
people as well as experts — in the process of developing the manual, by means of
assessing their training needs, interests, suggestions and preferences.
Method
The method applied for the initial research-oriented phase of the CyberTraining
project combines elements of the Delphi technique (Hsu & Sandford, 2007;
Linston & Turroff, 1975) alphabetic by first author always and online focus
groups (Kitzinger, 1994; Rezabek, 2000) in a two-level qualitative questioning
process. After an initial Delphi-style online questioning of trainers and experts,
selected outcomes of a content analysis of trainers’ and experts’ answers were
deepened in two online focus groups.
Participants
Experts’ Questioning and Online Focus Group
A selection of experts were invited for the initial online questioning based on an
internal classification system that aimed to reflect different professional back-
grounds and thus also different perspectives on the cyberbullying problem. Apart
from researchers, the classification system included representatives of web sites on
school bullying and cyberbullying, teachers, representatives of companies dealing with
new technologies, representatives of projects, initiatives dealing with internet safety,
youth protection coordinators, lawyers and legal experts, counsellors, mediators and
therapists, policy-makers, ICT experts and online educators and representatives of
regional or national anti-bullying networks, organisations, initiatives, campaigns.
One hundred and twenty-two experts were selected from all categories outlined
above were invited for the experts’ questioning. The experts’ questionnaire was
completed by 41 experts. The majority of experts were from Europe with experts
coming from the UK (n = 10), Germany (n = 5), Greece (n = 3), Belgium,
Lithuania, Norway, Poland, Portugal (n = 2), Austria, the Czech Republic,
Denmark, Spain, Finland, Ireland, Latvia and the Netherlands (n = 1). Moreover,
the questionnaire was completed by experts from Australia (n = 2), the United
States (n = 2) and Japan (n = 1). In terms of their professional background, the
predominant group of experts were researchers (n = 17), representatives from
regional or national anti-bullying networks, organisations, initiatives, campaigns,
and so on (n = 8) and representatives of a project or initiative dealing with Internet
safety (n = 4).
Trainers’ Questioning and Online Focus Group
172
The trainers were selected on basis of an internal classification system based on
▲
queries in each of the partner countries. The three main categories included ICT
trainers (e.g., trainers working for IT companies, trainers working for the national
Internet safety initiatives), research and training centres (e.g., trainers with a back-
ground in traditional school bullying, trainers working in teacher training centres)
and police and legal experts. From each of these main groups trainers were invited
to complete the online questionnaire.
From the 121 trainers invited to participate, 55 completed the trainers’ question-
naire. Again, the majority of trainers were from Europe, with experts coming from
Portugal (n = 21), Switzerland (n = 12), Ireland (n = 7) and Spain (n = 5), Bulgaria
(n = 4) and Brazil (n = 2), Germany (n = 1), Italy (n = 1), France (n = 1) and the
United States (n = 1). In terms of their professional profile, the predominant
groups were trainers from research and training centres (21), school staff such as
teachers or counsellors (17) and trainers dealing with information and communica-
tion technologies (ICT) and Internet safety (7).
Experts’ and Trainers’ Views on Cyberbullying
All in all, 25 experts of the 41 who previously completed the experts’ question-
naire participated actively at the discussions of the online focus group, with 149
postings. Another 10 experts logged in and followed the discussions without
actively contributing to the discussions. From the group of 55 trainers who com-
pleted the trainers’ questionnaire, 13 contributed actively to the online discussions.
Measures and Procedure
Questionings of Experts and Trainers
In Phase 1 of the information-gathering process selected experts and trainers were
asked to fill in a short questionnaire. The questionnaire for experts consisted of
five open questions, the questionnaire for trainers of seven questions. The ques-
tions in both questionnaires resulted from an internal discussion process between
the partners from the CyberTraining project and varied slightly in terms of their
thematic focus. While the focus of the experts’ questioning was on the sources of
cyberbullying, approaches tackling cyberbullying, and future perspectives, the
trainers’ questionnaire focused on information and skills needed by trainers to deal
with cyberbullying, the kind of resources needed for a training manual on cyber-
bullying, and the challenges trainers face when dealing with cyberbullying. The
questionnaires asked for the issues and elements a training manual on cyberbully-
ing should cover. Both questionnaires were made available online.
Both the experts’ and trainers’ answers were categorised and analysed by means
of a content analysis. The first step of the content analysis aimed to develop a
system of overall categories. As most answers consisted of several ‘sub-answers’, each
answer was spilt up into single content units. These content units were coded and allo-
cated to the overall categories that were refined during the analytical process. While
the content analysis of the experts’ questioning was supported by the MAXQDA
text analysis software, the content analysis of the trainers’ questioning was carried
out manually, without the support of content analysis software.
Online Focus Groups
The outcomes of the content analysis were summarized in short reports that
formed the starting point for deepening selected topics in Phase 2 of the informa-
tion-gathering process, the subsequent moderated online focus group for experts 173
▲
Results
In this section we present selected categories that resulted from the content analysis
of answers from the experts’ questionnaires and online focus groups.
TA B LE 1
The Sources Of Cyberbullying: Experts’ Questionnaire and Online Focus Group
Overall categories Subcategories
ing in new technical developments and also new patterns of usage in terms of the
internet and mobile phones, which have a considerable impact on people’s lives.
Characteristics of ICT that promote cyberbullying, some of which can also be
considered as motivating factors for bullies, are, for instance, the sense of
anonymity perpetrators have and the fact that perpetrators are not confronted with
immediate reactions from their victims. As one experts stated, ‘Cyberbullying is
becoming increasingly popular due to the level of anonymity, ease and the likeli-
hood to reach as many bystanders as possible’. In most cases they do not have to
be afraid of the punishment and consequences, which may also reduce their inhibi-
tion considerably. As several experts stated, this may also attract new groups of
perpetrators who would be more sensitive to face-to-face interactions.
There was a broad agreement among experts that both young people and adults
lack knowledge and education in ICT. In relation to young people, the lack of
media literacy often leads to an inappropriate usage of new technologies. For many
experts the lack of knowledge in ICT in relation to parents as well as professionals
working with young people is even more obvious. Some even speak of a digital
divide between generations.
Experts also agreed that there is a lack of legislation, control and reporting
related to cyberbullying. In most countries there are few mechanisms that allow
monitoring and controlling of online activities in chat rooms, online communities
or content/video sharing communities. In terms of monitoring their children’s use
of internet, mobiles and other new technologies, many parents neither have the
capacity to monitor continuously, nor have they an adequate knowledge and com-
petences to judge their children’s activities. One expert from Norway stressed the
sheer impossibility of monitoring children’s use of the internet: ‘Youngsters can tell
parents they do homework, bring the laptop (that they get from their schools) to
their room, chat all night, and parents lose control’.
In terms of the category ‘Other factors within young people, parents, schools,
media and society’, the subcategory factors within schools is remarkable. As
several experts stated, schools should play a crucial role in tackling cyberbullying.
Nevertheless, most schools are not addressing cyberbullying in their curricula or
school policies yet, they do not prepare their staff, and also do not provide students
175
▲
TA B LE 2
Approaches Tackling Cyberbullying: Experts’ Questionnaire and Online Focus Group
Overall categories Subcategories
Knowledge on ICT and Internet Safety (21) Better understanding of ICT, its potentials and dangers (7)
Appropriate, responsible, safe and positive usage of ICT (14)
Rules, monitoring and sanctions (72) Rules, legislation and restrictions on cyberbullying (21)
Monitoring and control (13)
Technical solutions: reporting and filter mechanisms (13)
Consequences, sanctions and punishment (12)
Arguments against restrictions, banning and punishment (13)
Awareness raising and motivational strategies (33) Awareness-raising and campaigns (27)
Creative ideas for reaching target audience (3)
Not merely focusing on technology issues (3)
Approaches targeting children and young people (52) Empowering young people (17)
Increasing knowledge and awareness (9)
Peer based approaches (21)
Conveying respect and traditional values (2)
Involving young people in development of resources (5)
Approaches targeting parents and other adults (22) Information and knowledge for parents: training, courses,
manuals and tools (11)
Encouraging and motivating parents (2)
Help and assistance for parents (4)
Training of professionals (5)
Approaches targeting Schools (57) Policies / whole school approach (13)
Teacher training (22)
Restrict or monitor access to ICT (9)
Education: information on ICT and Internet safety (8)
Approaches on class level (5)
Challenges (26) Rapid change of technology (3)
Costs and funding (5)
Resistance to training and lack of support by schools and
government (7)
Danger of mixing up cyber safety with cyberbullying (6)
Need of enhanced cooperation between Internet safety
experts and experts on school bullying (5)
not the technology that is the problem; it is the misuse of it.’ While a number of
experts expressed their concerns about restrictive and punitive approaches, there
176
▲
was a broad agreement with regards to the need and effectiveness in educating
users in terms of adequate online behaviour and risk management.
The experts also widely agreed on the importance of awareness raising and
motivational strategies in order to attract parents’, teachers’, professionals’ and
young people’s attention on the relevance of the cyberbullying problem. In this
context one expert from the United Kingdom pointed out ‘that educators (need to)
understand that cyberbullying isn’t just “about” technology, particularly as many
educators may lack confidence in this area’.
In terms of approaches targeting children and young people, empowerment and
peer-based approaches were regarded as very effective methods to tackle cyberbul-
lying. As one expert stated, ‘Young people who are being bullied often don’t want
to talk to an adult figure, be it a parent or teacher. They are more comfortable
talking to another young person.’
Experts’ and Trainers’ Views on Cyberbullying
One of the focuses of approaches targeting parents, teachers, youth workers and
other professionals should be on conveying information and knowledge on ICT
and cyberbullying in form of training, manuals, courses and other resources. Also,
providing help and assistance — for example, by means of help lines as well as
training of professionals — were regarded as being important.
In terms of approaches targeting schools, whole-school approaches and teacher
training were considered to be effective methods. Again, approaches focusing on
restricting and monitoring access to Internet and mobile phones in schools were
not considered as effective by a number of experts.
One major challenge when developing resources on cyberbullying is the rapid
change in technologies. Introductions to the latest state of development of ICT may be
out of date soon. Experiences reported by the experts also suggest that governments,
authorities and schools are hesitant when it comes to financing projects and programs,
though in the long run funding these projects may be less expensive than having to
cope with the negative effects of cyberbullying. The discussions also revealed the need
for enhanced cooperation between anti-bullying and cyber safety experts.
TA B LE 3
Trainers’ Difficulties: Trainers’ Questionnaire and Online Focus Group
Overall categories Subcategories
TA B LE 4
Elements Of A Training Manual: Trainers’ Questionnaire And Online Focus Group
Overall categories Subcategories
Conclusions
The main aim of the experts’ and trainers’ questionnaires and the discussions in
both online focus groups was to gather information that contributes to the devel-
opment of a training manual that meets trainers’ needs and reflects the current
state of cyberbullying research. The two studies presented in this article, among
others, revealed the trainers’ need for well-grounded information on ICT, basic
information on cyberbullying, and approaches for tackling cyberbullying, as well
as training skills that are needed for dealing with the cyberbullying problem.
Although the outcomes of the studies were not surprising, they gave valuable hints
in terms of the style of a training manual preferred by trainers, as well as the
resources needed. Moreover, the outcomes of the experts’ questionnaires and
online discussion were helpful in clarifying the framework and scope of approaches
for tackling cyberbullying. In the project’s second phase, the main outcomes were
considered when developing the training manual.
Apart from these findings that were of practical use for the CyberTraining
project, the two studies also brought up some results that are of interest both for
cyberbullying research and the rather practical-oriented work — for example,
when providing training. Both studies revealed that cyberbullying is a phenomenon
that blurs the boundaries of formerly separated fields: traditional school bullying
on the one side and ICT and internet safety on the other side. The development of
resources, training, projects and campaigns that tackle cyberbullying makes multi-
179
▲
Acknowledgments
The authors wish to thank the ‘Leonardo da Vinci’/Lifelong Learning Programme
of the European Commission for co-funding the CyberTraining project. We also
wish to thank the partners of the CyberTraining project as well as the experts and
trainers who participated at the online questionings and the online focus groups.
Endnotes
1 The development of the training manual was part of the EU-funded project CyberTraining
(http://www.cybertraining-project.org/)
2 http://www.cybertraining-project.org
3 The detailed figures are available online in the report ‘Experts’ Questioning and Online
Focus Group — Outcomes and Implications’ (Jäger, 2009).
4 The detailed findings are available online in the report ‘Trainers’ Needs Analysis —
Outcomes and Conclusions’ (Amado, Matos, & Pessoa, 2009) that is available online.
References
Amado, J., Matos, A., & Pessoa, T. (2009). Trainers’ needs analysis — Outcomes and conclu-
sions. Retrieved from http://www.cybertraining-project.org/reports/CyberTraining%20-
%20Trainers%20Needs%20Analysis%20-%20Outcomes%20and%20Conclusions.doc
Eurostat. (2010). Information society statistics. Retrieved from: http://epp.eurostat.ec.europa.
eu/portal/page/portal/information_society/data/main_tables
Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Traditional bullying and cyberbullying:
Identification of risk groups for adjustment problems. Journal of Psychology, 217(4),
205–213.
Hsu, C.-C., & Sandford, B.A. (2007). The Delphi technique: Making sense of consensus.
Practical Assessment Research & Evaluation, 12(10), 1–8. Retrieved from http://pare-
online.net/getvn.asp?v=12&n = 10
Jäger, T. (2009). Experts’ questioning and online focus group — Outcomes and implications.
Retrieved from http://www.cybertraining-project.org/reports/CyberTraining%
180 20Online%20Focus%20Group%20-%20Outcomes%20and%20Implications.doc
▲
Hinduja, S., & Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related
to offending and victimization. Deviant Behavior, 29(2), 1–29.
Kitzinger, J. (1994). The methodology of focus groups: the importance of interactions
between research participants. Sociology of Health and Illness, 16, 103–121.
Kowalski, R., Limber, S., & Agaston, P. (2008). Cyber Bullying. Malden, MA: Blackwell
Publishing.
Linstone, H.A., & Turoff, M. (1975). The Delphi Method: Techniques and applications.
London: Addison-Wesley Publishing Company.
