Cyber Pox: A Look at Female Adolescent Cyber Bullying

By Garinger, Helen M. | Michigan Journal of Counseling, Spring-Summer 2008 | Go to article overview
Save to active project

Cyber Pox: A Look at Female Adolescent Cyber Bullying


Garinger, Helen M., Michigan Journal of Counseling


Bullying is no longer limited to direct physical or verbal confrontations in the schoolyard. Technology has enabled bullying to expand into cyber space. The power of the Internet and its influence on the lives of teens should not be underestimated. In an adolescent world dominated by peer pressure, electronic connections pose an element of danger. Computer access is readily available in schools, public libraries, and the home.

Regardless of race, culture, or ethnicity the goal for school personnel remains to develop successful intervention strategies to combat bullying and cyber bullying, to constructively work with bullies, engage the bystanders, empower victims, and keep students safe. This article discusses aspects of bullying found in cyber bullying and presents prevention and intervention strategies for school counselors and parents.

Cyber Bullying Defined

Cyber bullying utilizes communication and information technologies. Cyber bullying is a covert form of psychological bullying. It can be verbal, utilizing a cell phone or written messages. Electronic media such as cell phones, websites, chatrooms, "MUD" rooms (multi-user domains where individuals can assume different names and characters) and online personal profiles, such as MySpace.com, enable bullies to hide behind screen names whereby they can remain anonymous (Shariff & Johnny, 2007).

The critical difference between cyber bullying and regular bullying rests with the balance of power between the bully and the victim. Cyber bullying involves more victims than in-school bullying. Empowered by anonymity, a victim at school can become the tormenter from home. Anonymous perpetrators can transmit personal attacks in seconds. Perhaps, the most frightening aspect is the rapidity and scope of the email distribution (Willard 2007b). No longer is an incident confined between two students. Now the entire school population is there to witness the harassment and become privy to defamatory remarks about a classmate. "The Internet has unleashed its dark side, an underground, adolescent world of spite and vengeance. It is the bathroom wall moved into everybody's bedroom." (Cooper, 2004, p. 1).

Invariably, cyber bullying occurs without adults present, usually from a bedroom computer. And, the bully in school can continue attacking anyone from home. Schoolyard bullies are easily identifiable. Tracing a cyber bully is more difficult. The author learned that websites, such as Wiredsafety.org are used to track cyber attacks. Local authorities can also be involved. "Cyberspace represents new territory for peer mistreatment, often leaving school administrators with doubts about the boundaries of their jurisdiction" (Strom & Strom, 2005, p. 36). "Virtual violence on the electronic media in the USA seems inescapable" (Jambor, 1996). Children tend not to share cyber bullying incidents with their parents for fear that they may interfere, which could make the bullying worse, or that their parents will punish them, or restrict their use of technology (Keith & Martin, 2005). So, in spite of being a victim of cyber bullying or cyber threats, the child or adolescent is more fearful of restricted Internet use than sharing the issue with an adult. Staying connected is the lifeline to their social groups.

Some students tend to be targets of Internet abuse and others are not. Sometimes victims are simply those students who do not conform to the norms of the peer group, or the dominant group. They can be regarded as misfits for any number of reasons, such as bad teeth, hairstyle, clothes, or being too fat, or too thin. A student's behavior can be the source of future bullying, for instance, if a student cries too easily in class, he or she may become victimized.

Identification of Victims and Consequences of Bullying

Girls, who have difficulty regulating their emotions, feelings, and communicating effectively, are easy targets for victimization by peers (Duncan, 2004).

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Cyber Pox: A Look at Female Adolescent Cyber Bullying
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?