Professional Documents
Culture Documents
ISBN: 978-0-494-38139-7
&<%(5%8//<,1*(0(5*,1*&21&(516$1'62/87,216,1$1(9(5
,1&5($6,1*',*,7$/:25/'
$/$15$<021'0&/($1
68%0,77(',13$57,$/)8/),//0(17
2)7+(5(48,5(0(176)257+(
'(*5((2)0$67(52)('8&$7,21
1,3,66,1*81,9(56,7<
)$&8/7<2)('8&$7,21
1257+%$<217$5,2
$ODQ5D\PRQG0F/HDQ-XQH
iv
$EVWUDFW
The relative ease by which the internet can be accessed has given way to a new
form of bullying. Coined cyberbullying by Bill Belsey in 1999, victims of online abuse
can be attacked via websites, chat rooms, instant messages, online journals, blogs, or cell
phone text messages. Since these attacks can occur at all hours of the day to millions of
people worldwide in an instant, cyberbullies can easily extend the network of abuse their
Northern Ontario public school board. With the call from the Safe Schools Action Team
of Ontario for schools to implement mandatory antibullying programs, it was evident that
there was little mention of cyberbullying. As students become more adept at accessing
and navigating the internet, schools must become more active to help educate students,
parents, and teachers about cyberbullying and how to help prevent such abuse.
Furthermore, with the evolution of cell phone capabilities to record and download
information and videos to the internet, schools face added pressure to combat
cyberbullying, since such phones can record incidences at school that can be easily
placed on the internet for many to see. As the technology advances, so must schools and
school boards with respect to how they educate and prevent cyberbullying. A series of
recommendation are listed at the end of the study to help schools and school boards take
$FNQRZOHGJHPHQWV
I would like to thank my wife, Lise, for providing her support and encouragement
devote time to my research and motivated me to take the research as far as possible.
Also, I would like to thank my daughter, Léa, for reminding me of the innocence of a
child. It is a quality that society can often lose sight of and one we need to constantly
protect. Such a quality does not project through a computer screen, which is reason
I would also like to thank Dr. Kris Kirkwood for his support and encouragement
It is my hope that this research provides some impetus for educators, schools, and
school boards to develop programs and consequences for those who cyberbully others.
Education mandates schools address both the mental and social development of children.
Since internet access allows for students to be constantly connected to others via a variety
unsafe or embarrassed enough that leaving school is their only option to combat the
cyberbully. As educators and parents, we must share the responsibility of promoting safe
and respectful online communication. It is the least we can do to protect the innocence of
our children.
vi
7DEOHRI&RQWHQWV
$EVWUDFW.............................................................................................................................................. iv
$FNQRZOHGJHPHQWV ............................................................................................................................ v
/LVWRI7DEOHV ..................................................................................................................................... vi
&+$37(521(7+(352%/(0 ................................................................................................ 1
Background .................................................................................................................................... 1
Rationale for the Study .................................................................................................................. 3
Significance of the Study ............................................................................................................... 4
Statement of the Problem ............................................................................................................... 6
Definitions....................................................................................................................................... 7
&+$37(57:25(9,(:2)7+(5(/(9$17/,7(5$785(.......................................... 9
&+$37(57+5((0(7+2'2/2*< ..................................................................................... 72
&+$37(5)2855(68/76 ....................................................................................................... 75
&+$37(5),9(6800$5<',6&866,216$1'5(&200(1'$7,216................... 99
1
&+$37(521(7+(352%/(0
Similar to the conversion from audio tapes to compact disc’s, or VHS tapes to
dvd’s, society is experiencing another technological shift from isolated devices such as
have unlimited capabilities. Furthermore, young adults are connected to the internet
more frequently than ever before, which gives them access to a variety of information via
chat rooms, e-mails, websites, online journals, blogs, text messages, and instant
messaging. Regardless if the information is intended for private or public use, the
potential for online abuse is significant. One of the fastest growing and most direct forms
such as e-mail, cell phone and pager text messages, instant messaging (IM),
%DFNJURXQG
Education has been witness to a cultural phenomenon that has escalated the level
and frequency of violence within schools. While traditional “violent acts” may have been
limited to fights, horseplay taken too far, or incidences involving some form of a weapon,
the 20th century has borne a new wave of violence–cyberbullying. Although the intent
students today have a wider array of vehicles by which to promote their hateful views.
2
With the increase in popularity of cell phones as well as the extreme ease and knowledge
with which young people navigate the World Wide Web, cyberbullying allows for
The impact for those who are harassed is profound. Instead of physical or verbal
attacks face-to-face from their perpetrators, students now find themselves being ridiculed
via instant messaging, having derogatory or slanderous statements or death threats posted
about them online, and even having websites devoted to them wherein other web users are
encouraged to join in on the harassment. While the majority of the online harassment can
be as simple as name-calling, several examples of more violent forms (i.e., death threats,
hit lists, and so on) have increased over the last few years.
Perhaps the most extreme example of cyberbullying came from the perpetrators of
the Columbine High School massacre: Eric Harris and Dylan Klebold. In the aftermath of
their deadly massacre, authorities revealed that Eric Harris operated a website that
contained “conspicuous threats against fellow students” (Keith & Martin, 2005, p. 224).
While this demonstration of rage is very rare, the important lesson society needs to take
away from such tragic events is that the internet is no longer a place to be left unmonitored.
With students becoming more and more technologically savvy, it is quite easy to
register websites and send electronic mail with relative anonymity. This allows bullies to
continue to harass their victims around the clock and with the potential to encourage and
enlist more people to log-on and do the same. Without a place to get a respite from these
bullies, whether it be at school or online, the victims are engaged in a constant, daily
5DWLRQDOHIRUWKH6WXG\
While bullying within schools has been around and studied over several decades,
the emergence of cyberbullying is a relatively new cultural phenomenon. Since the term
cyberbullying was first coined in 1999, society has become more attentive to the use and
abuse of the internet and text messaging. However, a major problem that exists with
cyberbullying is that parents do not have the control over the content their children are
exposed to. Unlike the television, which is often in a family room, computers are often
located in areas that are more quiet and segregated in rooms that are out of plain view of
the parents (i.e., bedrooms, office within a home, or other low traffic areas).
This lack of control is even more staggering when you consider the following:
x Nearly 60% of Canadian students use chat rooms and instant messaging; and
telephone, cable TV, computers in the home, and internet access in the
Moreover, “ by the year 2005, two billion people will be continuously connected to a
powerful global network of satellites and fiber optic cables,” and “by 2005 annual number
of text and visual messages sent over the Internet is expected to reach 1.2 trillion”
(Environics Research group, 2001, p. 14). While the technology continues to grow in
terms of options for connecting to the internet, the speed at which one can be connected to
the internet, and the variety of products that connect to the internet (i.e., computers, cell
4
phones, personal digital assistants, and so on), few if any controls are being placed upon
Furthermore, the technological advances are having a profound effect on the variety
of ways cyberbullying can occur. For example, students can be text messaged inappropriate
comments via cell phones or computers, have defamatory personal websites or polling sites
developed about them, have defamatory comments made about them via online journals or
With such a diverse arsenal of weapons at the disposal of bullies, particularly online
weapons, it is difficult for any victim to gain reprieve from his or her attacker(s). The ease
and speed at which messages may be sent also complicates matters further. It takes only a
minute to create and send defamatory messages with today’s technology. Combine this
with the fact that many young people spend the majority of their day at school, wherein
computers and cell phones are prevalent and easily accessible despite various controls (i.e.,
cell phone bans, blocked web sites, spy ware for teachers to see what sites students are on,
and so on), the online abuse of victims cannot be left solely in the hands of parents to
control. Since “adults approach computers as practical tools, while for kids the Internet is a
lifeline to their peer group” (Keith & Martin, 2005, p. 226), the time has come for all
parties with a vested interest in the safety of children to combine to help fight online
bullying. By working together, schools, parents, community groups, and students can help
6LJQLILFDQFHRIWKH6WXG\
Having been a high school administrator (vice-principal) for 3 years, I have dealt
verbal acts. For example, males that were being bullied tended to solve the problem via
physical aggression (fighting), while females tended to engage in more damaging verbal
student was being verbally abused by several other students in a chat room. The parents
that brought the matter to my attention were able to provide me with four pages of
transcript from the chat room conversation. The nature of the conversation ranged from
mild disgust with the one female for her actions during a basketball trip to a more
aggressive tone (swearing, speculating) wherein the others criticized the female for her
“perceptions and accusations” about an event and the repercussions they could have down
the road for everyone involved. As I resolved the situation and recorded it as a “bullying
incident,” I wondered how many other instances have occurred that were not brought to my
attention. Was this an isolated case, or were there more instances that went on that were
bullied at school, while 31.8% of students stated they report bullying to someone at school
(Adlaf, E.M., Paglia, A., & Beitchman, J.H., 2002, p. 6). The same study conducted by
OSDUS in the spring of 2003 revealed that 33% of students had been bullied since
September, which would represent some 282,900 students across Ontario (Adlaf, E.M.,
Paglia, A., & Beitchman, J.H., & Wolfe, D., 2003, p. iv). Additionally, “ a 2002 British
survey found that one in four youth, aged 11 to 19 has been threatened via their computers
or cell phones, including death threats” (National Children’s Home {NCH}, 2005, p. 3).
6
While bullying continues to be a problem within the school system, the emergence
of cyberbullying and subsequent research has not been clearly delineated from the general
“bullying” statistics. Schools either react to events within their school or implement
programs to prevent inappropriate behaviour. However, few schools or school boards have
taken the initiative to deal with cyberbullying adequately. In order to effectively deal with
cyberbullying, it must be separated from common forms of bullying (physical and verbal)
and studied more intensely. Considering that technology will only increase in speed,
demand, and capability in the foreseeable future, how schools react to the cyber world will
If there is one lesson to be learned from recent school shootings it is that bullying
played an extensive role in leading up to any attacks from the perpetrators. With a more
advanced and anonymous system at the disposal of the bully via the cyber world, the
potential for more frequent and threatening harassment will only increase. There is no
doubt that the children of today face unprecedented levels of bullying, since the bullies can
reach their victims every hour of the day on cell phones or the internet. Although victims
may not act as aggressively as executing a school shooting, the reality is that some form of
aggression is sure to occur, whether the aggression is towards the bully or inflicted upon
6WDWHPHQWRIWKH3UREOHP
cyberbullying occurs and what can be done from a school perspective to help deal with
such incidents. Considering that web-based comments are dealt with under 6HFWLRQ
harm, wherein bodily harm includes psychological injury regardless if the threat is carried
out or not, and such comments are often seen as outside of the discipline parameters of
schools and school boards since the abuse can occur outside of school hours, there are a
effectively dealt with. The key questions answered by participants of the study include the
following:
5. During which hours of the day do cyberbullying victims experience the most
abuse?
'HILQLWLRQV
such as e-mail, cell phone/pager text messages, instant messaging (IM), defamatory
repeated, and hostile behaviour by an individual or group that is intended to harm others.
communications networks.
that can be used by authorities to trace all electronic communications between computers
consumers.
PDA (personal digital assistant), or pager. Text messaging is used for messages that are no
9RWLQJERRWKV: Some websites offer users the opportunity to create online polling or
voting booths.
The documents are formatted in a markup language called HTML (HyperText Markup
Language) that supports links to other documents as well as graphics, audio, and video
files.
9
&+$37(57:25(9,(:2)7+(5(/(9$17/,7(5$785(
the frequency, consequences, and penalties associated with such deviant behaviour. First
of all, while the issue of cyberbullying is relatively new, at least in terms of reporting
such acts, it would appear that cyberbullying occurs at similar or more frequent rates than
Addiction and Mental Health, the rate for reported bullying jumped from 26.4% in 2001
to 33% in 2003, and the majority of the bullying reported was “verbal bullying” (Adlaf et
al., 2003, p.12). However, when the Canadian statistics regarding online abuse are
expanded to include those who reported that someone had said something “hurtful” to
them via the internet, the number of reported online bullying incidents jumps to 57%
Furthermore, the study found that while males are statistically more likely to bully
other students compared to females (35.3% vs. 30.3%), females generally have a higher
rate of verbal bullying on the internet than males (Adlaf et al., 2003, p. 12). While
statistics were not given to verify the exact percentage difference, the research has shown
that females prefer the secrecy of the internet to send hurtful messages and that students
prefer to send messages via the internet because they do not wish to say what they have
written face-to-face. Moreover, the majority of online abuse of males tends to suggest
homophobic themes, while females are attacked mostly for sexual promiscuity, regardless
of whether any of the themes are true or not. The research also indicates that males will
use a website to attack their victim, while females will resort to using instant messaging,
While the ease and immediacy of instant messaging and text messages have made
allowed for bullying to occur at all times of the day. Unlike physical or verbal aggression
at school, the internet has created a forum wherein the person being bullied is left with no
escape from the torment. Whether the technological weapon of choice is an e-mail,
instant message, web site, online poll, or an online journal, bullies can attack their victims
at any time. Added to the fact that many bullies use screen names to cover their identity,
it can be extremely frustrating and detrimental to the mental state of victims when they
can often escape penalties for their actions. Unless online abusers make direct threats
towards their victims, defame a person, or if their comments spread hate based upon race,
national or ethnic origin, colour, religion, sex, sexual orientation, martial status, family
status or disability, there is often nothing that can be done by the authorities.
Furthermore, the right to free speech has also provided more protection for online abuses
since they can often claim that, assuming what they are saying isn’t defamation, they
have the right to promote their views. For instance, if an online bully is commenting on
the sexual promiscuity or sexual preference of their victim, and what they are saying is
true, free speech advocates will argue they have the right to promote such views. While
the promotion of such views may be distasteful and vulgar, they remain within the legal
context of the law. One avenue that is left to victims seeking retribution is a civil lawsuit,
but the time and cost of such action often prevents many victims from doing so.