Livingstone, S., & Haddon, L. (2009). EU Kids Online: Final Report. Retrieved from
http://www.lse.ac.uk/collections/EUKidsOnline/Reports/EUKidsOnlineFinalReport.pdf
Microsoft. (2009). Microsoft’s European Online Safety Survey. Retrieved from http://www.
microsoft.com/emea/presscentre/pressreleases/OnlinebullyingPR_100209.mspx
Rezabek, R. (2000). Online focus groups: Electronic discussions for research. Forum
Qualitative Sozialforschung/Forum: Qualitative Social Research, 1(1). Retrieved from
http://www.qualitative-research.net/fqs-texte/1-00/1-00rezabek-e.htm
Experts’ and Trainers’ Views on Cyberbullying
181
▲
C
yberbullying at school has emerged as a new, electronic form of bullying and
harassment and is recognised as a growing problem all over the
world. The ability to use cyberspace to bully others means that
harassment, rumours and intimidation can reach a much wider audi-
ence. Although research has not as yet explored fully the conse-
quences of either cyber-victimisation or cyberbullying, it would
appear that they may be detrimental to the health of young people,
suggesting the need for policies and interventions, which some
European countries (e.g., Germany, Luxemburg, Belgium and the
United Kingdom) have attempted to undertake. Currently, however,
only the United States has implemented specific laws that treat
cyberbullying as a criminal offence per se. After briefly considering
the literature on cyberbullying this article will focus on the legal, reg-
ulatory and good practice frameworks for controlling cyberbullying
in UK educational contexts.
individual, using electronic forms of contact, repeatedly and over time against a
victim who cannot easily defend him- or herself’ (Smith et al., 2008, p. 376). To date,
cyberbullying has received significant media attention as certain cases have resulted
in civil and criminal law suits filed against a perpetrator and/ or a school. Currently
in the United Kingdom there is no specific law against cyberbullying per se; however,
a number of other civil and criminal laws may be applied to a cyberbullying context.
This article thus highlights the legal aspects of the issue of cyberbullying relevant to
the United Kingdom, and discusses potential problems with such an approach. It also
discusses current good practices to prevent cyberbullying.
Address for Correspondence: Magdalena Marczak, 16 Framefield Drive, Solihull, B91 2SR, UK. E-mail:
lwxmim@nottingham.ac.uk
▲
nearly 6% said they had received nasty or threatening text messages or emails
‘once in a while’ or more in 2002 and 2003, but this rose to 7% or more in 2004
and 2005.
Although research has not as yet fully explored the consequences of cyberbully-
ing, it would appear that these may be detrimental to the health of young people
(Raskauskas & Stoltz, 2007). Emerging research has indicated cyberbullying is
associated with a number of psychiatric and psychosomatic problems, including
perceived difficulties, emotional and peer problems, headache, recurrent abdominal
pain, sleeping difficulties, not feeling safe at school, hyperactivity, low prosocial
behaviour, frequent smoking, drunkenness (Sourander et al., 2010) and conduct
problems (Gradinger, Strohmeier & Spiel, 2009). Adjustment problems of cyber-
bullies, cyber-victims and cyber-bully/victims have also been reported in a number
of studies (Gradinger et al., 2009; Juvonen & Gross, 2008; Kowalski et al., 2008;
Raskauskas & Stoltz, 2007; Ybarra & Mitchell, 2004a, 2004b). As is evident from
systems.
3. Making reporting of cyberbullying easier: schools should provide and publi-
cise different ways of reporting cyberbullying, such as a student council task-
force, peer reporting, anonymous reporting, and provide information about
contacting service providers directly.
4. Promoting the positive use of technology: it should be used to support
engaging, positive and effective learning, and to realise and increase the
potential of personalised learning by making learning more flexible, creative
and accessible. Schools should promote and discuss ‘netiquette’, e-safety and
digital literacy.
5. Evaluating the impact of prevention activities: schools should review the
existing anti-bullying policies regularly.
Cyberbullying at School
Websites that specifically target children and young people have also been set up
that aim to educate them about online safety. They include:
• http://www.childnet-int.org: this website gives general safety advice for
parents, young people and teachers as well as more specific advice on key
issues in its fact sheets and targets three main areas: Access, Awareness, and
Protection & Policy.
• http://www.beatbullying.org: CyberMentors is the latest project by
Beatbullying designed to meet this need. CyberMentors.org.uk is a new
service for the digital age: a traditional mentoring system delivered via
a social networking site. Young people, aged 11-25, are trained as
CyberMentors, in schools and online, so that they can offer support to their
peers. The CyberMentors themselves — many of whom have been bullied in
the past – are able to use their own life experiences to help others and
improve their ‘soft skills’ while doing so.
• http://www.missdorothy.com: the Missdorothy.com website and the
Learning programme are endorsed by the government, leading safety agen-
cies and the Nelson Mandela Children’s Fund (UK). It is currently being
taught in many schools around the United Kingdom and more are being
encouraged to use it. By teaching youngsters how to manage risk and assist
their decision making in situations of potential danger the Missdorothy.com
website aims to empower them for their future.
• http://www.websafecrackerz.com: WebSafe Crackerz is a ‘spoof world’
providing genuine safety information throughout all the linked sites. It
consists of a game as it is based within a fictional story about ‘gladhanders’,
liars, stalkers, bullies, security bouncers, detectives, fake spam and mobile
phone companies and a big boss (the Baron), who runs the whole show.
Sponsors and partners of this UK program include MSN, the Home Office,
the Cyber Research Unit, Childnet International and ChildLine.
Kingdom, with an estimated 62% of all schools using this method (Houlston,
Smith, & Jessel, 2009). The most widely known and extensively developed
program targeting the reduction of bullying and aggressive behaviours was devel-
oped by Olweus (Olweus, 1991, 1993, 1994), and it has been tried in a number of
countries including England, Finland, Germany, Holland, Sweden, and the United
States (Olweus, Limber, & Mihalic, 1999).
In addition to the Olweus model, a number of other school-based programs
focusing specifically on dealing with bullies have been developed. These focus on
teaching about the power characteristic in bullying and the way in which
bystanders endorse bullies, by being silent or not protesting. These included the
Bully Busters program (Horne, et al., 2003; Newman et al., 2000); the Bully
Proofing program (Bonds & Stoker, 2000; Garrity et al., 2004); Target Bullying:
Ecologically Based Prevention and Intervention for Schools, (Espelage & Swearer,
2004; Swearer & Espelage, 2004); and Life Skills Training (Botvin, Mahalic, &
Grotpeter, 1998).
Other strategies focused on teaching children appropriate methods to address
conflict. The three most common prosocial approaches used were conflict resolu-
tion, peer mediation, and peaceable schools (Cueto, Bosworth, & Sailes, 1993).
While there has been a development of intervention methods, initial evaluations
of the numerous implemented interventions were not positive (e.g., Smith et al.,
2007; Smith et al., 2004). For example, Smith, et al.’s (2004) meta-analysis of
results of published and unpublished evaluations of antibullying programs from
Europe, North America and Australia, showed that the majority of these programs
produced insignificant intervention effects. However, more recently Farrington and
Ttoffi (2009) completed a systematic review and meta-analysis of the effectiveness
of programs designed to reduce school bullying perpetration and victimisation.
Their meta-analysis of 44 different program evaluations showed that ‘school-based
anti-bullying programs are effective in reducing bullying and victimisation (being
bullied)’ (Farrington & Ttofi, 2009, p. 6), with bullying decreasing by 20–23%
and victimisation by 17–20%.
These traditional approaches to dealing with the problem of bullying offer indi-
vidual and school-based approaches, but cyberbullying presents different chal-
187
▲
Legal Aspects
In November 1999 it became a legal requirement for all UK schools to have an
anti-bullying policy (the School Standards and Framework Act 1998, Section 61
(4) (b)). The government produced an anti-bullying pack entitled ‘Don’t Suffer in
Silence’, which placed a strong emphasis on seeking help or telling a teacher when
bullied (Department for Education and Employment, 1994, 2000). With more
resources becoming available to schools, bullying, once a taboo topic, became
more openly discussed. Schools were reported to tackle the problem more willingly,
knowing that the Office for Standards in Education (OFSTED) inspects whether
bullying is a problem in a school and whether the school has taken measures to
combat it (Smith et al., 2000). OFSTED also produced a report in 2003, entitled
(Campbell, Buttler & Kift, 2008). Current civil acts as well as criminal acts seem to
be appropriate to tackle serious forms of cyberbullying and the introduction of pre-
ventative methods (as with traditional bullying) may prove to be more fruitful.
tion, and for skill development as well as for creativity and play. However, it is also
equally crucial to provide adults with the knowledge that will allow them protect
children from the risks posed by technology in an informed way and to provide
children with skills that will allow them to do so safely, as far as possible, without
their being exposed to harmful or inappropriate material. It is hoped that the avail-
able resources and the different educational regulatory frameworks and preventa-
tive plans which cover cyberbullying already put in place will help guide the
professionals involved with children to help them avoid becoming either a bully or
a victim of the new technology.
Conclusion
Currently in the United Kingdom cyberbullying is not a specific criminal offence.
However, prosecution could still occur as some specific cyberbullying acts could be
covered under other existing laws. A number of support services have been set up
to help teachers, parents and students face the challenges posed by new technology.
The Education and Inspections Act 2006 (EIA 2006, Department for Children,
Schools and Families, 2007a: 3) outlines some legal powers that relate more
directly to cyberbullying. Head teachers have the power ‘to such an extent as is
reasonable’ to regulate the conduct of pupils when they are off site. The EIA also
provides a defence for school staff in confiscating items such as mobile phones
from pupils. A range of Education Acts and government initiatives highlight the
duty of the school community to protect all its members and provide a safe,
healthy environment. The School Standards and Framework Act 1998 places a spe-
cific duty on state-maintained schools to combat bullying, including ensuring that
anti-bullying procedures are in place. With the growth of cyberbullying research it
is hoped that more specific cyberbullying interventions will be developed.
There are a number of unanswered questions regarding the law and cyberbully-
ing. For example, in cyberspace, boundaries between countries are blurred — what
consequences should therefore be used for somebody who cyber-bullies another
person from a different country? Which country’s law should prevail in such case?
Is there a need to create a specific cyberbullying law or can existing laws be used?
190
▲
References
Barker, B.O. (2002). The Internet Can Improve Education. In H. Cothran (Ed.), The inter-
net: Opposing viewpoints. San Diego, CA: Greenhaven Press.
Bonds, M., & Stoker, S. (2000). Bully-proofing your school: A comprehensive approach for
middle school students. Longmont, CO: Sopris West.
Botvin, G.J., Mihalic, S.F., & Grotpeter, J.K. (1998). Life Skills Training: Blueprints for
Violence Prevention, Book Five. Blueprints for Violence Prevention Series (D.S. Elliott,
Series Editor). Boulder, CO: Center for the Study and Prevention of Violence, Institute
of Behavioral Science, University of Colorado.
Cyberbullying at School
Byron, T. (2008). Safer children in a digital world: The report of the Byron Review. Byron
Review — Children and New Technology. Retrieved from http:// http://publications.
education.gov.uk/eOrderingDownload/DCSF-00334-2008.pdf
Campbell, M.A. (2005). Cyber bullying: An old problem in a new guise? Australian Journal
of Guidance and Counselling, 15, 68–76.
Campbell, M., Buttler, D., & Kift, S. (2008). A school’s duty to provide a safe learning envi-
ronment: Does this include cyber-bullying? Australia & New Zealand Journal of Law
& Education, 13(2), 21–32.
Caravita, S.C.S., Di Blasio, P., & Salmivalli, C. (2009). Early adolescents’ participation in
bullying: Is ToM involved? Journal of Early Adolescence, 30(1), 138–170.
Childnet. (2007). E-safety: Evaluation of Key Stage 3 Materials for Initial Teacher
Education. Available at: http://www.childnet-int.org/kia/trainees/
Connolly, J., Pepler, D., Craig, W., & Taradash, A. (2000). Dating experiences of bullies in
early adolescence. Child Maltreatment, 5(4), 299 – 310.
Cowie, H., Naylor, P., Talamelli, L., Chauhan, P., & Smith, P. K. (2002). Knowledge, use of
and attitudes towards peer support: A 2-year follow-up to the Prince’s Trust survey.
Journal of Adolescence, 25, 453–467.
Cueto, S., Bosworth, K., & Sailes, J. (1993, April). Promoting peace: Integrating curricula
to deal with violence. Paper presented at the annual meeting of the American Education
Research Association, Atlanta, GA.
DCFS. (2007). Safe to learn: Embedding anti-bullying work in schools — cyber-bullying.
DCSF: Teachernet Publications.
DfES. (2007). Bullying: Don’t suffer in silence. An anti-bullying pack for schools. London:
HMSO.
Dooley, J., Pyzalski, J., & Cross, D. (2009). Cyber-bullying versus face-to-face bullying.
Zeitschrift fur Psychologie/Journal of Psychology, 217(4), 182–188.
Edith Cowan University’s Child Health Promotion Research Centre. (2010). Research
News: ECU researchers awarded national tender to evaluate cyber-bullying. Retrieved
from http://www.ecu.edu.au/news/latestnews/2010/06/ecu-staff-evaluates-cyber-
bullying-program
Erwin-Jones, S. (2008). Dealing effectively with cyber-bullying (Protecting Children Update,
May 2008). London: Optimus Education.
Espelage, D.L., & Swearer, S.M. (2004). Bullying in American schools: A social-ecological
perspective on prevention and intervention. Mahwah, NJ: Lawrence Erlbaum
Associates.
Farrington, D.P., & Ttoffi, M.M. (2009). School-based programs to reduce bullying and vic- 191
▲
Jouvonen, T., & Gross, E.F. (2008). Extending the school grounds? Bullying experiences in
cyberspace. Journal of School Health, 78, 496–505.
Kaltiala-Heino, R., Rimpela M., Rantanen, P., & Rimpela, A. (2000). Aggression at school
— an indicator of adolescents at risk for mental disorders. Journal of Adolescence, 23,
661–674.
Kowalski, R.M., Limber, S.P., & Agatson, P.W. (2008). Cyber-bullying: Bullying in the
digital age. Malden, MA: Blackwell.
Kumpulainen K., & Räsänen E. (2000). Children involved in bullying at elementary school
age: their psychiatric symptoms and deviance in adolescence. An epidemiological
sample. Child Abuse and Neglect, 24(12), 1567–1577.
Li, Q. (2006). Cyber-bullying in schools: A research of gender differences. School
Psychology International, 27, 157–170
Loeber, R., & Dishion, T. J. (1983). Early predictors of male delinquency: A review.
Psychological Bulletin, 94, 68–99.
Mitchell, K.J., Finkelhor, D., & Wolak, J. (2001). Risk factors for and impact of online
sexual solicitation of youth. JAMA, 285(23), 3011–3014.
Nansel, T.R., Overpeck, M., Pilla, R.S., Ruan, W.J., Simons-Marton, B. & Schneidt, P.
(2001). Bullying behaviours among US youth: Prevalence and association with psy-
chosocial adjustment. Journal of the American Medical Association, 285, 2094–2100.
Netanel, N.W. (2000). Cyberspace self-governance: A skeptical view from liberal democratic
theory. California Law Review, 88, 395–498.
