Executive Summary
This following essay was written to explore some of the many forms of cyberbullying on social media. The operational definition of cyberbullying varies slightly between experts but is generally described as “as a threat or harassment directed towards an individual that can be repetitive in nature, and has varying tactics of abuse.” Nancy Willard has identified seven categories of cyberbullying. They are: “online harassment, cyberstalking, put downs, masquerade, outing, flaming, and exclusion.” With the growing number of social media users increasing annually so is the immersion of this new form of bullying. As of 2010, 73% of American teens access their social media sites daily, many for as much as six to ten hours daily. With numerous students online for this length of time, a growing trend of cyberbullying has immersed. Studies show that at least one in every five students have experienced some form of cyberbullying. One of the most common types of cyberbullying experienced on social media is online harassment. This is a Student Sample
Online harassment can begin with a single post or the upload of a picture that is meant to create a negative impact on an individual. When a perpetrator uploads a picture on Facebook or Snapchat with negative intentions, it can then “snowball” with the participation of others who then upload and forward that picture. When someone participates in forwarding this picture on Facebook they too become perpetrators. This repetition of posts adds to the repeated humiliation experienced by the victim. When “up to 98% of Canadian access the internet and communications technologies daily,” they have visible access to the damage inflicted and often join in, now known as “conforming.” If online harassment continues to escalate in can then turn into a more sinister type of cyberbullying known as cyberstalking.
Although cyberstalking in nature is rare, it can be terrifying for the victim involved. Cyberstalking has many common characteristics as traditional stalking but with one main difference: the perpetrator has anonymity to their advantage. This anonymity has empowered people to be bolder and cross moral lines that would not normally be crossed. Cyberstalking can be done from across the street or across the world and the perpetrator may not even be known to the victim. With ever growing advancements in technology, the cyberstalker has access to many tools that gives h/she different methods of harassing and hunting their victim.
Students that are victims of social media cyberbullying may experience feelings such as: “depression and anxiety and increased feelings of sadness and loneliness.” Cyberbullying on social media is a permanent record of not just the victim’s experiences, but the bully’s tactics as well, and these are available for all social media users to view. This permanent documented history is not just available for the viewing of other students on social media, but also for potential colleges and future employers, which could have devastating effects on their futures.
As the number of social media users continue to grow so does the number of cyberbullying incidents. Continued research into this field is required to help identify potential predictors of this negative behaviour. Stronger legislative consequences and an increase in education are also required to help students combat and prevent this growing trend of harassment. This is a Student Sample
INTRODUCTION
Social media has exploded on the scene as one of the most popular activities that students prefer to engage in. Gone are the days of going outside to enjoy assorted activities and here to stay are tablets, smartphones, and laptops. According to the research conducted by Lenhart, Purcell, Smith and Zickuhr “73% of wired American teens now use social networking websites, a significant increase from previous surveys” (2010, p. 2). With the immergence of social media and an ever-increasing number of users, a new form of bullying has spawned and continues to grow. There are numerous different tactics that cyberbullies employ to stalk and harass their victims. According to Nancy Willard, there are seven categories involved in cyberbullying now identified as the most common. They are: online harassment, cyberstalking, put downs, masquerade, outing, flaming, and exclusion (2007, p. 5). A recent article written by Namin Shin and Hwasil Ahn found that “A close examination of several studies makes it possible to conjecture that the overall involvement rate of cyberbullying among youth is around 20% of the population surveyed.” (2015, p. 393). This equals one person in every five that have experienced bullying online in some form. As Generation Z grows, they are spending more and more time on social media. Marilisa Racco from British Columbia Global News reported “it’s estimated that they log about 10 hours a day online (an informal Global News survey found that number to be closer to six hours) and a whopping 96 per cent own a smartphone” (June 18, 2018). This ever-increasing presence on social media makes cyberbullying a growing trend in society, now keeping on par with traditional bullying. This is a Student Sample
Cyberbullying, in general, is a relatively new phenomena that has only begun to be studied and researched over the last three decades. There are several overlapping factors that cyberbullying has in common with traditional bullying but the most notable difference is the anonymity the perpetrator experiences. “If the perpetrator does not see the victim, then s/he may have less awareness of the consequences and the effects that their actions are causing” (Slonge, Smith, Frisen, 2012, p. 26). When they can’t see their victims face they don’t always understand the impacts on their victim, therefore lacking the empathy normally associated with face to face interactions. This difference allows cyberbullies a sense of empowerment and can give the feel of a victimless crime. Any form of online bullying leaves victims behind to deal with varying degrees of impacts: from simply being hurt to suicide. This paper will explore two of the most common types of cyberbullying and some of the effects felt by the victims.