11
To complicate matters even more for the victims, internet service providers (ISPs)
often protect the identity of the creator of the website from the victims and will simply
shut down a website rather than punish the creator of the site by restricting his or her
access to the internet. Thus, nothing prevents the abuser from creating another website
For a school administrator, unless the abuse can be linked to activities done on the
school computers or within the school day, punishment can be tough to impose.
Additionally, with online abusers using screen names, it can be difficult to determine who
is sending the messages or creating websites. Even if the identity could be determined
for those that use screen names to send messages or create websites, schools would then
have to prove that the person actually sent the message or created the site. It is possible
that online abusers could access other users’ screen names and send messages to those
they hate. In essence, the victim may open the e-mail thinking it is from a friend, only to
realize that a hurtful or threatening message has been sent. Without positive proof
relating to the sender of the message, the authority of the school to impose a suitable or
terms of number of incidents and punishing those involved, which is sure to increase as
more users access internet and cell phone capabilities, there is a need for schools to
become more proactive. Regardless of computer spy ware in schools (used by teachers to
view which sites students are on), web-filtering software in computer labs, or cell phone
hurtful messages or websites occurs during school time or not, the impact upon the
12
translate into problems at school. If teachers, administrators, and other school support
staff are going to deal with the mental or physical fallout from the cyberbullying, then the
problem cannot be thought of as outside the school’s authority. Knowing the scope and
nature of the frequency of cyberbullying will help formulate possible solutions and
provide a basis by which to begin to deal with the problem from a school perspective.
<RXWK,QWHUQHW6DIHW\6XUYH\
The Crimes Against Children Research Centre (CCRC) of the University of New
Hampshire conducted a National telephone survey of 1,501 youth aged 10-17, who had
used the internet at least once a month for the past 6 months and their parents from
August 1999 to January 2000. Although the focus of the study was to gather information
about the incidence of young people receiving unwanted or illegal sexual solicitations or
pornography over the internet, the study also assessed the internet’s users’ knowledge of
x Approximately 20% youth received a sexual solicitation or approach over the last
year;
x Only 17% of youth and 10% of parents could name a specific authority to which
they could report such internet activity (Wolak & Mitchell, 2000, p. 2).
13
While the study does seem to indicate a problem with respect to internet
harassment, it is difficult to determine the extent of the problem since the survey includes
children that have used a computer sporadically (once a month for 6 months minimum)
and those that have used a computer frequently. Since the statistics fail to make a
connection between the level of usage and the frequency of online bullying or
without any knowledge of what users were using the internet for, it is difficult to put any
value into the fact that only a small percentage of users could name an authority to report
internet activity to. For instance, it is possible that a student could use the computer to
access chat rooms two or three times a month wherein he or she was constantly harassed
during each visit, compared to a frequent user that may avoid such chat rooms and never
be harassed. In either case, it is possible that the user could simply exit certain chat
rooms or never enter such areas; thus they could control the harassment by avoiding the
sites and never need to report any activity. Furthermore, without defining “sexual
solicitation” or “episodes” explicitly, the study remains very general in terms of the range
&\EHU6ODPPHG
Students in the Manhattan interschool system decided to list and rank 150
students on an online voting booth to determine who was the biggest “ho” in their ranks.
While the site was shut down afterward, no students were suspended or expelled. In fact,
a District Attorney commented that while the site was distasteful, it was protected by the
First Amendment Free Speech clause. Only a few miles away in Chappaqua, NY, two
senior students ran a website that listed information on 40 girls–including family history,
14
phone numbers, addresses, and sexual experience. While the site was password
protected, access was given to 14 boys. Each boy was suspended for 5 days and charged
with second-degree harassment, which carries a jail sentence of up to one year and a
Perhaps the most extreme case of cyberbullying occurred in Dallas in the spring
of 2001 at Lake Highlands High School. Lauren Newby, suffering from multiple
sclerosis, had her weight made fun of online, was called a “fat cow MOO BITCH,” and
was urged to “Die bitch queen!” What makes this story more shocking is that her
perpetrators, she believes, took their online activities to the physical extreme by egging
her car, writing “MOO BITCH” in shaving cream on her car, and threw a bottle of acid at
her front door, causing minor acid burns to her mother. Although the physical attacks
cannot be positively linked to the online abuse due to the anonymity of the cyberbullies,
Lauren is convinced the incidents are the work of the same individual (Benfer, 2001. p.
8).
Since the cyber attacks detailed were not hosted on school computers, and since
there is very little evidence to form a criminal charge, civil litigation seems to be the only
recourse for online victims. Furthermore, in the last 5 years, many state courts have
upheld the rights of students to publish content that school administrators found
offensive, as long as the content was published without using school computers. In most
cases, the students were mocking or critiquing the policies of administrators or teachers
<RXQJ&DQDGLDQVLQD:LUHG:RUOG7KH6WXGHQWV¶9LHZ
This study examines the use of the internet by Canadian youth, aged 9 to 17 years,
the extent to which they place themselves at risk, and their perceptions of parental
knowledge and supervision of their internet use (Environics Research Group, 2001, p.7).
The survey, conducted among 5,682 Canadian youth, aged 9 to 17 years (in grades 4
x 99% percent of Canadian youth report that they use the internet at least to some
x Among the 71 percent of youth who remember, 46 percent say they first used the
internet when they were between 8 and 10 years of age. Another one-quarter
(24%) first used it between 11 and 12 years of age. Youth in elementary school
are more likely to report first using the internet at a younger age;
x The activities that youth like to do most on the internet are playing/downloading
music (57%), sending and getting e-mail messages (56%) and surfing for fun
(50%);
x Seven in 10 youth (71%) say they have an e-mail account of some kind. Of these,
8 in 10 (81%) say they have a free Web-based e-mail account. Among youth who
have one or more e-mail accounts, 44 percent say that their parents do not know
x Almost 6 in 10 youth (56%) use chat rooms. This number is higher among youth
in secondary school. Among youth who use chat rooms, 38 percent say they at
least sometimes go into chat rooms for kids that are not monitored, compared to
only 21 percent who go into chat rooms that are monitored. More than 3 in 10
16
(33%) say they go into chat rooms for adults 18 and older. Youth in secondary
school are far more likely to say they go into chat rooms for teens that are not
monitored than go into ones that are monitored (72% compared to 39%,
respectively). Among youth who use chat rooms, more than five in ten say they at
least sometimes go into private areas of chat rooms to talk to just one person;
often do IM with friends. Smaller numbers often do this with people they’ve only
x On average, youth say they have about 30 people on their IM list; and
x Youth in secondary school are most likely to mention social factors (36%), such
as communicating with people they know and meeting new people, as the biggest
While this survey is quite comprehensive, there are a few issues with the
administration of the survey that should be noted. First of all, the surveys were
the surveys were administered under the same conditions or with the same instructions in
each selected area. Secondly, the fact that only Francophone schools in Quebec and only
Anglophone schools in the rest of Canada were surveyed could skew the data. By
selecting only schools that speak the one of the official languages in each province, the
&HQWUHIRU$GGLFWLRQDQG0HQWDO+HDOWK3RSXODWLRQ6WXGLHV%XOO\LQJ5HVXOWV
(OSDUS) concerning bullying among Ontario students in grades 7-13. Among the
17
victims of bullying, 24.6% reported being bullied in school since the start of the school
year. The survey, which included 4, 211 students in grades 7 to OAC, represents about
916,200 students across Ontario and had a completion rate of 71% amongst students.
Notable differences included males (26.9%) were bullied more often than females
(22.3%) and 7th-graders (38.7%) were bullied more often than those students in grade 12
Furthermore, the study also found that 31.8% of students report bullying to
someone at school, with males being more likely to engage in bullying than females
(40.0% vs. 20.0%). The least likely bullying perpetrators were grade 13 students
(18.3%), whereas the most likely to bully were students in grade 8 (47.7%); (Adlaf et al.,
2002, p. 1).
rate of 71% suggests roughly 1,700 students did not complete the survey (Adlaf et al.,
2002, p. 1). Depending upon which grades each of the nonrespondents were in, there
&HQWUHIRU$GGLFWLRQDQG0HQWDO+HDOWK3RSXODWLRQ6WXGLHV6XLFLGH,GHDWLRQ
which were taken from the 2001 2QWDULR6WXGHQW'UXJ8VH6XUYH\ (OSDUS). The data
indicate that 11.1% of students reported that they had seriously considered suicide during
the past year (the percentage represents 101,700 students across Ontario). Females were
more likely to contemplate suicide than males (13.3% vs. 8.9%), and students living with
two parents are less likely to report suicide ideation than those students that live with one
When the study assessed school-related factors and the impact upon suicide
ideation, the survey found that students who report being a victim of bullying are more
likely to have serious suicidal thoughts than those who bully. In total, 17.3% of bullying
victims reported having serious suicidal thoughts, 19.1% of victims who also bully others
had serious suicidal thoughts, compared to students who are bullies (only 11.6%) and
students who are neither victims nor bullies (8.6%); (Adlaf et al., 2002, p. 16).
While the statistics are staggering when you consider that 11.1% of students have
had “serious” thoughts concerning suicide, it is difficult to accept the notion that students
that live with both parents are less susceptible to suicidal thoughts than those that live
with one parent unless the report includes detailed information about the situation the
students live in. Also, if the majority of respondents were from single-parent homes, the
&%&1HZV2QOLQH&\EHUEXOO\LQJ
This article was adapted and updated from an October 10, 2002 documentary that
aired on CBC’s 7KH1DWLRQDO news program. It details the story of David Knight, who,
unbeknownst to him, had a website devoted to him wherein others were encourage to
post lewd, sexual comments smearing David’s reputation and family. A sample of the
x Accusing him of using the date rape drug on little boys; and
x Accusing him of being gay and physically dirty (Hancock & Selick, 2002).
While it took nearly seven months of phone calls, messaging, and the threat of legal
action before the internet service provider removed the website dedicated to David,
19
police authorities have commented that internet bullying is tough to combat unless it
crosses the line into death threats or other criminal offences. Furthermore, the article
stated that a recent survey found that 14% of Canadian users had been threatened while
using instant messaging, and 16% admitted they posted hateful comments themselves
(Hancock & Selick, 2002). Once again, these statistics must be looked upon with caution
since there is no clear indication of the number of people surveyed or the methods used
1HZ%UHHGRI%XOOLHV7RUPHQW7KHLU3HHUVRQWKH,QWHUQHW
Due to the fact that females tend to be more prone to communicating via text messaging
and e-mail, cyberbullying incidents seem to be more skewed towards them. Despite the
fact these incidents take place outside of the school day, often at night or on weekends,
school administrators and teachers are left to deal with the fallout of cyberbullying when
(2003) details the power and effect of cyberbullying. Rebecca had fallen victim to a
cyberbully that impersonated her on the internet for over a month, posting half a dozen
cruel e-mails and creating two websites in Rebecca’s name that slandered a friend of
hers. After being ostracized by her peers, Rebecca cried repeatedly at night and had
some residual anger towards the incident a year after the fact (Blair, 2003, p. 7).
x 74% of the 17 million teenagers who surfed the internet in 2000 used America
x More than 1/3 of teens use IM to say things they don’t want to say in face-to-face
districts design antibullying programs, and it is assumed that these policies cover cyber
harassment. One caution to note here is that while 17 million teenagers may have used
instant messenger, there is no clear distinction as to the number of teenagers that sent
derogatory messages. This could be a case where states are trying to be proactive since
the number of teenagers messaging is on the rise, rather than a reflection that those
already using instant messaging are abusing the service (Blair, 2003, p. 8).
7KH26'860HQWDO+HDOWKDQG:HOO%HLQJ5HSRUW([HFXWLYH6XPPDU\
6XUYH\ (OSDUS) was once again issued to Ontario students. The study is the longest
surveys conducted every 2 years since 1977. In the spring of 2003, 6,616 students from
37 school boards, 126 schools, and 383 classes participated (Adlaf et al., 2003, p. i). Of
note is that this survey was different from those in the past as it ranged only from grades
7-12 due to the elimination of the OAC year for Ontario students. Furthermore, this
survey also differed from those in the past because it added topics such as physical
injuries that required medical attention, trends in medical drug use since 1977, the type of
x 12% of students had serious thoughts about suicide, with more females than males
x 33% of students have been bullied at school since September. The most
x 30% of students report taking part in bullying other students at school, with
verbal attacks the most prevalent (25%), followed by physical attacks (4%), and
theft/vandalism (1%);
x Bullying is significantly more likely among males than females, and among the
younger grades;
females. This combined total of 32.7% for each group represents 310,300
females. This combined total of 29.7% for each group represents 282,900
x 47.1% of grade7 students have been bullied since September; 38.7% of grade 8
students have been bullied since September; 32.8% of grade 9 students have been
bullied since September; 32.6% of grade 10 students have been bullied since
September; 28.7% of grade 11 students have been bullied since September; and
x 31.7% of grade7 students have bullied others since September; 32.2% of grade 8
students have bullied others since September; 32.7% of grade 9 students have
22
bullied others since September; 30.5% of grade 10 students have bullied others
since September; 29.4% of grade 11 students have bullied others since September;
x About 8% of students report being bullied on a daily or weekly basis, and about
x The frequency of being bullied does not significantly vary between the sexes; and
about 23% did so monthly or less often (Adlaf et al., 2003, p. ii).
One of the interesting aspects of the study is that is has been ongoing since 1977
and surveys students every 2 years. While this surveying frequency can certainly lend
some weight to the statistics and conclusions noticed over time, there is a concern that the
frequency may result in a devaluing of the survey. For example, some students may have
heard about the survey through friends or relatives, and when they are asked to complete
the survey, tend to complete the survey with a predetermined bias due to the previous
Another concern is that the statistics on bullying do not define what constitutes
“verbal” harassment. Since many comments could fall under verbal harassment, such as
lewd jokes, derogatory comments about appearance or sexual nature, or simple name-
calling, it makes it difficult to determine the extent of the bullying problem. While 33%
is a high number in terms of students that are bullied, without knowledge of the nature of
the comments it is hard to tell if the seriousness of each “verbal” harassment case is
equitable.