Newman, DA., Horne, A.M., & Bartolomucci, C.L. (2000). Bully busters: A teacher’s
manual for helping bullies, victims, and bystanders. Champaign, IL: Research Press.
NCH. (2005). Putting U in the picture: Mobile phone bullying survey 2005. Retrieved from
www.nch.org.uk
Oliver, C., & Candappa, M. (2003). Tackling bullying: Listening to the views of children and young
people. Nottingham: Department for Education and Skills.
Olweus, D. (1991). Bully/victim problems among school children: Basic facts and effects of a
school-based intervention program. In D.J. Pepler & K.H. Rubin (Eds.), The development and
treatment of childhood aggression (pp. 411–448). Hillsdale, NJ: Erlbaum.
Olweus, D. (1993) Bullying at school: What we know and what we can do. Oxford: Blackwell.
Olweus, D. (1994). Bullying at school: Basic facts and effects of a school based intervention
program. Journal of Child Psychology and Psychiatry, 35, 1171–1190.
Olweus, D., Limber, S., & Mihalic, S. (1999). The Bullying Prevention Program. Blueprints
for violence prevention. Boulder, CO: Center for the Study and Prevention of Violence.
192 Patchin, J.W., & Hinduja, S. (2006). Bullies move beyond the schoolyard. A preliminary
▲
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyber-
bullying: Its nature and impact in secondary school pupils. Journal of Child Psychology
and Psychiatry, 49(4), 376–385.
Smith, P.K., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into cyber-
bullying, its forms, awareness and impact, and the relationship between age and gender
in cyber-bullying (Research Brief No. RBX03-06). London: DfES.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyber-
bullying: Its nature and impact in secondary school pupils. Journal of Child Psychology
and Psychiatry, 49(4), 376–385.
Smith, P.K., Morita, Y., Junger-Tas, J., Olweus, D., Catalano, R., & Slee, P. (2000). The
nature of school bullying: A cross-national perspective. London: Routledge.
Smith, J.D., Ryan, W., & Cousin, J.B. (2007). Antibullying programs: A survey of evalua-
tion activities in public schools. Studies in Educational Evaluation, 33, 120–134.
Smith, P.K., Smith, C., Osborn, R., & Samara, M. (2008b). A content analysis of school
anti-bullying policies: Progress and limitations. Educational Psychology Practice, 24, 1–
12.
Smith, J.D., Schneider, B.H., Smith, P.K. & Ananaiadou, K.(2004). The effectiveness of
whole school antibullying programs: A synthesis of evaluation research. School
Psychology Review, 33, 548–561.
Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntano, T., Koskelainen, M.,
Ristkari, T., & Helenius, H. (2010). Psychosocial Risk Factors Associated With Cyber-
bullying Among Adolescents. Archives of General Psychiatry, 67(7), 720–728.
Swearer, S.M., & Espelage, D.L. (2004). Research on school bullying and victimisation:
What have we learned and where do we go from here? School Psychology Review, 32,
365–383.
Ybarra, M.L., & Mitchell, K.J. (2004a). Online aggressors/ targets, aggressors and targets:
A comparison of associated youth characteristics. Journal of Child Psychology and
Psychiatry, 45, 1308–1316.
Ybarra, M.L., & Mitchell, K.J. (2004b). Youth engaging in online harassment: Associations
with caregiver-child relationships, Internet use, and personal characteristics. Journal of
Adolescence, 27, 319–336.
193
▲
M
any young people who are bullied do not tell anyone. School staff therefore
are often unaware of which students are being victimised and when to
provide support or assistance. A critical strategy to overcome this
problem is to encourage victimised students to seek help and report
this bullying. This study aims to examine the relationship between
help-seeking behaviours and self-reported emotional symptoms in
young people from Australia (n = 5959; M age = 12.36 years, SD = 1.46
years) and Austria (n = 1530; M age = 12.68 years, SD = .84 years)
who reported being victimised (via cyber and traditional bullying). In
both countries, students who were cyber-victimised compared to those
who were victimised in more traditional methods were less likely to
seek help. Girls in both countries were significantly more likely to
seek help and endorse more emotional symptoms than boys. No rela-
tionship was found between help-seeking and emotional symptoms in
students who had been cyber-victimised. These preliminary results
have important implications for the types of strategies used to enhance
the approachability of school staff and families to provide appropriate
194 help and support for young people who are being bullied.
▲
Address for Correspondence: Julian Dooley, Child Health Promotion Research Centre, Edith Cowan University,
Australia. E-mail: j.dooley@ecu.edu.au
▲
the causal relationship between bullying and mental health and emotional problems
in young people who are victimised (Arsenault, Bowes, & Shakoor, 2009; Gazelle &
Ladd, 2003; Goodman, Stormshak & Dishion, 2001; Hanish & Guerra, 2002).
Many intervention programs have been developed to reduce bullying behaviours
in schools and to promote a healthy outcome for those who are victimised. These
interventions have variously targeted students who are bullying others, students
being bullied, the student population in general, teachers, parents and/or other
members of the broader school community. Despite the relatively rapid prolifera-
tion of bullying prevention programs, still little is known about the most effective
components of a program, the processes that are responsible for the success (or
otherwise) of a program and the basis for success of one program over another.
Despite the limited evidence describing the positive outcomes associated with
school-based bullying intervention programs, some results are available (Farrington
& Ttofi, 2009).
Help-Seeking and Bullying Behaviours
In a comprehensive review of the effectiveness of bullying interventions, Farrington
and Ttofi (2009) reported that bullying behaviours decreased by 20–23% and vic-
timisation rates decreased by 17–20%. One of the most consistent elements of bul-
lying prevention programs (especially targeted to victimised students) relates to
strategies for students to source help. This form of help-seeking often involves for-
mally involving an adult (e.g., teacher, school counsellor) by reporting the behav-
iour (Novick & Issacs, 2010). Despite the emphasis placed on the importance of
telling, there is strong evidence that students tell teachers about bullying very infre-
quently, with more young people choosing to tell their parents than teachers
(Fekkes et al., 2005; Smith & Shu, 2000). Further, elementary school students are
more likely to tell teachers about bullying (Fekkes et al., 2005; O’Moore, Kirkham,
& Smith, 1997) than secondary school students (Smith & Shu, 2000).
There is strong evidence that the prevalence of peer-to-peer bullying is often
unreported (e.g., Smith et al., 2001), which can affect the support services that are
provided to students (Naylor et al., 2001). A variety of individual level factors have
been used to explain this poor reporting phenomenon. For example, students are
often reluctant to report being bullied for fear of reprisal (Boulton & Underwood, 195
▲
1992; Smith & Sharp, 1994) or because they lack of confidence in adults’ ability to
help (Besag, 1989; Cowie & Olafsson, 1999). More recently, Oliver and Candappa
(2007) reported that a student’s reluctance to tell may be based on either a concern
that teachers might not believe their report or a worry that teachers might reveal
their report (inadvertently or otherwise), which could lead to further victimisation.
One of the strongest predictors of help-seeking is gender, with girls significantly
more likely to report being bullied than boys (Hunter, Boyle, & Warden, 2004). In
addition, there are also several system-level factors that appear to be associated
with students’ reporting. For example, Unnever and Cornell (2004) reported that
students who perceived the school climate as tolerant of bullying were less likely to
report being bullied.
Cyberbullying and Help-Seeking
One of the challenges in addressing bullying behaviours and encouraging students
who are being bullied to seek help is the changing landscape within which bullying
competent school staff and parents feel, the better able they are to support students
to deal with cyber- and traditional bullying behaviours. Given this difficulty, some
suggest the Internet might provide a useful means to encourage young people who
are victimised to seek help (Yablon, 2008).
Culture and Bullying Behaviours
To date, few studies have investigated the role of culture in relation to bullying
behaviours (see Molcho et al., 2009, and Nansel, Craig, Overpeck, Saluja, &
Ruan, 2004 for important cross-cultural studies). In one of the few studies to date,
Eslea and colleagues (2004) reported that students who are bullied in traditional
ways were significantly more disadvantaged on all measures (e.g., mental health,
friendships) across seven countries, whereas students who bullied others did not
differ consistently, suggesting that culture plays a role in the outcomes associated
with bullying perpetration and victimisation. We were unable to identify any
studies that examined the cross-cultural context of help-seeking behaviours associ-
ated with bullying, thus the aim of this study was to examine help-seeking behav-
iours and self-reported emotional symptoms in students who reported being bullied
(via cyber and traditional means) and to examine the cultural similarities and/or
differences in these associations.
This study examined the help-seeking behaviour of students who reported being
bullied (cyber and traditional) and the relationship between victimisation and help-
seeking and its association with self-reported emotional symptoms. Given there is
no evidence to date examining cyber-victimisation, help-seeking and emotional
symptoms, the cross-sectional analyses conducted here are exploratory. We did,
however, hypothesise that students who reported being victimised (cyber- and tra-
ditional) would report more emotional symptoms, and girls would report more
help-seeking behaviours than boys. Further, we examined if:
1. gender, cyber-victimisation and traditional victimisation were associated
with emotional symptoms
197
▲
Method
This study examined help-seeking and emotional symptoms on Australian and
Austrian students who reported being cyber-victimised.
Participants
The Australian cross-sectional sample was from the Australian Covert Bullying
Prevalence Study (ACBPS), designed to determine the prevalence of covert, includ-
ing cyberbullying, behaviours in Australia (Cross et al., 2009). This study was con-
ducted in 2007–2008 by the Child Health Promotion Research Centre (CHPRC) at
Edith Cowan University. Schools were randomly selected within strata defined by
geographic location and school sector. Non-mainstream and smaller schools as well
as those already involved in intervention projects conducted by the CHPRC were
excluded. Surveys were administered by school staff within classrooms to those
students who consented to participate and for whom written parental consent was
provided. The study was approved by the Edith Cowan University Human
Research Ethics Committee.
To increase comparability between the Australian and Austrian data, only results
from ACBPS grades 5–9 (age range 10–15 years) are reported below. This sample
comprised 5959 students (Age M = 12.36, SD = 1.46) from one hundred and six
schools (55 primary, 51 secondary). The final sample was fairly evenly distributed
between year levels (Grade 5: 17%, Grade 6: 17%, Grade 7: 18%; Grade 8: 15%,
Grade 9: 14%), and by gender (52.9% female). Metropolitan schools were over-
represented in the sample (64%). Australian students’ use of technology was wide-
spread: 95% used a computer with the internet at least once monthly (57.4% daily
use) and about 63% used their own mobile phone at least once a month (45.7%
daily use).
The Austrian sample data were drawn from the national intervention evaluation
study, ViSC (Spiel & Strohmeier, under review). The sample comprised 1530 grade
5 and 6 students (727 girls, 803 boys) aged 10 to 15 (M = 12.68, SD = .84) from
16 different schools located in two federal states of Austria (Carinthia and Vienna).
Overall, 82.5% of students used the mobile phone and 70.2% of students used the
Internet, both at least once a day. Participation was voluntary and based on active
parental consent. The data were collected in May and June 2010 (about one month
before the end of the school year) using an internet-based questionnaire that was
198
▲
completed within an hour during school time in each school’s computer lab under
the supervision of one or two trained research assistants.
Measures
Assessment of Traditional Victimisation
Australian sample: Traditional victimisation (this term will be used to refer to other
forms of bullying not including cyberbullying, i.e., covert bullying, overt bullying)
was measured using 12 items that asked about participant’s experiences with non-
cyber types of bullying. These items include being teased in nasty ways, being left
out or excluded, being made to feel afraid, or having secrets/lies told about them.
Students reported how often they experienced each of these behaviours last term at
school (a period of approximately three months) on a 5-point Likert scale with
responses ranging from Never to Most days this term. Cronbach’s alpha for the tra-
ditional victimisation scale was .91.
Cyber-Victimisation, Help-Seeking and Emotional Symptoms
Austrian sample: Traditional victimisation was measured with five behavioural items
(e.g., ‘How often have others insulted or hurt you by excluding you during the last
two months?’). The items covered the frequency of behaviours within the last two
months. Their response format ranged from Never to Nearly every day. Although the
response scale was structured differently than the Australian sample (0–4 versus 1–5)
the same scoring was used in the analyses to ensure equivalency between the samples.
The scales in both samples were calculated as mean scores of the items. Cronbach’s
alpha for the traditional victimisation scale was .80.
Assessment of Cyber-Victimisation
Australian sample: Cyber-victimisation was measured using eight items that asked
about participants’ experiences with cyberbullying. These items included being sent
nasty emails or nasty messages on the internet, having mean or nasty comments
posted on web sites (i.e., MySpace or Facebook), or being left out or ignored over
the internet. As with traditional victimisation, participants were asked to indicate
how often each of these behaviours occurred on a 5-point Likert scale with
responses ranging from never to most days this term. Cronbach’s alpha for the
cyber-victimisation scale was .87.
Austrian sample: Cyber-victimisation was measured using five behavioural items
which asked about experiences of being bullied via the Internet or mobile phone
(e.g., How often have you been harassed by mean text messages during the last two
months from other students?). The items covered the frequency of behaviours
within the last two months. Their response format ranged from never to nearly
every day on a 5-point Likert scale. Cronbach’s alpha for the cyber-victimisation
scale was .94. As above, the same scoring scale (0–4) was used in the analysis to
ensure comparability between the two samples. The scales in both samples were
calculated as mean scores of the items.
Assessment of Help-Seeking Behaviours
Australian sample: Help-seeking behaviour was measured using one item, which
asked if participants had spoken to anyone about being bullied (e.g., ‘Did you ask
for help, when you were bullied again and again lately in ways not easily seen by
others at school?’). The response format for the item ranged from No (score = 0) to 199
▲
Yes (score = 1). Participants could indicate that they were not bullied or could
refuse to answer. Only those students who were cyber-victimised and indicated that
they had sought help were asked to identify whom they asked for help (i.e., ‘Whom
did you ask for help, when you were bullied again and again lately in ways not
easily seen by others at school?’). Eight different possibilities were given: (1)
parents/guardians, (2) friends from school, (3) friends not from school, (4) teach-
ers, (5) other family members, (6) kids help line, (7) website and (8) others.
Austrian sample: Two specific forms of help-seeking behaviour were measured (i.e.,
‘Did you tell somebody that you have been harassed by mean text messages,
emails, videos or photos?’; ‘Did you ask for help, when you were harassed again
and again lately in ways not easily seen by others at school?’). The response format
for the items ranged from No (score = 0) to Yes (score = 1). Participants could indi-
cate that they were not bullied or could refuse to answer. For the help-seeking vari-
able, a sum score of the 2 help-seeking items was computed. This sum score ranged
Results
Descriptive Statistics
The means, standard deviations and bivariate correlations of the study variables
are presented in Tables 1 and 2. ANOVAs were used to test for the statistically sig-
nificant differences between the three groups and gender. Importantly, given the
different format between the Australian and Austrian help-seeking item, only those
students who indicated they were cyberbullied (on a global cyber-victimisation
item) were included in the analyses using the help-seeking and emotional symptoms
questions. In the Australian sample, girls reported higher rates of victimisation
(cyber or traditional) and emotional symptoms than boys. In the Austrian sample,
girls reported more emotional symptoms than boys, while boys reported more inci-
dences of cyber-victimisation than girls.
