The goal of this course is to discuss a newer form of abuse--cybperbullying and cyberharassment. The course will review how perpetrators employ different digital mediums to harass their victims and the terminologies that have been linked to these harassing behaviors. The scope of cyberbullying and harassment and at what point online and offline harassment converge and diverge will also be explored. Risk factors, consequences of cyberbullying, how dating and domestic violence have been transformed by technology, theories to explain this phenomenon, and prevention and educational efforts will also be discussed.
This course is designed for physicians, nurses, social workers, psychologists, therapists, mental health counselors, and other members of the interdisciplinary team who may intervene in cases of cyberbullying and harassment.
NetCE is accredited by the Accreditation Council for Continuing Medical Education to provide continuing medical education for physicians. NetCE is accredited as a provider of continuing nursing education by the American Nurses Credentialing Center's Commission on Accreditation. NetCE has been approved by NBCC as an Approved Continuing Education Provider, ACEP No. 6361. Programs that do not qualify for NBCC credit are clearly identified. NetCE is solely responsible for all aspects of the programs. NetCE, #1092, is approved as a provider for social work continuing education by the Association of Social Work Boards (ASWB) www.aswb.org through the Approved Continuing Education (ACE) Program. NetCE maintains responsibility for the program. ASWB Approval Period: 03/13/2016 to 03/13/2019. Social workers should contact their regulatory board to determine course approval for continuing education credits. This program is approved by the National Association of Social Workers (Approval #886531582-9920) for Social Work continuing education contact hours. NetCE is accredited by the International Association for Continuing Education and Training (IACET). NetCE complies with the ANSI/IACET Standard, which is recognized internationally as a standard of excellence in instructional practices. As a result of this accreditation, NetCE is authorized to issue the IACET CEU. NetCE SW CPE is recognized by the New York State Education Department's State Board for Social Work as an approved provider of continuing education for licensed social workers #0033. This course is considered self-study, as defined by the New York State Board for Social Work. Materials that are included in this course may include interventions and modalities that are beyond the authorized practice of licensed master social work and licensed clinical social work in New York. As a licensed professional, you are responsible for reviewing the scope of practice, including activities that are defined in law as beyond the boundaries of practice for an LMSW and LCSW. A licensee who practices beyond the authorized scope of practice could be charged with unprofessional conduct under the Education Law and Regents Rules.
NetCE designates this enduring material for a maximum of 5 AMA PRA Category 1 Credit(s)™. Physicians should claim only the credit commensurate with the extent of their participation in the activity. NetCE designates this continuing education activity for 5 ANCC contact hour(s). NetCE designates this continuing education activity for 6 hours for Alabama nurses. NetCE designates this continuing education activity for 2.5 NBCC clock hour(s). Successful completion of this CME activity, which includes participation in the evaluation component, enables the participant to earn up to 5 MOC points in the American Board of Internal Medicine's (ABIM) Maintenance of Certification (MOC) program. Participants will earn MOC points equivalent to the amount of CME credits claimed for the activity. It is the CME activity provider's responsibility to submit participant completion information to ACCME for the purpose of granting ABIM MOC credit. Completion of this course constitutes permission to share the completion data with ACCME. Social workers participating in this intermediate to advanced course will receive 5 Clinical continuing education clock hours, in accordance with the Association of Social Work Boards. AACN Synergy CERP Category A. NetCE is authorized by IACET to offer 0.5 CEU(s) for this program.
In addition to states that accept ANCC, NetCE is approved as a provider of continuing education in nursing by: Alabama, Provider #ABNP0353, (valid through December 12, 2017); California, BRN Provider #CEP9784; California, LVN Provider #V10662; California, PT Provider #V10842; Florida, Provider #50-2405; Iowa, Provider #295; Kentucky, Provider #7-0054 through 12/31/2017.
In addition to states that accept ASWB, NetCE is approved as a provider of continuing education by the following state boards: Alabama State Board of Social Work Examiners, Provider #0515; Florida Board of Clinical Social Work, Marriage and Family Therapy and Mental Health Counseling, CE Broker Provider #50-2405; Illinois Division of Professional Regulation for Social Workers, License #159.001094; Illinois Division of Professional Regulation for Licensed Professional and Clinical Counselors, License #197.000185; Illinois Division of Professional Regulation for Marriage and Family Therapists, License #168.000190; Texas State Board of Social Worker Examiners, Approval #3011; Texas State Board of Examiners of Professional Counselors, Approval #1121; Texas State Board of Examiners of Marriage and Family Therapists, Approval #425.
This activity is designed to comply with the requirements of California Assembly Bill 1195, Cultural and Linguistic Competency.
While incidents of cyberbullying are becoming more common, the solution is not necessarily to avoid the Internet and other digital technologies; rather, more Internet safety education and prevention information are needed to raise awareness. The purpose of this course is to provide health and mental health professionals with the information necessary to identify and intervene in cases of cyberbullying and harassment to minimize the negative effects to patients and to improve professionals' ability to educate the public to prevent cyberbullying.
Upon completion of this course, you should be able to:
- Discuss Internet and cell phone usage among different segments of the population.
- Define cyberbullying, cyberharassment, and cyberstalking.
- Identify various online vehicles and how they may be used to harass or bully.
- Discuss the prevalence of cyberbullying and harassment among children, adolescents, young adults, and adults.
- Analyze the general profiles of cyberbullying perpetrators and victims, including possible indicators of cyberbullying.
- Utilize theoretical frameworks used to explain cyberbullying.
- Evaluate the health, psychosocial, social, behavioral, and academic impact of cyberbullying and harassment.
- Identify risky Internet behaviors.
- Apply different prevention, educational, and clinical interventions for cyberbullying.
Alice Yick Flanagan, PhD, MSW, received her Master’s in Social Work from Columbia University, School of Social Work. She has clinical experience in mental health in correctional settings, psychiatric hospitals, and community health centers. In 1997, she received her PhD from UCLA, School of Public Policy and Social Research. Dr. Yick Flanagan completed a year-long post-doctoral fellowship at Hunter College, School of Social Work in 1999. In that year she taught the course Research Methods and Violence Against Women to Masters degree students, as well as conducting qualitative research studies on death and dying in Chinese American families.
Previously acting as a faculty member at Capella University and Northcentral University, Dr. Yick Flanagan is currently a contributing faculty member at Walden University, School of Social Work, and a dissertation chair at Grand Canyon University, College of Doctoral Studies, working with Industrial Organizational Psychology doctoral students. She also serves as a consultant/subject matter expert for the New York City Board of Education and publishing companies for online curriculum development, developing practice MCAT questions in the area of psychology and sociology. Her research focus is on the area of culture and mental health in ethnic minority communities.
Contributing faculty, Alice Yick Flanagan, PhD, MSW, has disclosed no relevant financial relationship with any product manufacturer or service provider mentioned.
John M. Leonard, MD
Jane C. Norman, RN, MSN, CNE, PhD
The division planners have disclosed no relevant financial relationship with any product manufacturer or service provider mentioned.
The purpose of NetCE is to provide challenging curricula to assist healthcare professionals to raise their levels of expertise while fulfilling their continuing education requirements, thereby improving the quality of healthcare.
Our contributing faculty members have taken care to ensure that the information and recommendations are accurate and compatible with the standards generally accepted at the time of publication. The publisher disclaims any liability, loss or damage incurred as a consequence, directly or indirectly, of the use and application of any of the contents. Participants are cautioned about the potential risk of using limited knowledge when integrating new techniques into practice.
It is the policy of NetCE not to accept commercial support. Furthermore, commercial interests are prohibited from distributing or providing access to this activity to learners.
- INTERNET AND DIGITAL COMMUNICATION TRENDS
- DEFINING CYBERBULLYING
- ONLINE AND DIGITAL MEDIUMS FOR HARASSMENT
- FORMS OF CYBERBULLYING
- PREVALENCE OF CYBERBULLYING
- SIMILARITIES AND DIFFERENCES BETWEEN ONLINE AND OFFLINE BULLYING/HARASSING
- PROFILE OF CYBERBULLIES
- PROFILE OF CYBERBULLYING VICTIMS
- POTENTIAL INDICATORS OF CYBERBULLYING
- THEORETICAL FRAMEWORKS USED TO UNDERSTAND CYBERBULLYING
- ONLINE DATING AND CYBERHARASSMENT
- DIGITAL TECHNOLOGY AND INTIMATE PARTNER VIOLENCE
- PSYCHOSOCIAL CONSEQUENCES OF CYBERBULLYING
- RISKY INTERNET BEHAVIORS
- PREVENTION AND INTERVENTIONS
- Works Cited
- Evidence-Based Practice Recommendations Citations
Supported browsers for Windows include Microsoft Internet Explorer 9.0 and up, Mozilla Firefox 3.0 and up, Opera 9.0 and up, and Google Chrome. Supported browsers for Macintosh include Safari, Mozilla Firefox 3.0 and up, Opera 9.0 and up, and Google Chrome. Other operating systems and browsers that include complete implementations of ECMAScript edition 3 and CSS 2.0 may work, but are not supported.
#96421: Cyberbullying and Harassment
In the last few decades, Internet and digital technologies have become more commonplace. It is now customary to instantaneously connect and communicate with people using online social networking platforms or text messages. Unfortunately, these digital mediums may be utilized as vehicles to bully and harass others. Cyberbullying and cyberharassment refer to the use of electronic communication to frighten, intimidate, and/or threaten another individual, with the potential to inflict emotional distress . The prevalence of victimization of cyberbullying varies due to how researchers define the concept and how they go about collecting the data. For example, in one study conducted with adolescents and young adults 14 to 19 years of age, 3.2% disclosed to being a victim of harassment via text messages in the past two months . Another study using an expanded definition of cyberharassment to include messages received via the Internet, text messages, and emails in the last 6 months found a victimization rate of 9.8% . Addressing cyberbullying and cyberharassment can be a challenge due to the anonymity of the perpetrator, and it can be extremely rampant given the speed and coverage of the Internet. A negative posting or crude photo of someone can be disseminated very rapidly and can be read and seen around the world .
Many adults may be categorized as what is termed "digital immigrants," meaning they did not grow up in the digital world and are trying to learn and adapt to this new environment . Digital immigrants may employ technology but tend to be less familiar with its potential, although they do acknowledge its importance for some tasks . On the other hand, adolescents and young adults are generally considered "digital natives," as they were raised using digital technology and have no difficulty speaking and utilizing new technological mediums with ease and familiarity . Digital natives tend to use technology for numerous tasks and adapt as the tools change . It is likely that the majority of health and mental health practitioners fall into the category of "digital immigrants," and some clients, particularly adolescents and young adults, are "digital natives." Consequently, it is vital for practitioners to build their knowledge of Internet technologies and applications in order to meet the unique needs of their younger clients.