23
6HDWWOH3XEOLF6FKRROV2OZHXV%XOO\LQJ6XUYH\5HSRUWIRU0F&OXUH0LGGOH6FKRRO
In November 2003, McClure Middle School completed 374 surveys (192 were
female respondents compared to 179 male respondents), for an overall response rate of
females);
x 24.3% of respondents were bullied “2-3 times a month” or more (27.3% of males
x 7.5% of respondents bullied other students “2-3 times a month” or more (8.4% of
x 45.2% of respondent’s stated that their homeroom teacher did “little or nothing”
Aside from the low response rate for the survey, an alarming statistic the study
revealed is that homeroom teachers did “little or nothing” or “fairly little” to counteract
bullying in the past couple of months (Communities that Care, 2003, p. 4). If students
were simply informed the situation was dealt with and not informed of any specific
parameters placed upon the bully, it may be difficult to lend credence to the respondents.
It is quite possible that the bully has followed every directive set upon them by the
teacher, yet may have found further ways in which to abuse their victim. Also, if the
level of bullying is not differentiated, the statistic may be skewed even further. For
example, students that experience name-calling may respond that little is being done, but
those who are being physically attacked are extremely satisfied with the actions of the
24
teacher. Under this scenario, the school may be responding well to the more serious
incidents of bullying, but the statistic will reflect unfavourably towards the teacher’s
actions.
,QWHUQHW%XOO\LQJ
The level of harassment being dished out online can vary from rumours or
pictures to videos that have been doctored to make fun of students. In her article on
Internet bullying, Amanda Paulson describes a few of the more recent cyber attacks:
x A middle-school girl had a rumour circulated about her via text messaging stating
x An overweight boy in Japan had pictures taken of him in the boys’ locker room at
school from a classmate’s cell phone, only to have them sent to several others;
x Websites often ask students to vote for the ugliest or fattest kid in school;
x Ghyslain, a Canadian teenager, filmed himself acting out a scene from “Star
Wars” with a school camera. After forgetting to erase the footage, some of his
peers took the film and uploaded it to the Internet and spliced him into scenes
from “The Matrix,” “The Terminator,” and “Chicago,” and added special effects.
The video was downloaded over one million times and forced Ghyslain to drop
The most common instances of online bullying involve instant messages sent via
chat rooms. With only a screen-name visible to the person reading the message, bullies
have little fear of being identified and held accountable for their actions. Furthermore,
with free speech rights, the anonymity of the bullies, and the fact that the abuse often
25
takes place off school property, it can be extremely hard to punish those responsible
under the authority of schools. Additionally, even if schools can take action against the
websites due to the absence of any clear policies against abuse and resources for
reporting harassment.
reporting of such incidents, to parents to talk openly with their children about such issues
at school and at home, and to students to refrain from engaging in such antics. Schools
can also take an additional step by including a cyberbullying clause in their internet use
agreements.
6HDWWOH3XEOLF6FKRROV2OZHXV%XOO\LQJ6XUYH\5HSRUW$OO6FKRROV&RPELQHG
The all schools combined report included several Seattle area schools: Denny
Middle School, Eckstein Middle School, Hamilton Middle School, John Marshall
Alternative School, McClure Middle School, Summit Alternative School, and Whitman
Middle School. The survey was completed in March of 2004. Important findings
include:
x Survey response rate: grade 6: 821 surveys completed (446 females, 375 males),
for a total response rate of 53.0%; grade 7: 752 surveys completed (424 females,
328 males), for a total response rate of 48.0%; grade 8: 671 surveys completed
x 15.3% of grade 6 students surveyed had been bullied “2-3 times a month” or
x 4.1 % of grade 6 students surveyed had been bullied “one year or more,”
x 5.3% of grade 6 students surveyed had bullied other students “2-3 times a month”
x 29.0% of grade 6 students surveyed had not told anyone about the bullying,
x 51.2% of grade 6 students surveyed stated teachers or others adults try to put a
stop to the bullying when they are aware of the student being bullied, compared to
40.8% for grade 7 and 37.0% for grade 8 (Communities that Care, 2004a, p. 8).
While the intent of the Olweus report was well intended, the low response rate
makes it extremely difficult to determine the extent of the bullying problem. With just
over half of the surveys being returned, it is possible that the actual statistics may be
6HDWWOH3XEOLF6FKRROV6DIH6FKRROV+HDOWK\6WXGHQWV3URMHFW6XPPDU\5HVXOWV
This report summarizes the findings from the Communities that Care (CTC)
Youth Survey given to grade 6, 8, 10, and 12 students in Seattle Public Schools in 2002
and again in the Spring of 2004. In total, 8,161 students (2,375 grade 6 students; 2,154
grade 8 students; 2,035 grade 10 students; and 1,597 grade 12 students) completed the
surveys, which represented 72% of all eligible students in the participating schools
(Communities that Care, 2004b, p. 1). The study identified risk factors (characteristics of
school, community, and family environments, and characteristics of students and their
27
peer groups, that are known to predict increased likelihood of drug use, delinquency,
school dropout, and violent behaviours among youth) and protective factors (factors that
exert a positive influence and act as a buffer against the negative influence of risk) as
essential to academic success and positive youth behaviours (Communities that Care,
2004b, p.2).
While the survey tended to group the issue of bullying in the heading “Anti-social
However, the study was included for comparison purposes. Essentially, the 2002 and
2004 data for grades 6 and 8 were valid since the response rate was significantly high.
However, the response rate for grades 10 and 12 in the 2004 survey was so low that it
impacted the reliability and accuracy of the data. This information is significant when
assessing the validity of the McClure Middle School Report and the All Schools
Combined Survey Report that originated from the same school system.
&\EHUEXOOLHV6WDONLQJ2QOLQH3OD\JURXQG
In her column on cyberbullying, author Cindy J. Cooper (2004) details that online
comments generally abuse boys via homophobic comments, while girls are labeled as
sexually promiscuous (p. 2). Although girls inflict more virtual abuse through
messaging, online journals, and online conversations, boys are more likely to make
While cyberbullies can reach victims via computers and cell phones, Cooper
cautions against the bully you may not know–your best friend. Oftentimes when friends
have a falling out, usually two girls, one of them is likely to use the other’s password or
screen-name to send out nasty e-mails. Although she suggests some strategies to combat
28
social climate for students, parents removing internet connections from the bedrooms of
their children, and learning whether their internet provider can track and shut down
online bullies, she is cautious that such solutions may be as “hazy as cyberspace”
5LVHRIWKH&\EHUEXOO\'HPDQGV1HZ5XOHV
Despite the advantages of technology, especially for educating young people, the
can be performed at a moment’s notice, which is the problem with technology in the eyes
of Mark Franec (2004, p. 32). He sees the immediacy of the internet as eliminating the
time between thinking of committing an offence and actually following through with its
commission. The lack of reflection time causes individuals to send off potentially hurtful
retrieving and eliminating the evidence. Franec is not only an advocate of schools
creating and communicating proper computer etiquette with students, but he also states
that school officials need to follow up on all alleged cyberbullying and have firm
sanctions in place.
&\EHUEXOO\LQJLQ6FKRROV1DWXUHDQG([WHQWRI$GROHVFHQWV¶([SHULHQFH
In 2004, Qing Li, an Associate Professor for the Division of Faculty of Education
at the University of Calgary, surveyed 177 grade 7 students in order to study (p. 7):
Two middle schools located in a large western Canadian city (one located in a middle
class area and the other in a low/middle socioeconomic status area) were chosen as the
x 54% of the students were bully victims, and over a quarter of them had been
cyberbullied;
x 52.4% of the students responded that they knew someone being cyber-
bullied;
people outside of their schools, and 15.9% by multiples sources; 40.9% had
x 60% of cyberbully victims were cyberbullied 1-3 times, over 18% of them
were cyberbullied 4-10 times, and 22% of them were cyberbullied more
than 10 times;
x 43% of cyberbullies did so less than 4 times, over 30% cyberbullied others
x Within the school bully group, 85.5% reported that they were also bully
victims; and
x 30% of the school bully group were cyberbullies and 27.3% were
schools, it is not without its limitations. First of all, the study “which intended to
30
discover the frequency of students using computers did not consider that the majority of
students in school have easy access to computers” (Li, 2004, p. 3). There is no
indication that the results of the study would have been drastically altered, but to not
focus on the computer use in school is a problem. Despite the use of web-filtering
software, students can easily access MSN Messenger, e-mail, and chat rooms to
cyberbully others. Another concern with the study is that the survey gave students only
two options to explain how they conducted their cyberbullying efforts–e-mail or chat
rooms. The reality is that cyberbullies have instant messaging, cell phones, personal
blogs, and personal spaces to conduct cyber threats or cyber harassment. Furthermore,
the study was limited to a large urban city. Since computer access has grown
tremendously in the last decade, excluding rural areas could significantly impact the
&KDOOHQJLQJ&\EHUEXOO\LQJ
The Media Awareness Network (MNet) research indicates that 50% of kids say
they are alone online most of the time, while only 16% say they discuss with parents
what they do online. While dealing with cyberbullies can be difficult in schools, MNet
states that students need to be better educated about the Criminal Code of Canada and
how students can deal with online bullies via legal procedures. For example, under the
communication causes them to fear for their own safety or the safety of others
may also be violating the Canadian Charter of Rights and Freedoms if their
comments spreads hate or discrimination based upon race, national or ethnic origin,
colour, religion, sex, sexual orientation, marital status, family status, or disability
recommended:
online, places they go, and the people they talk to;
x Encourage your kids to report any online incident that makes them feel
uncomfortable or threatened;
x Encourage your kids to develop their own moral code so they will choose to
x Watch for signs that your child may be being bullied online and take action
cyberbullying;
x Update the school’s computer use policy to incorporate penalties for cyber-
bullying;
providers; and
3XWWLQJ8LQWKH3LFWXUH0RELOH%XOO\LQJ6XUYH\
The National Children’s Home (NCH, 2005) estimates 97% of 12-16 year-
olds own a mobile phone and was commissioned in April 2002 to complete the
first-ever survey into mobile and online bullying (p. 3). NCH defined text bullying
as one or more unwelcome text messages that the recipient finds threatening or
x 17% believed the embarrassing photo had been sent to someone else;
x 73% of those surveyed knew the bully, while 26% stated the bullying was
done by a stranger;
x 28% did not tell anyone of the bullying, 41% told a friend, 24% spoke to a
parent about the bullying, and 14% told a teacher about the bullying;
33
x When asked why the bullying wasn’t reported; 31% of those bullied
claimed the bullying was not enough of a problem to report it; 12% claimed
there was nobody they wanted to tell; 11% believed the bullying would not
stop; and 10% claimed they did not know where to go to receive help;
x When asked what kind of support or help would have encouraged students
to report the bullying, 28% claimed they would not report it; 23% stated
talking to an expert that knew how to handle bullies; 15% said a school staff
member; and 13% stated visiting a website with tips on how to deal with
x 50% of respondents claimed the threats took place at school or college, 17%
claimed the bullying took place on the weekend, 21% claimed the bullying
took place after school or college, and 6% claimed the bullying took place
In general, this study stands out as one of the most complete and
frequency with each new cell phone or computer user. While 770 students aged
11-19 were surveyed for this study, there are some concerns over statistics. First of
all, of the 20% that state they have been cyberbullied, there is no clear indication of
the severity of each incident, which makes it difficult to determine if the e-mail,
text, and chat room abuses should be grouped together. Furthermore, without
distinguishing the number of respondents in each age group and the frequency they
are text messaging or in chat rooms or the severity of the messages being sent, it is
34
difficult to assess the extent of the problem and the age group most at risk where
cyberbullying is concerned. Certainly the fact that 31% stated the bullying was not
enough of a problem to report it could lend support to the notion that the cyber-
bullying is a relatively minor occurrence. However, when you consider 50% of the
attacks came at school or college, where zero-tolerance school and internet use
policies are often in effect, there can be little doubt that this is an indication of a
serious problem since online abusers are not deterred by such policies (NCH, 2005,
p. 8).
&\EHUEXOO\LQJ&UHDWLQJD&XOWXUHRI5HVSHFWLQD&\EHU:RUOG
Susan Keith and Michelle E. Martin discuss in their article the alarming frequency
of cyberbullying, the warning signs of children that are cyberbullied, ways by which
parents can help combat cyberbullying, and the obstacles present that make tracking such
x 57% of students said someone said something hurtful to them online, and 13% say
x 53% of students admit to saying something mean while online, while 7% admit
x 35% of students have been threatened online, while 5% said it happens quite
often;
x 42% have been bullied online, with 7% saying it happens “quite often”;
x 58% have not told their parents or another adult about their experiences (Keith &
Despite some statistics being consistent with similar studies in terms of the
frequency of bullying, there is no explanation as to how the statistics were arrived at.
Once again, there is no distinction between the meaning of “students who have been
threatened” and students that admit to saying “something mean.” Additionally, there is
little information concerning the “threatening” emails. If the email was in fact a physical
threat, the receiver would then have the means to take legal action against the sender of
emails and the percentage of “threatening” emails, then the level and seriousness of cyber
&\EHU'LOHPPDVLQWKH1HZ0LOOHQQLXP6FKRRO2EOLJDWLRQVWR3URYLGH6WXGHQWV
6DIHW\LQD9LUWXDO6FKRRO(QYLURQPHQW
McGill University, builds on her doctoral work by investigating the legal aspects of
x The article reviews the legal obligations and reasonable expectations of schools to
Hazelwood, 1988), Shariff notes that the courts stated that an educator’s authority
curriculum;
x Applying this logic to cyberbullying, Shariff states that it is reasonable for schools
Shariff (2005) points out the dilemma many administrators face across the
country in that students and parents will often cite freedom of expression guarantees as a
reason schools cannot impose discipline on cyber activity. The main avenue she
advocates for schools to combat the &KDUWHU argument is to establish reasonable limits for
technological use that is linked to providing a safe school environment and an equal
impose discipline. It should be noted that a &KDUWHU right, such as Section 2(b), can be
limited by Section 1 of the &KDUWHU which states that “the rights and freedoms set out in it
are subject to only such reasonable limits prescribed by law as can be demonstrably
justified in a free and democratic society” (Canadian Charter of Rights & Freedoms, p.