Overall, the vast majority of Australian students reported asking for help
200
▲
(85.1% asked for help whereas 14.9% did not) and there was a significant gender
difference was found between girls (89.8%) and boys (78.9%) (χ2 = 81.1, df = 1, p
< .001) with more girls asking for help than boys. In the Austrian sample the stu-
dents answered two general items regarding help-seeking behaviour. The first item
TA B LE 1
Means, Standard Deviations and Bivariate Correlations Between the Study Variables in the Australian
sample
Australian study variables Girls Boys t df P value 1. 2. 3.
1. Cyber victimisation .11 (.31) .09 (.34) -3.4 5637 .001 — .55*** .22***
2. Traditional victimisation .43 (.59) .38 (.60) -3.2 5900 .002 .48** — .35***
3. Emotional symptoms .60 (.45) .47 (.44) -11.4 5606 < .001 .14*** .31*** —
Note: ** p < .01. *** p < .001. Correlations shown above the diagonal axis are for girls, below are for boys.
Cyber-Victimisation, Help-Seeking and Emotional Symptoms
TA B LE 2
Means, Standard Deviations and Bivariate Correlations Between the Study Variables in the Austrian
Sample
Austrian study variables Girls Boys F(1,1528) 1. 2. 3.
Note: ** p < .01. *** p < .001. Correlations shown above the diagonal axis are for girls, below are for boys.
covered help-seeking behaviour after being cyber-bullied. This item was answered
by 559 students (238 girls and 321 boys). Overall, 42% girls stated that they
sought help, while only 19% of boys indicated this (χ2 = 34.22, df = 1, p < .001).
The second item covered help-seeking behaviour after being bullied in a covert
way. This item was answered by 560 students (260 girls and 300 boys). Overall,
49% girls stated that they sought help, while only 34% of boys indicated this (χ2 =
12.12, df = 1, p < .001).
The Australian students who were cyber-victimised were most likely to ask
friends from school, parents or guardians for help, followed by friends outside
school, teachers, and other family members (Table 3). In Austria, parents or
guardians were asked for help most often, followed by friends from school, friends
outside school, teachers, and other family members. Kids help lines and websites
were rarely contacted by students from either country although Australian boys
who were cyber-victimised were significantly more likely than girls to seek help
from a website. No gender differences were found in the Austrian sample but sta-
tistically significant differences were found on several variables in the Australian
sample. In general, Australian girls were more likely to talk to parents/guardians,
friends from school, friends not from school or other family members. In contrast,
Australian boys were more likely to talk to teachers than were girls.
Testing the Hypothesised Model
The associations between gender, cyber-victimisation, traditional victimisation, 201
▲
TA B LE 3
Where Students Seek Help
Australian girls Austrian boys P value Australian girls Austrian boys P value
(N = 1800) (N = 1189) (N = 127) (N = 103)
Measurement Model
Australian sample: In the first step, a two latent factors model for victimisation was
constructed. The latent factor ‘cyber-victimisation’ was built using the eight cyber-
victimisation items. The latent factor ‘traditional victimisation’ was used for the 12
traditional victimisation items. The two latent factors were allowed to correlate.
The model fit was good CFI = 0.94, RMSEA = 0.068 (χ2 was not used due to an
extremely large sample size). In a second step, a latent factor model for emotional
symptoms was created using five emotional items. This model fit was also good, CFI
= 0.98, RMSEA = 0.059 (χ2 was not used due to an extremely large sample size).
Austrian sample: In the first step, a two latent factors model for victimisation was
constructed. The latent factor ‘cyber-victimisation’ was built using the five cyber-
victimisation items. The latent factor ‘traditional victimisation’ was used for the
five traditional victimisation items. The two latent factors were allowed to corre-
late. The model fit was excellent, χ2(33) = 155.92, p < .01, CFI = 0.99, RMSEA
0.05. In a second step, a latent factor model for emotional symptoms was created
using the five emotional symptoms items. This model fit was not satisfactory, χ2(5)
202
▲
= 61.75, p < .001, CFI = 0.97, RMSEA 0.09. The modification indices suggested to
correlate the residuals of the item ‘I have many fears, I am easily scared’ with all
other four items. Therefore, we decided to delete this item. The four item model fit
was excellent, χ2(2) = 4.99, p = 0.08, CFI = 0.99, RMSEA 0.03.
Structural Model
Australian sample: In the second step, we constructed the initial, hypothesized
model (Figure 1). The model had an adequate fit, CFI = 0.88, RMSEA = 0.039 (χ2
was not used due to an extremely large sample size) and it explained 20% of vari-
ance in emotional symptoms (R2 = .20). Statistically significant paths (standardised
coefficients) are shown in Figure 1. Being a girl was positively related to being
cyber-victimised, being traditionally victimised, reporting emotional symptoms and
with seeking help. Of interest, in the Australian sample, cyber-victimisation was
not related to emotional symptoms but traditional victimisation was. In addition,
traditional victimisation was related to help-seeking behaviour whereas cyber-
Cyber-Victimisation, Help-Seeking and Emotional Symptoms
FIGURE 1
The final Australian model displays standardised coefficients for predicting the direct and indirect effects of
gender, cyber-victimisation, traditional victimisation, and help seeking on emotional symptoms.
FIGURE 2
The final Austrian model displays standardised coefficients for predicting the direct and indirect effects of
gender, cyber-victimisation, traditional victimisation, and help seeking on emotional symptoms.
toms. No evidence was found for indirect effects in either sample. Furthermore, the
hypothesised model suggests that cyber-victimisation and traditional victimisation
would help to explain the association between gender and emotional symptoms.
Indeed, a very small specific indirect effect was found for cyber-victimisation in the
Austrian sample (b = 0.01, p = .04). To summarise, help-seeking behaviour was
neither directly nor indirectly associated with emotional symptoms.
204
▲
Discussion
This study examined help-seeking and self-reported emotional symptoms in 10- to
15-year-old students who were bullied via cyber and traditional methods. Seeking
help (by reporting to someone) when being bullied is not a common behaviour,
especially with males (Hunter et al., 2004). However, if incidences of bullying are
under- or unreported, then schools (in addition to teachers and parents) appear
unable to provide the necessary assistance and support. The challenge for school
staff (and parents) is to create an environment (virtual or otherwise) that encour-
ages help-seeking and the reporting of bullying behaviours. Therefore, we were
interested to examine the phenomenon of help-seeking in relation to bullying expe-
riences and the association with self-reported emotional symptoms in young stu-
dents from two countries.
Cyber-Victimisation, Help-Seeking and Emotional Symptoms
colleagues found that some cyberbullying behaviours (e.g., using pictures or videos)
would be considered more harmful than traditional behaviours whereas others
(e.g., via mobile phone text message) may not be viewed as being as harmful as tra-
ditional bullying (Smith et al., 2008). Therefore, it may be that the majority of the
cyberbullying behaviours experienced by the students in this study were less
harmful relative to the traditional behaviours. If it is the case that most of the
cyberbullying behaviours experienced were relatively mild (relative to other bully-
ing behaviours), then it may also be the case that help was not sought as those vic-
timised may have had the skills to deal with these behaviours themselves.
Hunter et al. (2004) reported that students were more likely to report if they felt
that something could be achieved by telling someone. Being cyberbullied in addi-
tion to being bullied by more traditional methods may result in students feeling
more helpless (i.e., there is no easy solution or that the situation can’t be fixed),
thus making it less likely that they will report. This could result in higher levels of
important to ensure that young people who are being victimised have a variety of
strategies that encourage and enable them to report or seek help.
Strengths and Limitations
There are several strengths to this study. First, it is the only study (that we are aware
of) to examine the relationship between different forms of victimisation (cyber and
traditional) and help-seeking behaviours and the relationship to self-reported emo-
tional symptoms. The emergence of cyberbullying and cyber-victimisation has
created a significant amount of concern for teachers, school psychologists, counsel-
lors, pastoral care teams and parents. Of concern is school staff reporting a lack of
awareness of these behaviours occurring. Although many students in this sample
reported seeking help, we did not find a relationship between help-seeking and
self-reported emotional symptoms in students who were cyber-victimised. The cross-
cultural consistency of this result adds weight to the importance of providing clear
avenues that encourage and enable students to report all forms of bullying.
Cyber-Victimisation, Help-Seeking and Emotional Symptoms
Furthermore, although there were some minor differences in item wording, the key
outcome variables (help-seeking and emotional symptoms) were identically worded.
Overall, there were some limitations with this study. For example, some items that
assessed victimisation (cyber and traditional) were worded differently between the
two countries. Nevertheless, this difference was largely due to the need to ensure the
items best reflected the cultural background of participants to maximise understand-
ing. Another important limitation relates to the way in which the help-seeking ques-
tions were formatted. Although the wording was identical, the fact that the
Australian students could answer this question even though they may not have been
bullied (i.e., if they misunderstood the nature of the question) may have resulted in
an over estimation of the number of students who asked for help. We attempted to
account for this by only selecting those participants who indicated they were cyber-
bullied on a global measure of victimisation. Nonetheless, although we suggest that
these data be interpreted with caution, the consistency with the data collected from
Austria and, as noted, UK students (by Smith et al., 2008) is notable.
Other limitations concern the nature of the data collected. First, all measures
were self-reports. Second, as with all cross-sectional studies the causal direction of
the relationships cannot be determined, and thus our focus is on associations
between the variables involved.
Conclusion
The accurate identification of young people who are being bullied relies, in part, on
these behaviours being reported. Without awareness of the prevalence, types and
extent of bullying behaviours, adults (especially school staff and parents) are less
able to provide support. This is even more the case with less obvious forms of bul-
lying, such as cyberbullying. The results of this study suggest that young people
in Australia and Austria who reported being cyber-victimised indicated they were
less likely to seek help. This lack of help-seeking/reporting is a major concern to
schools and parents and requires the development of strategies to ensure that
young people who are being victimised receive the help and support they need.
References 207
▲
Arsenault, L., Bowes, L., & Shakoor, S. (2009). Bullying victimization in youths and mental
health problems: ‘Much ado about nothing’? Psychological Medicine, 29, 1–13.
Bentler, P.M. (1990). Comparative fit indexes in structural models. Psychological Bulletin,
107(2), 238–246.
Besag, V.E. (1989). Bullies and victims in schools: A guide to understanding and manage-
ment. Milton Keynes: Open University Press.
Boulton, M.J., & Underwood, K. (1992). Bullying/victim problems among middle school
children, British Journal of Educational Psychology, 62, 73–87.
Child Health Promotion Research Centre. (2008). Cyber Friendly Student Summit. Perth,
Australia: Author.
Cowie, H., & Olafsson, R. (1999). The role of peer support against bullying. School
Psychology International, 20, 96–105.
Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L., et al. (2009). Australian
Covert Bullying Prevalence Study (ACBPS). Perth, Australia: Child Health Promotion
Research Centre, Edith Cowan University.
Dooley, J.J., Cross, D., Hearn, L., & Treyvaud, R. (2009a). A review of the Australian and
international cyber-safety literature (A report prepared for the Department of
Broadband, Communications and the Digital Economy, p. 276). Perth, Australia: Edith
Cowan University.
Dooley, J.J., Pyzalski, J., & Cross, D. (2009b). Cyberbullying and face-to-face bullying:
Similarities and differences. Zeitschrift fur Psychologie/Journal of Psychology, 217(4),
182–188.
Eslea, M., Menesini, E., Morita, Y., O’Moore, M., Mora-Merchan, J.A., Pereira, B. et al.
(2004). Friendship and loneliness among bullies and victims: Data from seven coun-
tries. Aggressive Behavior, 30, 71-83.
Farrington, D.P., & Ttofi, M.M. (2009). School-based programs to reduce bullying and vic-
timization. Campbell Systematic Reviews, 6, doi: 10.4073/csr.2009.6
Fekkes, M.F., Pijpers, I.M., & Verloove-Vanhorick, S.P. (2005). Bullying: Who does what,
when and where? Involvement of children, teachers and parents in bullying behavior.
Health Education Research, 20(1), 81–91.
Gazelle, H., & Ladd, G.W. (2003). Anxious solitude and peer exclusion: A diathesis-stress
model of internalizing trajectories in childhood. Child Development, 74, 257–278.
Goodman, R. (2001). Psychometric properties of the Strengths and Difficulties Question-
naire (SDQ). Journal of the American Academy of Child and Adolescent Psychiatry, 40,
1337–1345.
Goodman, M.R., Stormshak, E.A., & Dishion, T.J. (2001). The significance of peer victim-
ization at two points in development. Journal of Applied Developmental Psychology,
22, 507–526.
Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Traditional bullying and cyberbullying:
Identification of risk groups for adjustment problems. Zeitschrift für Psychologie /
Journal of Psychology, 217, 205–213.
Gradinger, P., Strohmeier, D. & Spiel, C. (in press). Motives for bullying others in cyber-
space: A study on bullies and bully-victims in Austria. In Q. Li, D. Cross & P. Smith
(Eds.), Bullying in the global village: Research on cyberbullying from an international
perspective.
Hanish, L.D. & Guerra, N.G. (2002). A longitudinal analysis of patterns of adjustment fol-
lowing peer victimization. Development and Psychopathology, 14, 69–89.
Hunter, S.C., Boyle, J.M.E., & Warden, D. (2004). Help seeking amongst child and adoles-
cent victims of peer-aggression and bullying: The influence of school-stage, gender, vic-
timisation, appraisal, and emotion. British Journal of Educational Psychology, 74,
208
▲
375–390.
MacLeod, M., & Morris, S. (1996). Why me? Children talking to ChildLine about bullying.
London: ChildLine.
Mitchell, K.J., Ybarra, M., & Finkelhor, D. (2007). The relative importance of online vic-
timization in understanding depression, delinquency, and substance use. Child
Maltreatment, 12, 314–324.
Molcho, M., Craig, W., Due, P., Pickett, W., Harel-Fisch, Y., & Overpeck, M. (2009). Cross-
national time trends in bullying behaviour 1994–2006: Findings from Europe and
North America. International Journal of Public Health, 54, 225–234.
Muthén, L.K., & Muthén, B.O. (2007). Mplus user’s guide (5th ed.). Los Angeles, CA:
Muthén & Muthén.