In order to understand the pervasive social, psychological, and cultural impact of the Internet on the lives of individuals, it is important to obtain a brief glimpse of Internet and digital technology usage and consumption. According to the U.S. Census, 74.8% of households had Internet at home in 2012, compared with 68% in 2009 and only 18% in 1997 [7,92]. A study conducted in 2014 with 1,006 adults found that 87% men and 86% women used the Internet . Individuals 18 to 29 years of age are the most likely to utilize the Internet (97%), while adults 65 years of age and older are the least likely (57%) . There is no doubt that Internet technology has become a ubiquitous part of the American landscape. Although data published in the last several years is among the most current, the Internet landscape changes so rapidly that obtaining accurate data is nearly impossible.
Cell phones are also an integral part of the fabric of individuals' lives. As of 2014, 90% adults have cell phones and 58% have smartphones . Of the 2,252 adults 18 years of age and older who participated in the Pew Internet and American Life Survey in 2013, 63% used their cell phone to access the Internet . More than one-third (39%) of adults in the United States, 70% of adolescents, and 72% of young adults (18 to 29 years of age) indicated that the phone is a way to deal with boredom . In 2013, the Pew Research Internet Project found that 44% of adults leave their phones by their bedside when they go to sleep .
In a focus group study of Australian adolescents and their usage of cell phones, interesting themes emerged . While it is not surprising they were attached to their cell phones, these adolescents expressed that the number of calls they received on their cell phone was associated with how valued or loved they felt. When they could not use their cell phones, they felt disconnected. This speaks to how cell phones have become entrenched in individuals' social and personal lives.
Of the 90% adults with cell phones in 2014, 81% reported using their phones primarily to send and receive text messages . Adolescents are the largest consumers of text messaging on cell phones, and a Pew Internet survey showed that 38% of teens texted friends on a daily basis in 2008; this increased to 54% by 2009 . Adolescents (14 to 17 years of age) who text frequently send and receive more than 100 texts daily . According to a Nielsen survey, adolescents in the U.S. sent and received an average of 3,339 text messages per month in 2010, or almost 111 messages every day . This compares to 1630 text messages per month for the next highest users, young adults 18 to 24 years of age . Adolescents prefer text messaging on their cell phones as the main mode of communication rather than talking, with girls using phones more often than boys . In 2010, 75% of adolescents 12 to 17 years of age had their own cell phones, a 45% increase compared to 2004 .
A huge number of individuals are using online social networking sites like Myspace, Facebook, and Google+, and adolescents are no exception. In 2014, 74% of adults were using social networking sites, with those 18 to 29 year of age the leading users at 89% . As of 2013, an estimated 71% of Americans 18 years of age and older used Facebook; 17% used Instagram, and 22% reported using LinkedIn . Additionally, 19% of Internet users have Twitter accounts, with more older teens than younger teens using the platform. Parental supervision is not as strict as one might think. In a 2008 study, one-third of parents had never seen their child's Myspace profile .
Although the use of the Internet and digital technology is growing and changing rapidly, it is important to remember that there is also the digital divide. The term "digital divide" refers to the social inclusion/exclusion and equality/inequality of Internet access, which is influenced by socioeconomic differences among various groups, including racial/ethnic minorities . Extent of access can be categorized based on three factors: access to the Internet, frequency of Internet use, and scope of Internet use . Socioeconomic status plays a role in each of these factors, as it is necessary to have the economic resources to purchase a computer or digital device, to pay for service, and to allot time to use the Internet recreationally . According to U.S. Census data, 56.9% of African Americans and 58.3% of Hispanics indicated they had Internet at home compared with 76.2% of whites . This divide does not expand to include Asian Americans, who have greater access to the Internet at home (82.7%) than whites . However, the growing use of cell phones and mobile devices to access the Internet may be closing this gap . In 2012, smartphone use among whites was 44.6% compared with 45% among African Americans and 45.8% among Hispanics . Ethnic minorities, including African Americans and English-speaking Latinos, are higher users of mobile devices and Internet access via cell phones compared to their white counterparts. They appear to take fuller advantage of their cell phone features compared to white cell phone users . This difference may be partially the result of inconsistencies in data collection, but it also speaks to the fact that mobile phones have become extremely prevalent.
The terminology used to discuss cyberbullying is complex. For the purposes of consistency and clarity, the term "cyberbullying" will be used throughout this course, as opposed to the terms "cyberharassment" or "cyberabuse," as the term cyberbullying is the most frequently used in the research literature . In this course, cyberharassment and cyberabuse will be considered subtypes of cyberbullying. Although bullying is often considered a part of school violence, the term has been used to describe activities occurring in the workplace and outside of the school setting.
As discussed, cyberbullying is defined as the use of electronic communication disseminated via the Internet and other digital technologies to frighten, intimidate, and/or threaten another individual with resultant emotional distress . The terms cyberharassment, cyberabuse, and cyberstalking (or online harassment, online abuse, and online stalking) are often used interchangeably, which may be confusing.
In general, stalking typically involves two or more unwanted contacts. The mechanisms of stalking may be classified into four different categories :
Purely online: Stalking occurs completely online.
Crossover: Stalking takes place solely online for weeks, but it then transitions to offline (e.g., face-to-face contact or postal contact by the perpetrator), though online activities may continue.
Proximal with online: Stalking is initiated offline but evolves to include online contact.
Purely offline: Stalking occurs completely offline.
Examples of cyberstalking include but are not limited to :
Obtaining information on the Internet about the victim in order to harass or intimidate online or offline
Sending or posting false information or messages about the victim
Impersonating someone online
Posting personal information about the victim online
Sending computer viruses to the victim
Some experts have defined cyberharassment as involving the use of electronic communications to convey sexually lewd or inappropriate behaviors, while cyberbullying does not. However, for the purposes of this course, bullying, harassment, and abuse will refer to repeatedly inflicting negative behaviors on another individual causing physical, psychological, or emotional discomfort or injury . These negative behaviors may or may not be sexually inappropriate.
In addition, some have argued that repetition of the negative behavior is not necessarily a key criterion in the definition of cyberbullying. For example, an offensive behavior or threat can be sent or posted online once but then distributed or posted to larger audiences, because the Internet provides a mechanism to disseminate information quickly to a vast number of people [21,99]. In these cases, the perpetrator's behavior is not repetitious, but the intent is for mass distribution (i.e., repetition of views or forwards).
Another key dimension of cyberbullying is the intent to trigger negative feelings in the victim(s). In one focus group study, adolescents felt that the intent of the cyberbullying perpetrator was to hurt the victim . The authors indicated that the motivations for the perpetrator varied and included just wanting to have fun (at the expense of the victim), not liking the victim, having had an argument with the victim, or in some cases, merely wanting to display technological prowess. In a focus groups with teachers, parents, and students, another theme was peer pressure; cyberbullying was being perpetrated because "everyone else was doing it" .
The power imbalance between the victim and perpetrator is a vital component in the definition of traditional bullying . For example, power differentials in offline bullying might encompass the bully having larger physical stature or greater social status, such as popularity. However, this is not necessarily the case in online harassment. In cases of cyberbullying, the perpetrator may hold the power by having technological skills and/or the content (e.g., a photo or video) to inflict harm . Consequently, some have said that online technology itself can create a power imbalance between the perpetrator and victim. Essentially, bullying and harassment have become democratized; it allows everyone to participate.
Finally, literature has typically used the term cyberbullying to connote the behaviors of youths and adolescents. However, as stated earlier, this curriculum will be employing the collective term "cyberbullying" in its broadest sense to encompass a wide range of negative behaviors such as aggression disseminated through electronic communications and this appears to be the consensus in the empirical literature . How researchers measure the different types of aggression and the specific vehicle of the electronic communication employed are inconsistent in research studies . Its victims and perpetrators can include adults, adolescents, and children, although there is an emphasis on youths in this curriculum.
There are many different forms of online, digital, and electronic mediums that are used to bully or harass someone . This includes e-mail, text/instant messaging, chatrooms, blogs, and social networking sites. In a 2007 study, 25% of the youths reported that the cyberbullying occurred in chatrooms and nearly as many said it occurred on a website . However, instant or text messaging appears to be the most common vehicle for cyberbullying, and it is often used by perpetrators who know the victim from offline situations. Individuals who are victimized by someone they met or know online are typically victimized through Internet mechanisms like social networking, e-mail, chatrooms, and blogs or gaming websites . As the use of social networking websites has exploded, it is assumed that this will become a more common tool of cyberbullying.
E-mail is a form of electronic communication involving the transmission of messages over the Internet. Cyberbullying can occur when inappropriate messages, photos, pornography, or computer viruses are e-mailed to the victim.
A chatroom is a virtual community in which a group of individuals "dialogue" and share information with each other asynchronously (i.e., non-real time). A perpetrator can use this forum to spread rumors or negative or personal information about a victim to the group.
There are several online games (e.g., World of Warcraft) with an interactive component, allowing players to have discussions and interactions in game. When someone harasses an individual when playing games in the cyber world, this is called "griefing" .
Blogs are analogous to website journals. Entries might include commentary, information about events, graphics, videos, or images, all of which are posted by an individual and viewed in chronological order. Cyberbullying occurs when an individual posts negative, private, and/or false information about the victim and others are encouraged to enter the blog to read the commentaries.
Instant and text messaging are forms of synchronous (i.e., real-time) communication whereby individuals communicate through text using computers or other devices, such as phones. When mean, hurtful, threatening, or humiliating messages are sent from one party to another, this may be considered cyberbullying. Text wars or attacks can occur when a large group of people gangs up on a victim or victims. During these "wars" massive amounts of text messages are sent to the victim.
Social networking is a form of online communication that consists of three uses of web-based services :
Individuals construct a public or semi- public profile within a bounded system.
Individuals articulate a list of other users with whom they share a connection.
Users can view and traverse their list of connections and those made by others within the system.
Cyberbullying on social networking sites can occur in a similar manner as via e-mails, blogs, text messaging, and websites. Interestingly, there are several studies that show that the largest group involved in cyberbullying on social networking sites is bystanders—those who witness the bullying of others. A 2011 study found that 88% of adolescents in the United States have witnessed bullying/harassment on a social networking site .
It has become relatively easy for anyone to create a personal website. A cyberbully may create pages with threatening or hurtful information about a victim on a specific website. In some cases, the perpetrator may post personal information and photos without the consent of the victim. This information then becomes public domain, with the possibility of reaching millions of viewers. This act of placing harmful comments on a website has been called "trolling" .
These forms of electronic communication all share the same attribute of reproducibility. A perpetrator can easily harm another individual repeatedly by simply clicking a button, which then spreads the negative behavior (i.e., gossip) to a group of individuals in his/her address book .
Flaming: Sending messages that are rude or vulgar in nature about a person via an online group, e-mail, or instant/text message
Outing: Posting or sending content about a person that is sensitive and/or private (also referred to as "doxxing")
Exclusion: Deliberately and cruelly excluding someone from an online group
Cyberstalking: Harassment via the Internet involving threats and intimidation
Online harassment: Repeatedly sending offensive messages online
Impersonating: Pretending to be the victim and posting messages or personal photos
Denigrating: Sending or posting untrue and cruel statements about a particular person. This can include e-mail or text insults about another peer's physical characteristics, such as looks or weight. Girls are the more frequent target of insults than boys, and the insults often focused on weight (e.g., calling someone a "whale" or "ugly pig") and promiscuity or sexuality (e.g., calling someone a "whore" or "slut").