2). Essentially, if a school can prove the restriction of freedom of expression is justified
One concern about the views put forth by Shariff (2005) is that she advocates
schools use the cases she references as a guideline until the courts provide schools with
policy directions. I would tend to disagree with this stance for the simple fact that court
rulings and policies can take months and years to come to fruition. Schools would be
better served taking action and instituting policies that are backed by research and
supported by community stakeholders rather than wait to see what the courts will do.
6KDSLQJ6DIHU6FKRROV$%XOO\LQJ3UHYHQWLRQ$FWLRQ3ODQ
x that each school board in the province should adopt a bullying prevention policy
and each school should implement an effective bullying prevention program that
administrators;
2005, p. 6) .
Furthermore, the report found that of the nearly 2 million students in Ontario schools,
approximately 1 in 3 in grades 7-12 report being bullied in school. The report also
bullying prevention programs and action plans for schools and school boards. The
assertion that schools, community partners, and school boards must work together is a
The problem I see with the report, which was presented to the Honourable Gerard
cyberbullying. Since the report was submitted, many of the recommendations are being
instituted, including the training of administrators for bullying prevention. The downfall
of the report is that cyberbullying becomes an add-on to the training rather than a central
focus of the training. With cyberbullying rates on the rise, the report was too limited to
general bullying programs and does not adequately address cyberbullying programs,
which would have been crucial considering the lack of legal policies in place that
&\EHUEXOO\LQJ$Q(PHUJLQJ7KUHDWWRWKH³$OZD\V2Q´*HQHUDWLRQ
Bill Belsey, the man attributed with coining the term cyberbullying, continues his
work on educating the public regarding internet safety. Highlights of his article entitled,
&\EHUEXOO\LQJ$Q(PHUJLQJ7KUHDWWRWKH³$OZD\V2Q´*HQHUDWLRQ (2005)include:
x 94% of young people say they go online form home, compared to 79% in 2001;
x 20% of grade 4 students access the internet through their own personal computer,
x 23% of students report having their own cell phone, 44 % of which have internet
capability;
x 56% of students’ cell phones have text messaging, and 17% have cameras;
x 22% of students have their own webcam, a number that climbs to 31% by grade
11;
x Instant messaging is growing in popularity at a rate 30% faster than e-mail did at
its inception;
x Cyberbullying is often outside of the legal reach of schools and school boards, as
x Cyberbully victims should save e-mails from cyberbullies, date and time received,
copies of relevant e-mails and headers, URLs of groups or communities that are
offensive, profiles of offenders, chat rooms (and screenshots of the chat room)
that were offensive, and all dates or times any cyberbullying occurred online;
messaging, cell phone use, and online bullying; educate teachers, students and
parents about cyberbullying; never allow an incident to pass without dealing with
it; “walk the walk” and demonstrate to students positive online communication
While the statistics Belsey (2005) provides should come as no shock since the
world is becoming more and more dependant on technology, the fact that instant
messaging is increasing in popularity at a rate 30% faster than e-mail should be. Instant
messaging is one of the ways cyberbullies conduct their abuse, and since it can be
anonymous, it is often an abuse that can be difficult to trace. The only concern with the
40
statistics provided by Belsey is that although the rates of usage and number of
technological functions continue to rise, there is no proof that cyberbullying will continue
to rise as well. The level or rate of cyberbullying could very well stay proportional to the
number of users. A greater number of people with the technological advances does not
With this in mind, Belsey (2005) suggests procedures and actions for someone
that is cyberbullied in order to help determine who is sending the offensive or hurtful
material. The importance of the article is that Belsey advocates for schools to take the
lead in developing policies for cell phone usage, internet usage, and be the model of
online communication and behaviour. Cyber safety and decorum should be woven into
the curriculum, not separate from it in Belsey’s eyes, which is one of the most
&\EHUEXOO\LQJ'RQ¶W6KRRW
developing a comprehensive policy on acceptable computer use both on and off school
with school partners (2005, p. 17). It is important to note that the research being
policies around cyberbullying and that they communicate these to the school partners
regularly. Repeated calls for the same actions in other articles seem to suggest that
cyberbullying incidents.
41
$%ULHILQJIRU(GXFDWRUV2QOLQH6RFLDO1HWZRUNLQJ&RPPXQLWLHVDQG<RXWK5LVN
Nancy E. Willard is the Director for the Centre for Safe and Responsible Internet
Use (CSRIU). Her concerns and solutions regarding internet usage are that:
provide personal information, photos, music, and graphics about their interests;
x While many sites have Use Agreements preventing harmful speech and have age
restrictions to participate, the reality is that young people can simply lie about
their age and enter these sites, since no effective technologies exist to verify the
x The concern with such sites is that some young people are not making good
choices with respect to what they say or divulge online, and with little parental
x School threat procedures should be amended to include actions for online threats;
school computers to help track or deal with any online threats that are brought
The recommendation that school emergency procedures incorporate online threats should
be an immediate change since many school tragedies over the past few years were first
promoted via internet threats (especially the Columbine massacre). It is also notable that
she advocates administrators having unlimited access to restricted sites while on school
time to track and deal with online threats. My concern is that such access is potentially
damaging to any administrator. First of all, the assertion that administrators would be
42
surfing the internet for such threats during school time exposes them to the potential to
visit sites that could be considered outside the realm of education and subsequently be
be on educating young people to disengage from and prevent online abuse rather than use
the internet as a tool to search for such abuses. The Columbine massacre was tragic for
sure, but to assume that it may have been prevented or stumbled onto if administrators
had access to unlimited sites is farfetched. The reality is that such sites where student
post hateful thoughts can be restricted viewing, most likely accessible to only close
activity, we will be doing a greater service in terms of protecting our students than some
$Q(GXFDWRU¶V*XLGHWR&\EHUEXOO\LQJDQG&\EHU7KUHDWV
One of the interesting aspects of this article by Nancy E. Willard (2005b) is that
that suffer from online abuse or harassment (p. 17). The charts, which are located in
Appendix G, advocate that schools have teams in place to gather and preserve online
evidence of abuse, to assess the violence or suicide risk of students that commit or are
subject to online abuse, and outline steps for assessing the extent of cyberbullying. Once
the team has gathered the pertinent information, Willard lists numerous options available
to schools and parents to deal with the cyberbullying activity. Of note in the options
section is that Willard states that unless a school “nexus” or link can be established
between the cyberbully and the victim being harassed, the school should seek informal
43
school discipline, such as mediation, counseling sessions, or meeting with the cyberbully
and the parents (p. 17). A concern here is that if the school link cannot be made, and the
continue, since he/she will know there are requirements necessary before a school can
act. I would think a more appropriate course of action would be to impose escalating
punishments. A school may wish to restrict computer access and increase the
punishments if the behaviour persists that way the cyberbully will know the school is
&\EHUEXOO\LQJ$*URZLQJ(SLGHPLFLQ6FKRROV
Epidemic in Schools”, an article by Eric Roher, in the winter 2006 magazine named the
x Since parents are obligated to send their children to school or provide home
schooling, they are entitled to expect that schools will take reasonable measures to
x Where there is evidence that online threats or intimidation that occur off school
moral tone of the school, there may be a sufficient link to impose school
discipline;
44
x Section 264.1 (1) (a) of the Criminal Code of Canada refers to offences by those
that threaten death or bodily harm, wherein bodily harm includes psychological
schools walls and property, school administrators must be acutely aware of pertinent
)UHHGRPV before dispensing any discipline for events that occur off school property
(Roher, 2006, p. 14). OPC has been very active in advocating for such discipline but also
discipline may be imposed. One concern I have about the article is that it is too easy for
administrators to pick out the key points and base decisions upon those points. While
only a few sections from the (GXFDWLRQ$FWRI2QWDULR and the &ULPLQDO&RGH were
referenced, the fact remains that many other sections in each document can help or hinder
such disciplinary decisions. Educators must take the time to be familiar with all relevant
Table 1
6WXGLHV([DPLQLQJ&\EHUEXOO\LQJDQG2QOLQH2IIHQFHV
About 8% of students
report being bullied on a
daily or weekly basis, and
about 21% are bullied
monthly or less often;
- About 7% of students
reported bullying someone
on a daily or weekly basis,
and about 23% did so
monthly or less often.
Seattle Public Individual - 374 McClure Quantitative - 12.6% of respondents were
Schools student surveys Middle bullied (16.3% of males
surveys School compared to 9.2% of
November 2003 -195 were females);
female
Olweus respondents - 24.3% of respondents were
Bullying Survey compared to bullied “2-3 times a month”
Report for 179 male or more (27.3% of males
McClure respondents compared to 21.5% of
Middle School females);
- overall
response - 7.5% of respondents
rate of 64% bullied other students “2-3
times a month” or more
(8.4% of males compared to
6.7% of females); and
53
- 72% of all
eligible
students
returned the
surveys;
Li, Qing Individual 177 grade 7 Two Quantitative - 54% of the students
student students (80 middle were bully victims and
2004 surveys males and schools over a quarter of them
97 females) located in had been cyberbullied;
Cyber-bullying a large
in schools: Western - 52.4% of the students
Nature and Canadian responded that they
extent of city knew someone being
adolescents’ cyberbullied;
experience One of the
schools - 31.8% of the
was cyberbully victims
located in were bullied by their
a middle classmates, 11.4% by
class area, people outside of their
and the schools, and 15.9% by
55
- 43% of cyberbullies
did so less than 4
times, over 30%
cyberbullied others 4-
10 times, and over
26% cyberbullied
others over 10 times;
- One in 10 youngsters
(10%) admitted they
had another person
take an embarrassing
photograph of them
that made them feel
uncomfortable;
- 73% of those
surveyed knew the
bully, while 26%
stated the bullying was
done by a stranger;
- 50% of respondents
claimed the threats
took place at school or
college, 17% claimed
58
Table 2
$UWLFOHV([DPLQLQJ&\EHUEXOO\LQJDQG2QOLQH2IIHQFHV
- Ghyslain, a Montreal
teenager, filmed himself acting
out a scene from “Star Wars”
with a school camera. After
forgetting to erase the footage,
some of his peers took the film
and uploaded it to the internet
and spliced him into scenes
from “The Matrix,” “The
Terminator,” and “Chicago,”
then added special effects.
The video was downloaded
over one million times and
forced Ghyslain to drop out of
school and seek psychiatric
help;
62
- Parents need to
encourage their kids to
report any online
incident that makes them
feel uncomfortable or
threatened;
64
- Schools need to
integrate antibullying
into classrooms;
- Schools need to
educate teachers,
parents, and students
about the seriousness of
cyberbullying;
- In referencing three
American cases challenging
the schools discipline with
respect to limiting freedom of
expression (Tinker, 1969;
Fraser, 1986; Hazelwood
1988). Shariff notes that the
courts stated that an educator’s
authority over school-
sponsored activities can be
characterized as part of the
school’s curriculum;
- Cyberbullying is often
outside of the legal reach of
schools and school boards, as
this behaviour often happens
on home computers or via
mobile phones;
Roher, Eric Cyberbullying 2006 OPC Register - Since parents are obligated to
– A Growing (Vol. 8, No. 4) send their children to school or
Epidemic in provide home schooling, they
Schools are entitled to expect that
schools will take reasonable
measures to prevent risks of
harm in the school
environment, which includes
protecting students from any
reasonably foreseeable risk of
harm;
- Schools should be
encouraged to incorporate
antibullying programs into
classroom instruction and that
the school code of conduct be
extended to include electronic
communication.
72
&+$37(57+5((0(7+2'2/2*<
imperative to survey students at the high school level since they are often very familiar
with the technology and have less parental controls placed upon them with regards to
computer or cell phone usage. While cyberbullying is by no means done solely by high
school aged students, they often represent the largest section of the population generally
at-risk of being bullied or those most likely to be involved in online bullying. For the
purposes of this study, 495 local area high school students ranging from grades 9-12 were
surveyed regarding their usage of internet, cell phones, chat rooms, and instant
messaging, as well as the frequency and severity of cyberbullying. All of the students
3RSXODWLRQDQG6DPSOH
Students representing grades 9-12 in six high schools were distributed the 6WXGHQW
schools contain between 600 and 1,000 students and the rest of the high schools have
between 100 and 450 students, a portion of each grade and level (applied, academic,
college, university) were surveyed. Subjects were given a participant information letter
that described the reasoning behind my research, what I plan to do with the research one I
have tabulated the results, and which policies I hope to change or alter to reflect the
results of the research. Furthermore, they were instructed that the survey would be
completely anonymous and that no information relating to student name or school would
be asked for.
73
If students chose to sign the consent forms (Appendix B), or had their parents sign
for them if they are under 16 years of age (Appendix C), they were given a copy of the
Participant Survey and asked to complete the survey. The surveys should have taken 10-
15 minutes to complete, and as students finished they were asked to raise their hand so
that a teacher could collect the survey from them. Once the surveys were collected by the
teacher, he/she forwarded them to the principal of the school, who in turn sent them to me
,QVWUXPHQWDWLRQ
which students regularly use the internet or cell phones; how often they have been asked
to participate in cyberbullying; how often they were cyberbullied; how often they use
instant messaging, participate in chat rooms, send text messages; and generally how safe
'DWD&ROOHFWLRQ
Each of the six high schools were contacted in April 2007 and asked if they would
select one class per grade and level (applied and academic) to distribute the cyberbullying
surveys to. For example, a school would select one grade 9 academic class and a grade 9
applied level class to distribute the survey to, then do the same for grades 10, 11, and 12,
thus giving eight sets of surveys per school. Once schools indicated they were willing to
participate, the Principal of the school was left to determine which classes were selected
to participate (i.e., a grade 9 academic math class or a grade 9 academic science class).
the instructor of the classes selected to participate. After the entire letter was read, during
which time each instructor highlighted the right to withdraw, students that chose to
participate were given a copy of the survey. Those that chose to refrain from
participating were asked by subject teachers to continue on with their course work until
If students chose to sign the consent forms, they were given a copy of the 6WXGHQW
complete the survey. As students finished the survey, they were asked to raise their hand
and wait for the teacher to collect the survey from them. Once the surveys were collected
by the teacher, they were forwarded to the principal of the school, who in turn sent them
Since I was not involved in the selection of the classes, the names and identities of
the students are anonymous to me. Only students and classes selected to participate by
individual principals will know that they are in the survey. Furthermore, since I
instructed each principal and teacher to treat the survey as a test, students did not have
access to information other students wrote, nor were they given any opportunity to view
the surveys.