Nansel, T.R., Craig, W., Overpeck, M.D., Saluja, G., & Ruan, W.J. (2004). Cross-national
consistency in the relationship between bullying behaviors and psychosocial adjust-
ment. Archives of Pediatrics and Adolescent Medicine, 158, 730–736.
Naylor, P., Cowie, H., & del Rey, R. (2001) Coping strategies of secondary school children
in responses to being bullied, Child Psychology and Psychiatry Review, 6(3), 114–120.
Cyber-Victimisation, Help-Seeking and Emotional Symptoms
Novick, R.M., & Isaacs, J. (2010). Telling is compelling: The impact of student reports of
bullying on teacher intervention. Educational Psychology, 30(30), 283–296.
O’Moore, A.M., Kirkham, C., & Smith, M. (1997). Bullying behaviour in Irish schools: A
nationwide study. Irish Journal of Psychology, 18(2), 141–169.
Oliver, C., & Candappa, M. (2007). Bullying and the politics of telling. Oxford Review of
Education, 33(1), 71–86.
Perren, S., Dooley, J.J., Shaw, T., & Cross, D. (in press). Being victimised in school and
cyberspace: Associations with depressive symptoms in Swiss and Australian adoles-
cents. Child and Adolescent Psychiatry and Mental Health, 4, 28. doi: 10.1186/1753-
2000-4-28.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child
Psychology and Psychiatry, 49, 376–385.
Smith, P.K., & Sharp. S. (1994). School bullying: Insights and perspectives. London:
Routledge.
Smith, P.K., & Shu, S. (2000). What good schools can do about bullying: Findings from a
decade of research and action. Childhood, 7(2), 193–212.
Smith, P.K., Shu, S., & Madsen, K. (2001). Characteristics of victims of school bullying:
Developmental changes in coping strategies and skills. In J. Juvonen & S. Graham
(Eds.), Peer harassment in school: The plight of the vulnerable and victimised (pp. 332–
351). New York: Guilford Press.
Spiel, C., & Strohmeier, D. (under review). National strategy for violence prevention in the
Austrian public school system: Development and implementation. International Journal
of Behavioral Development.
Steiger, J.H. (1990). Structural model evaluation and modification: An interval estimation
approach. Multivariate Behavioral Research, 25(2), 173–180.
Ttofi, M.M., & Farrington, D.P. (2008). Bullying: Short-term and long-term effects, and the
importance of Defiance Theory in explanation and prevention. Victims and Offenders,
3, 289–312.
Twyman, K., Saylor, C., Taylor, L.A., & Comeaux, C. (2010). Comparing children and ado-
lescents engaged in cyberbullying to matched peers. Cyberpsychology, Behavior, and
Social Networking, 13(2), 195–199.
Unnever, J.D., & Cornell, D.G. (2004). Middle school victims of bullying: Who reports
being bullied? Aggressive Behavior, 30, 373–388.
Willard, N.E. (2007). Cyber-bullying and cyber-threats: Responding to the challenge of
online social aggression, threats, and distress. Illinois: Research Press.
209
▲
Yablon, Y.B. (2008). Internet as a source of help in dealing with school violence. Journal of
Educational Computing Research, 39(3), 205–220.
D
espite significant overlaps between victim status in traditional forms of bully-
ing and cyberbullying, and qualitative results about self-reported
reasons for cyberbullying, the role of revenge and retaliation as a
motive to engage in acts of cyberbullying has not yet been examined
systematically. As a first step, this study investigates whether and to
what extent traditional victims, when they become cyberbullies,
actually choose their former (traditional) perpetrators as targets of
their own cyberbullying behavior. Furthermore, the impact of indi-
vidual differences in relevant traits, such as vengefulness and justice
sensitivity, on the choice of cybervictims is examined. Data from 473
students were collected via an online survey. Of these, 149 were
identified as traditional victims/cyberbullies. Results show that tradi-
tionally bullied students indeed tend to choose their former perpetra-
tors as cybervictims, and that individual differences play a role in the
choice of their victims. Implications for further research, as well as
for interventions and prevention programmes, are discussed.
■ KEYWORDS: cyberbullying, bullying, revenge, justice, empathy
Address for Correspondence: Andreas König, Université du Luxembourg, FLSHASE, Research Unit INSIDE,
Bâtiment XII, Route de Diekirch, L-7720 Walferdange, Luxembourg. E-mail: andreas.koenig@uni.lu
▲
The overlaps between offline and online bullying reported in several studies
could be interpreted as further empirical. For example, Ybarra and Mitchell (2004)
found that most cyberbullies were also cybervictims, and that almost half of the
cyberbullies reported having been victims of traditional bullying. However, these
overlaps between cyberbullies and (cyber)victims still do not reveal any informa-
tion as to whether the targets of cyberbullying are actually those who had been
(traditionally) perpetrating the cyberbully before. Cyberbullying could as well be
directed against known or unknown third persons, in which case one could not call
it revenge, but rather some form of displaced aggression. The present study is the
first to specifically address revenge for being bullied within the relevant subsample
of traditional victims/cyberbullies.
On a conceptual level, Ybarra and Mitchell (2004) argue that while for some
cyberbullies, the internet may simply be an extension of the schoolyard, some may
compensate their physical weakness (which precludes them of becoming ‘tradi-
tional bullies’) by using cyberbullying to assert dominance over others. The ability
to remain unidentified as a cyberbully creates an asymmetrical power constellation.
Victims of traditional bullying may seek retribution through technological means,
thereby ‘turning the table’ on their aggressors (Hinduja & Patchin, 2009). This is
made possible through the equalising characteristics of the Internet and its ability
to preempt the relevance of physical intimidation (Kowalski & Limber, 2007).
According to Ybarra and Mitchell (2004), these differences in the aspect of asym-
metrical power between conventional and cyberbullying may help explain why
bullies are not always cyberbullies and vice versa.
Based on the aforementioned conceptual and empirical arguments, we expected
a substantial percentage of traditional victims/cyberbullies to be motivated by
revenge. Considering the existing gap in current cyberbullying research, this study
aims to make a first step in addressing this question by examining in how far tradi-
tional victims, when they become cyberbullies, actually choose their former (tradi-
tional) perpetrators as their targets. Only then would it make sense to consider
cyberbullying a form of revenge.
Second, we investigated to what degree cyberbullies’ choice of targets can be
predicted by personality traits that are known to be related to vengeful behavior.
We expected that the extent to which cyberbullies chose their former (traditional)
perpetrators as targets can be predicted by dispositional vengefulness and justice
sensitivity from a victim’s perspective. Vengefulness has been conceptualised as the
degree to which individuals tend to inflict harm or demand retribution for a per-
ceived wrong (Stuckless & Goranson, 1992). Justice sensitivity from a victim’s
perspective (or simply, ‘victim sensitivity’) has been conceptualised as the degree
to which a person responds with anger, moral outrage, and rumination towards
unfair disadvantages and victimisations (cf. Schmitt, Gollwitzer, Förster, &
Montada, 2005). Victim-sensitive individuals have been shown to respond particu-
larly sensitive towards being exploited, deceived, or humiliated (Gollwitzer &
Rothmund, 2009; Gollwitzer, Rothmund, Pfeiffer, & Ensenbach, 2009) and tend
to be more punitive (Schmitt, Neumann, & Montada, 1995). Thus, highly victim-
sensitive individuals should be particularly motivated to avenge prior victimisation.
212 Since revenge is also motivated by a desire to make it clear that one is not the kind
▲
while at the same time hiding his/her identity from the target. Thus, cyberbullying
allows taking revenge while minimizing the probability of retaliation.
Empathy has also been linked to aggressive behavior in several studies (Jolliffe,
2004). To date, research has mainly focused on the link between empathy and
aggression in general. Only few studies addressed the empathic skills of traditional
bullies. These studies revealed an inconsistent pattern, which seems to be related to
the gender of participants. There is even less research on cyberbullying and
empathy. As mentioned above, cyberbullies remain more anonymous than tradi-
tional face-to-face bullies. This anonymity, or distance between the perpetrator and
the victim, implies that perpetrators will be prevented from observing the immedi-
ate consequences of their behavior. Therefore, cyberbullies may even experience
less empathy for their victims than traditional bullies (Pornari & Wood, 2010).
Alternatively, cyberbullying may particularly attract persons with low trait
empathy. However, and in contrast to findings with traditional bullying, first
research findings do not support this role of empathy for cyberbullying.
Cyberbullies were not found to show a lack of empathy in comparison to victims,
bully-victims, and non-involved persons (Almeida et al., 2008). Therefore, we
decided to control for empathy, but did not have a specific hypothesis.
Method
The methods section will start with a description of the procedure. Next, the meas-
ures used and the study sample will be described.
Procedure
The study was advertised in a popular German online discussion forum for stu-
dents (Schuelervz.net). The link was active for a period of one week in December,
2009. As an incentive, gift vouchers (5 x 20€ and 2 x 30€; redeeming required an
adult) were raffled among participants. Winners could choose between vouchers
either for a clothing store or for an online bookshop. To maintain anonymity, those
who completed the questionnaire were redirected to another webpage, where they
could enter their contact data for the raffle in a separate dataset. 213
▲
Instruments
Because of the ordinal response format, no scale was computed. Instead, stu-
dents who indicated performing at least one of the mentioned behaviors once or
twice within the last 6 months were categorised as cyberbullies. If, for example, a
participant indicated that he or she denigrated someone once or twice within the
last 6 months, this was considered a relevant cyberbullying behaviour, even if he or
she performed no other form of cyberbullying during that time.
Traditional victimization. Students indicated how often they had become the victim
of traditional bullying within the last 6 months on a single item, using the same 5-
point ordinal response format as for cyberbullying, preceded by a description of
(traditional) bullying (Scheithauer, Hayer & Petermann, 2003) in order to ensure
that participants would not include acts of cyberbullying in their answer concern-
ing their overall involvement in (traditional) bullying. For the purpose of this study,
students who indicated being bullied at least once or twice within the last 6 months
were categorized as ‘traditional victims’. Note that our operationalisation of
(cyber)bullying differs from typical operationalisations of bullying, where a child
would only be categorised as a ‘bully’ if he or she repeatedly engaged in such
behaviour. For the present purpose, we decided to omit this criterion since our
research question is mainly correlational, and a valid estimation of the prevalence
of cyberbullying is not important for our hypotheses.
Vengefulness. Dispositional vengefulness was assessed with a German version
(Werner & Appel, 2004) of the revenge subscale of the Transgression-Related
Interpersonal Motivations Inventory (TRIM; McCullough et al., 1998). An item
example is ‘I want him/her to get what he/she deserves’ (5 items; α = .88). Responses
were given on a 6-point Likert scale (1–6). For further analyses, mean scores were
computed for all measures with a continuous (equidistant) response format.
Victim sensitivity. A brief version (cf. Faccenda, Pantaléon, Bois & Schmitt, 2008)
of Schmitt et al.’s (2005) victim sensitivity for befallen injustice (SBI) scale was
employed in this study. An item example is ‘It annoys me when I’m treated worse
than others’ (5 items; α = .77).
214
▲
Demographic and other control variables. Along with age and sex of participants, they
were asked about their self-assessed technological competency in matters of mobile
phone and Internet and about the presence of peers during acts of cyberbullying
with one item each. No further demographic or SES data were collected. This was
done in order to reduce participation time to a minimum, and to foster a sense of
anonymity among participants.
Participants/Sample
Out of 777 participants starting with the online questionnaire, 77 already dropped
on the first page and another 63 on the second page when asked about their age
and sex. In general, the dropout rate increased by 2–4% per page after that.
Testing for differences between those who did vs. did not complete the question-
naire did not yield any significant results. Only a few questions were programmed
to be obligatory to prevent page skipping, so not every participant reaching the last
page answered to every single question. Eventually, 473 (60.9%) had a sufficient
completion rate to be retained for further analyses.
Three-hundred and seventy-five (79.3%) persons were classified as cyberbullies.
Of these, 47.7% were male (52.3% female), 46.4% were less than 18 years old
(Range: 11 to 17; M = 14.63) and 53.6% were older than 18 years (Range: 18 to
25; M = 20.9). These rates are higher than usual (cf. Slonje & Smith, 2008), but, as
argued earlier, this might be the result of our method, and it could also be due to
the greater anonymity connected to an online survey. It is, however, of no conse-
quence for the present purpose and our analyses.
One-hundred and seventy-nine (30.9%) participants reported being traditionally
victimised at least once or twice within the last 6 months. Of these, 58.1% were
male (41.9% female), 69.3% were less than 18 years old (Range: 11 to 17; M =
14.57), and 30.7% were older than 18 years (Range: 18 to 25; M = 20.60).
Results
To answer our research questions, the overlapping category of both cyberbullies/tra-
ditional victims had to be identified first. Out of 179 traditional victims, 83.3% (N =
215
▲
149) were also cyberbullies. Of these, 56.4% were male (43.6% female), 65.8%
were less than 18 years old (Range: 11 to 17; M = 14.61), and 34.2% were older
than 18 years (Range: 18 to 25; M = 20.80). The following analyses refer to this cate-
gory of cyberbullies/traditional victims only, with a varying N depending on the
number of complete answers on the according third variables.
Choice of Last Victim
Of all cyberbullies/traditional victims, N = 133 answered to the question of
whether or not they had chosen a traditional perpetrator as their last online target
(see Table 1). Of these, 41.4% (N = 55, subsequently referred to as ‘avengers’) indi-
cated choosing a target who had traditionally bullied them before (which equals
14.7% among all 375 cyberbullies), whereas 58.6% chose another person as their
last cybervictim (subsequently referred to as ‘non-avengers’). There was no effect of
sex on this frequency: Male (58.2%) and female respondents (41.8%) did not
differ with regard to the extent to which they targeted a former traditional bully,
χ2(1; N = 133) = 0.04; p = .86. Also, there were no age differences between
avengers (M = 16.65 years; SD = 3.32) and non-avengers (M = 17.14 years; SD =
3.58) (t = 0.79; p = .43; df = 131). However, a marginally significant difference
were found for self-assessed technological competence (t = -1.66; p = .099; df =
131), with a higher competency for avengers (M = 4.20; SD = 0.99) than for non-
avengers (M = 3.86; SD = 1.27).
Reported Proportion of Traditional Perpetrators
Our second dependent variable was the self-reported proportion of ‘traditional’
perpetrators among respondents’ cybervictims on a scale from 1 to 5. Using this
continuous measure allowed us to use more sophisticated methods of data analysis.
Of 149 traditional victims/cyberbullies, 144 answered this question. Of these,
47.9% indicated not having any of their traditional perpetrators among their
cybervictims at all; 20.1% indicated that about a quarter were persons who tradi-
tionally bullied them prior to choosing them as cybervictims; 11.8% indicated
about half of them, 10.4% about three quarters, and 9.7% said about all of their
cybervictims were former traditional perpetrators. In sum, 52.1% of traditional
victims/cyberbullies stated that at least about a quarter of their victims were
persons who bullied them before.