Masquerade: Posing as someone else for the purpose of sending information via the Internet that makes that individual look bad. Some perpetrators manage to steal victims' passwords in order to access computers or cell phones and pretend to be that person. Adolescents report that it is not difficult to obtain a password, and exchanging password information is often a sign of friendship.
Online sexual solicitation is another form of cyberbullying, whereby perpetrators identify victims online and entice them to perform sexual acts on- or offline . Other approaches include bombing (using a software program to send the victim thousands of e-mails, resulting in the e-mail account failing and ultimately being blocked) and tricking a victim into disclosing sensitive and personal information in order to disseminate the information to other people via the Internet [30,31]. "Happy slapping" entails perpetrators using cell phones to film victims being assaulted or forced to do something humiliating. In one study of 1241 high school students, 10% admitted to filming someone being humiliated or attacked .
In some cases, perpetrators will assume a new online identity for the purpose of bullying. In a study conducted with 365 sixth to ninth graders in Canada, researchers found that one-third of the adolescents admitted to taking on different personalities when they were online, and almost one-quarter pretended to be a different gender . About 19% said they told people online that they had a different physical appearance than in real life, and 15% disclosed assuming another person's identity online. In another study, adolescents admitted to engaging in a variety of cyberbullying behaviors, including sending insulting e-mails, targeting strangers in chatrooms, and impersonating others online .
Some cyberbullies are very sophisticated in terms of their Internet skills, and some have been known to target institutions or companies by releasing worms that compromise computer systems . This can cause computer and network systems to shut down, ultimately hurting a company's productivity and yielding financial losses. Others use their skills to access private customer information from companies for dissemination or criminal activity.
Another behavior that can develop into or be a part of cyberbullying is "sexting." However, not all sexting is cyberbullying. Sexting involves disseminating sexually explicit photos, e-mails, and texts by cell phone or online . According to a study conducted by the Pew Internet and American Life Project, sexting may take place between romantic partners or it may occur between individuals who are not in a romantic relationship, but one of whom hopes to develop a romantic relationship . When sexting takes place in the context of an established romantic relationship, it is considered analogous to sex, according to the teens surveyed. It may begin before or after sexual intercourse is initiated in the relationship.
If sexting data is sent in either of these scenarios, it may be shared with others outside the relationship without the consent of one of the individuals. If this occurs, it can be classified as cyberbullying under some contexts.
In a study of 1,034 ethnic minority 10th graders, 21% of participants had sent a nude or semi-nude photo or video . Nearly one-third (31%) had received sexually explicit content. It is estimated that approximately 15% to 40% of youths are involved in sexting (depending on how sexting is defined) . Research indicates that sexting is often done among groups rather than simply between two individuals.
It is not clear whether the prevalence of cyberbullying has increased or decreased over the years. Some speculate that as the forms of electronic communication increase there is a greater opportunity for cyberbullying . However, the prevalence is very difficult to monitor due to the varying definitions of cyberbullying, the different timeframes used, and the different study populations researchers employ .
Some scholars argue that there is a curvilinear relationship between age and cyberbullying—it peaks around adolescence (between the ages of 13 and 15 years) and then decreases with age . However, the speculation that there is an "age out" effect with cyberbullying is controversial. The statistics regarding college students and cyberbullying seem to contradict this hypothesis.
In a 2004 survey of Internet users 10 to 17 years of age, 19% indicated that they bullied someone via the Internet or were a victim themselves in the previous year . However, in a 2007 study, 48.8% of adolescents disclosed being a victim of cyberbullying, with almost one-third having received an abusive text message . On the other hand, 21.4% of adolescents in the study admitted to having bullied someone using technology, typically text messages. Other reported forms of cyberbullying included receiving threatening online messages, having e-mails forwarded to others without consent, having an embarrassing photo posted without consent, or being the target of a malicious rumor that was spread online . Girls are generally more likely to be victims of harassment or abuse online compared to boys (38% vs. 26%). Furthermore, adolescents who use social networking sites are more likely to be victims of cyberbullying compared to those who do not use social networking sites (39% vs. 22%) . Data obtained from eight studies conducted between 2007 and 2014 yielding a sample size of 15,000 youths throughout the United States indicate that 25% have experienced cyberbullying victimization and 16% disclosed to having cyberbullied someone .
In a very early study focusing on online sexual victimization, almost 20% of surveyed adolescents had received an online sexual solicitation within the last year, and 3% stated that they received a sexual solicitation that was characterized as aggressive, whereby the perpetrator attempted to contact the youth by mail or phone to meet . In a 2008 survey study examining social networking sites and victimization, 15% of participants 10 to 15 years of age reported that they had received some sort of sexual solicitation via social networking sites . In a 2012 national study in the United States, 23% of youths indicated that they experienced exposure to pornography online and 9% reported an unwanted sexual solicitation online . In a study conducted in Taiwan, 13% of 11th grade students had experienced unwanted online sexual solicitation . The rate of solicitation was higher among boys than girls (15.9% vs. 10.2%) .
Online racial discrimination, another form of cyberbullying, is also a concern . A survey of 264 high school students measured online racial discrimination by asking whether participants had experienced being shown a racist image online; seeing jokes about people of their race or ethnic group online; hearing things online that were untrue about people in their race or ethnic group; or witnessing people saying mean or rude things about another person's ethnic group online. The researchers found that 71% of both African American and white students had experienced online racial discrimination at least once. Social networking sites were the most frequent medium for this type of online harassment (50%), followed by text messaging (34%) . Perceived anonymity may be a partial motivator for perpetrators. Online chatroom participants who are in a monitored chat have a 19% chance of being exposed to a negative racial remark about another racial/ethnic group or about their own group, but the chances increase to 59% in an unmonitored chatroom .
In a 2014 online survey study with 297 undergraduate and graduate students at a university, 51.5% indicated that they had engaged in a cyberbullying behavior . In another study, 10% to 15% of college students had received repeated e-mails or text messages from a spouse, boy/girlfriend, or partner that were insulting, threatening, or harassing . The two most frequent types of online harassment among college students, according to a 2010 study, were sexual harassment and online pestering . Approximately 24% of the participants reported having received inappropriate sexually oriented messages or unwanted material of a sexual nature, while 28% had been pestered or irritated by a person online to the point they no longer wanted to be friends. In these cases, 17% stated they requested the person who was sending messages not contact them any longer, but the contact did not stop .
In a study focusing on cyberstalking, 4,446 female undergraduates were questioned regarding their online experiences . Researchers found that 13% of the sample had been cyberstalked, and 24.7% stated they had received e-mails from a stalker.
Although much of the research regarding cyberbullying focuses on youths, adults are also at risk. In a study that recruited women from diverse age groups using Facebook, 19.9% of adult women had repeatedly received sexually obscene messages from someone they did not know via the Internet within the last 12 months . Furthermore, 12.5% indicated they had been threatened online or by text message by someone they did not know in the past year. According to the New York City Police Department Computer Investigation and Technology Unit (CITU), 42.8% of its cases between 1996 and 2000 involved online or computer-based harassment .
Cyberbullying is not a phenomenon confined to the United States; rather, it has become a global social issue. A cross-cultural comparison of youths from Canada and China and their experiences with cyberbullying found that one-quarter of Canadian 7th grade students had been victims of cyberbullying, and the prevalence was slightly higher for the Chinese students (33%) . However, these differences were not statistically significant. Meanwhile, 15% of the Canadian students and 7% of the Chinese students admitted to have bullied someone using online communication mediums . In another large-scale Canadian study conducted in high schools in Quebec, a total of 8,194 individuals 14 to 20 years of age participated. A total of 22.9% reported experiencing cyberbullying in the last 12 months . Girls in this study experienced significantly more cyberbullying than boys .
In a 2009 study, 666 college students from a university in Turkey were recruited to complete a survey about cyberbullying . About 22.5% disclosed that they had bullied someone online at least once. Of these students, 3% were strictly perpetrators; they engaged in the bullying but had never been victims. However, 19% of this subset of "perpetrators" were also "bully victims;" they fell in both categories. In terms of being a victim, more than a half (55%) stated they were victims of cyberbullying at least once during their lifetime.
In a 2010 study of young Australians (younger than 25 years of age) who had self-identified as cyberbullying victims, almost half (49%) stated they were victims when they were 10 to 12 years of age, 52% at 13 to 14 years of age, and 29% at 15 to 16 years of age . The data also demonstrated that they were victimized multiple times. The most common vehicles of harassment were e-mail (21%), online chatrooms (20%), social networking sites (20%), and cell phones (19%) . In a 2013 quantitative study with 2,017 adolescents (12 to 19 years of age) in Greece, 28.3% disclosed that they had been a victim of cyberbullying and 14.6% indicated they had perpetrated cyberbullying behaviors .
Sociocultural context may play a role in shaping bullying behaviors both offline and online and help-seeking behaviors. It has been suggested that in collective cultures (e.g., Asian cultures) in which there is an emphasis on the collective unit and preserving harmony, social conformity becomes an important dimension in bullying. In Japan, for example, bullying typically involves an entire class or a small group of students "ganging up" on a victim. Bystanders will tend not to intervene because the collective unit is where they derive their identity. In these cultures, the bullying behavior usually involves indirect bullying tactics, such as spreading rumors and social exclusion .
Cultural differences in how individuals view themselves relative to the external environment may also play a role in cyberbullying . In Japan, as in most Asian countries, there is an emphasis on an interdependent self-construal—viewing oneself and others within a broader context . In Western cultures, individuals tend to be primed with independent self-construals—viewing oneself and others from one's own perspective . In a longitudinal study of college students in the United States and Japan, researchers analyzed two time periods to determine if there were changes in cyberbullying behaviors. Cyberbullying behaviors were highest and increased over time with the U.S. college and the U.S. sample had lower interdependent self-construals and higher cyberbullying reinforcements compared with their Japanese counterparts .
There also appear to be cultural differences in help-seeking behaviors, with cultures with stronger respect for authority figures (e.g., China) displaying more confidence in these figures' ability to protect them. It is possible that a culture's ingrained respect for authority and hierarchy may make the involvement of authority figures such as teachers and school administrators an effective preventive measure for cyberbullying .
When one thinks of a conventional bully, an image of a bigger or stronger person dominating a weaker victim comes to mind. While this may be true in offline cases, this is not necessarily the case in cyberbullying. According to some experts, the issue of physical or social power is not necessarily the primary issue of the cyberbully; there may not necessarily be an obvious power imbalance between the perpetrator and victim . However, context specific skills, such as having more technological prowess, may be considered the key form of power in some cases of cyberbullying .
