Cyberbullying Identification Prevention Response 2020
Cyberbullying Identification Prevention Response 2020
Cyberbullying Identification Prevention Response 2020
2020 Edition
2
Cyberbullying by the numbers or her identity using anonymous email addresses or
pseudonymous screen names. Second, the hurtful
Estimates of the number of youth who experience actions of those who cyberbully can more easily go
cyberbullying vary widely (ranging from 10-40 per- viral; that is, a large number of people (at school, in
cent or more), depending on the age of the group the neighborhood, in the city, in the world!) can
studied and how cyberbullying is formally defined. participate in the victimization, or at least find out
In our research, we inform students that cyberbully- about the incident with a few keystrokes or
ing is when someone “repeatedly makes fun of an- touchscreen impressions. It seems, then, that the
other person online or repeatedly picks on another pool of potential targets, aggressors, and witness-
person through email or text message or when es/bystanders is limitless.
someone posts something online about another
person that they don’t like.” Using this definition, Third, it is often easier to be cruel using technology
about 28 percent of the students who have been a because cyberbullying can be done from a physical-
part of our most recent 11 studies over the last ly distant location, and the aggressor doesn’t have
twelve years have said they have been the victim of to see the immediate response by the target. In
cyberbullying at some point in their lifetime. About fact, some teens simply might not realize the seri-
16 percent admitted to cyberbullying others during ous harm they are causing because they are shel-
their lifetime. In our 2019 study of a nationally- tered from the target’s response. Finally, while par-
representative sample of approximately 5,000 mid- ents and teachers are doing a better job monitoring
dle and high schoolers in the U.S., 36.5 percent said youth at school and at home, many adults don’t
they had been cyberbullied during their lifetime, have the technological know-how (or time) to keep
while 17.4 percent said they had been cyberbullied track of what teens are up to online. As a result, a
within the previous 30 days. With regard to offend- target’s experience may be missed and a aggres-
ing, 14.8 percent revealed they had cyberbullied sor’s actions may be left unchecked. Even if those
others during their lifetime, while 6.3 percent ad- who bully are identified, many adults find them-
mitted doing so in the last 30 days. selves unprepared to adequately respond.
3
majority access the internet on their mobile device. accept that cyberbullying is one such problem that
They do so for school work, to keep in touch with will only get worse if ignored.
their friends, to play games, to learn about celebri-
The other challenge relates to who is willing to step
ties, to share their creations, or for many other rea-
up and take responsibility for responding to inap-
sons. Because online communication tools have be-
propriate use of technology. Parents often say that
come such a tremendous part of their lives, it is not
surprising that some youth have decided to use the they don’t have the knowledge or time to keep up
with their kids’ online behavior, and that schools
technology to be malicious or menacing toward
should be covering it in detail during class time and
others. The fact that teens are constantly connected
through other programming. Educators are often
to technology means they are susceptible to victim-
doing their part through policies, curricula, training,
ization (and able to act on mean impulses toward
and assemblies, but sometimes don’t know when
others) around the clock. And because some adults
and how to intervene in online behaviors that occur
have been slow to respond to cyberbullying, many
away from school but still involve their students.
feel that there are little to no consequences for
Finally, law enforcement is hesitant to get involved
their actions.
unless there is clear evidence of a crime or a signifi-
Cyberbullying crosses all geographical boundaries. cant threat to someone’s physical safety. As a result,
Online connectivity across a broad variety of devic- cyberbullying incidents either slip through the
es has opened up the whole world to users, and for cracks, are dealt with too formally (or informally), or
the most part this has been a good thing (a really are otherwise mismanaged. At that point, the prob-
good thing!). Nevertheless, some users feel free to lem behaviors can continue and even escalate be-
post or send whatever they want while online with- cause they aren’t adequately or appropriately ad-
out considering how that content can cause harm. dressed.
4
“Today my best friends turned on me and put my business on social media
and I can't believe why! I told them who I liked and they took and posted
our conversation...I didn’t want to fight back but I did and one of my friends
told everyone the guy I like told her he would never date me and now
everyone knows :( now everyone's calling me dirty and a slut.”