'DWD$QDO\VLV
The data from the surveys were analyzed using frequencies and percentages as
well as chi-square analysis. SPSS was used extensively in the analysis of the data. The
sample size was 495 students, and 448 surveys were returned.
75
&+$37(5)2855(68/76
The key research problem explored was to determine the extent to which
cyberbullying occurs and what can be done from a school perspective to help deal
with such incidents. Of the six high schools that participated in the study, two had
a student population between 600 and 1,000 students, while the rest of the high
schools had a student population between 100 and 450 students. Each school was
required to choose a minimum of one class at each grade level (grades 9-12),
although principals of participating schools were free to choose the level surveyed
In this chapter, the results that were statistically significant are presented. It
is important to note that a total of 448 students out of 495 responded to the request
to complete a survey, which represents a 90.5% return rate. The majority of the
students were from grades 11 and 12 (60.8%), with the greater total number of
(19.1% for grade 9 students and 20.2% for grade 10 students) was well balanced.
Although the senior grades had a higher percentage of participants (60.7% of all
respondents), the surveys were relatively equal in the percentage of male and
One of the reasons for the minor discrepancy between the junior and senior grades
is attributed to the class size maximums and timetabling procedures of high schools
in the board. While academic or university level classes have a greater number of
76
Table 3
*HQGHUDQG*UDGH/HYHORI5HVSRQGHQWV
:KDWJUDGHDUH\RXLQ" 7RWDO
*UDGH *UDGH *UDGH *UDGH
:KDWJHQGHU 0DOH &RXQW
DUH\RX"
ZLWKLQ:KDW
JHQGHUDUH
\RX"
ZLWKLQ:KDW
JUDGHDUH\RX
LQ"
)HPDOH &RXQW
ZLWKLQ:KDW
JHQGHUDUH
\RX"
ZLWKLQ:KDW
JUDGHDUH\RX
LQ"
7RWDO &RXQW
ZLWKLQ:KDW
JHQGHUDUH
\RX"
ZLWKLQ:KDW
JUDGHDUH\RX
LQ"
77
students that can be placed in such courses, schools typically try to limit the number of
students in grade 9 and 10 classes to ease the transition to high school. Since the grade 9
and 10 courses students must take offer little choice for students, administrators can
timetable several sections to reduce the class size. Conversely, senior level classes are
typically harder to run since they have the greatest amount of choice as to which courses
students choose to take. Thus, especially in smaller schools, courses may be offered in
alternating years, which means that some courses will see a significant number of
students in them since they may have only one chance of taking the course before
graduation.
cell phone, but there is a huge discrepancy between the genders in terms of owning a cell
phone. Less than half (44.8%) of males own a cell phone compared to 61.3% of female
communicating via text messaging and e-mail” (Blair, 2003, p. 6), which helps to explain
the difference between the genders. It should also be noted that since “girls inflict more
virtual abuse through messaging, online journals, and online conversations, and boys are
more likely to make online threats or create websites targeting others” (Cooper, 2004,
p.2), it stands to reason females would have a greater number of cell phones considering
text messaging is one of the most prevalent forms of communication a cyberbully has at
his/her disposal.
78
Table 4
3HUFHQWDJHRI5HVSRQGHQWV7KDW2ZQD&HOO3KRQH
'R\RXRZQDFHOO
SKRQH"
As shown in Table 5, the two most popular choices for the cyberbully to carry out
his/her act was via internet chat rooms or e-mail. The number of respondents
cyberbullied via these two avenues was almost equal to the number of respondents that
were cyberbullied via multiple sources (10.2%). The alarming statistic is that of the
26.8% that are being cyberbullied, over one third of the victims experienced bullying
from multiple sources. Although there was very little in terms of gender differences, the
concern for those being cyberbullied is quite significant, especially when you consider
that victims of multiple sources of online abuse have little respite from the harassment.
Regardless of whether the combination is chat rooms or text messaging, e-mail and
websites, or websites and text messages, the cyberbully is never out of touch with the
victim.
As shown in Table 6, another example of the difference between male and female
respondents shows that there was little difference between whether a male was
cyberbullied by a stranger or someone they knew; however, females were most likely to
be cyberbullied by a stranger. Recalling that females tend to visit chat rooms and instant
messaging areas more frequently than males do, they open themselves up to a greater
number of perpetrators. While chat rooms may be designed for young males or females
to communicate with one another, there is no guarantee they are talking with another
child. As Nancy E. Willard is quick to point out, if “young people can simply lie about
their age and enter these sites since no effective technologies exist to verify the age of
internet users,” (2005a, p. 33) then adult predators can do the same. The ability of a
80
Table 5
:D\VLQ:KLFK5HVSRQGHQWV:HUH%XOOLHG
+DYH\RXHYHUEHHQEXOOLHGRUWKUHDWHQHGE\VRPHRQHLQWKHIROORZLQJ
ZD\V 7RWDO
&KRVH
PRUH
,QLQWHUQHW ,KDYHQRW WKDQ
'LJLWDO 9LDWH[W FKDW 9LD 9LD EHHQ RQH
EXOO\LQJ PHVVDJHV URRPV HPDLO ZHEVLWHV F\EHUEXOOLHG RSWLRQ
:KDW 0DOH &RXQW
JHQGHU
DUH\RX"
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
+DYH\RX
HYHUEHHQ
EXOOLHGRU
WKUHDWHQHG
E\VRPHRQH
LQWKH
IROORZLQJ
ZD\V
)HPDOH &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
+DYH\RX
HYHUEHHQ
EXOOLHGRU
WKUHDWHQHG
E\VRPHRQH
LQWKH
IROORZLQJ
ZD\V
7RWDO &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
+DYH\RX
HYHUEHHQ
EXOOLHGRU
WKUHDWHQHG
E\VRPHRQH
LQWKH
IROORZLQJ
ZD\V
81
Table 6
7KH&\EHUEXOO\,GHQWLILHG
:KRFDUULHGRXWWKHEXOO\LQJ" 7RWDO
6RPHRQH 1R
6WUDQJHU \RXNQHZ 5HVSRQVH %RWK
:KDWJHQGHU 0DOH &RXQW
DUH\RX"
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KRFDUULHG
RXWWKH
EXOO\LQJ"
)HPDOH &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KRFDUULHG
RXWWKH
EXOO\LQJ"
7RWDO &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KRFDUULHG
RXWWKH
EXOO\LQJ"
82
predator to enter such sites and get young children to divulge personal information
drastically increases the potential for harm, which is a potential reason for the higher
occurring between 3 and 11 p.m., times students are often away from the school, it is easy
to see that victims of cyberbullying have literally no place to hide. If the statistics
incorporate the 11 p.m.-8 a.m. time as well, the results show that 91.7% of all
cyberbullying occurrences happen while students are away from school. With such a
lack of online respect, there is little surprise that “thirty-three states require or
recommend that districts design bullying programs, and it is assumed that these policies
cover cyber harassment” (Blair, 2003, p.8), and that the Safe Schools Action Team of
Ontario advocates that all administrators undergo immediate bullying prevention training
With little or no escape from the cyberbully, students will inevitably bring the
problems with them to school. If the victim of cyberbullying chooses to lash out in
school, then the administration will be left to deal with the effects of online harassment.
Knowing that the majority of cyberbullying occurs during off-school hours, it is vital to
design effective strategies to help guide schools when dealing with cyberbullying
incidents since the victim will have had a full night (or many nights) or harassment at
home before coming into the school. The frustration, anger, and embarrassment a
cyberbullying victim will face will most likely manifest itself during the school hours;
thus schools must be prepared to put strategies in place that defuse such situations by
Table 7
3HDN7LPHVIRU&\EHUEXOO\LQJWR2FFXU
:KHQGLGWKHF\EHUEXOO\LQJRFFXUPRVW
IUHTXHQWO\"
%HWZHHQ %HWZHHQ %HWZHHQ
DP SP SP 1R
SP SP DP UHVSRQVH 7RWDO
:KDWJHQGHU 0DOH &RXQW
DUH\RX"
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KHQGLGWKH
F\EHUEXOO\LQJ
RFFXUPRVW
IUHTXHQWO\"
)HPDOH &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KHQGLGWKH
F\EHUEXOO\LQJ
RFFXUPRVW
IUHTXHQWO\"
7RWDO &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KHQGLGWKH
F\EHUEXOO\LQJ
RFFXUPRVW
IUHTXHQWO\"
84
As shown in Table 8, the results demonstrated that of those that were cyberbullied
in schools, 13.7% were harassed daily or weekly. Separating by gender, male students
were more apt to be cyberbullied daily or weekly (17%) compare to females (9.8%).
This statistic in itself should be cause for alarm for schools. Using the 448 respondents to
the survey, if 27% indicated they have been cyberbullied, that means that 120
respondents experienced some form of cyber harassment. Of those 120 respondents that
With the increasing number of school shootings and violent acts, one common
theme seems to be embedded throughout each act–the perpetrators of such acts were
week without reprieve from their tormentors, and the schools have little in place to help
protect or deal with the cyberbullying, then hope for change is slim. When victims begin
to lose hope, the potential for drastic actions or violent outbursts increases. It is statistics
like this that support the notion of Eric Roher that “schools should be encouraged to
incorporate antibullying programs into classroom instruction and that the school code of
take a proactive approach to heading off potential problems, rather than waiting and
indicated they thought the harassment was not that big of a problem, but interestingly
enough, 19% believed reporting would not help their cause. The significance of the
85
Table 8
%XOO\LQJ,QFLGHQFHVSHU0RQWK
6LQFH6HSWHPEHUKRZPDQ\WLPHVKDYH\RXEHHQ
F\EHUEXOOLHGSHUPRQWK"
'DLO\RU /HVVWKDQ $ERXW
DOPRVW RQFHD RQFHD
1RQH GDLO\ :HHNO\ PRQWK PRQWK 7RWDO
:KDW 0DOH &RXQW
JHQGHUDUH ZLWKLQ
\RX" :KDW
JHQGHUDUH
\RX"
ZLWKLQ
6LQFH
6HSWHPEHU
KRZPDQ\
WLPHVKDYH
\RXEHHQ
F\EHU
EXOOLHGSHU
PRQWK"
)HPDOH &RXQW
ZLWKLQ
:KDW
JHQGHUDUH
\RX"
ZLWKLQ
6LQFH
6HSWHPEHU
KRZPDQ\
WLPHVKDYH
\RXEHHQ
F\EHU
EXOOLHGSHU
PRQWK"
7RWDO &RXQW
ZLWKLQ
:KDW
JHQGHUDUH
\RX"
ZLWKLQ
6LQFH
6HSWHPEHU
KRZPDQ\
WLPHVKDYH
\RXEHHQ
F\EHU
EXOOLHGSHU
PRQWK"
86
results indicates the need for more involvement from schools. When schools allow
students to enter the online world without much concern for the treatment they receive as
a result of being part of that world, or allow students to think reporting cannot help their
cause, then the system is flawed. Schools must acknowledge the problems concerning
online safety and seek to correct them by incorporating programs into student courses, or
else schools fail parents by not protecting students from any reasonably foreseeable risk
As shown in Table 10, both male and female respondents would rather confide to
a friend that they are being cyberbullied than a trusted adult. In fact, males actually
parents, police, or school administration or staff members. If the victim and friends of
the cyberbullying victim choose to stay silent and not report the incident, a large number
of cases will continue to slip under the radar and be left unresolved. With less than a
quarter of all incidents being reported to a trusted adult, there is no telling if the
unreported cases are serious online threats or harassment. As long as the attitude persists
that reporting such online abuse to a trusted adult is not popular, then students will
Table 9
5HDVRQIRUQRW5HSRUWLQJ&\EHUEXOO\LQJ,QFLGHQWV
,I\RXKDYHEHHQF\EHUEXOOLHGEXWGLGQRWWHOO
DQ\RQHZK\GLG\RXQRWWHOODSDUHQWVFKRRO
DXWKRULW\RUWKHSROLFHDERXWWKHRQOLQHEXOO\LQJ"
,WZDVQ
W ,GLGQRW ,GLGQRW
D WKLQNLW NQRZ
SUREOHP ZRXOGKHOS ZKHUHWR 1R
WRPH WKHSUREOHP JRIRUKHOS UHVSRQVH 7RWDO
:KDW 0DOH &RXQW
JHQGHU
DUH\RX"
ZLWKLQ:KDWJHQGHU
DUH\RX"
ZLWKLQ,I\RXKDYH
EHHQF\EHUEXOOLHGEXW
GLGQRWWHOODQ\RQH
ZK\GLG\RXQRWWHOOD
SDUHQWVFKRRO
DXWKRULW\RUWKHSROLFH
DERXWWKHRQOLQH
EXOO\LQJ"
)HPDOH &RXQW
ZLWKLQ:KDWJHQGHU
DUH\RX"
ZLWKLQ,I\RXKDYH
EHHQF\EHUEXOOLHGEXW
GLGQRWWHOODQ\RQH
ZK\GLG\RXQRWWHOOD
SDUHQWVFKRRO
DXWKRULW\RUWKHSROLFH
DERXWWKHRQOLQH
EXOO\LQJ"
7RWDO &RXQW
ZLWKLQ:KDWJHQGHU
DUH\RX"
ZLWKLQ,I\RXKDYH
EHHQF\EHUEXOOLHGEXW
GLGQRWWHOODQ\RQH
ZK\GLG\RXQRWWHOOD
SDUHQWVFKRRO
DXWKRULW\RUWKHSROLFH
DERXWWKHRQOLQH
EXOO\LQJ"
88
Table 10
5HSRUWLQJ&\EHUEXOO\LQJ
:KRGLG\RXUHSRUWWRWKDW\RXZHUHEHLQJF\EHUEXOOLHG" 7RWDO
7HDFKHU
VFKRRO
DGPLQLVWUDWRU
VFKRRO 1R
3DUHQW )ULHQG VXSSRUWVWDII 3ROLFH 2WKHU UHVSRQVH
:KDW 0DOH &RXQW
JHQGHU
DUH\RX"
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KRGLG\RX
UHSRUWWRWKDW
\RXZHUH
EHLQJF\EHU
EXOOLHG"
)HPDOH &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KRGLG\RX
UHSRUWWRWKDW
\RXZHUH
EHLQJF\EHU
EXOOLHG"
7RWDO &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
:KRGLG\RX
UHSRUWWRWKDW
\RXZHUH
EHLQJF\EHU
EXOOLHG"
89
(26.9%). The Safe Schools Action Team commissioned by the Ministry of Education of
Ontario reported that “of the nearly two million students in Ontario schools,
approximately one in three in Grades 7-12 report being bullied in school” (2005, p. 10).
