1.1 Cyber Bullying as a rising problem

Newspapers and website are full of articles relating to problems and weaknesses of the educational system. The role of teachers is becoming more and more important. Violence at school is an everyday issue, not only between students but also against the school structure itself. The core values of the school community are oftentimes missing, that is why, teachers are increasingly playing the role of educators. But how is that possible?

The recently deceased former associate editor of the Frankfurter Allgemeine Zeitung, Frank Schirrmacher, writes in his book “Minimum (2006)”: “… our children have fewer friends than previous generations. So not only the lives of individuals radically changed, but our society is reprogrammed insidiously; …. More and more we will be on our own, but alone we can not survive. At a time when the most valuable asset is its social capital – as we are forming new communities? … We are not prepared for the minimum of social relations. We suddenly standing in front of the original question a society: What is a family? How is trust? Who help whom? ”

1.2 Our Commitment: Learn to trust!

These questions are quite interesting and pretty related to what we have been experiencing so far as Starkmacher association. One consideration came into my mind:

We need to create spaces of experience, where people can learn to trust!

For this reason, the target group of our activities and our allegiance should not be only the young people. These latter certainly live in large transitional situations and struggle in finding their own position, their place in the society. However, equally important are the teachers in the schools, the social workers in youth and educational institutions, youth leaders and educators who often drag with a steadfast passion and against a negative opinion wave to the concerns of young people into the field.

Most of my colleagues are extremely committed and involved in activities targeting youth, and yet many of them feel overtaxed and alone. Teachers further of the transfer of knowledge are increasingly taking on educational tasks, which is no longer provided by parents or families. I was really surprised when I heard about teachers from the Berlin Rütli School (Berliner Morgenpost, 21.08.11 education crisis) who literally “gave up” because of the lack of ability to communicate in many schools. In recent years, working with teachers all around Europe, what I have been experiencing and witnessing is resignation and helplessness. It is a devastating feeling, leaving no room for improvements and no hope since these teachers are the ones our future generations will learn trust and confidence from. Therefore, it is not easy to find good and positive climates in the schools. This directly links to the violence and bullying I have witnessed in many schools. This behaviour translates into powerlessness and insecurity, and a great need for help.

Since 2003, along with friends and colleagues, we have been promoting a shared vision to tackle these challenges. Our wish was to combine our successful projects, exchanging so good practices and results, as well as difficulties and challenges in order to come up with new common effective projects. This was the inception phase of Starkmacher e.V. This latter was born in 2006 and it is currently based in Mannheim, with 5-7 permanent employees and numerous partners and volunteers from all around the world.

1.3 Our Approach: The change starts from me!

In the last years, Starkmacher has sustained more then 50 schools. Our approach has been focusing on the quality of the schools, in terms of climate, positivity , talent-oriented pedagogy and joyfulness. Unfortunately, most of the times we met a deficit-oriented approach, missing so the chances to empower the students, discover and appreciate their talents and positively make them active actors of the schools. Children from all around the world need to be sustained and guided with the hand in order to promote their holistic growth. They need to be treated first of all as human beings, not as a target group. This is the reason why, with some colleagues, we developed a pedagogy that gives more space and chances to discover the beautiful gifts children and students are born with, unfolding and promoting their talents, first of all at school. In the era of “patchwork-families” this accompaniment is not guaranteed and sometimes not available at all. Oftentimes parents are, or pretend to be, overwhelmed and too busy. However, teachers cannot absorb at school the lack of solid life-structures, the feeling of reliability and trust children should get from their families.

This thought is not new. Particularly in private schools or high schools there is a wide range of additional services and programs designed to promote students’ individual talents and abilities. However, disadvantaged students are often dropped by the wayside. At the same time, teachers are under enormous pressure to meet the demands of parents, Ministry and the public opinion.

Starkmacher projects perfectly match these challenges, targeting accurately teachers, pupils and families. The starting point of Starkmacher principle is: “The change starts from me: only when I, myself am strong, I can make others stronger”. Starkmachers’ projects create spaces of experience, in which individuals are strengthened and can experience being part of a community and the extreme importance of this latter.

Our approach has been developed establishing trustful relationships with teachers and, generally speaking, the administrative body. We bring everybody into the boat, to navigate the challenges and chances all together. This is an empowering exercise a “Starkmacher” exercise, in which everybody, teachers and pupils, those pretty much involved and those left out, feel being part of a unique and strong body. Fabio, a young guy involved in a “musical Project”, said: “I have learnt that, what matters is being on the stage with the heart, as one body with the others. It is not a competition and, if you do something wrong you just keep going, with the help and support of the others”.