A second difference is that online perpetrators are more often unknown to their victims; he/she can be invisible and anonymous . This can make tracing the identity of the cyberbully difficult . Furthermore, as noted, this anonymity may play a role in the continuation of cyberbullying, as the perpetrator does not necessarily witness the negative results of the bullying and may be less likely to feel remorse or regret . Studies are demonstrating the role of anonymity in cyberbullying. For example, one study found that 59% of comments posted anonymously were uncivil compared to 29% of those posted by an individual with an identifier . In a longitudinal study with 146 college students, researchers found that when the perpetrator perceived there was anonymity, rates of cyberbullying increased . Perceived anonymity tends to support positive attitudes toward cyberbullying. In a focus group study, one young boy related :
I think cyberbullying is much worse than verbal bullying because you cannot tell anyone about it and then no one really knows what's going on. And the person who is doing it does not feel as guilty because they are not saying it to your face.
Offline bullying is confined to a particular time and place; however, with cyberbullying, the harassing messages can be disseminated very rapidly to a very wide audience in multiple geographic regions over an extended period of time . This makes it very difficult to locate the source of the cyberbullying, but it is easier for the victim to document the harassment as the messages can easily be saved .
In studies of children and adolescents 10 to 17 years of age, boys have been found more likely to be perpetrators of cyberbullying . Female teen perpetrators tend to spread rumors online, while male adolescent cyberbullies tend to post photos or videos that are hurtful to the victim . Age also seems to be correlated with cyberbullying, as it increases with age to a certain point . The peak frequency in cyberbullying tends to occur between 13 and 15 years of age—spiking in the 8th grade and declining in the 11th grade [30,53]. It appears that younger children are more likely to be bullies in the traditional sense (offline), but older youths are more likely to be bullies online; however, it is not clear what dynamics explain this difference . In part, it may be correlated with increased access to the Internet and cell phones with less parental supervision as children age.
Cyberbullies tend to be more aggressive and generally break more rules than non-bullies of the same age . Not surprisingly, there is a strong correlation of cyberbullying with substance abuse and being either a victim or perpetrator of traditional offline bullying . Socially, perpetrators tend to have poor relationships and emotional bonds with their parents, less supervision from their parents, and are more likely to associate with peers who are delinquent .
It is not surprising that empathy plays a role in cyberbullying. Those with higher levels of empathy toward cyberbully victims tend to have more negative attitudes toward cyberbullying in general and believe that their peers also disapprove of cyberbullying activities . Because perpetrators are not empathetic toward their victims, they underestimate the harmful consequences of their behaviors and tend to view their behaviors more as innocent pranks or jokes rather than cyberbullying .
There is also some evidence that perpetrators of cyberbullying/harassment score higher levels of psychopathology compared to their non-perpetrating counterparts. In a 2014 study with undergraduate and graduate students, personality traits of Machiavellianism, subclinical narcissism, and subclinical psychopathy (called the "Dark Triad") were correlated with engaging in cyberbullying behaviors .
There is also another segment of cyberbullies termed "social climber bullies" . These are upper social class students who do well in school and who have leadership positions in school clubs and extracurricular activities. They know they can get away with bullying because teachers and school administrators do not suspect them. Social climber bullies tend to bully students who are "wannabees" (i.e., who want to be part of the in-crowd) and "losers" (i.e., outside of the in-crowd) because they are less likely to report the bullying.
In general, girls and women tend to be the victims of cyberbullying, especially specific types of bullying. For example, girls are more likely to have had a rumor spread online about them than boys .
Cyberbully victims also tend to be victims in other areas of their lives, such as traditional bullying. Not surprisingly, victims of cyberbullying tend to use the Internet more than non-victims . A study of 935 adolescents between 12 and 17 years of age found that those with active profiles on social networking sites were more likely to experience online bullying than those without profiles . Similarly, adolescents who are daily users of the Internet and who use social networking sites such as MySpace and Facebook are more likely to report having been harassed online . Individuals who used webcams at least once or twice a week or who used message boards most days of the week were 1.75 times and 1.67 times more likely, respectively, to report having been cyberbullied repeatedly in the past year .Those who have created online content, such as developing their own blogs, building websites for themselves or for others, uploading photos, or posting to community boards, are more likely to experience online harassment compared to those who do not create their own content . This is not surprising, as motivated perpetrators will seek out contact and other personal information online to be used to harass their victims .
Although cyberbullying can have devastating effects on victims, many are reluctant to seek help. Adolescents have stated they would not necessarily seek help from school staff if they were being cyberbullied due to [32,118]:
Fear of being stigmatized as an informant
Fear of retaliation from the perpetrator
Concern of getting friends into trouble
Belief that it is not a school problem
Concern that parents would restrict their Internet activities
Feelings of shame (i.e., unwillingness to admit to being not well liked by peers)
A study of children who sought help from a Canadian organization's cyberbullying helpline found that the decision to seek parental assistance in online stalking incidences was contingent on whether the individual believed the stalker's threats were real and credible . The children expressed concern that they might be punished if they were to involve their parents, and for the most part, they felt that their parents and adults in general were unable to understand the cyberworld and cyberbullying .
Signs of depression or anxiety, particularly when the Internet is not available or is inaccessible for periods of time
Signs of depression or anxiety when e-mails or instant/text messages arrive
Academic difficulties or behavioral problems offline (e.g., not being on time at school, dropping grades, relationships suffering)
Withdrawal from friends and family
Viewing pornographic material on the computer
Sacrificing normally enjoyed offline activities to participate in Internet activities
Attempting to maintain level of secrecy about online activities (e.g., quickly turning computer off when parent is walking by, deleting browsing history, turning monitor screen off when someone walks by)
Strain theory was introduced by Robert Merton in the early 1930s in his study of wealth. He asserted that whenever a gap or discrepancy between individuals' aspirations and reality exists, frustration will ensue, and individuals will be more likely use illegitimate means to accomplish their goals . In the 1990s, Agnew expanded this theory to apply more broadly to economic aspirations. Agnew argued that people who experience strain are more likely to experience frustration or anger and are then more vulnerable to engaging in criminal or deviant behavior . Sources of strain could stem from three sources: positively valued goals that are not achieved; loss of positively valued stimuli (e.g., loss of a job, loss of a romantic relationship); and presentation of negative stimuli (e.g., history of family violence) . Although social institutions or persons (e.g., parents) can prevent deviant behavior, it is argued that repeated strains could weaken the bonds of these social control mechanisms . It is important to note that strain and deviance are not causal; deviant behavior is a coping mechanism when strain develops .
Since the 1990s, strain theory has been applied to other behaviors, and it has been posited that there may be a relationship between strain and cyberbullying or traditional bullying. In one study of 1,963 middle school students, a variety of strains were measured, including receiving a poor grade, breaking up with a girl/boyfriend, and having a quarrel with a family member, and level of frustration and anger was also recorded . The authors found that strain and anger/frustration were correlated to traditional bullying and cyberbullying even after taking into account gender, race, and age. Therefore, strain theory may be helpful in explaining the causes of cyberbullying. Using the Korean Youth Panel Survey, which includes 3,449 8th grade students, researchers tested strain theory by hypothesizing that youths who were bullied in the traditional manner were more likely to be perpetrators of cyberbullying . This hypothesis was confirmed, and the authors found that other strains, such as parental, academic, and financial strains, also increased the odds of being a perpetrator of cyberbullying.
Disinhibition theory maintains that the Internet can promote an abandonment of some inhibitions, leading to greater disclosure, less restraint, and greater expressiveness. These types of behaviors have been classified as the "online disinhibition effect," which can fall into one of two categories: benign disinhibition (e.g., self-disclosures) or toxic disinhibition (e.g., foul language, pornography, violence, bullying) . The following characteristics of the Internet may facilitate online disinhibition :
Dissociative anonymity: A person can remain relatively anonymous online, with no name or a false name.
Invisibility: For the most part, the Internet, and particularly websites, blogs, and other text-based platforms, lends itself to the person's invisibility. In online communication, there is no concern about nonverbal cues and messages sent.
Asynchronicity: People can interact and communicate with each other in non-real time; there is no feedback loop that discourages negative behavior.
Solipsistic introjections: Because there are no immediate social and nonverbal cues online, one assigns a "voice" and "image" to another person. This process may be conscious or unconscious.
Dissociative imagination: It is easier for a person to dissociate online fiction and offline fact.
Minimization of authority: There is often minimal or no sense of who the authority figure is online. If there is an authority figure, his/her presence is minimized by social cues present in face-to-face interaction, such as attire, height, and body language.
Although this is interesting, studies testing disinhibition theory's application to cyberbullying have not necessarily yielded findings to support these assumptions. In an anonymous online survey of youths 12 to 17 years of age, approximately two-thirds who were victims of cyberbullying stated they knew who the perpetrator was and half knew the bully from school . Therefore, anonymity associated with the Internet does not appear to be the driving force in the cyberbullying in this age group.
In another survey of 7th, 8th, and 9th grade Taiwanese students, instant messaging was the technology most often used for cyberbullying purposes . Students who used instant messaging were more likely to be victims and perpetrators of cyberbullying. If the anonymity component of cyberbullying were a true motivating factor, instant or text messaging would not be the best tool, as it requires a log-in identification. In addition, users of instant messaging often must first have approved the conversation and participants . In this study, among those who experienced cyberbullying, only 25% did not know the identity of the cyberbully, and among those who witnessed a cyberbullying event, 43% stated they did not know who the bully was. Because the majority do seem to know the identity of the perpetrator, the role of anonymity in promoting greater disinhibition is called into question.
Social presence theory is somewhat similar to disinhibition theory in that it asserts that Internet technologies might encourage certain types of behaviors due to the lack of nonverbal and social cues. An individual's sense of social presence decreases in the online medium, and therefore, deindividuation increases . Because online interactions are more impersonal, communication can more easily become aggressive or abusive . For example, it is simple to cut and paste information and e-mail it to a large audience without having to witness the fallout .
According to a 2008 survey, about half of adults in the United States have used an online dating service . In the United States, 30 million adults, or 15% of adults, know someone in a long-term relationship or marriage originating from an online dating service . Popular online dating sites include Yahoo Personals, Match.com, Chemistry.com, PerfectMatch.com, eHarmony.com, and Spark.com . Combined, these sites include 64 million profiles. However, many consider safety to be an issue when using these services. In a small sample of Internet dating service users, more than 80% used various safety precautions when dating, such as meeting at a public location; telling a friend of the meeting; never leaving or going home with someone they met; never giving out a home address; never giving out a phone number; and reporting people who violate dating rules to the dating service . Respondents older than 38 years of age used more safety precautions than younger respondents.
In a 2012 qualitative study conducted, researchers interviewed online dating site users via email and texting . Participants indicated that the use of deceit contributed to the riskiness of online dating. One participant admitted to having two different profiles, individualizing use of the profile to match the type of women he wanted to target. Interesting, although participants acknowledged that there were dangers in online dating, it was generally acknowledged only within the overall context of the danger of the Internet. Participants also contextualized that any danger was rooted in other people behaving badly .