As the access to technology and the ease by which messages can be communicated
increases, both privately and publicly, the potential exists for cyberbullying to exceed
traditional school bullying in the very near future. The fact that cyberbullying has
virtually caught up to traditional school bullying in less than a decade suggests that as
As shown in Table 12, results indicate that cyberbullies that send threatening
messages to their victims do so either very frequently (15 times or more per month) or
sporadically (1 and 4 times per month). While the majority of cyberbullies tended to
send between 1-4 messages per month, which may or may be to the same target, this
should still be a major cause for concern. Cyberbullies rarely start out by sending
threatening messages 15 times or more per week; they gradually work their way up to
more serious forms of victimizing. The fact that the majority of the cyberbullies are in
this category may not mean each of them will become a serial cyberbully, but some
certainly will. Furthermore, if the cyberbully is not challenge by the person being
victimized, which is something school programs can help address, then the chances of
Another concern that the statistics illuminate is the fact that 3.7% (16 out of
434) admit to cyberbullying others 15 or more times per month. If we extrapolate these
over 12 months (16 x 15 x 12) would equal 2,880 threatening messages being received by
90
Table 11
6HQGLQJ7KUHDWHQLQJ0HVVDJHV
+DYH\RXHYHUVHQWD
WKUHDWHQLQJRUEXOO\LQJ
PHVVDJHWRVRPHRQH
HOVH"
Table 12
)UHTXHQF\RI2QOLQH+DUDVVPHQWE\WKH&\EHUEXOO\
6LQFH6HSWHPEHUKRZPDQ\WLPHVKDYH\RXF\EHU
EXOOLHGVRPHRQHHOVHSHUPRQWK"
RU
PRUH
WLPHV 7RWDO
:KDWJHQGHU 0DOH &RXQW
DUH\RX" ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
6LQFH
6HSWHPEHU
KRZPDQ\
WLPHVKDYH
\RXF\EHU
EXOOLHG
VRPHRQH
HOVHSHU
PRQWK"
)HPDOH &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
6LQFH
6HSWHPEHU
KRZPDQ\
WLPHVKDYH
\RXF\EHU
EXOOLHG
VRPHRQH
HOVHSHU
PRQWK"
7RWDO &RXQW
ZLWKLQ
:KDWJHQGHU
DUH\RX"
ZLWKLQ
6LQFH
6HSWHPEHU
KRZPDQ\
WLPHVKDYH
\RXF\EHU
EXOOLHG
VRPHRQH
HOVHSHU
PRQWK"
92
the victims of online hate in the six schools surveyed. With technological capabilities
and access to devices capable of sending online threats on the rise, the ease at which
As shown in Table 13, one of the causes for concern with Table 13 is the fact that
25 students used school computers to send threatening or bullying messages, yet there is
no record suggesting any of the students were caught. When I asked high school
administrators during our June 2006 principal meeting if they had any reported
cyberbullying cases during the 2005-2006 school year, only a few were brought to my
attention, and even then the threats were made from home computers.
As shown in Table 14, while male respondents (32.4%) used another person’s
online account to send a message more often than female respondents (22.2&), the
overall total of the respondents using a false identity to send messages was 27.8%. It is
interesting to note that this result demonstrates little variance from the overall number of
respondents who indicated they were cyberbullied (26.9%), and is in fact equal to the
number that indicated they had sent a threatening message (27.8%). I believe the
numbers speak to a culture of disrespect for online use. It comes as little surprise to me
that an equal number of respondents were found to have sent threatening messages and
used another person’s online name considering the anonymity that the internet can
provide. If users have little concern for getting caught or for how others will react to
their messages, then there will be no incentive to change. When traditional bullying
programs use mediation between the victim and abuser to solve the problem, one of the
key components is the face-to-face contact between the two parties so that the bully can
see the emotional effect he has had on the victim. Since the internet does not allow the
93
Table 13
8VHRI6FKRRO&RPSXWHUVWR6HQG7KUHDWHQLQJ0HVVDJHV
+DYH\RXHYHUVHQWD
WKUHDWHQLQJRUEXOO\LQJ
FRPPHQWYLDWKH
VFKRROVFRPSXWHUV"
Table 14
,PSHUVRQDWLQJ2WKHUV2QOLQHWR6HQGD0HVVDJH
+DYH\RXHYHUXVHG
DQRWKHUSHUVRQ
VRQOLQH
FKDWURRPVFUHHQQDPH
WRVHQGDPHVVDJH"
victim any such opportunity, unless school administration or parents become involved,
the responsibility has to fall to schools to educate and prepare students to navigate safely
through their online journey while respecting those they share online space with.
As shown in Table 15, a significant difference exists between males and females with
that 48% of male respondents admitted to posting such comments, while only 29.8% of
female respondents admitted to such acts. Once again, the anonymity of the internet and
the freedom it grants people can have significant effects. As Blair points out, “more than
1/3 of teens use IM to say things they don’t want to say in face-to-face conversations with
their peers” (2003, p. 7). Even if students use their real names or e-mail address, the fact
students are not face-to-face gives some people a sense of confidence since they know
there are no immediate consequences to their online actions. Those that post hateful or
derogatory comments may eventually be confronted and disciplined, but during the
moment of the conversation they have free rein to say what they want. The only
immediate reaction is that of the person being victimized or taunted, and should that
person become irate at what is being said, he or she is simply empowering the cyberbully
to continue.
As shown in Table 16, despite the level of cyberbullying apparent amongst the
strongly/somewhat agree that they feel safe in their schools. However, do not let this
statistic mask any potential problems. Having served as an administrator in one of the
high schools that participated in the survey, I can attest to the sense of security and
belonging students feel. Cyberbullies, however, seek to attack victims when they are
96
Table 15
3RVWLQJ1HJDWLYHRU'HIDPDWRU\&RPPHQWV'XULQJ2QOLQH&KDWV
+DYH\RXHYHUSRVWHG
QHJDWLYHGHURJDWRU\RU
GHIDPDWRU\FRPPHQWV
GXULQJDQRQOLQHFKDW"
Table 16
)HHOLQJ6DIHDW6FKRRO
,IHHOVDIHLQP\VFKRRO"
6WURQJO\ 6RPHZKDW 6RPHZKDW 6WURQJO\
DJUHH DJUHH GLVDJUHH GLVDJUHH 7RWDO
:KDW 0DOH &RXQW
JHQGHUDUH ZLWKLQ
\RX" :KDW
JHQGHUDUH
\RX"
ZLWKLQ,
IHHOVDIHLQ
P\VFKRRO"
)HPDOH &RXQW
ZLWKLQ
:KDW
JHQGHUDUH
\RX"
ZLWKLQ,
IHHOVDIHLQ
P\VFKRRO"
7RWDO &RXQW
ZLWKLQ
:KDW
JHQGHUDUH
\RX"
ZLWKLQ,
IHHOVDIHLQ
P\VFKRRO"
98
online, which is generally during the times they are away from school and using personal
computers or cell phones. School can often act as a reprieve from the online torment
since the student may have little opportunity to access online material. Conversely,
school also becomes the one place that the victim may choose to lash out in, which again
indicates a need for schools to be proactive with cyberbullying because the external
99
&+$37(5),9(6800$5<',6&866,216$1'5(&200(1'$7,216
Students representing grades 9-12 in six high schools across the district
portion of each grade and level (applied, academic, college, university) were surveyed,
and a total of 448 out of 495 surveys were returned. With the increased accessibility to
the internet (schools, internet cafés, libraries, cell phones, etc.), students in our school
systems are connected to a world that offers tremendous benefits and serious pitfalls.
When students choose to enter online chat rooms, use instant messaging to communicate
with others, text message one another, write online blogs, or simply post material on
internet web pages, the last thing they may think of is being cyberbullied. However, with
the expanding number of devices capable of accessing and downloading material from
the internet comes the potential for cyberbullies to target and threaten unsuspecting users.
Whether the attacks are written e-mails, comments in online blogs or journals, websites
With all of the various ways in which students can be harassed online, and the
ease at which this can be done, this study set out to see the extent to which students were
cyberbullied. Outlined below are the most relevant findings of the study:
x The number of respondents who indicated they were cyberbullied via e-mails (22)
and internet chat rooms (26) were almost equal to the number of respondents that
x Male respondents were more prone to cyberbullying via chat rooms, while female
x There was little difference in the percentage of male respondents that indicated
carried out the cyberbullying, there was a minute difference in the male
respondents’ results;
x Female results were much more profound when analyzing whether a stranger
(75.9%) or someone the victim knew (13%) carried out the cyberbullying;
targeted by a stranger;
p.m., although the results indicate that males were more likely to be cyberbullied
occurrences;
x 76.2% of the respondents that indicated they did not report the cyberbullying
activity to an adult stated that they did not view the actions as a problem, while
another 19% stated they did not know where to go for help;
x Peers (44.7%) and other acquaintances (25%) of the cyberbullying victim are the
most likely outlets for the victim to disclose the online abuse to;
x Males (62.6%) are more likely to send a threatening or bullying message than
females (37.4%);
101
63 respondents admitted, either do it only a few times per month (65% engage in
x 5.6% of all respondents indicated they had used school computers to send a
x 27.8% of all respondents admitted that they used another person’s screen name to
'LVFXVVLRQV
With the rise in technological use, especially the rate at which young people are
connecting to the internet via computers or cell phones, schools and students have been
information and communication technologies such as e-mail, cell phone and pager text
individual or group that is intended to harm others (Belsey, 2005, p. 8), is a relatively
new phenomenon that schools are facing. While the majority of the abuse may occur
outside of the school walls, schools inevitably deal with the fallout of the abuse. The
research on bullying has been extensive and indeed, particularly in Ontario, the need for
schools to implement antibullying programs has been well documented. One of the
problems with many of the programs schools are implementing is that such programs fail
to address cyberbullying.
Since the term was coined in 1999, research has demonstrated that:
x Nearly 60% of Canadian students use chat rooms and instant messaging; and
x Canadians have the highest or near-highest penetration and use of the telephone,
cable, TV, computers in the home, and internet access in the world (Environics
Furthermore, Bill Belsey states that “94% of young people say they go online
from home, compared to 79% in 2001,” and that “ instant messaging is growing in
popularity at a rate 30% faster than email did at its inception” (Belsey, 2005a, p7).
Knowing Canada is one of the fastest rising nations to embrace the technological
revolution, this study on cyberbullying set out to find the frequency of cyberbullying in
schools and to offer solutions for schools to deal with this emerging problem.
After analyzing the surveys completed by the schools that participated in the
survey, results indicate that 26.8% of the participants have been cyberbullied. Such
103
results are in between studies conducted in Britain and the United States. In a survey by
National Children’s Home & Tesco Mobile in Britain, results demonstrated that “One in
five youngsters (20%) experienced some sort of digital bullying” (2005, p.2).
Conversely, a survey completed in the United States indicated that “42% have been
bullied online and 57% of students said someone said something hurtful to them online”
(Keith & Martin, 2005, p. 224). Once again, with Canada being one of the fastest
growing nations to become connected online, the abuse rates will only increase unless
Another key finding in the survey was the fact that female results showed that a
stranger (75.9%) was more likely to carry out the cyberbullying than someone the victim
knew (13%). This is not a surprising statistic when one considers the fact that females,
especially young ones, are prime targets for sexual predators in chat rooms. Chat rooms
are a favourite area to visit online for young females, and they are often oblivious to the
fact that sexual predators posing as other young females are lurking within. To
complicate matters even further, when “50% of kids say they are alone online most of the
time, while only 16% say they discuss with parents what they do online” (Challenging
Cyberbullying, 2005, p. 1), it becomes increasingly clear that online safety of children is
an issue. While some parents may be vigilant in the supervision of their child’s online
activity, many remain on the sidelines because they fail to understand the technology or
how to keep tabs on their children’s online activity. Schools, by their very nature of
acting as parents to students while they are in school, need to take a greater role in
educating students and parents about the dangers of online abuse since they often have a
greater capacity to connect than parents to experts to help develop programs to deal with
104
cyberbullying and because they have a significant effect on the social and education
cannot be separated by schools; thus the need for curriculum initiatives that address
males, had engaged in cyberbullying activity. The majority of male respondents that
engage in cyberbullying activity either do it only a few times per month (65% engage in
activity 15 times or more/month), while 90% of the female respondents that admitted to
20.9% of the total participant surveys returned. Regardless if cyberbullies only sent a
few (2 derogatory or hurtful messages per month they still would be responsible for (93
with statistics from Table 12 that indicate as many as 2,880 derogatory or hurtful
messages could be sent within the six schools surveyed from frequent cyberbullies (15 or
more time per month), school boards have a responsibility to address the issue. However,
since this is merely a sample of the school population, the total number of derogatory or
hurtful messages being sent across the board will certainly be much higher. Add the fact
that “the immediacy of the Internet as eliminating the time between thinking of
committing an offence and actually following through with its commission” (Franec,
2004, p. 1), and school programs addressing cyber safety and online respect become even
more vital.
