Cyber bullying is abusive behaviour using technologies. The cyber bully uses a range of strategies which can be categorised as follows and each category provides some clues to effective help and support
1. Emails to a known address of the cyber bully victim
2. Mobile phone text messages to bully the victim
3. Social networking sites messages abusing or denigrating the victim
4. Information technologies accessible by the cyber bully including video message boards.
If we examine the logistics and practicalities of cyber bullying via these media, solutions can be presented which should enable the victim to ignore, redirect, delete or track the bully and their abusive messages.
1. Emails: the relevant factors here include:
a) The cyber bully must be aware of the email address of the recipient in order to send intimidating or abusive messages.
b) The messages remain private as the victim is fearful of the abuser
Solutions:
- change the email address of the victim and do not distribute unless to known and trusted individuals;
- redirect the abusive cyber bullying material to a protective source such as a parent or school liaison for further intervention;
- allow students an individual email address since generic addresses such as 'student name /number@name of school or institution' provide a template for locating someone to abuse.
- train the victim to ignore, redirect or delete all emails from the abusive source so as to avoid exposure to the abuse.
2. Mobile Phone Text messages: the relevant factors here include:
a) The cyber bully must be aware of the phone number of the recipient in order to send intimidating or abusive messages
b) The messages remain private as the victim is fearful of the abuser
Solutions:
- change the phone number and distribute only to trusted friends and family
- Forward the abusive message, without opening, to a protective source
- train the victim to ignore, redirect or delete all emails from the abusive source so as to avoid exposure to the abuse.
However, this is generally not what happens and the consistent access of the cyber bully to their victim via these electronic means can prove to be highly destructive. Supportive strategies within the home and school such as limiting access to mobile phones and supervised computer time, can offer some protection. Allowing unlimited access to mobile phones and computers without monitoring the content is the equivalent of locking a child in their room with their abuser and this is an inadequate response. Parents may want to consider overnight restrictions on mobile and internet usage to limit access if the child is being bullied by these means. These solutions may seem obvious but the complicating factor always is the distressed mental state of the victims of cyber bullying and their reluctance to expose themselves to further and possibly physical abuse should they use these responses.
3. Social networking sites: the relevant factors differ here:
a) the site is often a private and exclusionary site accessible only to the cyber bully's selected friends. The victim therefore often hears by proxy about the abusive or denigrating information and cannot retaliate on the site or correct misrepresentations.
b) the cyberspace rules are very different for such sites. There is the issue of 'freedom of speech ' which has been used in some litigation to uphold the right of the cyber bully to denigrate or criticise, even slander the victim with no recourse to legal sanction. Solutions:
- the victim cannot engage with the abuser so must be advised to ignore their postings and contribute to other more productive social networks
- the victim may open an individual site to counteract the abusive or libelous allegations of the cyber bully
- the victim may seek intervention from webmasters if the language or content of the abuse is contrary to cyber communication regulations. Cyber bullying is a destructive and harmful activity, which requires the victim to develop skills for self protection and help seeking. http://news.bbc.co.uk/2/hi/uk_news/england/sussex/7251384.stm BEBO BULLY VICTIM IN SUICIDE BID : Monday, 18 February 2008, 17:06 GMT
MySpace has introduced protective measures such as promoting safe social networking on their sites since 2006. They have employed trained specialist personnel to deal with inappropriate content and have closed down 29000 profiles set up by registered offenders (Patchin and Hinduja,2010). They restrict access to sites set up by young people under age 15 and do not permit children under 13 to register. These measures provide some protection from predatory users, and may be a useful barrier to peer abuse.
4. Other opportunities for abuse: An example has been cited of abusive peers entering the video announcements visual communication board at a school and on the school bus to expose an individual to public humiliation. This is known as 'hacking' and is most likely a police matter and should be reported as such by the school authorities. Cyber Bullying has entered the realm of severe abuse but help and support are available.
Cyber Bullying - Help and Support for Dealing With Cyber Bullies Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Dr. Jean Healey has extensively researched many aspects of bullying. Her new book 'Childhood Bullying: A Deadly Serious Matter' is available through Amazon or the bullywatch website.Find out more about Cyber Bullying at the special page on http://bullywatch.com.au. There you can download a FREE e-book about cyberbullying. Register there for resources and information to assist in managing a range of bullying behaviours and for family support.
© Dr. Jean Healey, All rights reserved worldwide.
This article comes with free reprint rights which mean you can us it for your ezines, websites, newsletters, blogs, ebooks etc.There is a requirement that all the links remain in place and the article cannot be modified.
watches mobile phone Save On Diode Led Di 0187 Fluid View Order Polo Ralph Lauren Purple Label Satin Navy
0 comments:
Post a Comment