Patterns of use may vary among online dating websites, but researchers have found a theme of control. Implementing mechanisms to control how the situation will play out in an offline environment surfaced as a prominent theme that touches indirectly on online dating safety . Participants in one study described the process of how they negotiated the transition from online dialoguing to the first face-to-face meeting with the person they had been conversing with on the Internet, and common characteristics included meeting during the day in public places and ensuring that there is an easy exit strategy (e.g., meeting for coffee).
There have been few studies about cyberbullying and online dating. In a 2001 study of female adult customers of online dating sites, 26.8% stated they experienced receiving unsolicited obscene e-mails and 15.6% stated they experienced flaming . In this study, the cybervictimization did not necessarily translate into offline harassment or victimization.
Youths also use online mechanisms to date or engage in romantic relationships . A study of youths 11 to 14 years of age found that adolescents used the Internet as a developmental platform for romantic and sexual experiences, building friendships and romantic relationships. As young as 13 years of age, youths described their online sexual and romantic relationships as intense and committed. Sexual encounters ranged from cybersex or cybering, which refers to having blatant sexual conversations, to flashing, which is displaying nudity via a webcam. The online environment appears to make younger individuals overly confident, and their sexual activities were often detached, impersonal, and anonymous .
Over the years, as dating websites have become more popular, states have attempted to enact statutes to protect users. For example, some states require dating websites to have criminal background checks in place . In addition, it is now common for dating websites to have educational information for users about how to protect themselves when making arrangements to meet offline .
Many states have been unable to keep pace with the growth of technologies and their role in intimate partner violence. Domestic violence victims who typically can resort to prosecuting their perpetrators and filing civil protection orders have had a more challenging time when the violence and stalking takes place online . Because many states have not included cyberstalking in their statutes, domestic violence victims may find themselves in a predicament .
Domestic violence has been defined as "a pattern of assaultive and coercive behaviors, including physical, sexual, and psychological attacks, and economic coercion that adults or adolescents use against their intimate partners" [67,68]. Stalking is common among domestic violence perpetrators as a means to threaten and control victims.
More than half of female stalking victims were stalked not by a stranger but by an intimate partner, and 81% of women who were stalked by a current or former intimate partner were also physically assaulted by that partner . It is difficult to assess the impact of technology on the perpetration of domestic violence, as only pieces of information are available. However, Women Halting Online Abuse (WHOA), a volunteer organization focusing on online abuse, extrapolated some statistics based on 349 individuals who filled out their questionnaire in 2010. According to their survey, 34% of participants stated the harassment began with e-mails; 47% indicated that they had a prior relationship with the harasser, and of these victims, 55% reported the harasser was an ex-partner .
In a study conducted by the Technology Safety Project of the Washington State Coalition Against Domestic Violence, a program designed to educate the community, domestic violence victims, and domestic violence advocates about the role of technology in domestic violence and promoting technology safety, one-quarter of the women had the browser history on their computer monitored, and 23.6% stated that they had received threatening e-mails repeatedly . An additional 18% indicated that someone monitored their e-mails.
The increasing sophistication of digital technology has affected how perpetrators control and monitor their victims' movement through the use of global positioning systems (GPS), wireless video cameras, and cell phones. Similarly, Internet technology has been used by perpetrators to determine and track victims' plans and movements. If a victim is not technologically sophisticated, she or he can inadvertently provide more information than she or he intends to the abuser. For example, abusers can monitor victims' e-mails by simply looking at website browser histories and reading deleted e-mails . Increasingly sophisticated and easily accessible software, hardware, and spyware programs allow abusers to monitor a victim's computer without his or her knowledge. If one of these programs is installed, alerts reporting the victim's computer activity, including e-mails sent and websites visited, may be sent to the abuser . Keystroke loggers, hardware devices plugged into the keyboard, may also be used to record everything typed, such as e-mails and passwords .
As digital technology advances, there will be concerted efforts to protect domestic violence victims from online crimes. In Ohio, for example, a "do not track" legislation was brought forth that allowed Internet and smartphone users the ability to prevent anyone from tracking their personal information and whereabouts. This type of legislation may be used by domestic violence victims to protect their safety .
Undoubtedly, cyberbullying has deleterious consequences. There has been some research that shows that the severity of the negative effects may vary by the means by which the cyberbullying is performed. For example, posting negative or invasive photos or video has the most serious consequences. Online cyberbullying is associated with more negative emotional repercussions than cyberbullying by phone or text message .
Many psychosocial effects of cyberbullying have been noted in victims. Youths who experience bullying of any kind often face academic problems, perhaps in part because they are distressed and preoccupied. Teachers will often report that victims' grades drop precipitously, and some will have other academic problems, such as cutting classes, increased detentions, and carrying weapons to school [54,73]. This may be the result of no longer viewing school as a safe place.
The most significant psychological effects appear to be depression and anxiety. Depression is also associated with cyberbullying victimization, with victims reporting increased sadness, anger, and anxiety . These negative ramifications appear to apply in many countries and cultures .
In one study, youths who reported receiving an unwanted sexual solicitation online were 3.5 times more likely to experience major depression symptoms . In terms of gender, boys were 2.5 times and girls were 2 times as likely to disclose experiencing major depression if they had experienced unwanted online sexual solicitations. Similar negative psychological effects have been reported in adolescents experiencing online racial discrimination. High school students who experienced online racial discrimination are at greater risk for depression and anxiety, with girls reporting more symptoms compared to boys .
Issues of self-esteem seem to be a problem for both perpetrators and victims of cyberbullying, even after controlling for age, race, and gender . Coupled with increased depression and anxiety, it is not surprising that suicide resulting from cyberbullying and victimization has become a social problem. In a study of 2,000 middle school youths, suicidal ideation was higher among those who were either victims or perpetrators of bullying or cyberbullying . Being a victim is a slightly stronger predictor of suicidal thoughts and attempts; victims of cyberbullying were 1.9 times more likely and perpetrators of cyberbullying were 1.5 times more likely to have attempted suicide. The adverse psychosocial consequences stemming from cyberbullying may be due to the fact that victims feel that because of online anonymity, there is no safe haven .
Risky and safe Internet behaviors have become an issue in most households given parental concerns that children might fall prey to online predators or be exposed to inappropriate material. A 2001 survey from the Pew Internet and American Life Project found that 57% of parents sampled expressed fears that strangers would contact their children online . In a national study, 7% of adolescents reporting actually meeting someone offline after having met them online; of these children, 23% went to the meeting alone . Frequent use of the Internet is a significant predictor of this risky behavior, as adolescents who tend to use the Internet at least once a day are 1.7 times more likely to meet with someone that they have met online. In a 2014 study with 147 teens and young adults (15 to 24 years of age), participants were asked to complete a survey about experiences with cybervictimization. A content analysis of the participants' Facebook profiles found that greater numbers of Facebook friends predicted victimization . The authors of this study hypothesized that having a strong presence on Facebook increases one's online profile and can increase the risk of meeting a stranger . In another study, persons who frequented online games and chatrooms were more likely to be victims and perpetrators of online sexual solicitation than those who were not involved in online gaming or chatrooms . Parental rules regarding Internet use, including how long adolescent children can be online, oversight of activities, and checking accessed sites, were not predictors of whether or not adolescents would have an offline meeting with someone they met online .
However, children who are online are not necessarily in grave danger from online predators . Rather, because of a lack of familiarity with technology, general concern with adolescents' sexuality, and parental fears about losing control, the media and parents have created a moral panic with little data to justify the fear. In a 2008 study, researchers found that none of the youths in the study who posted personal information online were exposed to sexual predators . However, other risky Internet behaviors, such as interacting online with a stranger, chatting online about sex, seeking pornography, and accepting strangers to friends lists, make adolescents more vulnerable. Essentially, there is no single risky Internet behavior that places youths at risk; engaging in a cluster of Internet risky behaviors increases vulnerability . For example, students who post photos online were also more likely to visit sex websites, chat online about sex, and seek information about sex online.
In general, scholars and researchers maintain that the skills acquired by using the Internet and conversing in online social networking sites can assist in facilitating youths' confidence, communication skills, team building, and other skills that are necessary in a highly technological world. Therefore, it is not realistic to merely prohibit the use of online technologies. Instead, prevention and educational efforts for health professionals, parents, adolescents, and young adults should focus on risky behaviors and skills to recognize, refuse, and report online predators .
Parents, adolescents, and children should also be educated about the types of Internet behaviors that are considered risky, including :
Posting a full name on publicly accessible Internet profiles, such as discussion forums, message boards, blogs, and/or chat rooms
Posting contact information (e.g., phone numbers, e-mail addresses, city and state) on the Internet
Posting photos of oneself on the Internet
Posting what is considered a provocative or sexy picture of oneself on the Internet
Creating what might be considered a provocative user name or e-mail address
Making one's profile visible to all Internet users
Creating a gender-specific e-mail address
Inviting strangers to one's social networking site
Accepting strangers to one's social networking site
Entering a sex chatroom
Agreeing to meet someone offline after minimal Internet exchanges
Downloading pornographic images from pornographic websites
Talking with a stranger about sensitive topics (e.g., sex, relationships)
Returning an e-mail from a stranger
Posting one's plans on the Internet (e.g., plans for the day or a specific time)
Using a webcam to talk to a stranger on the Internet
Accepting file transfers or links from a stranger
Education is a key component in the prevention of cyberbullying, and education about Internet safety can occur on several different levels—with parents, youths, and young adults. Although the majority of individuals practice Internet safety behaviors to some extent, in one study 25% of young women reported having posted a sexy or provocative photo of themselves on the Internet in the last 12 months and 25% talked to someone online they did not know about sex, relationships, and other personal topics . Approximately 10% of the sample indicated they had met someone offline after a few online exchanges. Of course, while the majority of users have not engaged in risky Internet behaviors, those who have may be targeted for more education regarding what constitutes risky behavior and how to avoid victimization.
In an in-depth study with 48 high school students, participants were asked to identify factors that would be important in helping to prevent cyberbullying . The majority felt that there should be more explicit discussions in order to raise awareness about the Internet environment. For example, when an individual engages in an online conversation, he or she should understand that they are "talking" to a stranger who may or may not have represented him/herself accurately. One interesting point is that the participants discussed the importance of others raising their awareness of risky Internet behaviors but not their own . This may speak to the fact that youths do not necessarily see themselves in danger (feeling "invincible"). These points should be addressed in educational materials and programs for the prevention of cyberbullying.
Parental supervision and monitoring is also vital. Three dimensions of effective parental monitoring have been identified: control, solicitation, and disclosure . Parental control refers to efforts on behalf of the parents to restrict their children's behaviors through rules. Parental solicitation pertains to parents' efforts to obtain information by questioning their friends, teachers, and coaches. Finally, disclosure refers to a child's willingness to honestly tell parents about his or her behaviors .
