Saturday, November 28, 2015

Week 6: Cyberbullying



Cyberbullying
   According to Bynum’s (2015) article, Computer and Information Ethics, that refers to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practices within their profession.  However, does this apply children especially if their intentions go awry and they decide to use technology to degrade and bully other students?  This is the case with cyberbullying that shares some basic elements with traditional bullying in that it is about relationships, power, and control where bullies attempt to establish illegitimate power and control over their victims according to, Erb (2006).  The thing that sets cyberbullying apart from traditional bullying, more than just the use of technology, is the anonymity of the person or persons posting the comment(s) and the much larger audience that can see the posting or message.  In addition, the cyberbullying can take place 24/7 and it is outside the legal realm of schools (when done outside school grounds), yet, can impair student academic performance.

   Cyberbullying can take the form in the following 7 ways as suggested by Willard (2005);
    
Other such virtual venues can be created such as voting or polling booths where webpages can be created and students can vote for the “ugliest” ,” “fattest,” or “dumbest” boy and girl in the school, having devastating consequences on the hapless students that are included in the contest.  Equally disturbing is the fact that each example of the cyberbullying presented can take place under adult supervision without them even knowing.  Although Keith and Martin (2005) suggest that it is the responsibility of parents to monitor their children’s computer use, they admit that this can be tricky.  Acknowledging that adults often use technology as practical tools, their children may view it as more of a way to communicate with peer groups.  With the various modes of communication, a child can be completing homework on one screen and switch to another and engage in bullying activities without the parents even knowing, or on a different electronic device. 

   Next, is a brief look from statistical information collected from Hinduja and Patchin (2015) depicting the different forms of cyberbullying that takes place in one middle school in the Midwest.  Not only does the bar graph show the percentage of the kids that have suffered from cyberbullying, but even more surprising, was the different forms of bullying that took place online from “hateful” comments to impersonating another to inflict humiliation. 

  
Because of the increased access to technology and the understanding that students can remain anonymous, things that many would not say face-to-face can now be communicated without being identified, increasing the amount of bullying that takes place at school can now follow student’s home around the clock. 

   So, with the complexion of school bullying changing due to technological advances, a student can now be bullied around the clock.  Therefore, schools have instituted student education programs, developed anti-bullying school board policies (both infraction and discipline), provided parent education, established relationship with local police departments, encouraged students to report cyberbullying, and all this must be done while walking a tightrope to protect students affected by cyberbullying without trampling on the free speech rights of bullies (Beale & Hall, 2007).  In addition, many states have been forced to adopt anti-bullying laws when the results of the bullying leads to much more serious results.  For example, in Massachusetts the suicide of 15-year old Phoebe Prince after months of bullying from schoolmates prompted swift reform of the Massachusetts bullying law (Kueny & Zirkel, 2012).  The paradigm then that exists is what can schools do?  What should states do?  The reality is that anti-bullying laws have increased in recent years, however, they generally lack sanctions or incentives, thus leaving implementation and enforcement in question.  Only four states-Deleware, Florida, Georgia, and Utah-specify possible consequences (Kueny & Zirkel, 2012).  As an educator I see the reality of cyberbullying outside the grasp of school personnel and outside the realm of parents unless they are monitoring their child’s activities on a screen 24/7.  Furthermore, the ability to track the instigator or bully will continue to be a challenge, putting further strain on a school that has the immediate challenge of educating kids, let alone dealing with bullying on their own campuses.     
  
References
Beale, A. V., & Hall, K. R. (2007). Cyberbullying: what school administrators (and parents) can do. The Clearing House, 81(1), 8-12.

Erb, T. (2006). Cyberbullying: A growth threat to young adolescent well-being. Middle School
Journal, 21-22.
Hinduja, S., & Patchin, J. W. (2015, February). Cyberbullying victimaization. Retrieved from http://cyberbullying.org/2015-data/

Keith, S., & Martin, M. E. (2005). Cyber-bullying: creating a culture of respect in a cyber world. Reclaiming Children and Youth, 13(4), 224-228.
Kueny, M. T., & Zirkel, P. A. (2012). An analysis of school anti-bullying laws in the United States. Middle School Journal, 43(4), 22-31.
Willard, N. (2005). An educator's guide to cyberbullying and cyberthreats. Retrieved from http://csriu.org/cyberbullying/pdf