ONLINE HARASSMENT
Online harassment through social media is one of the most common forms of cyberbullying. According to Slonje, Smith and Frisen “Physical strength is not necessary for perpetration of cyberbullying” (2012, par. 2, p. 27). “What does lend strength to cyberbullying is simply access to a computer, technical ability and anonymity” (2012, par. 2, p. 27). Online harassment creates what bullies feel is a victimless crime and may begin with one perpetrator initiating a tormenting act on a victim. What sometimes begins with a single verbal harassing comment on Facebook can then turn into what researchers are now calling “snowballing.” Slonje, Smith and Frisen describe it as “a single act by one perpetrator that may be repeated many times by others and experienced many times by the victim: (2012, par. 4, p. 26). An example of this is when a sexy photo of someone is uploaded by an angry ex boyfriend and then it goes viral from others uploading it. The victim is continuously exploited each time the photo is uploaded on Snapchat or a comment retweeted on Twitter and powerless to stop this online form of harassment. One study by Mishna, Khoury-Kassabri, Gadalla, and Daciuk concluded that “evidence indicates that 98% of Canadian youth access the internet and communications technologies on a daily basis” (2011, par. 1, p. 63) making any form of online harassment visible for almost everyone. Facebook, Twitter and Snapchat allow today’s youth visibility to everything that is online and to then join in on the harassment, also known as ‘conforming”. The findings of the study conducted by Mishna, Khoury-Kassibri, Gadalla and Daciuk revealed “that students are highly involved in cyber bullying” (2011, par. 11, p. 66). And these students “were more likely than others to report perpetration of violence toward peers” (2012, p. 63). Online harassment can be known to have varying levels of degrees of impact on victims and can sometimes escalate and become even more intrusive on a victim. This is a Student Sample
CYBERSTALKING
The operational definition of cyberstalking as defined by J. Reid Maloy in Paul Bociq’s book “Cyber Stalking” states “An abnormal or long-term pattern of threat or harassment directed toward a specific individual” (Maloy, 1998a, as cited in Bociq, 2004. p. 6). Cyberstalking can begin with online harassment once any type of slight is felt by the stalker and can continue to escalate to cyberstalking. “Such behaviours may include, but are not limited to, the transmission of threats and false accusations, identity theft, data theft, damage or data to equipment, computer monitoring and solicitation of minors for sexual purposes, and any form of aggression” (Bociq, 2004, p. 14). This behaviour may begin with something as simple as having a friend request rejected on Facebook. This unlimited access to social media means that the perpetrator may not always be known to the victim in a face to face environment.
The true purpose of cyberstalking isn’t always known, but the end result for the victim is almost always the same: they feel threatened and can become terrified. The different types of advancing technology that a cyber stalker has access to and employs are used to elicit fear and paranoia for the victim. Technology today can allow cyberstalkers to set up timers for pre-set messages, which are escalating in nature, making the victim think that they’re being watched. Other forms of technology allow for the stalker to hack the victim’s phone and computers and watch them, noting personal information and personal habits in which they can use against their victim. Traditionally it was thought that some stalkers were associated with some form of mental illness, yet this is not true with regards to cyberstalking. The anonymity provides cover for anyone to become involved and push beyond moral lines that is traditionally harder to cross with face to face stalking. Cyberstalking added with traditional stalking has increased the number of victims perpetrated worldwide and the level of fear created and felt.
VICTIM IMPACT
As earlier defined by Bociq a stalker is a person who displays abnormal behavior directed towards another, yet for the victim of these verbal and relentless assaults it feels much more impactful than just bad behaviour. In his book “Cyber Stalking” Bociq also refers to a different operational definition of stalking defined by Ogilvie as “as a concept stalking possesses sinister and threatening connotations. It implies being hunted and harassed, whilst powerless and unable to stop a threatening and relentless pursuit” (Ogilvie, 2000, as cited by Bociq, 2004, p. 5). This definition is more reflective of how the victim feels.