1.4 Our Project: Joining Forces to Combat Cyberbullying in Schools

The challenges and issues raised by new forms of bullying in schools are of concern to Starkmacher and its partners. Together, as a consortium, we came up with a project called “Joining Forces to Combat Cyberbullying in Schools”, with the main goal of creating “cyberbulling free schools”: the project was carried out by 8 NGOs from 5 EU Member States (DE, IT, PL, SI, HU) which closely cooperated with local partner schools. The implementation started by offering trainings to NGO staff from partner organisations in Conflict Resolution, Training of Trainers as well as new Social Media Management. The second strand was capacity building in schools, which was executed by the trained multipliers from a partner organisation. This included information and awareness raising activities with teachers/educators, school management, and parents in order to raise their awareness about the issue of cyberbullying and to increase new media know-how and critical awareness. It also intended to conduct local trainings on conflict resolution and social media competence with pupils and teachers, establishing so mediation clubs in each partner schools that shall provide trainings as well as peer mediation.

The second year was characterised by an individual empowerment of youth through creative social media. Organising Int’l Media Camps and local Creativity Groups helped in familiarising youngsters with respectful and safe media usage, but also unlocking hidden potentials, helping to promote a mentality of non-violence and respect in partner schools. After the 1st int’l workshop, the partner started local creativity contests for youngsters in order to produce new artworks. The winners have been then invited to the second int’l workshop. The final stage focused on awareness raising through a youth-led social media campaign helping to spread “anti-cyber violence messages to a widest possible public audience and especially younger people. The official launch of the campaign was on 20th November 2016, which marks the Universal Children’s Day.

In the following chapter, we are going to talk about Cyberbullying and which ways of intervention and prevention are known.

Our holistic approach will be described by Matej Cepin talking about our goal of changing school cultures towards bullying-free zones, through addressing the challenge of cyberbullying from many different angles, through the combination of different action. We believe our approach is Holistic (promotion / prevention / intervention, determinants of health), Community oriented (teachers, pupils, parents) and able to develop competencies through an active participation of stakeholders. Our actions and supportive actions (training of multipliers, creativity campuses, social media campaign) will be extensively described in the different paragraphs.

Finally, we will provide the readers with useful guidelines on how to implement the project in different schools and environments.

Let yourself embark on this journey! Look around and get involved with us for young people who need your encouragement!

2. Young People and Social Media

Within this chapter, we will try to put in context the phenomenon of social networks within integrated development of a young person. First, we will define elementary terms and changes that incorporation of social media into our lives brings. The last subchapter discusses whether social media is harmful or stimulating for young people and what are the advantages and disadvantages. We will also reveal the truth behind prejudices and stress, how the lifestyle of young people is changing because of social media.

social-media

2.1.1 What is social media?

Social media = “forms of electronic communication (such as Web sites) through which people create online communities to share information, ideas, personal messages, etc.” (Merriam-Webster’s Learner’s Dictionary)

Young people discovered social media first. But now also adults can’t imagine life without social media. It became our way of communication, branding ourselves through online personas, building online communities and just spending free time. Whether it’s Facebook, Google+, Instagram Snapchat or some other social media app, it is slowly but firmly incorporating into every aspect of our lives.


The Rise of Social Media (Ben Brommell)

“Social networking is the practice of expanding the number of one’s business and/or social contacts by making connections through individuals.” (Whatis.com)


Social Networking in Plain English(Common Craft)

You’re asking what is the difference between Social media and social networking?

To make it simple social media is the way to connect (more of a one-way communication) and social networking mean building relationships (two-way communication).  Read more about the difference in a blog of Fauzia Burke at Huffingtonpost.

jess3_briansolis_conversationprism4_web_1280x1024Source: Brian Solis & JESS3

If you are new to the field of social media, we recommend to check out online dictionaries:

2.1.2 Social media in numbers

Every year the number of social media users is increasing and Statista is predicting that in the year 2020 the number of users will increase from 2,14 billion to almost 3 billion people.

statistic_d278414_number-of-global-social-media-users-2010-2020

There are so many different social media and last few years Facebook is the most used one.

statistic_id272014_global-social-networks-ranked-by-number-of-users-2016

And with that many people online and with the consideration that an average human spends 1.72h online, no wonder facebook and other social media is one of the biggest sources of information these days.


The Social Media Revolution 2016 (Click-Thru Consulting)

2.1.3 Changes (in everyday life, worldwide, future)

Changes in everyday life

With a regular use of social media, many aspects of everyday life changed. First of all, we changed the way we communicate. It would be completely unheard if you would leave in the middle of a telephone conversation, but it is completely normal to leave while chatting and respond the next day. With different communication, styles came also changes in socialization process and community building styles.


How Social Networks Have Changed The World! (Alex Moore)

Worldwide changes

Modern technology has brought us many things: from easy access to information and quicker communication to increasing loneliness, from improving our productivity and efficiency to job losses and it made so many changes that sometimes it is hard to point a finger and decided whether we benefited as a society or it just brought us new problems in with that changed reality. But for sure it had a direct result in the availability of enormous quantities of data. Availability of big data is influencing the way we think and study and extracting knowledge from it will become more and more important.