5
understanding about what is and is not appropriate in situations that make them uncomfortable and
with respect to the use of various devices and that can soften their heart. This might involve com-
online communication tools. When there are viola- munity service projects, missions trips, or other ac-
tions, immediate logical consequences must be giv- tivities that help them to take alternative perspec-
en that are proportionate to the misbehavior. Kids tives and begin to understand that everyone is
need to learn that inappropriate online actions will fighting a hard battle.
not be tolerated. Get them to understand that tech-
nology use and access is a privilege, and not a
right—and with those privileges come certain re-
What should schools do to prevent cyber-
sponsibilities that must be respected.
bullying?
If a parent discovers that their child is cyberbullying
The most important preventive step that schools
others, they should first communicate how that be-
can take is to educate the school community about
havior inflicts harm and causes pain in the real
responsible use of their devices at all times (ideally
world. We must remember that kids are not socio-
through a concerted focus on digital citizenship re-
paths—they are just kids who sometimes lack em-
sponsibilities). Students need to know that all forms
pathy and make mistakes. Give them the oppor-
of bullying are wrong and that those who engage in
tunity to address the behavior and move on. That
harassing or threatening behaviors will be subject
said, consequences should be firmly applied de-
to discipline. It is therefore essential to discuss is-
pending on seriousness and intentionality (and es-
sues related to appropriate online communications
calated if the behavior continues). Moving forward,
in various areas of the general curriculum. To be
it is essential that parents pay even greater atten-
sure, these messages should be reinforced in clas-
tion to the technology use of their child to make
ses that regularly utilize technology. Signage also
sure that they have internalized the lesson and are
should be posted around campus to remind stu-
continually acting in responsible ways. Finally, work
dents of the rules of acceptable use. In general, it is
to cultivate empathy by intentionally putting them
crucial to establish and maintain an environment of
respect and integrity where violations result in in-
“I like the way they [my school] handled it
formal or formal sanction.
because they treated me with respect and
Furthermore, school district personnel should re-
did not laugh at the situation. view their harassment and bullying policies to en-
They took it seriously.” sure that it allows for the discipline of students who
engage in cyberbullying. If their policy covers it,
6
cyberbullying incidents that occur at school - or harm done and the disruption that occurred.
that originate off campus but ultimately result in a
Moreover, schools should come up with creative
substantial disruption of the learning environment -
response strategies, particularly for relatively minor
are well within a school’s legal authority to inter-
forms of harassment that do not result in significant
vene. The school then needs to make it clear to all
harm. For example, students may be required to
stakeholders. In some cases, simply discussing the
incident with the offender’s parents will result in the create anti-cyberbullying posters to be displayed
throughout the school, or a public service an-
behavior stopping. If inappropriate behaviors con-
nouncement (PSA) video conveying an anti-bullying
tinue, additional steps need to be taken.
and/or a pro-kindness message. Older students
might be required to give a brief presentation to
A youth may be being cyberbullied if he or she:
younger students about the importance of using
• unexpectedly stops using their device(s) technology in ethically-sound ways. The point here,
again, is to condemn the behavior (without con-
• appears nervous or jumpy when using device(s) demning the child) while sending a message to the
• appears uneasy about being at school or outside
rest of the school community that bullying in any
form is wrong and will not be tolerated.
• appears to be angry, depressed, or frustrated after texting,
chatting, using social media, or gaming
Even though the vast majority of these incidents
can be handled informally (calling parents, counsel-
• becomes abnormally withdrawn ing the aggressor and target separately, expressing
condemnation of the behavior), there may be occa-
• avoids discussions about their activities online
sions where formal response from the school is
A youth may be cyberbullying others if he or she: warranted. This is particularly the case in incidents
involving serious threats toward another student, if
• quickly switches screens or hides their device the target no longer feels comfortable coming to
• uses their device(s) at all hours of the night
school, or if cyberbullying behaviors continue after
informal attempts to stop it have failed. In these
• gets unusually upset if they can’t use device(s) cases, detention, suspension, changes of placement,
or even expulsion may be necessary. If these ex-
• avoids discussions about what they are doing online
treme measures are required, educators must clear-
• seems to be using multiple online accounts, or an account ly articulate the link to school and present evidence
that is not their own that supports their action.