Overall, studies indicate there is a discrepancy in reports by parents and children about parental supervision and monitoring of the Internet. Parents tend to report that they have more rules for Internet usage, while children report fewer parental rules . Parents may underestimate how often their children use the Internet and engage in risky Internet behaviors in part because they are less competent with technology and less informed about the Internet . At the same time, another study found that the more parents try to restrict their children's online activity, the more risky online activities they engage in .
With this in mind, there are safety tips parents may implement in order to minimize the chances of online victimization of their child or children :
Place the computer in an area where there is a lot of traffic to prevent youths from being completely isolated, minimizing their ability to freely explore on the Internet.
Specify where laptops, smart phones, and tablets may be used.
Implement a schedule for Internet use.
Encourage computer and Internet use when a responsible adult is present.
Use screensavers of important people to prevent the person using the computer from falling into a trance-like state.
Parents, counselors, and other helping professionals cannot effectively advocate for Internet safety and avoidance of risky behaviors if they themselves are not familiar with various technologies. It is important to experience social networking sites, blogs, chatrooms, and other online technologies firsthand. Professionals and parents must also acknowledge that the Internet is not simply a venue to locate information; it has become a place for youths and young adults to socialize . Just as individuals have been socialized to recognize cues when situations are perceived to be unsafe or to not frequent certain locations during certain times, this now extends to the Internet.
Using cognitive behavioral techniques, cyberbullying education can focus on an individual level or group format. Topics such as social skills, an ethics of caring, conflict resolution, impulse control, and promotion and facilitation of empathy and personal responsibility should be the focus of educational curricula [32,33]. In a 2009 study, adolescents were asked to identify solutions for cyberbullying; the strongest suggestion was for an anonymous helpline to report cyberbullying . Although youths indicated a wish to report witnessed or experienced cyberbullying, fear of reprisal was a major barrier. Therefore, they felt a mechanism to report cyberbullying and harassment that protected anonymity was vital . Other suggestions included interventions to help youths develop a healthy and positive self-esteem and self-concept.
Imparting social skills, such as fostering empathy and self-efficacy, is also an important theme in cyberbullying prevention. Adolescents who intervened or who were merely bystanders in cyberbullying situations score high on empathic levels, but adolescents who score high on social self-efficacy are more likely to intervene compared to those who scored low on social self-efficacy, who were more likely to engage in passive bystanding behaviors . Social self-efficacy is defined as one's perception of oneself and perceived competence in navigating social situations and being assertive and proactive in interpersonal relationships. In other words, regardless of adolescents' ability to empathize with victims, perceived ability to do something effective predicts whether they will intervene. Adolescents who score low on self-efficacy may not necessarily know what they can do to help, may be afraid of retaliation, or may be afraid of doing the wrong thing and exacerbating the situation . Therefore, adolescents should be taught assertiveness skills for a variety of situations in order to minimize the pressure to conform to group norms. For example, prevention programs that emphasize peer support, peer mediation, and peer mentoring might be beneficial . For example, researchers who conducted a recent study with Turkish adolescents found that those adolescents who were less empathic were more at risk for engaging in cyberbullying. Their study results demonstrated that the combined effect of affective (i.e., experiencing someone else's feelings) and cognitive (i.e., taking another's perspective) empathy played a vital role in influencing adolescents' participation in cyberbullying. Consequently, some experts recommend empathy training in an attempt to reduce participation in cyberbullying . Teaching both affective empathy ("My friends negative feelings as a result of experiencing cyberbullying does affect me.") as well as cognitive empathy ("I can understand why my friend who experienced cyberbullying is upset.)" is vital .
Due to the rapidly changing nature of the Internet and digital technology, parents, educators, practitioners, and youths will require continual education regarding cyberbullying and harassment, how it occurs, and its impact. The etiquette that applies to interacting offline should also be applied to interacting online, and individuals of all ages should have a clear understanding of how to behave properly on the Internet. Sanctions should be imposed when inappropriate behaviors occur on school grounds and at home . Educators and parents may employ an Internet use contract and/or a cell phone use contract to explicitly delineate what is appropriate and inappropriate in terms of Internet and cell phone behaviors . These contracts should be reviewed by all parties and be placed by the computer as reminders.
Because cyberbullying is often perceived to be anonymous, perpetrators believe they can get away with the offense and victims believe they have no recourse. However, there are steps that can be taken to address these behaviors. Victims of cyberbullying should not erase messages, as they can serve as evidence. The police, Internet service providers, and/or telephone companies may use these messages and the associated data to track the origination of the message . This can allow victims to gain some sense of control over the situation.
Overall, the prevention of cyberbullying must be viewed as a several-prong approach, with education at many levels. Collaboration with teachers, school counselors, school administrators, and students is key to making education effective . Cyberbullying among youths may be related to poor parental monitoring and poor parent/child emotional bonding . However, this does not mean that parents should be the sole target for prevention education. Instead, educators, youths, practitioners, and parents should all learn about Internet safety. It should not be assumed that adults are the most effective teachers regarding cyberbullying. Student mentors can be highly effective in disseminating information about cyberbullying, Internet risky behaviors, and positive online interactive skills .
Social workers, counselors, physicians, nurses, educators, lawyers, and other professionals can work collaboratively with parents and community leaders to develop policies that deal directly with cyberbullying and harassment. Policies that establish appropriate Internet behavior etiquette and codes of conduct and consequences for violating these codes must be clearly communicated to all parties. Training should involve local community leaders, school administrators, teachers, and other professionals and should focus on different forms of technology and how they are used to cyberbully. Because many administrators may be digital immigrants, as discussed, they must be empowered to make a difference despite lacking technological savvy .
In cases of identified cyberbullying, victims may benefit from crisis intervention and counseling . The seven-stage crisis intervention model is often used with these clients.
The first stage involves assessing the client's level of danger. Depending upon the type of cyberbullying the victim experienced, the victim's level of distress may vary. Determine the severity of the distress and if the victim is at risk of hurting himself/herself. Equally important is assessing the victim's risk of being hurt by the perpetrator.
Establishing rapport is the next step. Frequently, victims are ashamed about the cyberbullying or harassment, feeling that they are to blame. Others are reluctant to disclose the cyberbullying and harassment, believing that their parents may impose strict monitoring and supervision or that the repercussion from the perpetrators will be severe. Adults may feel embarrassed. The goal in this stage is to provide a supportive and safe environment in which the victim can tell his/her story about the cyberbullying.
Next, it is important to identify the major problems to address. Practitioners can assist cyberbullying victims by first evaluating his or her emotional status and determining the extent of the psychological, emotional, and social impact of the cyberbullying. This will inform the treatment plan by illuminating specific areas that should be addressed.
The fourth stage involves exploring feelings. Questions should be posed about victims' feelings and perceptions of how safe they feel at home and at school . Victims can be asked to define what cyberbullying and harassment mean to them and what types of losses they have experienced (e.g., loss of safety, control, certainty, and/or trust) .
Exploring alternatives is stage 5. It is important that victims feel that the counseling process is collaborative. Victims should voice their feelings or thoughts about the various alternative solutions that may be implemented.
In stage 6, develop a concrete, solutions-focused action plan. Crisis intervention is based on a problem-solving orientation, whereby the situation is immediately assessed. The type of assistance is decided upon, and a concrete plan of action is implemented. The specific action plan will vary depending upon the type, extent, and severity of the cyberbullying.
Finally, it is essential to follow-up with the victim. When the immediate stress from the crisis has stabilized, reinforce proactive techniques used by the victim to promote adaptation and coping . It is important to reassure victims that fear is a normal response and the fear and anxiety experienced might last for a while, which is normal. Fear can be used in a positive manner to serve as a protective mechanism, ultimately empowering victims to be more proactive in taking online safety precautions . When instances of cyberbullying occur, it is recommended that it is documented fully .
Due to the seeming invisibility and anonymity of the Internet, cyberbullying and harassment have become serious social concerns. The solution is not necessarily to avoid the Internet and other digital technologies; rather, more Internet safety education and prevention information are needed to raise awareness for youths, adults, parents, and practitioners. Adults, including helping professionals, who are not confident and do not feel well-versed in new digital technologies must acknowledge that the Internet is a new space for individuals to connect and converse, both positively and negatively. Having the knowledge and skills to help cyberbullying victims is necessary in this new era.
|Cartoon Network Stop Bullying: Speak Up Campaign|
|An initiative started by the Cartoon Network Stop Bullying: Speak Up seeks to empower all kids to take part in the growing movement to help bring an end to bullying by offering online tools, documentaries, and parental guides.|
|Common Sense Education|
|A cyberbullying toolkit and other educational materials for safe media use.|
|University of New Hampshire|
|Crimes Against Children Research Center: Internet|
|The Center conducts research and offers resources about crimes against children for the public, policy makers, law enforcement personnel, and other child welfare practitioners.|
|A non-profit organization focused on providing resources about Internet safety.|
|Cyberbullying Research Center|
|Clearinghouse that provides current resources and information about cyberbullying among adolescents.|
|An education program about online safety in Australia.|
|Embrace Civility in the Digital Age|
|Organization focused on cyberbullying and harassment and safe Internet use.|
|Federal Bureau of Investigation: A Parent's Guide to Internet Safety|
|Government publication focused on education for parents regarding safe Internet use for children.|
|A public service sponsored by Internet industry corporations and public interest organizations to help ensure that Internet users have safe, constructive, and educational or entertaining online experiences.|
|Publishes media literacy and digital citizenship education materials.|
|National Center for Victims of Crime Stalking Resource Center|
|Organization focusing on education and advocacy for crime victims and professionals. This section focuses on stalking, including the use of technology.|
|National Network to End Domestic|
|Violence: Technology Safety|
|Organization focusing on providing resources about domestic violence. This section focuses on how technology is used to stalk, harass, monitor, and control dating and domestic violence victims.|
|Privacy Rights Clearinghouse|
|A nonprofit consumer organization to provide consumer information and advocacy. One of the main goals is to raise consumers' awareness of how technology affects personal privacy, including information about stalking.|
|Provides educational resources on Internet safety for youths.|
|A site designed to educate youth to prevent cyberbullying.|
|United States Department of Justice:|
|Computer Crime and Intellectual Property Section|
|Government site focused on cybercrime.|
|Virtual Global Taskforce|
|An organization focused on building partnerships to protect children from online abuse.|
|Resources on cyberbullying, cybercrime, and Internet safety.|
|Working to Halt Online Abuse (WHOA)|
|Volunteer organization working with professionals to raise awareness about online abuse and harassment.|
1. Patchin JW, Hinduja S. Bullies move beyond the schoolyard: a preliminary look at cyberbullying. Youth Violence Juv Justice. 2006;4(2):148-169.
2. Ybarra ML, Mitchell KJ. Youth engaging in online harassment: associations with caregiver-child relationships, Internet use, and personal characteristics. J Adolesc. 2004;27(3):319-336.
3. Li Q. A cross-cultural comparison of adolescents' experience related to cyberbullying. Educ Res. 2008;50(3):223-234.
6. Allen KP. Off the radar and ubiquitous: text messaging and its relationship to "drama" and cyberbullying in an affluent, academically rigorous U.S. high school. Journal of Youth Studies. 2012;15:99-117.