In order to analyse the relationship between the degree of traditional victimisa-
tion and the proportion to which these victims later chose their former perpetrators
as targets for cyberbullying, we used the frequency with which those who were
classified as traditional victims indicated being bullied for further differentiation;
that is, only the four ordinal scale values from Once or twice to Several times a
week were used. This allowed us to compute an ordinal correlation coefficient
(Kendall`s tau) regarding the relationship between prior victimisation and the pro-
portion of traditional perpetrators among targets.
Does a more frequent victimisation lead to more vengeful behaviour? Apparently
yes: There was a significant correlation between the frequency of traditional victimi-
sation and the reported proportion of traditional perpetrators (r = .19; p < .01; N =
144). Separated by age or sex, the strength of this correlation differs just marginally
216 from the entire sample with r = .22 (p = .02; N = 63) for females vs. r = .17 (p = .04;
▲
N = 81) for males, and r = .21 (p = .05; N = 51) for participants older than 18 years
vs. r = .14 (p = .07; N = 93) for those younger than 18 years. Thus, neither sex nor
TABLE 1
Traditional Victimisation Within Last 6 Months and Choice of Former Perpetrator as Last Cybervictim
Traditional victimisation
N 93 16 13 11 133
% choice of traditional perpetrator 36.60% 50.00% 53.80% 36.40% 41.40%
as last cybervictim (N = 34) (N = 8) (N = 6) (N = 7) (N = 55)
% choice of other (third) person 63.40% 50.00% 46.20% 63.60% 58.60%
as last cybervictim (N = 59) (N = 8) (N = 7) (N = 4) (N = 78)
Cyberbullying as an Act of Revenge
age moderate the relation between frequency of victimisation and the proportion of
traditional perpetrators among one’s cybervictims.
Effects of Vengefulness and Victim Sensitivity
The effects of dispositional vengefulness and victim sensitivity on the proportion of
former perpetrators as targets of cyberbullying were tested via regression analyses.
As before, all analyses were performed only for those cyberbullies who reported
being victims of traditional bullying as well. Did vengefulness and victim sensitivity
predict the extent to which cyberbullies targeted a prior perpetrator? Unexpectedly,
victim sensitivity did not significantly predict the proportion of one’s traditional
perpetrators (R2corr = .04; p = .17). This did not change when controlling for age
and sex. In contrast, vengefulness turned out to be a significant predictor in a
simple regression model (R2corr = .03; p = .02). Even when controlling for age and
sex, vengefulness proved to be a significant predictor for the proportion of one’s
traditional bullies chosen as cybervictims (see Table 2).
Next, in order to assess the relevance of these traits and to identify the strongest
predictors in the context of other potentially relevant variables, a stepwise hierar-
chical multiple regression was computed, controlling for sex and age in a first
block and vengefulness, victim sensitivity, presence of peers when cyberbullying,
self-assessed technical competency and empathy in a second block (see Table 3).
Again, vengefulness emerged as a significant predictor of the proportion of former
perpetrators as targets of cyberbullying. In addition, the more peers were present, the
higher the proportion of former perpetrators among targets, which is in line with the
significant bivariate correlation between these two variables (r = .25; p = .002; N =
134). Although the proportion of former perpetrators deviated from normality, the
distribution is well within the critical limits proposed by West, Finch and Curran
(1995) with skewness = .91 (SD = .20), and kurtosis = -.50 (SD = .40).
Discussion
The substantial overlap of involvement in traditional and cyberbullying led to the
assumption that revenge might be an important motive for cyberbullying (Ybarra
217
▲
& Mitchell, 2004; Smith et al., 2008). Also, some authors found that youth, when
asked why they cyberbully others, frequently mention revenge as a motive (e.g.,
Goberecht, 2008; Hinduja & Patchin, 2009; Sanders, 2009). Previous studies have,
TA B LE 2
Regression of the Proportion of Traditional Bullies Among Cybervictims on TRIM-R
R2corr Beta t F p
TA B LE 3
Stepwise Hierarchical Multiple Regression of Proportion of Traditional Bullies Among Cybervictims
on TRIM-R, SBI, Empathy, Presence of Peers and Technological Competency of Traditional Victims/
Cyberbullies, Controlling for Age and Sex
R 2corr Beta t F p
Included variables
Age -.125 -1.748 .083
Sex .119 1.344 .181
TRIM-R .184 2.076 .040*
Peer presence .212 2.432 .016*
Excluded variables
SBI .103 1.176 .242
Empathy .121 1.314 .191
Technical competency .121 1.400 .164
Note: N = 126 (df1 = 4; df2 = 121); *p < .05; **p < .01.
however, not explicitly investigated whether and to what extent cyberbullies actu-
ally choose their prior perpetrators as targets — only then would it make sense to
consider their cyberbullying behavior as an act of revenge. The present study aimed
to overcome this problem: Cyberbullies were directly asked whether their last
cybervictim was someone who had bullied them before, and they were asked how
many of their cybervictims were former ‘traditional’ bullies.
Our data do confirm qualitative evidence about revenge-as-a-motive and are in
line with the prevalence data concerning the overlap of traditional victimization
and involvement in cyberbullying. Within this group of traditional victims/cyber-
bullies, 41.4% chose their former perpetrator as their last victim of cyberbullying.
Taking a closer look at the proportion of perpetrators among targets, more than
half (52.1%) of traditional victims who became cyberbullies stated that at least a
quarter of their cybervictims were their former traditional perpetrators within a 6-
month period. This can be seen as an important first step in the examination of
revenge as a motive, because actually choosing a prior traditional perpetrator as
218 target for cyberbullying instead of a third person is a necessary condition for classi-
▲
(school)year, so even bullying behavior that occurred once or twice within this time
frame could potentially have occurred repeatedly. Also, the asymmetrical constella-
tion between perpetration and victimisation should be taken into account: If two
traditional victims independently take revenge by cyberbullying the same perpetra-
tor ‘once or twice’ within the last months, then this person might well be cybervic-
timised three or four times within that timeframe, meeting the usual defining
criteria of repetition from the cybervictim’s perspective (or vice versa, if a once or
twice traditionally victimised person decides to cyberbully this perpetrator several
times). Also, even a single aggressive threat can cause emotional damage and
concern about the future (Dzuka & Dalbert, 2007).
In the light of the social prestige hypothesis (Smith, 2008), the significant corre-
lation between presence of peers and the proportion of former perpetrators among
targets raises the question about the role of peers especially for cyber-avengers.
Taking revenge might be a way of gaining prestige that is socially more acceptable
than choosing innocent third persons as cybervictims. On the other hand, peers
might also propose and reinforce cyber-revenge. Further research could elaborate
how revenge and social prestige are interconnected. It is important to note,
however, that our results suggest that cyber-revenge is not taken ‘alone in a dark-
ened room’, but more likely with peers being present. By punishing the perpetrator,
the cyber-avenger can at the same time demonstrate to other relevant peers that
he/she is not a person ‘to be walked over’. This could then encourage other victims
to avenge against the same bully (if he/she perpetrated them, too), or to express
solidarity with the traditional victim by copying the behaviour and further punish-
ing the same traditional bully as a cyber-target.
According to Fiske & Morling (1996), the more power someone perceives in the
interaction with a powerful other, the more anxiety is experienced. Consequently,
the lack of power leads to coping with anxiety to restore some form of control.
Cyberbullying might help to restore such a sense of control by asserting dominance
from a safe ground. The sense of powerlessness facing a bully could therefore help
explain why some avenge against their perpetrator using traditional bullying, while
others tend to restore a sense of control by engaging in cyberbullying. However, it
does not explain why some seek cyber-revenge while others show displaced aggres-
sion directed against third persons. At this point, the victims sense of justice might 219
▲
become relevant: The venting of anger and restoring a sense of control can be
realised by (cyber)bullying anyone less powerful in a given constellation, but justice
can only be served by punishing the perpetrator. In our study, victim sensitivity was
not a significant predictor of the extent of perpetrators among cybervictims.
However, statistical power to find a small effect was only about 1-β = .39 (α = .05).
Therefore, larger sample sizes could yield significant effects. Further, being bullied
may so clearly be perceived as threatening and unjust (Dzuka & Dalbert, 2007), that
even low sensitive individuals interpreted the situation as highly unfair. Thus, no
additional variance could be explained. Further research could consider other ways
to address the role of (retributive) justice for cyberbullying by assessing direct justice
judgements, norms of ‘a just response’ or attributions of responsibility.
Engaging in cyber-revenge might also be seen from the perspective of fear of
retaliation (cf. Lawler & Bacharach, 1987): In relationships with powerful others,
individuals are less likely to confront others, but tend to avoid the target and use
link between both forms of bullying, and that there might even be a causal rela-
tionship. They further corroborate that a traditional victimisation is a risk factor of
cyberbullying behaviour. Therefore, findings also have important implications for
prevention and intervention. Approaches that address the reduction of bullying in
general might be promising in decreasing traditional bullying as well as cyberbully-
ing. Inhibiting the experience of victimisation seems to be important for preventing
cyber-revenge, which seems to appear quite frequently, but is only one way to cope
with this experience. Hence, the findings of this study should be considered during
the design and development of new anti-cyberbullying trainings, taking other forms
of handling and processing one’s own victimisation into account. Approaches that
address the reduction of revenge feelings might also be promising, as well as those
fostering a sense of control. However, the success of such approaches has to await
future evaluation. ‘Occasional cyberbullies’ might not be considered the primary
targets when thinking about preventive measures, if they do so only once or twice
Cyberbullying as an Act of Revenge
to take revenge for being bullied in person. But regarding the positive relationship
between cyber-revenge and the presence of peers, these occasional cyberbullies
might also significantly contribute to a culture where cyberbullying may be consid-
ered an appropriate answer to traditional victimisation.
The present study also has some limitations. For example, data were collected
via an online survey, which has its advantages and disadvantages (cf. Welter et al.,
2005). On the one hand, it seems plausible that there is a self-selection bias in
online surveys studying an ‘online topic’. By collaborating with Germany’s largest
discussion forum for students, we tried to minimise unrepresentative data.
Although our study was only advertised for a short period of time, it therefore had
a good chance of reaching at least a representative sample of those who use such
forums. If among this sample certain individuals were particularly attracted to our
study, it would probably be those who experienced either (cyber)bullying or victim-
isation themselves. While this would lead to an overestimation of prevalence rates,
relative proportions within the according overestimated subsamples (e.g., cyber-
avengers among cyberbullies) should hardly be affected. One might even argue that
for the sake of statistical power, this kind of self-selection is advantageous for
studies where statistical analyses are only to be performed with a subpopulation
(e.g., those who qualify for two distinct categories at the same time) that is particu-
larly more likely to participate, especially if it only accounts for a small percentage
in the entire population.
Online studies often have higher dropout rates. However, our quote of about
60%, reaching the last page of the survey can be considered satisfactory (cf. Welter
et al., 2005) and is probably due to the incentive. As far as the prevalence of the
behaviours measured is concerned, generalisation of findings may be limited.
Finally, the cross-sectional design and the methodology used do not allow inter-
preting for causal effects, even if we explicitly assessed traditional victimisation
prior to cyberbullying as a prerequisite for causality. Rather, experimental or longi-
tudinal study designs have to be realised. In sum, this study highlights the role of
revenge for traditional bullying victims in cyberbullying.
221
▲
Endnote
1 Punctuation refers to the process of dividing and organising ongoing interactions into
meaningful patterns. Although actions are interconnected by loop-backs to form a cir-
cular pattern, each participant uses their own individualised punctuation of the commu-
nication behaviours present into a sequence presuming linear causation, therefore
interpreting their own behaviour as merely a reaction on the other’s behaviour
(Watzlawick, Beavin-Bavelas, & Jackson, 1967).
References
Almeida, A., Marinho, S., Esteves, C., Gomes, S., & Correia, I. (2008). Virtual but not less
real: A study of cyber bullying and its relations with moral disengagement and
empathy. In Abstracts book 20th Biennial ISSBD Meeting. Würzburg, Germany.
Aquino, K., Tripp, T.M., & Bies, R.J. (2001). How employees respond to personal offense:
The effects of blame attribution, victim status, and offender status on revenge and rec-
onciliation in the workplace. Journal of Applied Psychology, 86, 52–59.
Bies, R.J., & Tripp, T.M. (2005). The study of revenge in the workplace: Conceptual, ideo-
logical, and empirical issues. In S. Fox & P.E. Spector (Eds.), Counterproductive work
behavior: Investigations of actors and targets (pp. 65–81). Washington, DC: American
Psychological Association.
Crick, N.R., & Dodge, K.A. (1996). Social information-processing mechanisms in reactive
and proactive aggression. Child Development, 67, 993–1002.
Knobloch, L.K., & Solomon, D.H. (1999). Measuring the sources and content of relational
uncertainty. Communication Studies, 50, 261–278.
Dzuka, J., & Dalbert, C. (2007). Aggression at School: Belief in a Personal Just World and
Well-Being of Victims and Aggressors. Studia Psychologica, 49, 313–320.
Faccenda, L., Pantaléon, N., Bois, J.E., & Schmitt, M. (2008). Adaptation and validation of
the German Justice Sensitivity Scales into French. European Journal of Psychological
Assessment, 24, 141–149.
Fiske, S., & Morling, B. 1996. Stereotyping as a function of personal control motives and
capacity constraints: The odd couple of power and anxiety. In R. Sorrentino & E.T.
Higgins (Eds.), Handbook of motivation and cognition (Vol. 3, pp. 322–346). New
York: Guilford.
Goberecht, T. (2008). Onderzoek naar het verband tussen emotionele en gedragsproblemen
en cyberpesten bij jongeren uit de eerste graad secundair onderwijs. Brussel: VUB.
Gollwitzer, M., Rothmund, T., Pfeiffer, A., & Ensenbach, C. (2009). Why and when Justice
Sensitivity leads to pro- and antisocial behavior. Journal of Research in Personality,
43(6), 999–1005.
Gollwitzer, M., & Denzler, M. (2009). What makes revenge so sweet: Seeing the offender
suffer or delivering a message? Journal of Experimental Social Psychology, 45(4), 840–
844.
Gollwitzer, M. (2009). Justice and revenge. In M.E. Oswald, S. Bieneck & J. Hupfeld-
Heinemann (Eds.), Social psychology of punishment of crime (pp. 137–156). Hoboken,
NJ: Wiley.
Gollwitzer, M., & Rothmund, T. (2009). When the need to trust results in unethical behav-
ior: The Sensitivity to Mean Intentions (SeMI) model. In D. De Cremer (Ed.),
Psychological perspectives on ethical behavior and decision making (pp. 135–152).
Charlotte, NC: Information Age.