For the youth of today the impacts of cyberbullying on social media can mimic those of traditional bullying. Constant and repeated negative messages sent to a young person has the same effects of being traditionally bullied over and over in a school yard. According to the U.S. Department of Health and Human Services “Kids who are bullied are more likely to experience: depression and anxiety, increased feelings of sadness and loneliness, changes in sleep and eating patterns, and loss of interest in activities they used to enjoy. These issues may persist into adulthood” (n.d., par. 2). These feelings follow young people into adulthood because unlike traditional bullying, cyberbully leaves a permanent record online. It can be viewed by anyone at anytime. This permanent record also adds to the stress and anxiety of a young bullied victim and even the online perpetrator. As they finish high school or college their social media record serves as a form of documented history. Their entire social media presence has been chronicled from the beginning, which has potentially disastrous consequences as future colleges and employers view their detailed social media history. As stated by the U.S. Department of Health and Human Services “Cyberbullying can harm the online reputations of everyone involved – not just the person being bullied, but those doing the bullying or participating in it” (n.d., par. 2). This is a Student Sample
CONCLUSION
In conclusion social media cyberbullying can be a persistent pursuit of someone, or it can begin with one online comment or uploaded picture that “snowballs” with the participation of others. This permanent record is not only harmful to the victim of this harassment, but to everyone who participates. This participation can be as simple as sharing a picture but in reality, it’s contributing to the continued infliction of harm to someone else. What some young people consider to be harmless as they forward a comment or picture, could be considered by potential employers, as encouragement and support of harassment. The anonymity of cyberstalking has made crossing moral lines, once thought by most people to be uncrossable, easier and more common. Traditional bullying requires the courage of face to face verbal aggression, whereas cyberbullying can be done within the safety of a home with a few strokes on a keyboard or 140 characters on Twitter.
Cyberbullying is a relatively new type of crime that continues to grow as the number of people on social media users increases. As cyberbullying incidents rise so does the advancement of legislation in Canada and worldwide. According to Public Safety Canada “depending on the exact nature of the behaviour, the following current offences could be charged: Criminal harassment, uttering threats; intimidation; mischief in relation to data; unauthorized use of computer; identity fraud; extortion; false messages, indecent or harassing telephone calls; counselling suicide; incitement of hatred; and, defamatory libel” (n.d., par. 2). Each one of these are crimes in Canada and apply to offenders of all ages. Continued research into this topic is necessary to help discover underlying predictors, develop stricter legislation against cyberbullying and provide more ways to educate social media users on how to protect themselves and others.
References
Bocij, P. (2004). Cyberstalking: harassment in the internet age and how to protect your family. Westport, CT: Greenwood Publishing Group. Retrieved from
https://books.google.ca/books?hl=en&lr=lang_en&id=q8NZLBE0sm0C&oi=fnd&pg=PR9&dq=cyberstalking&ots=lzqcyrWY1t&sig=g3cYdm9pIwBU2fnntCgatHR9fYc#v=onepage&q=cyberstalking&f=false
Government of Canada, Public Safety Canada. (n.d.). What are the potential legal consequences of cyberbullying? Retrieved from https://www.getcybersafe.gc.ca/cnt/cbrbllng/prnts/lgl-cnsqncs-en.aspx
Mishnaa, F., Khoury-Kassabrib, M., Gadallaa, T., & Daciuka, J. (2011). Risk factors for involvement in cyber bullying: victims, bullies and bully–victims. Children and Youth Services Review. 34 (1). Retrieved from https://www-sciencedirect-com.libezproxy.nait.ca/science/article/pii/S0190740911003343?via%3Dihub
Lenhart, K., Purcell, K., Smith, A., & Zickuhr, K. (2010). Social media and mobile internet use among teens and young adults. Pew Internet & American Life Project. Retrieved from https://files.eric.ed.gov/fulltext/ED525056.pdf
Racco, M. (June 19, 2018). Is generation z glued to technology? ‘It’s not an addiction; it’s an extension of themselves.’ Global News. Retrieved from
Shin, N., & Ahn, H. (2015). Factors affecting adolescents’ involvement in cyberbullying: What divides the 20% from the 80%? Cyberpsychology, Behavior, and Social Networking. 18(7). Retrieved from
http://web.b.ebscohost.com.libezproxy.nait.ca/ehost/pdfviewer/pdfviewer?vid=1&sid=b12717f1-21f5-482e-9fb4-0d20d9bcdca1%40sessionmgr120
Slonje, R., Smith, P., & Frisen, A. (2012). The nature of cyberbullying, and strategies for prevention. Computers in Human Behaviour. 29(1). Retrieved from
https://www-sciencedirect-com.libezproxy.nait.ca/science/article/pii/S0747563212002154
United States Government, Department of Health and Human Services. (n.d.). Cyberbullying tactics. Retrieved from https://www.stopbullying.gov/cyberbullying/what-is-it/
https://www.stopbullying.gov/at-risk/effects/index.html
Willard, N. (2007). Cyberbullying and cyberthreats (2nd ed.). Champaign, IL: Research Press. Retrieved from https://books.google.ca/books?id=VyTdG2BTnl4C&printsec=frontcover#v=onepage&q&f=true