7. U.S. Census Bureau. Detailed Tables: Internet Use in the United States: October 2009. Available at http://www.census.gov/hhes/computer/publications/2009.html. Last accessed October 2, 2014.
8. Aoyama I, Barnard-Brak L, Talbert T. Cyberbullying among high school students: cluster analysis, sex and age differences and the level of parental monitoring. International Journal of Cyber Behavior, Psychology and Learning. 2011;1:25-35.
9. Lenhart A. Cell Phones and American Adults. Available at http://www.pewinternet.org/Reports/2010/Cell-Phones-and-American-Adults/Part-3-Adult-attitudes-towards-the-cell-phone/Cell-owners-feel-safer.aspx. Last accessed October 2, 2014.
10. Walsh SP, White KM, Young RM. Over-connected? A qualitative phenomenon of the relationship between Australian youths and their mobile phones. J Adolesc. 2008;31(1):77-92.
11. Pew Internet. Teens and Mobile Phones. Available at http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx. Last accessed October 2, 2014.
12. The Nielson Company. U.S. Teen Mobile Report: Calling Yesterday, Texting Today, Using Apps Tomorrow. Available at http://www.nielsen.com/us/en/insights/news/2010/u-s-teen-mobile-report-calling-yesterday-texting-today-using-apps-tomorrow.html. Last accessed October 2, 2014.
13. Pew Internet. Teens, Cell Phones and Texting Text Messaging Becomes Centerpiece Communication. Available at http://pewresearch.org/pubs/1572/teens-cell-phones-text-messages. Last accessed October 2, 2014.
14. Pew Internet. Social Media and Young Adults. Available at http://www.pewinternet.org/Reports/2010/Social-Media-and-Young-Adults.aspx. Last accessed October 2, 2014.
15. Rosen LD, Cheever NA, Carrier M. The association of parenting style and child age with parental limit setting and adolescent MySpace behavior. J Appl Dev Psychol. 2008;29(6):459-471.
16. Guillén MF, Suárez SL. Explaining the global digital divide: economic, political, and sociological drivers of cross-national Internet use. Soc Forces. 2005;84(2):681-708.
17. Wasserman IM, Richmond-Abbott M. Gender and the Internet: causes of variation in access, level, and scope of use. Soc Sci Q. 2005;86(1):252-270.
18. Pew Internet. Mobile Access 2010. Available at http://www.pewinternet.org/Reports/2010/Mobile-Access-2010.aspx. Last accessed October 2, 2014.
21. Mitchell KJ, Wolak J, Finkelhor D. Trends in youth reports of sexual solicitations, harassment and unwanted exposure to pornography on the Internet. J Adolesc Health. 2007;40(2):116-126.
22. Vandebosch H, Van Cleemput K. Defining cyberbullying: a qualitative research into the perceptions of youngsters. Cyberpsychol Behav. 2008;11(4):499-503.
23. Hinduja S, Patchin JW. Cyberbullying Fact Sheet: What You Need To Know About Online Aggression. Available at http://www.cyberbullying.us/cyberbullying_fact_sheet.pdf. Last accessed October 2, 2014.
24. StopCyberbullying.org. How It Works. Available at http://www.stopcyberbullying.org/how_it_works/index.html. Last accessed October 2, 2014.
25. Kowalski RM, Limber SP. Electronic bullying among middle school students. J Adolesc Health. 2007;6(Suppl 1):S22-S30.
26. Ybarra ML, Espelage DL, Mitchell KJ. The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: associations with psychosocial indicators. J Adolesc Health. 2007;41(6 Suppl 1):S31-S41.
27. Boyd DM, Ellison NB. Social network sites: definition, history, and scholarship. J Comput Mediat Commun. 2008;13(1):210-230.
28. Willard N. An Educator's Guide to Cyberbullying and Cyberthreats. Available at http://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf. Last accessed August 17, 2011.
29. Mishna F, McLuckie A, Saini M. Real-world dangers in an online reality: a qualitative study examining online relationships and cyber abuse. Soc Work Res. 2009;33(2):107-118.
30. Calvete E, Orue I, Estévez A, Villardón L, Padilla P. Cyberbullying in adolescents: modalities and aggressors' profile.Comput Human Behav. 2010;26(5):1128-1135.
32. Cassidy W, Jackson M, Brown KN. Sticks and stones can break my bones, but how can pixels hurt me? Students' experiences with cyber-bullying. Sch Psychol Int. 2009:30(4):383-402.
33. Strom PS, Strom RD. Cyberbullying by adolescents: a preliminary assessment. Educ Forum. 2005;70(1):21-36.
35. Lenhart A. Teens and Sexting. Available at http://www.pewinternet.org/~/media//Files/Reports/2009/PIP_Teens_and_Sexting.pdf. Last accessed October 3, 2014.
36. Raskauskas J, Stoltz AD. Involvement in traditional and electronic bullying among adolescents. Dev Psychol. 2007;43(3):564-575.
37. Lenhart A. Data Memo: Cyberbullying and Online Teens. Available at http://www.pewinternet.org/~/media//Files/Reports/2007/PIP%20Cyberbullying%20Memo.pdf.pdf. Last accessed October 3, 2014.
38. Finkelhor D, Mitchell KJ, Wolak J. Online Victimization: A Report on the Nation's Youth. Available at http://www.unh.edu/ccrc/pdf/jvq/CV38.pdf. Last accessed October 3, 2014.
39. Ybarra ML, Mitchell KJ. Instant messaging may put young people at risk of harassment. Nurs Stand. 2008;22(31):17.
40. Tynes BM, Giang MT, Williams DR, Thompson GN. Online racial discrimination and psychological adjustment among adolescents. J Adolesc Health. 2008;43(6):565-569.
41. Tynes B, Reynolds L, Greenfield PM. Adolescence, race and ethnicity on the Internet: a comparison of discourse in monitored and unmonitored chatrooms. J Appl Dev Psychol. 2004;25(6):667-684.
42. Finn J. A survey of online harassment at a university campus. J Interpers Violence. 2004;19(4):468-483.
43. Kennedy MA, Taylor MA. Online Harassment and Victimization of College Students. Available at http://www.cjcj.org/files/online_harassment.pdf. Last accessed August 17, 2011.
44. Fisher BS, Cullen FT, Turner MG. Being pursued: stalking victimization in a national study of college women. Criminol Public Policy. 2002;1(2):257-308.
45. Burke S, Yick-Flanagan A, Oomen-Early J, Walker A. Using Social Networking Sites to Explore Cyberabuse Among U.S. Women. Paper presented at: American Public Health Association 138th Annual Meeting and Expo. November 6, 2010; Denver, CO.
46. D'Ovidio R, Doyle J. A study on cyberstalking: understanding investigative hurdles. FBI Law Enforcement Bulletin. 2003;72(3):10-17.
47. Dilmac B. Psychological needs as a predictor of cyberbullying: a preliminary report on college students. Educational Sciences: Theory & Practice. 2009;9(3):1307-1325.
48. Price M, Dalgleish J. Cyberbullying experiences, impacts and coping strategies as described by Australian young people. Youth Studies Australia. 2010;29(2):51-59.
49. Hokoda A, Lu H-HA, Angeles M. School bullying in Taiwanese adolescents. Journal of Emotional Abuse. 2006;6(4):69-90.
50. Mishna F, Saini M, Solomon S. Ongoing and online: children and youth's perceptions of cyber bullying. Child Youth Serv Rev. 2009;31:1222-1228.
51. Ybarra ML, Mitchell KJ. Prevalence and frequency of Internet harassment instigation: implications for adolescent health. J Adolesc Health. 2004:41(2):189-195.
52. Kiriakidis SP, Kavoura A. Cyberbullying: a review of the literature on harassment through the internet and other electronic means. Fam Community Health. 2010;33(2):82-93.
53. Williams KR, Guerra NG. Prevalence and predictors of internet bullying. J Adolesc Health. 2007;41(6):S14-S21.
54. Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in Internet harassment and school bullying: implications for school intervention. J Adolesc Health. 2007;41(6 Suppl 1):S42-S50.
55. Willard NE. Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Cruelty, Threats, and Distress. Champaign, IL: Research Press; 2007.
56. Mesch GS. Parental mediation, online activities and cyberbullying. Cyberpsychol Behav. 2009;12(4):387-393.
57. Juvonen J, Gross EF. Extending the school grounds? Bullying experiences in cyberspace. J Sch Health. 2008;78(9):46-54.
58. Patchin JW, Hinduja S. Traditional and nontraditional bullying among youth: a test of general strain theory. Youth Soc. 2011;43(2):727-751.
59. Agnew R. Foundation for a general strain theory of crime and delinquency. Criminol. 1992;30(1):47-87.
61. Huang Y, Chou C. An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Comput Human Behav. 2010;26(6):1581-1590.
62. Whitty MT. Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the Net. Comput Human Behav. 2008;24(5):1837-1850.
63. Rosen LD, Cheever NA, Cummings C, Felt J. The impact of emotionality and self-disclosure on online dating versus traditional dating. Comput Human Behav. 2008;24(5):2124-2157.
64. Madden M, Lenhart A. Online Dating: Americans Who Are Seeking Romance Use the Internet to Help Them in Their Search, But There Is Still Widespread Public Concern About the Safety of Online Dating. Available at http://www.pewinternet.org/~/media/Files/Reports/2006/PIP_Online_Dating.pdf.pdf. Last accessed October 3, 2014.
65. Jerin R, Dolinsky B. You've got mail! You don't want it: cyber-victimization and on-line dating. Journal of Criminal Justice and Popular Culture. 2001;9(1):15-21.
66. Couch D, Liamputtong P. Online dating and mating: the use of the Internet to meet sexual partners. Qual Health Res. 2008;18(2):268-279.
67. Bent-Goodly TB. Eradicating domestic violence in the African American community. Trauma Violence Abuse. 2001;2(4):316-330.
68. Schechter S, Ganley A. Domestic Violence: A National Curriculum for Family Preservation Practitioners. San Francisco, CA: Family Violence Prevention Fund; 1995.
69. Tjaden P, Thoennes N. Full Report of the Prevalence, Incidence, and Consequences of Intimate Partner Violence Against Women: Findings from the National Violence Against Women Survey. Washington, DC: U.S. Department of Justice; 2000.
70. Women Halting Online Abuse. 2010 Cyberstalking Statistics. Available at http://www.haltabuse.org/resources/stats/2010Statistics.pdf. Last accessed October 3, 2014.
71. Finn J, Atkinson T. Promoting the safe and strategic use of technology for victims of intimate partner violence: evaluation of the Technology Safety Project. J Fam Violence. 2009;24(1):53-59.
72. Southworth C, Finn J, Dawson S, Fraser C, Tucker S. Intimate partner violence, technology, and stalking. Violence Against Women. 2007;13(8):842-856.