105
A disturbing trend that reinforces the need for schools to address cyberbullying is
the avenues students choose to disclose online incidents. The survey results indicated
that cyberbullying victims will most likely confide in peers (44.7%) or other
acquaintances (25%), while another 19% stated they did not know where to go for help.
Students that choose to confide in other acquaintances usually do so because they are
confident that peers will not disclose the information to an adult. In total, potentially
89.7% of incidents are not reported to adults, much less school authorities; thus many
victims often suffer online abuse in silence. Schools already face a difficult culture with
respect to student reporting of incidents. The notion that one is a “rat” for disclosing
information, even if it can save or protect someone, certainly makes it difficult for
students to report general bullying, let alone cyberbullying. Furthermore, if one were to
report cyberbullying, there is a fear that the abuse could escalate since the internet can
easily pass along information or messages at alarming speed to a mass audience. The
challenge for schools and school boards becomes to what extent should they get involved
in such activities, especially when survey results indicated that he majority (75.2%) of all
There is no denying that any events that occur in the cyber world are accessible to
numerous people and that the chances of victims lashing out are increased in school
settings where large numbers of people can gather to continue the abuse. In this regard,
schools do have the responsibility to address the situation. As Eric Roher states,
since parents are obligated to send their children to school or provide home
schooling, they are entitled to expect that schools will take reasonable measures to
106
where there is evidence that online threats or intimidation that occur off school
moral tone of the school, there may be a sufficient link to impose school
discipline (p.14).
principals to maintain proper order and discipline within the school, there are no specific
penalties for dealing with cyberbullying. Like other offences where a suspension could
be imposed, penalties can range from 1-20 days, or for the more serious cases, an
Schools”, Eric Roher states that “schools should be encouraged to incorporate anti-
bullying programs into classroom instruction and that the school code of conduct be
extended to include electronic communication” (p.15). The problem with this advice is
that the interpretation, development, and application of such programs are still open to
schools to create and levy penalties. Similar to current offences for mandatory or
discretionary suspensions in Ontario, there may be little consistency from school board to
school board, or even from schools within a school board. Although the survey indicated
that 5.6% of all respondents had used school computers to send a threatening or bullying
message, schools cannot limit their policies to simply events that occur within the school,
107
but reach to those outside events that create a “poisonous learning environment, or
represents conduct that is harmful to the moral tone of the school” (Roher, p. 14).
5HFRPPHQGDWLRQV
with respect to cyberbullying. Computers and cell phones are the easiest access
people. Web blogs, websites, online journals, chat rooms, and instant messaging
services provide cyberbullies with the computer tools to have constant access to
their victims and allow cyberbullies to manipulate images or text to further abuse
their victims. Add to the mix the ability of cell phones and ipod music players to
have pictures and videos downloaded to them, the abuse can be replayed over and
One would only need to visit the website Youtube.com to see the power that
videos can have when posted on a site for the world to see. Notable videos posted
on the site in recent weeks included Saddam Hussein’s execution, school fights,
yelled at students while disciplining them. The problem with these videos is that
none of the participants either knew they were being taped or gave their permission
to be taped and have it posted on a website. With cell phone capabilities such that
they can record video and text messages, and adding the fact that they are easy to
hide due to their small and compact nature, the potential for abuse in schools is
quite concerning. From text messaging test answers to recording situations that can
108
be exposed to millions online with little respect for privacy and personal issues, cell
and school boards should put in place to combat the growing epidemic of
cyberbullying:
● School boards need to develop a policy in regards to cell phone and ipod
usage during school hours and consistently enforce the penalties set out therein. It
is too easy for students to tape any event, classroom or otherwise, and download it
to the internet. In doing so, students are abusing those they tape because they do
not get consent to be releasing such photos. This relates back to Franec’s (2004)
argument about the immediacy of the internet not allowing for any time between
thinking about committing an offence and actually committing one. Once an image
or video is on a phone or computer, the shock and entertainment value of the image
often can override common sense and the appropriate course of action; thus the
important,
messaging, cell phone use and online bullying; educate teachers, students
dealing with it; “walk the walk” and demonstrate to students positive online
particular school board and address online behaviour in and outside of the school.
109
Since cyberbullying deals with situations that could have taken place outside of the
physical boundaries of a school, it is important for boards to set standards that will
that account for the various forms and severity of cyberbullying, as well as
procedures for addressing short- and long-term solutions to cyberbullying are vital.
As Dr. Shaheen Shariff states, schools need guidelines that provide reasonable
(2005, p.21). The fact remains that cyberbullying is a relatively new area that
punishments and prevention measures should become part of the training for board
occur outside of school times, at least the administration can feel confident they
conjunction with parents, since cyberbullies can connect to their victims at any
hour of the day. Unlike traditional bullying where the bully and victim generally
have no contact with one another outside of a school setting, cyberbullying requires
parents and schools to work in conjunction with one another to protect children.
An additional complication to such monitoring is the code that children have when
talking online. Since children can use online acronyms (Appendix D) to disguise
what they are saying, parents cannot simply look over at the computer
110
have an understanding of the language and be able to decipher online text to ensure
the safety of their child. As suggested by the Media Awareness Network, parents
Æ Get involved and be aware as to what your children are doing online,
Æ Encourage your kids to report any online incident that makes them feel
uncomfortable or threatened;
Æ Encourage your kids to develop their own moral code so they will
Æ Watch for signs that your child may be being bullied online and take
Since students are generally more knowledgeable than their parents when it
comes to online usage and how to navigate through the internet, parents are often
hesitant to monitor their child’s online use. If parents do not know what a URL,
header, or a group of communities is, then they will not feel comfortable
monitoring their child. Also, if teachers are not aware of the tactics and signs of
e-mails from school). Schools should develop a series of seminars that address
such topics as basic internet terminology, how to save e-mails and headers,
examples of cyberbullying, since it can range from minor insults to severe threats.
providers, etc.), what to report, how much information is necessary before a report
should be made, and how to support those who are cyberbullied are also vital to
combating online bullying. It is also important that such seminars address the
warning signs of cyberbullying (Appendix E), particularly for the one being
cyberbullied and the person who is cyberbullying others (Cyberbullying victim and
offender warning signs, 2006, p. 1). While each individual board and school may
have different issues regarding delivery of such seminars, particularly boards with a
large student population or area, it is important that they are offered repeatedly so
that parents can become comfortable with the technology over time. This would
also allow parents to network with other parents and form a community of support
outside of school hours that could help address any abuse that is discovered outside
of school hours.
across the school board, beginning in grade 3.Given that“20% of grade 4 students
access the internet through their own personal computer, a number that rises to
51% by grade 11” (Belsey, 2005, p.7), proper online etiquette is vital. Such
internet usage agreements should address protocol use within the school and the
consequences for breaking them. If school boards develop consistent standards for
internet usage agreements amongst all schools, students will become accustomed to
agreements can often confuse students, since they may receive more harsh penalties
than other students in neighbouring schools or even within their own school.
Without consistent policies that are enforced, schools will have a difficult time
● Schools need to introduce curriculum units from grades 3-12 that address
online safety and protection measures. Schools cannot afford to wait to teach
students about online etiquette or safety. With this in mind, schools should
incorporate the aforementioned seminars for parents into the curriculum, plus
additional curriculum units that speak to student rights online, how to report online
abuse, the importance and benefits of reporting online abuse, and proper online
policy on acceptable computer use both on and off school property; run workshops
(2005, p. 17).
113
5HIHUHQFHV
Document Series No. 11. Toronto, ON: Centre for Addiction and Mental Health.
Adlaf, E.M., Paglia-Boak, A., Beitchman, J.H., & Wolfe, D. (2003). 7KHPHQWDOKHDOWK
DQGZHOOEHLQJRI2QWDULRVWXGHQWV: )LQGLQJVIURPWKH26'86.
CAMH Research Document Series No. 14. Toronto, ON: Centre for Addiction
http//www.Principalsonline.com
http://www.archive.salon.com/mwt/feature/2001/07/03/cyber_bullies/print.html
awareness.ca/english/resources/special_initiatives/wa_resources/wa_shared/backg
rounders/challenge_cyber_bullying.cfm
6FKRRO. Retrieved October 14, 2005, from the Seattle Schools web site:
http://www.seattleschools.org/area/ctc/olweus_survey/McClure_allschool_olw.pdf
Retrieved October 14, 2005, from the Seattle Schools web site:
http://www.seattleschools.org/area/ctc/olweus_survey/Combined_olw.pdf
http://www.seattleschools.org/area/ctc/youthsurvey.xml
http://www.cyberbullying.ca/Cyberbullies_Stalking_Online_Playground
_April_21_2004.html
http://www.e- laws.gov.on.ca/DBLaws/Statutes/English/90e02_e.htm#BK415
9LHZ. Retrieved October 22, 2005, from the Media Awareness Network web
site: http://www.media-awareness.ca
Franec, M. (2004, May 10). Rise of the cyberbully demands new rules. Retrieved
October 18, 2005, from The Christian Science Monitor web site:
http://www.csmonitor.com/2004/0510/p09s01-coop.htm
115
Keith, S., & Martin, M.E. (2005). Cyberbullying: Creating a culture of respect in a cyber
http//www.ucalgary.ca
October 18, 2005, from the National Children’s Home web site:
http://www.nch.org.uk/uploads/documents/Mobile_bullying_%20report.pdf
Paulson, A. (2003, December 30). ,QWHUQHWEXOO\LQJ. Retrieved October 18, 2005, from
http://www.csmonitor.com/2003/1230/p11s01-legn.htm
8(4), 12-15.
116
DQG\RXWKULVN. Retrieved November 17th, 2006 from the Centre for Safe and
Retrieved November 17th, 2006 from the Centre for Safe and Responsible Internet
Wolak, J., & Mitchell, K.J. (2000). <RXWKLQWHUQHWVDIHW\VXUYH\. Retrieved October 14,
2005, from The Crimes Against Children research Centre web site:
http://www.unh.edu/ccrc/projects/internet_survey.html
117
$SSHQGL[$
1LSLVVLQJ8QLYHUVLW\5HVHDUFK(WKLFV$SSURYDO
118
$SSHQGL[%
'LVWULFW6FKRRO%RDUG2QWDULR1RUWK(DVW5HVHDUFK$SSURYDO
119
$SSHQGL[&
6WXGHQW6XUYH\RQWKH([WHQWRI&\EHUEXOO\LQJLQ6FKRROV
You are asked to participate in a research study conducted by Alan McLean from the
Masters in Education department at Nipissing University. The results of this research
will be used as part of a thesis to help determine the frequency and severity of
cyberbullying in high schools across District School Board Ontario North East.
&RPSOHWLRQDQG5HWXUQRIWKLV6XUYH\6LJQLILHV&RQVHQW
13 years-old
14 years-old
15 years-old
16 years-old
17 years-old
18 years-old
19 years-old or older
Grade 9
Grade 10
Grade 11
Grade 12
120
Shared custody
Adoptive parent(s)
Foster parent(s)
Secluded in a bedroom
Yes
No
121
Only at school
Only at home
8. On average, how many text messages do you send per week via a cell phone or
computer?
1-5
6-10
11-15
15 or more
9. How many hours per week do you spend on a computer or cell phone text messaging,
going into Internet chat rooms, visiting websites for personal interest, or going to voting
1-4
5-9
10-14
15-19
20-24
Over 25 hours
122
10. Have you ever been bullied or threatened by someone in any of the follow ways?
Digital bullying
Via email
Via websites
A stranger
between 8 am – 3 pm
between 3 pm – 11 pm
between 11 pm – 8am
13. Since September, how many times have you been cyber-bullied per month?
None
Weekly
14. If you have been cyber bullied, but did not report such activity, why did you not tell a
parent, school authority, or the police that you were bullied online?
It wasn’t a problem to me
15. Who did you report to that you were being cyber-bullied?
Parent
Friend
Police
Other
16. Have you ever sent a threatening or bullying message to someone else?
Yes
No
17. Since September, how many times have you cyber-bullied someone else per month?
1-4
5-9
10-14
15 or more times
124
18. Have you ever been invited to post threatening or bullying comments on a website,
Yes
No
19. Have you ever invited anyone to post threatening or bullying comments on a website,
Yes
No
20. Have you ever sent a threatening or bullying comment via the school’s computers?
Yes
No
21. Has anyone ever taken a photograph of you in a way that made you feel embarrassed,
threatened or uncomfortable?
Yes
No
22. To your knowledge, have you had a photograph that was taken of you that made you
Yes
No
Yes
No
125
24. Have you ever shared your online chat room screen name?
Yes
No
25. Have you ever used another person’s online chat room screen name to send a
message?
Yes
No
26. Have you ever posted negative, derogatory or defamatory comments during an online
chat?