222 Gollwitzer, M., Meder, M., & Schmitt, M. (in press). What gives victims satisfaction when
▲
McCullough, M.E., Rachal, K.C., Sandage, S.J., Worthington, E.L., Jr., Brown, S.W., &
Hight, T.L. (1998). Interpersonal forgiving in close relationships: II. Theoretical elabo-
ration and measurement. Journal of Personality and Social Psychology, 76, 1586–1603.
McCullough, M.E. (2008). Beyond revenge: The evolution of the forgiveness instinct. San
Francisco, CA: Jossey-Bass.
Messini, E., & Nocentini, A. (2009). Cyberbullying definition and measurement: Some criti-
cal considerations. Journal of Psychology, 217(4), 230–232.
Monks, C.P., & Smith, P.K. (2006). Definitions of ‘bullying’: Age differences in understand-
ing of the term, and the role of experience. British Journal of Developmental
Psychology, 24, 802–821.
Pellegrini, A.D., & Bartini, M. (2001.) Dominance in early adolescent boys: Affiliative and
aggressive dimensions and possible functions. Merrill-Palmer Quarterly, 47(1), 142–
163.
Pornari, C., & Wood, J. (2010). Peer and cyber aggression in secondary school students:
The role of moral disengagement, hostile attribution bias, and outcome expectancies.
Aggressive Behavior, 36, 81–13.
Pronk, R.E., & Zimmer-Gembeck, M.J. (2009). It’s ‘Mean’, but what does it mean to ado-
lescents? Relational aggression described by victims, aggressors, and their peers.
Journal of Adolescent Research, 25(2), 175–204.
Sanders, J. (2009, August). Cyberbullies: Their motives, characteristics, and types of bully-
ing. Presentation at the XIV. European Conference of Developmental Psychology,
Vilnius, Lithuania.
Salmivalli, C., Kaukiainen, A., Kaistaniemi, L., & Lagerspetz, K. (1999). Self-evaluated self-
esteem, peer-evaluated self-esteem, and defensive egotism as predictors of adolescents’
participation in bullying situations. Personality and Social Psychology Bulletin, 25,
1268–1278.
Scheithauer, H., Hayer, T., & Petermann, F. (2003). Bullying unter Schülern —
Erscheinungsformen, Risikobedingungen und Interventionskonzepte. Göttingen:
Hogrefe.
Schmitt, M., Baumert, A., Fetchenhauer, D., Gollwitzer, M., Rothmund, T., Schlösser, T.
(2009). Sensibilität für Ungerechtigkeit. Psychologische Rundschau, 60 (1), 8–22.
Schmitt, M., Gollwitzer, M., Maes, J. & Arbach, D. (2005). Justice sensitivity: Assessment
and location in the personality space. European Journal of Psychological Assessment,
21(3), 202–211.
Schmitt, M., Neumann, R., & Montada, L. (1995). Dispositional sensitivity to befallen
injustice. Social Justice Research, 8, 385–407.
223
▲
Steffgen, G., König, A., Pfetsch, J., & Melzer, A. (in press). The role of empathy for adoles-
cents’ cyberbullying behaviour. Kwartalnik Pedagogiczny.
Stuckless, N., & Goranson, R. (1992). The vengeance scale: Development of a measure of
attitudes toward revenge. Journal of Social Behavior and Personality, 7, 25–42.
Watzlawick, P., Beavin-Bavelas, J., & Jackson, D. (1967). Pragmatics of human communica-
tion: A study of interactional patterns, pathologies and paradoxes. New York: W.W.
Norton.
Welker, J., Werner, A., & Scholz, J. (2005). Online research [Markt und Sozialforschung mit
dem Internet]. Heidelberg: dpunkt.verlag.
Werner, R., & Appel, C. (2004). Deutscher Vergebungsfragebogen nach McCullough et al.
(1998). In A. Glöckner-Rist (Hrsg.), ZUMA-Informationssystem. Elektronisches
Handbuch sozialwissenschaftlicher Erhebungsinstrumente. Version 12.00.
West, S.G., Finch, J.F., & Curran, P.J. (1995). Structural equation models with nonnormal
variables: Problems and remedies. In R.H. Hoyle (Ed.), Structural equation modelling:
Concepts, issues, and applications (pp. 56–75). Thousand Oaks, CA: Sage.
Willard N. (2006), Cyberbullying and cyberthreads: responding to the challenge of online
social cruelty, threats, and distress, Center for Safe and Responsible Internet Use,
Champaign, Illinois.
Ybarra, M.L., & Mitchell, K.J. (2004). Online aggressor/ targets, aggressors, and targets: A
comparison of associated youth characteristics. Journal of Child Psychology and
Psychiatry, 45(7), 1308–1316.
224
▲
Cyberbullying Prevention:
One Primary School’s Approach
Donna Tangen and Marilyn Campbell
Queensland University of Technology, Australia
B
ullying in all its forms, including cyberbullying, is a continuing problem in
schools. Given the severe consequences it can have on students
(socially, psychologically and physically) it is not surprising that a
number of intervention programs have been developed, with most
advocating a whole-school approach. The current study compared
students’ self-reports on bullying between schools with and without
a Philosophy for Children (P4C) approach. A sample of 35 students
in the P4C school and a matched sample of 35 students in other
schools between the ages of 10 and 13 completed the Student
Bullying Survey. Results indicated that while there were significant
differences in incidences of face-to-face bullying, there were similar
results from both cohorts in relation to cyberbullying. Both groups
of students felt that teachers were more likely to prevent face-to-face
bullying than cyberbullying. Findings indicate that teachers and
guidance counsellors need to be as overt in teaching strategies about
cyberbullying as they are in teaching strategies about reducing face-
to-face bullying.
■ KEYWORDS: cyberbullying, philosophy, children, bullying
the newest form of bullying there are many others with which teachers and stu-
dents have had to deal: physical (hitting, kicking), non-physical (exclusion, manip-
ulation), verbal (taunting, teasing), relational (forced to comply with rules of
others), and sexual (demean, embarrass, humiliate or control another on the basis
of gender or sexual orientation) (Beaty & Alexeyev, 2008; Bhat, 2008; Hawker &
Boulton, 2000). Covert bullying, a less direct, ‘hidden’ kind of bullying, can take
the form of spreading gossip, deliberate social exclusion and cyberbullying (Cross
et al., 2009). Recent statistics released from the Australian Covert Bullying
Prevalence Study (ACBPS; Cross et al., 2009) revealed that one in four students in
Address for Correspondence: Donna Tangen, A Block, Level 3 301, Queensland University of Technology, Victoria
Park Road, Kelvin Grove QLD 4059, Australia. E-mail: d.tangen@qut.edu.au
▲
Australia between Years 4 to 9 had been bullied, with the majority of them (61%)
having experienced covert bullying. Of these students, 60% had also been teased in
‘nasty’ ways, 24% had been physically hurt, and 13% had been sent nasty mes-
sages on the internet. It would seem that bullying for school-aged children remains
a difficult dilemma for schools to resolve.
Cyberbullying is used by young people to harm others repeatedly through the
use of technology such as social networking sites and other chat rooms, mobile
phones, websites and web-cameras (Campbell, 2005; Keith & Martin, 2005). Until
recently there has been little research into this form of bullying (Harewald, 2008).
However, the ACBPS study (Cross et al., 2009) reported that 7–10% of students in
Years 4 to 9 had experienced cyberbullying. Slightly higher rates were found
among secondary students, suggesting that cyberbullying may be related to age or
access to technology. Shariff and Johnny (2007) suggested that schools have too
much information but too little knowledge on the complexities of cyberbullying to
deal with it effectively. Difficulties arise because of the anonymity of the offender
and the fact that a high percentage of bullying goes unreported.
Whole School Approach to Prevent Bullying
Given the incidence of bullying in schools and the severe consequences it can have
on students (socially, psychologically and physically) it is not surprising that a
number of intervention programs have been developed. For example, a whole-
school approach to bullying looks at prevention and intervention from multiple
angles and across a broad spectrum of the school community (Smith, Schneider,
Smith, & Ananiadou, 2004). Generally, a whole-school approach takes into
account the style and quality of leadership and management practices of the
school, the quality and delivery of the curriculum, playground activities, the quality
of supervision, as well as formalised and agreed procedures to deal with a bullying
incident (Suckling & Temple, 2001). However, there is limited positive evidence that
a whole-school approach will prevent bullying (Ttofi & Farrington, 2009). While
these approaches have led to some reductions in bullying, very few programs achieve
a reduction of near or above the 50% mark, and some studies have reported minimal
or no improvement (McGrath, 2006). However, while there is very limited solid evi-
226 dence that whole-school approaches work, there is no evidence that other kinds of
▲
intervention are superior to the whole-school approach in dealing with bullying, nor
that the whole-school approach should be abandoned (Smith et al., 2004). Indeed,
there is strong support that such an intervention can succeed, but not enough is
known to indicate exactly how and when (Woods & Wolke, 2003).
A different approach to reducing bullying has a focus on dealing directly with
bullying incidents, whatever kind of bullying has occurred. Some researchers
(Galloway & Roland, 2004), however, have argued that this direct approach is not
necessarily the most effective in the long term as an explicit focus on a particular
bullying incident cannot address all the factors that may contribute to the problem.
For example, teachers’ moral orientation in response to bullying, their training and
skills to deal with problems of bullying or, indeed, their ability to recognise bully-
ing when it occurs need to be taken into consideration (Ellis & Shute, 2007). The
argument here is not that individual bullying incidents should not be addressed
explicitly but rather it should be addressed within the wider context of social interac-
Cyberbullying Prevention
tions. This view is supported by Luiselli, Putnam, Handler, and Feinberg (2005) who
identified the need for social skills training, promotion of social competency (by
teaching students how to interact more effectively with peers and adults through
enhanced conflict resolution, developing problem solving skills), developing skills in
negotiation, and developing friendship-building abilities. One approach that aims to
address the above needs is through a Philosophy for Children (P4C) approach, devel-
oped by Matthew Lipman in the 1960s (Haynes, 2008).
The Philosophy for Children Approach
The Philosophy for Children (P4C) approach argues that through philosophy a
classroom can become a pluralistic community centred in dialogue and collabora-
tive activity where critical, creative and complex thinking are present (Cam, 2006).
The program is based not only on cognitive development but also, through partici-
pation in the community of enquiry, students’ develop social skills leading to a
strengthening of social competency. At its simplest, P4C is based on encouraging
children to think for themselves about issues, to question assumptions and to join
with other children in open-ended discussions about these issues. This process
allows children to be exposed to a view range of viewpoints on ideas in which they
themselves are interested (Shaw, 2003). However, there is a structure to the
program based on the principles of constructivism. In the P4C approach, both cog-
nitive and social constructivism interact, allowing students opportunities to solve
real-life problems. Cognitive constructivism (Powell & Kalina, 2009) has its origins
in Piaget’s work, where ideas are constructed through an individual process. In
order for learning to be effective it must be presented at students’ personal level of
logical and intellectual capabilities. Social constructivism is derived from
Vygotsky’s work (Adams, 2006; Powell & Kalina, 2009). In this approach, per-
sonal critical thinking processes are integrated through social interactions. Both
approaches focus on the learner; the teacher becomes a facilitator in the learning
process, who aids in guiding the learner and explaining complex ideas so the
learner can gain understanding. The learner is the one who constructs their under-
standing of concepts. Both approaches value inquiry as a method for learning,
where the teacher poses a puzzling situation and the students try to solve the
problem through gathering data and working towards a solution. 227
▲
The P4C approach has many aims that are derived from the principles of con-
structivism, which include encouraging curiosity and questioning, strengthening
judgment and reasoning skills, improving understanding and encouraging consider-
ation of different viewpoints (Cam, 2006; Fisher, 1998). The process involves chil-
dren reading or viewing a stimulus (such as a dilemma a person may face),
developing questions in relation to the stimulus and then participating in a dia-
logue with each other (Haynes, 2008). Trickey and Topping (2004) undertook a
systematic review of 10 studies in philosophy in education, and while the results
showed positive outcomes in developing children’s problem-solving skills, their
review concluded that it was not possible to assert that any use of P4C would
always lead to positive outcomes because implementation is highly variable.
However, there is a wide range of evidence to suggest that given certain conditions,
children can gain significantly both academically and socially by participating in
such a program.
TA B LE 1
Participants’ Demographics
P4C Others
Male 17 17
Female 18 18
Age 10 years 2 2
11 years 15 15
228
▲
12 years 17 17
13 years 1 1
Mother’s education to Y10 2 1
Y12 0 5
Technical 2 2
University 11 17
Don’t know 18 10
Father’s education to Y10 0 3
Y12 2 5
Technical 1 3
University 10 16
Don’t know 22 8
Internet access at home 27 (77.1%) 19 (54.3%)
Mobile phone ownership 19 (54.3%) 23 (65.7%)
Cyberbullying Prevention
Method
Participants
Purposive sampling of Years 6 and 7 students was undertaken, where 35 students
in Years 6 and 7 from a P4C school were matched from a pool of 465 students
from other schools in the same state. The response rate from the P4C school was
72%. One student from each non-P4C schools was matched to each student in the
focus P4C school based on a list of criteria. The criterion by which they were
matched were gender, age, mother’s highest level of education, father’s highest level
of education, internet access and mobile phone ownership. If a single match was
still not discovered after this, a random number generator was used to choose one
of the remaining matching students from the list. There were 17 boys and 18 girls
in each matched group, ages ranged from 10 and 13 years, with the mean age of
11.49 years (SD = 0.654; See Table 1).
Measure
The Student Bullying Survey (Campbell, Slee, Spears, Kift, & Butler, 2007). The
survey contains a total of 87 multiple choice and short answer questions on bully-
ing, both cyber and other forms. As this study was part of a larger study the results
of the whole survey will be published in another paper. Only demographics, bully
and victim questions and the section on school response was utilised for this
article. Examples of questions included: (Q.12) ‘Have you been cyberbullied this
year?’ (Yes/No); (Q.23) ‘Have you cyberbullied someone this year?’ (Yes/No);
(Q.42b) ‘Do you think adults at your school would … discipline the person who
cyberbullied?’
229
▲
Procedure
Parents were sent home letters informing them of the study, with requests for
parental permission forms to be signed and returned if permission was granted for
their children to participate in the study. The self-report questionnaires were com-
pleted by students during a 45-minute class period. Those students who were not
given parental permission to participate were excused from the classroom and
worked on other lessons during this time period.