73. Beran T, Li Q. The relationship between cyberbullying and school bullying. Journal of Student Wellbeing. 2007;1(2):15-33.
74. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004;7(2):247-257.
75. Ybarra ML, Leaf PJ, Diener-West M. Sex differences in youth-reported depressive symptomatology and unwanted Internet sexual solicitation. J Med Internet Res. 2004;6(1):e5.
77. Hinduja S, Patchin JW. Bullying, cyberbullying, and suicide. Arch Suicide Res. 2010;14(3):206-221.
78. Delmonico DL, Griffin EJ. Cybersex and the e-teen: what marriage and family therapists should know. J Marital Fam Ther. 2008;34(4):431-444.
79. Diamanduros T, Downs E, Jenkins SJ. The role of school psychologists in the assessment, prevention, and intervention of cyberbullying. Psychol Sch. 2008;45(8):693-704.
80. Pew Internet. Teenage Life Online. Available at http://www.pewinternet.org/Reports/2001/Teenage-Life-Online.aspx. Last accessed October 3, 2014.
81. Wolak J, Mitchell KJ, Finkelhor D. Close online relationships in a national sample of adolescents. Adolescence. 2002;37(147): 441-455.
82. Liau AK, Khoo A, Ang PH. Factors influencing adolescents' engagement in risky Internet behavior. Cyberpsychol Behav. 2005;8(6):513-520.
83. Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML. Online "predators" and their victims: myths, realities and implications for prevention and treatment. Am Psychol. 2008;63(2):111-128.
84. Dowell EB, Burgess AW, Cavanaugh DJ. Clustering of Internet risk behaviors in a middle school student population. J Sch Health. 2009;79(11):547-553.
85. Liau A, Khoo A, Ang P. Parental awareness and monitoring of adolescent Internet use. Curr Psychol. 2008;27(4):217-233.
86. Hertz M, David-Ferdon C. Electronic Media and Youth Violence: A CDC Issue Brief for Educators and Caregivers. Atlanta, GA: Centers for Disease Control; 2008. Available at http://www.cdc.gov/violenceprevention/pdf/EA-brief-a.pdf. Last accessed October 3, 2014.
87. Gini G, Albiero P, Benelli B, Altoè G. Determinants of adolescents' active defending and passive bystanding behavior in bullying.J Adolesc. 2008;31(1):93-105.
88. Hinduja S, Patchin JW. Preventing Cyberbullying: Top Ten Tips for Parents. Available at http://www.cyberbullying.us/Top_Ten_Tips_Parents_Cyberbullying_Prevention.pdf. Last accessed October 3, 2014.
89. Roberts AR. Contemporary Perspectives on Crisis Intervention and Prevention. Englewood Cliffs, NJ: Prentice Hall; 1991.
90. Alexy EM, Burgess AW, Baker T, Smoyak SA. Perceptions of cyberstalking among college students. Brief Treat Crisis Interv. 2005;5(3):279-289.
91. Woolley N. Crisis theory: a paradigm of effective intervention with families of critically ill people. J Adv Nurs. 1990;15(2):1402-1408.
92. U.S. Census Bureau. Computer and Internet Access in the United States: 2012. Available at http://www.census.gov/hhes/computer. Last accessed October 27, 2014.
93. Pew Research Center. Internet User Demographics. Available at http://www.pewinternet.org/data-trend/internet-use/latest-stats. Last accessed October 28, 2014.
94. Pew Research Internet Project. Device Ownership over Time. Available at http://www.pewinternet.org/data-trend/mobile/device-ownership. Last accessed October 27, 2014.
95. Pew Research Internet Project. Cell Internet Use 2013. Available at http://www.pewinternet.org/2013/09/16/cell-internet-use-2013. Last accessed October 27, 2014.
96. Pew Research Internet Project. The First Cell Phone Call: Excerpt from "Networked: The New Social Operating System." Available at http://www.pewinternet.org/2013/04/03/the-first-cell-phone-call-excerpt-from-networked-the-new-social-operating-system. Last accessed October 27, 2014.
97. U.S. Census Bureau. Computer and Internet Use in the United States: Population Characteristics. Available at http://www.census.gov/prod/2013pubs/p20-569.pdf. Last accessed October 27, 2014.
98. Mehari KR, Farrell AD, Le AH. Cyberbullying among adolescents: measures in search of a construct. Psychology of Violence. 2014; [Epub ahead of print].
99. Compton L, Campbell MA, Mergler A. Teacher, parent and student perceptions of the motives of cyberbullies. Social Psychology of Education. 2014;17(3):383-400.
100. Slonje R, Smith PK, Frisén A. The nature of cyberbullying, and strategies for prevention. Computers in Human Behavior. 2013;29(1):26-32.
101. Lenhart A, Madden M, Smith A, Purcell K, Zickuhr K, Rainie L. Teens, Kindness and Cruelty on Social Network Sites: How American Teens Navigate the New World of "Digital Citizenship." Washington, DC: Pew Research Center Internet & American Life Project; 2011.
102. Kowalski RM, Giumetti GW, Schroeder AN, Lattanner MR. Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin. 2014;140(4):1073-1137.
103. Peskin F, Markham CM, Addy RC, et al. Prevalence and patterns of sexting among ethnic minority urban high school students. Cyberpsychology, Behavior And Social Networking. 2013;16(6):454-459.
104. Ringrose J, Gill R, Livingstone S, Harvey L. A Qualitative Study of Children, Young People and "Sexting:" A Report Prepared for the NSPCC. Available at http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sexting-research_wda89260.html. Last accessed October 27, 2014.
105. Slonje R, Smith PK. Cyberbullying: another main type of bullying? Scandinavian Journal of Psychology. 2008;49:147-154.
106. Patchin JW. Summary of Our Research (2004–2014). Available at http://cyberbullying.us/summary-of-our-research. Last accessed October 27, 2014.
107. Jones LM, Mitchell KJ, Finkelhor D. Trends in youth Internet victimization: findings from three youth Internet safety surveys 2000–2010. Journal of Adolescent Health. 2012;50(2):179-186.
108. Chang FC, Chiu CH, Miao NF, et al. Predictors of unwanted exposure to online pornography and online sexual solicitation of youth. Journal of Health Psychology. 2014; [Epub ahead of print].
109. Gibb ZG, Devereux PG. Who does that anyway? Predictors and personality correlates of cyberbullying in college. Computers in Human Behavior. 2014;38:8-16.
110. Cénat JM, Hébert M, Blais M, et al. Cyberbullying, psychological distress and self-esteem among youth in Quebec schools. Journal of Affective Disorders. 2014;169(1):7-9.
111. Floros GD, Siomos KE, Fisoun V, et al. Adolescent online cyberbullying in Greece: the impact of parental online security practices, bonding, and online impulsiveness. Journal of School Health. 2013;83:445-453.
112. Barlett CP, Gentile DA, Anderson CA, et al. Cross-cultural differences in cyberbullying behavior: a short-term longitudinal study. Journal of Cross-Cultural Psychology. 2014;45(2):300-313.
113. Li Q. A cross-cultural comparison of adolescents' experience related to cyberbullying. Educational Research. 2008;50:223-234.
114. Santana D. Virtuous or vitriolic: the effect of anonymity on civility in online newspaper reader comment boards. Journalism Practice. 2014;8(1):18-33.
115. Barlett CP, Gentile DA, Chew C. Predicting cyberbullying from anonymity. Psychology of Popular Media Culture. 2014; [Epub ahead of print].
116. D'Auria JP. Cyberbullying resources for youth and their families. Journal of Pediatric Health Care. 2014;28(2):e19-e22.
117. Doane AN, Pearson MR, Kelley ML. Predictors of cyberbullying perpetration among college students: an application of the theory of reasoned action. Computers in Human Behavior. 2014;36:154-162.
118. Baas N, de Jong MDT, Drossaert CHC. Children's perspectives on cyberbullying: insights based on participatory research. Cyberpsychology, Behavior, and Social Networking. 2013;16:248-253.
119. Bao W, Haas A, Chen X, Pi Y. Repeated strains, social control, social learning, and delinquency: testing an integrated model of strain theory in China. Youth and Society. 2014;46(3):402-424.
120. Jang H, Song J, Kim R. Does the offline bully-victimization influence cyberbullying behavior among youths? Application of general strain theory. Computers in Human Behavior. 2014;31:85-93.
121. Couch D, Liamputtong P, Pitts M. What are the real and perceived risks of online dating? Perspectives from online daters. Health, Risk and Society. 2012;14(7-8):697-714.
122. O'Day RD. Rapists, sexual offenders, and child molesters: who is your romantic "match?" Why dating websites should perform criminal background checks. Valparaiso University Law Review. 2013;48(1):329-368.
123. Shimizu A. Domestic violence in the digital age: towards the creation of a comprehensive cyberstalking statute. Berkeley Journal of Gender, Law & Justice. 2013;28(1):116-137.
124. Congressional Documents and Publications. (May 23, 2011). Brown Joins Domestic Violence Advocate to Outline Need for "Do Not Track" Internet and Smartphone Privacy Legislation: "Do Not Track" Bill Would Safeguard Consumers from Companies that Track Users' Whereabouts, Give Domestic Violence Victims Additional Safeguard Against GPS-Enabled Smartphone Stalking. Available at http://www.brown.senate.gov/newsroom/press/release/brown-joins-domestic-violence-advocate-to-outline-need-for-do-not-track-internet-and-smartphone-privacy-legislation. Last accessed October 27, 2014.
125. Nixon CL. Current perspectives: the impact of cyberbullying on adolescent health. Adolescent Health, Medicine, and Therapeutics. 2014;1(5):143-158.
126. Dredge R, Gleeson J, Garcia X. Presentation of Facebook and risk of cyberbullying victimization. Computers in Human Behavior. 2014;40:16-22.
127. Parris LN, Varjas K, Meyers J. The Internet is a mask: high school students' suggestions for preventing cyberbullying. Western Journal of Emergency Medicine. 2014;15(5):587-592.
128. Sasson H, Mesch G. Parental mediation, peer norms and risky online behavior among adolescents. Computers in Human Behavior. 2014;33:32-38.
129. Simmons KD, Bynum YP. Cyberbullying: six things administrators can do. Education. 2014;134(4):452-456.
130. Hinduja S, Patchin J. Preventing Cyberbullying: Top Ten Tips for Educators. Available at http://www.cyberbullying.us/Top_Ten_Tips_Educators_Cyberbullying_Prevention.pdf. Last accessed October 27, 2014.
131. Pew Research Internet Project. Social Networking Fact Sheet. Available at http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet. Last accessed October 27, 2014.
1. Michigan Quality Improvement Consortium. Routine Preventive Services for Children and Adolescents (Ages 2-21). Southfield, MI: Michigan Quality Improvement Consortium; 2013. Summary retrieved from National Guideline Clearinghouse at http://www.guideline.gov/content.aspx?id=46652. Last accessed November 6, 2014.
Mention of commercial products does not indicate endorsement.