Yes
No
27. Have you ever been involved in an online chat where you have received negative,
Yes
No
Strongly agree
Somewhat agree
Somewhat disagree
Strongly disagree
126
Strongly agree
Somewhat agree
Somewhat disagree
Strongly disagree
Strongly agree
Somewhat agree
Somewhat disagree
Strongly disagree
127
$SSHQGL['
6WXGHQW3DUWLFLSDWLRQ&RQVHQW)RUP
3$57,&,3$17,1)250$7,21/(77(5
6WXGHQW6XUYH\RQWKH([WHQWRI&\EHUEXOO\LQJLQ6FKRROV
<RXDUHDVNHGWRSDUWLFLSDWHLQDUHVHDUFKVWXG\FRQGXFWHGE\$ODQ0F/HDQIURPWKH0DVWHU¶V
LQ(GXFDWLRQGHSDUWPHQWDW1LSLVVLQJ8QLYHUVLW\7KHUHVXOWVRIWKLVUHVHDUFKZLOOEHXVHGDV
SDUWRIDWKHVLVWRKHOSGHWHUPLQHWKHIUHTXHQF\DQGVHYHULW\RIF\EHUEXOO\LQJLQKLJKVFKRROV
DFURVV'LVWULFW6FKRRO%RDUG2QWDULR1RUWK(DVW
,I\RXKDYHDQ\TXHVWLRQVRUFRQFHUQVDERXWWKHUHVHDUFKSOHDVHIHHOIUHHWRFRQWDFW$ODQ
0F/HDQDWH[WDODQPFOHDQ#GVEHGXRQFDRUWKHIDFXOW\VXSHUYLVRU
.ULV.LUNZRRGDWH[W
x 385326(2)7+(678'<
7KHSXUSRVHRIWKHVWXG\LVWRGHWHUPLQHWKHH[WHQWWRZKLFKF\EHUEXOO\RFFXUVDQGZKDWFDQ
EHGRQHIURPDVFKRROSHUVSHFWLYHWRKHOSGHDOZLWKVXFKLQFLGHQWV
x 352&('85(6
,I\RXYROXQWHHUWRSDUWLFLSDWHLQWKLVVWXG\ZHZRXOGDVN\RXWR
7DNHPLQXWHVRI\RXUWLPHWRDQVZHUDOORIWKHTXHVWLRQVDVNHG
$UHSRUWRIWKHILQGLQJRIWKHVWXG\ZLOOEHDYDLODEOHLQWKH1LSLVVLQJVFKRROOLEUDU\XSRQ
FRPSOHWLRQRIWKHWKHVLV
x 327(17,$/5,6.6$1'',6&20)2576
1RQH
x 327(17,$/%(1(),767268%-(&76
7KHVWXG\ZLOOKHOSGHWHUPLQHIXWXUHVFKRRO%RDUGSROLF\GHYHORSPHQWZLWKUHVSHFWWR
HGXFDWLQJVWXGHQWVDQGHGXFDWRUVRQWKHGHJUHHVDQGFRQVHTXHQFHVRIF\EHUEXOO\LQJ
x 3$<0(17)253$57,&,3$7,21 128
7KHUHLVQRSD\PHQWIRUSDUWLFLSDWLRQLQWKLVUHVHDUFK
x &21),'(17,$/,7<
$Q\LQIRUPDWLRQWKDWLVREWDLQHGLQFRQQHFWLRQZLWKWKLVVWXG\DQGWKDWFDQEHLGHQWLILHGZLWK
\RXZLOOUHPDLQFRQILGHQWLDODQGZLOOEHGLVFORVHGRQO\ZLWK\RXUSHUPLVVLRQ6XUYH\VZLOOEH
VKUHGGHGZLWKLQPRQWKVRIWKHPEHLQJUHWXUQHGWR$ODQ0F/HDQ
$OWKRXJKWKHVXUYH\VGRQRWDVNIRUDQ\LQIRUPDWLRQWKDWPD\LGHQWLI\\RXDQ\LQIRUPDWLRQ
WKDWLVREWDLQHGLQFRQQHFWLRQZLWKWKLVVWXG\DQGWKDWFDQEHLGHQWLILHGZLWK\RXZLOOUHPDLQ
FRQILGHQWLDODQGZLOORQO\EHGLVFORVHGZLWK\RXUSHUPLVVLRQ
x 3$57,&,3$7,21$1':,7+'5$:/
<RXFDQFKRRVHZKHWKHUWREHLQWKLVVWXG\RUQRW,I\RXYROXQWHHUWREHLQWKLVVWXG\
\RXPD\ZLWKGUDZDWDQ\WLPHZLWKRXWFRQVHTXHQFHVRIDQ\NLQG<RXPD\DOVRUHIXVHWR
DQVZHUDQ\TXHVWLRQV\RXGRQ¶WZDQWWRDQVZHUDQGVWLOOUHPDLQLQWKHVWXG\7KHLQYHVWLJDWRU
PD\ZLWKGUDZ\RXUGDWDIURPWKLVUHVHDUFKLIFLUFXPVWDQFHVDULVHZKLFKZDUUDQWGRLQJVR
x 5,*+762)5(6($5&+68%-(&76
<RXPD\ZLWKGUDZ\RXUFRQVHQWDWDQ\WLPHDQGGLVFRQWLQXHSDUWLFLSDWLRQZLWKRXWSHQDOW\
7KLVVWXG\KDVEHHQUHYLHZHGDQGUHFHLYHGHWKLFVFOHDUDQFHWKURXJK1LSLVVLQJ8QLYHUVLW\¶V
5HVHDUFK(WKLFV&RPPLWWHH,I\RXKDYHTXHVWLRQVUHJDUGLQJ\RXUULJKWVDVDUHVHDUFK
VXEMHFWFRQWDFW
2IILFHRI5HVHDUFK6HUYLFHV 7HOHSKRQH
1LSLVVLQJ8QLYHUVLW\
1RUWK%D\213%/
$VWKH5HVHDUFK6XEMHFW/HJDO5HSUHVHQWDWLYH,XQGHUVWDQGWKHLQIRUPDWLRQSURYLGHGIRU
WKHVWXG\³6WXGHQW6XUYH\RQWKH([WHQWRI&\EHUEXOO\LQJLQ6FKRROV´DVGHVFULEHGKHUHLQ
0\TXHVWLRQVKDYHEHHQDQVZHUHGWRP\VDWLVIDFWLRQDQG,DJUHHWRSDUWLFLSDWHLQWKLVVWXG\,
KDYHEHHQJLYHQDFRS\RIWKLVIRUP
'DWHBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
$SSHQGL[( 129
3DUHQWDO*XDUGLDQ&RQVHQW)RUP
3$5(17$/*8$5',$1&216(17)250
6,*1('&216(17)25<285&+,/'723$57,&,3$7(,15(6($5&+
6WXGHQW6XUYH\RQWKH([WHQWRI&\EHUEXOO\LQJLQ6FKRROV
Your child will be asked to participate in a research study conducted by Alan R. McLean, from the
Graduate Studies Department at Nipissing University. The results will form the basis of a Thesis paper
on Cyberbullying: Emerging Concerns and Solutions in an Ever-increasing Digital World. Participant’s
that are under the age of 16 years must have the Parental/Guardian Consent Form signed.
,I\RXKDYHDQ\TXHVWLRQVRUFRQFHUQVDERXWWKHUHVHDUFKSOHDVHIHHOIUHHWRFRQWDFW
Alan R. McLean (Faculty Investigator) Dr. Kris Kirkwood (Faculty Supervisor)
(705) 266-5385 Phone: 705-474-3461 ext. 4378
alan.mclean@dsb1.edu.on.ca krisk@nipissingu.ca
x 385326(2)7+(678'<
While bullying continues to be a problem within the school system, the emergence of cyber-bullying and
subsequent research has not been clearly delineated from the general “bullying” statistics. Schools
either react to events within their school or implement programs to prevent inappropriate behaviour.
However, few schools or school boards have taken the initiative to deal with cyberbullying adequately.
In order to effectively deal with cyberbullying, it must be separated from common forms of bullying
(physical and verbal) and studied more intensely. Considering that technology will only increase in
speed, demand, and capability in the foreseeable future, how schools react to the cyber world will be
significant in preventing and dealing with cyberbullying.
Participants will be asked to complete a survey that seeks to determine the online activities of students.
In particular, the study will seek to expose the extent to which participants are bullied online, the ways
in which students are bullied online, and the extent to which participants bully others while online.
x 352&('85(6
,I\RXUFKLOGYROXQWHHUVWRSDUWLFLSDWHLQWKLVVWXG\KHVKHZLOOEHDVNHGWRGRWKH
IROORZLQJWKLQJV
Subjects will be given a participant information letter that describes the reasoning behind my research,
what I plan to do with the research one I have tabulated the results, and which policies I hope to change
or alter to reflect the results of the research. Furthermore, they will be instructed that the survey is
completely anonymous and that no information relating to student name or school will be asked for.
If parents and students choose to sign the consent forms, then they will be given a copy of the
Participant Survey and asked to anonymously complete the survey. The surveys should take 10-15
minutes to complete, and as students are finished they will raise their hand and a teacher will collect the
130
survey from them. Once the surveys have been collected by the teacher, he/she will forward them to
the Principal of the school who will in turn send them to me via our Board mail system.
x 327(17,$/5,6.6$1'',6&20)2576
While the survey is anonymous, disclosing personal information regarding cyberbullying can be
stressful and emotionally upsetting since victims often re-live the abuse they suffered at the hands of
cyberbullies (or are suffering). If any student wishes to talk further about any issue that arises as a
result of completing the survey, please contact any of the professionals identified below:
1) Since the survey will be done in schools, students can immediately contact a guidance counsellor
within his/her participating school.
2) Students and Parents can also access Kids Help Phone for professional counselling services that are
available 24 hours a day. Students may phone 1-800-668-6868 or access online counselling at
kidshelpphone.ca
3) Child and Family Services – (705) 360-7100
Although the surveys do not ask for any information that may identify you, any information that is
obtained in connection with this study and that can be identified with you will remain confidential and
will only be disclosed with your permission.
x 3$57,&,3$7,21$1':,7+'5$:/
You can choose whether to be in this study or not. If you volunteer to be in this study, you may
withdraw at any time without consequences of any kind. You may also refuse to answer any questions
you don’t want to answer and still remain in the study. The investigator may withdraw your data from
this research if circumstances arise which warrant doing so.
131
x 5,*+762)5(6($5&+68%-(&76
You may withdraw your consent at any time and discontinue participation without penalty. This study
has been reviewed and received ethics clearance through Nipissing University’s Research Ethics
Committee. If you have questions regarding your rights as a research subject, contact:
5HVHDUFK6HUYLFHV 7HOHSKRQH
1LSLVVLQJ8QLYHUVLW\
1RUWK%D\213%/
7RREWDLQUHVXOWVRIWKHVXUYH\SOHDVHFRQWDFW
Alan McLean mailto:alan.mclean@dsb1.edu.on
c/o DSB Ontario North East phone: (705) 360-1151
Box 1020 cell: (705) 266-5385
Timmins, ON
P4N 7H7
6,*1$785(2)5(6($5&+68%-(&73$5(17/(*$/5(35(6(17$7,9(
,XQGHUVWDQGWKHLQIRUPDWLRQSURYLGHGIRUWKHVWXG\³>LQVHUWWLWOH@´DVGHVFULEHGKHUHLQ
0\TXHVWLRQVKDYHEHHQDQVZHUHGWRP\VDWLVIDFWLRQDQG,DJUHHWRSDUWLFLSDWHLQWKLV
VWXG\,KDYHEHHQJLYHQDFRS\RIWKLVIRUP
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
1DPHRI5HVHDUFK6XEMHFWSOHDVHSULQW
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB BBBBBBBBBBBBBB
6LJQDWXUHRI5HVHDUFK6XEMHFW 'DWH
6,*1$785(2)3$5(17*8$5',$1
,XQGHUVWDQGWKHLQIRUPDWLRQSURYLGHGIRUWKHVWXG\³>LQVHUWWLWOH@´DVGHVFULEHGKHUHLQ
0\TXHVWLRQVKDYHEHHQDQVZHUHGWRP\VDWLVIDFWLRQDQG,DJUHHWRP\FKLOG
SDUWLFLSDWLQJLQWKLVVWXG\,KDYHEHHQJLYHQDFRS\RIWKLVIRUP
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB BBBBBBBBBBBBBB
6LJQDWXUHRI3DUHQW*XDUGLDQ 'DWH
6,*1$785(2),19(67,*$725
,QP\MXGJHPHQWWKHVXEMHFWDQGRUSDUHQWLVYROXQWDULO\DQGNQRZLQJO\JLYLQJLQIRUPHG
FRQVHQWIRUSDUWLFLSDWLRQLQWKLVUHVHDUFKVWXG\
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB BBBBBBBBBBBBBBB
6LJQDWXUHRI,QYHVWLJDWRU 'DWH
$SSHQGL[) 132
2QOLQH$FURQ\PV
606: The Short Message Service (SMS) is the ability to send and receive text messages to and from
mobile telephones. The text can comprise of words or numbers or an alphanumeric combination.
SMS was created when it was incorporated into the Global System for Mobiles (GSM) digital
mobile phone standard.
A single short message can be up to 160 characters of text in length using default GSM alphabet
coding, and 70 characters when UCS2 international character coding is used.
(06-Enhanced Messaging Service (text messaging with more bells and whistles)
006 -Multimedia Messaging Service, (MMS) is the ability to send messages comprising a
combination of text, sounds, images and video to MMS capable handsets.
3'$VPDAs stand for Personal Digital Assistants. You might recognize these better if we used
names like Palm Pilot, RIM Blackberry, Handspring Visor / Treo, Sony Clie, iPaq, Pocket PC etc.
Most of these are not only personal information organizers, they can now connect to the Internet,
receive and send e-mail and browse the World Wide Web.
6327 -Smart Personal Object Technology. It uses FM radio networks to deliver a slow but steady
stream of data to devices like wristwatches and fridge magnets, sending information such as sports
scores, weather reports and stock quotes, or even short text messages. (Coming to your wristwatch
very soon. Dick Tracy move over!)
Online Acronyms
(Belsey, 2005b, p. 1)
135
$SSHQGL[*
&\EHUEXOO\LQJ:DUQLQJ6LJQV
&\EHUEXOO\LQJ:DUQLQJ6LJQV
$FKLOGPD\EHF\EHUEXOO\LQJRWKHUVLIKHRUVKH«
$FKLOGPD\EHDYLFWLPRIF\EHUEXOO\LQJLIKHRUVKH«
(Cyberbullying victim and offender warning signs, 2006. p. 1)
$SSHQGL[+ 136
&\EHUEXOO\LQJ5HYLHZ3URFHVV
137
(Willard, 2005b, p. 17)