Results
A crosstabs (Chi square) analysis was conducted to investigate the distribution of
victims and perpetrators of bullying in the P4C school and other schools. A higher
percentage of P4C school students claimed to have both been face-to-face bullied
and bullied others face-to-face in the last year than matched students at other
TA B LE 2
Percentage of Students Who Self-Identified as Victims and Bullies of Face-To-Face and Cyber Bullying
(With Chi Square Analysis)
P4C (35) Other school students (35)
230
▲
Discussion
The current study compared the incidence of both bullying and cyberbullying at a
school that offers a whole-school P4C approach to learning with students from
other schools who do not use this approach in upper primary. It was found that
students at the P4C school reported significantly more face-to-face bullying, as
both bullies and victims, than matched students at the other schools. However,
there were no differences in reports of cyberbullying. These results are surprising as
students at the P4C school have been participating in the P4C program for their
entire school life, which for some is 6 years prior to this study. While the P4C
program is not an anti-bullying program as such, a main feature is having weekly
discussions with a focus on helping students to become critical thinkers, especially
in relation to their behaviour towards others and how others behave towards them.
One might expect, then, that these students would have developed enough critical
Cyberbullying Prevention
231
▲
TA B LE 3
Student Perceptions of Adult Behaviour About Bullying at Their School (By Student Report of
Combined Often and Always or Some and A Lot Responses)
Face-to Face-to Cyberbullying Cyberbullying
-face P4C -face Others P4C Others
How much awareness do 88.6% (31) 85.7% (30) 77.2% (27) 77.1% (27)
adults at your school have
of bullying?
How often do adults try 82.8% (28) 82.9% (30) 45.7% (16) 45.7% (16)
to prevent bullying?
How often would adults at 54.3% (19) 48.6% (17) 45.7% (16) 54.3% (19)
your school discipline bullies?
How often do adults give 42.8% (15) 42.9% (15) 8.6% (3) 8.6% (3)
lessons to you on bullying?
How often do adults tell you 37.1% (13) 62.9% (22) 11.4% (4) 20.0% (7)
about anti-bullying policies?
References
Adams, P. (2006). Exploring social constructivism: Theories and practicalities. Education,
34, 243–257.
Department of Education, Employment and Workplace Relations (DEEWR). (2010). The
National Safe Schools Framework. Retrieved October 1 2010, from http://www.deewr.
gov.au/Schooling/NationalSafeSchools/Pages/overview.aspx
Beaty, L.A., & Alexeyev, E.G. (2008). The problem of school bullies: What the research tells
us. Adolescence, 43, 1–11.
Bhat, C.S. (2008). Cyber bullying: Overview and strategies for school counsellors, guidance offi-
cers and all school personnel. Australian Journal of Guidance and Counselling, 18, 53–66.
Cam, P. (2006). 20 Thinking tools: Collaborative inquiry for the classroom. Melbourne,
Australia: ACER Press.
Campbell, M.A. (2005). Cyber bullying: An old problem in a new guise? Australian Journal
of Guidance and Counselling, 15, 68–76.
Cyberbullying Prevention
Campbell, M.A., Slee, R., Spears, B., Kift, S., & Bulter, D. (2007). Student bullying survey.
Unpublished manuscript.
Cassidy, W., Jackson, M., & Brown, K.N. (2009). Sticks and stones can break my bones,
but how can pixels hurt me? Students’ experiences with cyber bullying. School
Psychology International, 30, 383–402.
Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L. et al. (2009). Australian
Covert Bullying Prevalence Study (ACBPS). Perth, Australia: Child Health Promotion
Research Centre, Edith Cowan University.
Ellis, A. A., & Shute, A. (2007). Teacher responses to bullying in relation to moral orientation
and seriousness of bullying. British Journal of Educational Psychology, 77, 649–663.
Espelage, D.L., Holt, M.K., & Henkel, R.R. (2003). Examination of peer group contextual
effects on aggressive behavior during early adolescence. Child Development, 74, 205–220.
Galloway, D., & Roland, E. (2004). Is the direct approach to reducing bullying always the
best? In P.K. Smith, D. Pepler, & K. Rigby (Eds.), Bullying in schools: How successful
can interventions be? (pp. 37–54). Cambridge, UK: Cambridge University Press.
Fisher, R. (1998). Teaching thinking: Philosophical enquiry in the classroom. London:
Cassell.
Harewald, R. (2008). Confronting the pedagogical challenge of cyber safety. Australian
Journal of Teacher Education, 33(3), 1–16.
Hawker, D.S.J., & Boulton, M.J. (2000). Twenty years’ research on peer victimization and
psychosocial maladjustment: A meta-analytic review of cross-sectional studies. Journal
of Child Psychology & Psychiatry & Allied Disciplines, 41, 441–455.
Haynes, J. (2008). Children as philosophers: Learning through enquiry and dialogue in the
primary classroom. New York: Routledge.
Hinton, L. (2003). Reinventing a school. Critical and Creative Thinking, 11, 47–60.
Jacobsen, K.E., & Bauman, S. (2007). Bullying in schools: School counselors’ responses to
three types of bullying incidents. ASCA Professional School Counseling, 11(1), 1–9.
Keith, S., & Martin, M.E. (2005). Cyber-bullying: Creating a culture of respect in a cyber
world. Reclaiming Children and Youth, 13, 224–228.
Luiselli, J. K., Putnam, R.f., Handler, M. W., & Feinberg, A. B. (2005). Whole-school posi-
tive behaviour support: Effects on student discipline problems and academic perform-
ance. Educational Psychology, 25(2–3), 183–198.
McGrath, H. (2006). What research tells us about whole-school programs for preventing bul-
lying. In H. McGrath & T. Noble (Eds.), Bullying solutions: Evidence-based approaches
to bullying in Australian schools (pp. 49–66). Sydney, Australia: Pearson Education
Australia.
233
▲
Ttofi, M., & Farrington, D. (2009). What works in preventing bullying: Effective elements of
anti-bullying programmes. Journal of Aggression, Conflict and Peace Research, 1, 13–24.
Trickey, S., & Topping, K.J. (2004). Philosophy for children: A systematic review. Research
Papers in Education, 19, 365–380.
Turkel, A.R. (2007). Sugar and spice and puppy dog’s tails: The psychodynamics of bully-
ing. Journal of the American Academy of Psychoanalysis and Dynamic Psychiatry, 35,
243–257.
Woods, S., & Wolke, D. (2003). Does the content of anti-bullying policies inform us about
the prevalence of direct and relational bullying behaviour in primary schools?
Educational Psychology, 23, 381–401.
234
▲
G
S
EW
&C
VI
RE
Memory Flowers
By Donna Ellis, illustrated by Philippa Morton
ISBN 978-0-646-53016-1
and memories.
Some children will ask about how or why someone died, the rituals around the
funeral, where the person has gone, and what else will change in their lives.
Questions express fears, uncertainty, and concerns. This book gives a means to be
able to talk to children about ways to try and feel better when feeling sad.
Resources are suggested to let children know that they can come up with ideas for
themselves, also. This will empower them to feel in some ‘control’ and learn skills
that might help them in other life challenges.
Memory Flowers is an excellent resource for parents who wish to help their chil-
dren cope with grief and loss. Children need to go at their own pace in addressing
questions. This book makes the answers easier to explain in a gentle, honest and
direct manner.
The colourful illustrations by Philippa Morton are adequate, but one feels that
more could have been made to highlight the strengths of the text. The figures of the
▲
family in the story resemble old-fashioned peg dolls. I am not sure this resemblance
is deliberate, but it leaves the family looking rather unemotional. I believe this
would make it more difficult for a child to identify realistic feelings.
To sum up, Ellis promotes spending time with your children, and doing things
together that make both you and them happy. This book presents as a wonderful,
colourful and articulate resource for both parents and professionals such as coun-
sellors or psychologists to use with children.
Counselling Adolescents
— The Proactive Approach
for Young People
By Kathryn Geldard and David Geldard
ISBN 978-1-84860-642-5
When you consider that the teen years are a period of intense growth, not only phys-
ically but morally and intellectually, it’s understandable that it’s a time of confusion
and upheaval for many families … Despite some adults’ negative perceptions about
teens, they are often energetic, thoughtful, and idealistic, with a deep interest in
what’s fair and right. (Dowshen, 2007 )
Into this world of confusion, change and mistaken perceptions comes the ideal
resource guide for counsellors, parents, teachers and all those people who are
struggling with the stress and challenges of dealing with adolescents, and the
demands of this stage in the adolescent life. This book not only provides a basic
236 level of knowledge about the major approaches to adolescent counselling, it is also
▲
a key resource book for the acquisition of crucial interpersonal skills that is essen-
tial for interaction with young people. This revised edition builds upon the founda-
tions laid down in the first and second editions, with a more comprehensive
coverage on the latest developments in the adolescent counselling field.
Drawing on four major themes with a wide range of topics (with the latest inclu-
sion on professional and ethical issues relating specifically to young people, as well
as a chapter dedicated to issues on forming collaborative relationships with young
people), this latest edition of Counselling Adolescents — The Proactive Approach
for Young People is indeed a ‘must-have’ guide for all those interested in working
with young people.
This latest edition integrates three areas salient to counsellors or experienced
practitioners’ reference needs. It includes the following areas: understanding the
young person, proactive counselling for young people, and the different strategies
and skills pertinent to adolescent counselling. It thus covers all the pertinent areas
Book Reviews
that one would need to know when dealing with young people. The fact that this
book is well presented, with headings to address the important ideas in the text, as
well as useful explanations illuminating complex issues, makes it an ideal guide not
only for counsellors and practitioners, but also for parents who would like to gain
a better understanding of the issues of adolescents and acquire valuable and simple
strategies to deal with the issues of their young teenager. Coming from the perspec-
tive of a parent of a 14-year-old boy, I was able to relate to most of the issues that
surfaced in the book, which makes it a practical guide for parents of adolescents,
myself included. Furthermore, the use of illustrative examples in some segments of
the book provides readers with real-life experiences on how issues highlighted are
addressed in practice. More of such clearly defined examples would be ideal as
they would enable readers to gain a more in-depth understanding of the issues dis-
cussed, allowing them to better relate to the experiences of the subjects and hence
gain a more personal insight into the issues explored.
The depth of clarity in this edition is enhanced by the inclusion of ‘Key Points’ at
the end of the chapters, which provides the readers with a summarised reflection of
the salient ideas presented in the chapter. This not only helps to reiterate the perti-
nent ideas presented but allows for further reflections where necessary. At the same
time, it helps to ease readers, particularly the layperson, into the content in the
upcoming chapters, thus facilitating a smooth transition of ideas from chapter to
chapter.
I found the first theme, ‘Understanding the Young Person’, an ideal start to
learning about the complex issues of adolescent life. It covers all the pertinent areas
and provides the readers with a basic understanding of the important factors that
affect the adolescent life. I find myself having a better understanding of this critical
age group and empathising with some of the challenges that young people face,
such as environmental stresses and hazards. The next theme highlights the proac-
tive approach towards counselling and provides the readers with a better under-
standing of the proactive process for counselling young people, complete with
well-defined and useful micro-skills counselling.
The final chapter, which provides sample case studies of the proactive coun-
selling process, has managed to illustrate all the important theories and techniques
that were described in the earlier chapters on proactive counselling. This is defi- 237
▲
nitely a must-read chapter for those interested in putting theory into practice.
Basically, each chapter makes a significant contribution, and together they offer an
all-encompassing breadth and depth of information on adolescent issues that touch
every aspect of ‘normal’ life.
This handbook is absolutely an essential companion guide and an invaluable
resource for all those working with adolescents. It is amazingly comprehensive,
well-written and generously dosed with practical anecdotes, presenting the perti-
nent issues on counselling adolescents in an accessible and reliable manner.
could be undertaken in this setting to role model appropriate technology use and
increase staff members’ awareness of how to use technology safely and effectively
(bridging the digital divide), I feel this chapter would have had more relevance and
significance for the reader.
In my opinion, Bauman’s book provides a timely discussion of an important,
emerging issue. Having worked as a school counsellor, her description of strategies
available to respond to cyberbullying incidents provide practical tips to aid the
reader to implement these immediately, as well as guidance about where to seek
further practical advice. I would recommend this book to all school staff, in par-
ticular those who work in pastoral care roles and counsellors outside of school
settings who work with school-aged children and adolescents, as a helpful intro-
duction to the issue of cyberbullying. Moreover, this book provides a description
of a large number of additional practical and evidence-based resources, for those
keen to expand their understanding of the issue.
Laura Thomas
Child Health Promotion Research Centre, Edith Cowan University
I grew up in a family where, like most other children I knew, separation and/or
divorce was virtually unheard of — a mystery. Aunts, uncles, grandparents and
great-grandparents had remained married ‘til death us do part’. In my world it was
not at all surprising for a couple to celebrate their silver, and ultimately their
239
▲
golden wedding anniversary. Only a few years ago I was commenting to a neigh-
bour on how lovely it was that some very dear friends, who were so fully commit-
ted to each other in every way possible, were about to celebrate their golden
anniversary, having been married for 50 years. My neighbour’s 13-year-old daugh-
ter, who had been silently listening to our conversation then added her own
comment, ‘But that would be boring’. Her mother and I endeavoured to offer some
explanation for the positive nature of the situation, only to be met with the reply,
‘No! Divorce is what makes the world go round’.
Another friend recently shared with me her concern regarding an information
sheet that was sent home from a local sports organisation of which her son is an
active member. On behalf of the child, parents were asked to respond to the ques-
tion, ‘Do you live with your mother or your father?’ My friend, who has been
married for over 20 years and embraces a traditional family lifestyle, was quite
aghast at the assumption that very few, if any, children would actually be living
with both parents.
summary points highlighting the key issues addressed throughout that chapter, and
a selection of questions for reflection or discussion. This volume could prove useful
to those counsellors who find themselves working across a range of clients, particu-
larly those whose primary focus is the family.
241
▲
Criminology
For over thirty years, the Australian and New
Zealand Journal of Criminology has been presenting a professional
eclectic approach to the respected tertiary field of criminology by
promoting quality research and debate on crime and criminal justice.
The journal’s high editorial standards are supported by peer review
and an impressive editorial board. A diversity of theoretical and
methodological articles are well complimented by reviews of con-
temporary issues and special topic features such as “History and
Crime” and “Indigenous Crime and Justice”.
Disciplines covered by the journal include psychology, law, politics,
history, sociology and the forensic sciences.
Brain Impairment
The official journal of the distinguished Australian Society for the
Study of Brain Impairment (ASSBI), Brain Impairment builds on 25
years of quality study and practice in all disciplines seeking to improve
the quality of life for people with brain impairment. Brain Impairment
is a truly multidisciplinary journal covering neurology, neuropsychol-
ogy, psychiatry, clinical psychology, neuropathology, occupational
therapy, physiotherapy, speech pathology and anatomy. Brain Impairment is fully peer-
reviewed with an impressive international Editorial Board.
Audiology
Since 1979, the Australian Journal of Audiology has been showcasing
242 scientific articles offering original contributions to the field of audi-
▲