7
bullying. Youth were asked whether they “enjoy go- What can youth do?
ing to school,” “feel safe at school,” “feel that teach-
ers at their school really try to help them succeed,” First and foremost, youth should develop a relation-
and “feel that teachers at their school care about ship with an adult they trust (a parent, teacher, or
them.” Those who cyberbullied others or who were someone else) so they can talk about any experi-
the target of cyberbullying were less likely to agree ences they have online (or off) that make them up-
with those statements. set or uncomfortable. If possible, teens should ig-
nore minor teasing or name calling, and not re-
Overall, it is critical for educators to develop and spond to the aggressor as that might simply make
promote a safe and respectful school climate - one the problem continue. If they can develop the abil-
marked by shared feelings of connectedness, be- ity to demonstrate resilience when targeted, it will
longingness, peer respect, morale, safety, and even bode well for their future since there will always be
school spirit. A positive on-campus environment others who want to tear them down as they journey
will go a long way in reducing the frequency of towards personal and professional success in life.
many problematic behaviors at school, including
bullying. In this setting, teachers must demonstrate Kids should also use the account and privacy set-
emotional support, a warm and caring atmosphere, tings within each device, app, or network to control
a strong focus on academics and learning, and a who can contact and interact with them, and who
fostering of healthy self-esteem. In schools with can read their online content. This can significantly
healthy climates, students know what is appropriate reduce their victimization risk.
and what is not. It’s useful to keep all evidence of cyberbullying to
show an adult who can help. If targets of cyberbul-
lying are able to keep a log or a journal of the dates
and times and instances of the online harassment,
that can also help prove what was going on and
who started it—which greatly helps during an in-
vestigation. This information can also be forwarded
to the respective site or company that serves as the
venue or medium for the cyberbullying. Youth
should take the time to report any harassment,
threats, impersonation, or other problems they see
or experience, and remember that their identity will
be protected to the maximum extent of the law
when doing so (we have a frequently updated list of
Internet, gaming, and social media companies and
their contact information at cyberbullying.org/
report so you know exactly where to get help).
8
Don’t stand by When should law enforcement get involved?
Bystanders also have a very critical role to play. Law enforcement officers also have a role in pre-
Those who witness cyberbullying generally do not venting and responding to cyberbullying. They first
want to get involved because of the hassle and need to be aware of ever-evolving state and local
problems they fear it might bring upon them, yet laws concerning online behaviors, and equip them-
they often recognize that what they are seeing is selves with the skills and knowledge to intervene as
not right and should stop. However, by doing noth- necessary. In our research, we found that almost
ing, bystanders are doing something—they are pas- one-quarter of officers did not know if their state
sively encouraging the behavior. By actively stand- had a cyberbullying law. This is surprising since
ing up—in that moment or right afterward (by de- their most visible responsibility involves responding
fending the target, providing encouragement, help- to actions which are in violation of law (e.g., harass-
ing to block and report the harassment, saving digi- ment, threats, stalking). Even if the behavior doesn’t
tal evidence, and reaching out to an adult), they can appear to rise to the level of a crime, officers should
make a huge difference in improving the situation, use their discretion to handle the situation in a way
as targets often feel helpless and hopeless and that is appropriate for the circumstances. For exam-
need someone to come to the rescue. Finally, they ple, a simple discussion of the legal issues involved
should never directly or indirectly contribute to the in cyberbullying may be enough to deter some
behavior – by forwarding hurtful messages, laugh- youth from future misbehavior. Officers might also
ing at inappropriate jokes or content, condoning talk to parents about their child’s conduct and ex-
the act just to “fit in,” or otherwise silently allowing press to them the seriousness of online harassment.
it to continue.
Relatedly, officers can play an essential role in pre-
To be sure, sometimes it is hard for a student—all venting cyberbullying from occurring or getting out
alone—to step up on behalf of others. However, it of hand in the first place. They can speak to stu-
is a lot easier to do when the help and support of dents about cyberbullying and online safety issues
one or two other friends. Encourage students to more broadly to discourage them from engaging in
band together with others if they are nervous about risky or unacceptable actions and interactions. They
intervening by themselves. might also address parents about local and state
laws, so that they are informed and can properly
respond if their child is involved in an incident.
Suggested citation
Hinduja, S. & Patchin, J. W. (2020). Cyberbullying Identification, Prevention, and Response. Cyberbullying Research Center
(cyberbullying.org).