Did You Know 2016 (mesjms)

Big data = “an accumulation of data that is too large and complex for processing by traditional database management tools” (Merriam-Webster’s Learner’s Dictionary)

“Modern technology is simply an advancement of old technology, the impact of technology in modern life is unmeasurable, we use technology in different ways and sometimes the way we implement various technologies ends up harming our lives or the society we leave in. What we call modern technology is technically not so new in most cases.”  (Use of technology)

Future

As the previous video said, we are currently preparing students for jobs that doesn’t exist jet, using the technology that hasn’t been invented jet in order to solve problems we don’t know they are problems jet. So the only thing we can really predict for future is that we have no idea what to predict. We can only guess about new trends that are coming.


Social Media Trends for 2016 (MtoM Consulting, LLC)

2.2.1 Influences on people as individuals

As any new change social media has some advantages and some disadvantages. It is easy to see just one side, but nothing is black and white, so we would like to present both.


Social Media: Advantages and disadvantages (krismarfil)

Positive influences:

  • Spreading messages out there in minutes: It is hard to conceal that something happened because people saw it and can share it on their social media. “What happens in Vegas, stay on social media!”
  • Meeting new people with similar interest. It is easy to find groups that have a similar interest and join them.
  • Speedy communication: Communication has never been this fast before.
  • Geeting fast feedback: Either business wise or personal, you can put it out there and people will tell you what they think.
  • Getting answers: Asking questions and getting answers from help communities, teachers or other people.
  • Global marketing: You can now market and sell your products from home.

Negative influences:

  • Waste of time: People spend enormous time just browsing and searching social media, with no real intention or purpose.
  • Personal details get revealed: If you are not careful with your personal information, it can be exposed to everybody. And revealing personal information on social media makes you more vulnerable to crimes like identity theft, stalking, etc.
  • Harassment: You can easily become a target of a cyberbullying or harassment.
  • Impact on productivity: Many companies have blocked social media in the offices since the work productivity suffered.
  • Addiction: Feeling that you are the center of attention can be a soothing for every ego, but it can be also addictive.


Marc Maron: The Social Media Generation Animated (Jess the Dragoon)

2.2.2 Influences on society

Global spread of social media has enabled increased access to information and education to millions of people, which empowered them to become part of political processes in their societies. Voices that could not be heard in governmental and other mainstream media are suddenly given a chance to address wide audiences. Even people not keen on active political participation have become political actors by supporting and sharing those newly empowered voices on social media. This new dynamic puts unprecedented pressure on all governments for democratisation, transparency, and accountability. Social media offers infrastructure to citizen’s initiatives to act, where governments fail, and for governments to work more efficiently with the help of their citizens, may it be on eradicating poverty, fight against corruption, protection of human rights, etc.

With its wide and instant reach, social media is a catalyst of social unrest everywhere where a government is unable or unwilling to listen to its citizens. It can even take down long-lasting authoritarian regimes, as we could see with the incredibly fast spread of Arab spring revolution (starting in Tunisia in December 2010). Victories of perceived underdogs Barack Husein Obama and Donald Trump in US presidential elections in 2008 and 2016 showed us the impact of an organised and targeted campaign on social media can have on political processes in stable democracies as well. In the case of the latter even in total opposition of a vast majority of mainstream media.


Does social media have the power to change the world? (devschooluea)

Newfound space for political influence, however, brings to us substantial risks of political misinformation and abuse in social media as well. We receive crazy amounts of news via social media and it is impossible to reflect on the quality of so much information. All social media is new, so there is little chance to check long term credibility of the source. Such an environment is prone to exposure to misleading and even completely false information – “fake news”, sensationalism and with it populism. With no authority to trust on what is true and what fake, we are inclined to believe the information that is closest to our way of thinking.

In a big chunk of the world freedom of speech is still limited and that counts for social media as well. In China, the state imposed the so-called “Great China Wall”, which does not allow you to seek information on free Tibet, Tiananmen square massacre,… on social media. In many countries (from Turkey to North Korea) any social media is blocked at least from time to time, so the impact of them on societal changes is limited accordingly.

2.3.1 Changes that effect young people

Communication has changed and there is no point denying it. We used to communicate in person. If you needed to communicate with somebody from a different country, you wrote them a mail. It took forever. With digitalisation everything changes. Communication became instant: in merely a second you can spread an information worldwide. How is this possible? Social media is so widespread, that everybody can communicate with everybody all the time. And with a bit more of a 2 billion social media users, sharing information can be almost instant.

See how social media is changing the way we communicate (Zurich Insurance Group)

How does this effect, young people? Since social media become such an important part of young people’s lives, it also influenced their thinking. Before young people were seeking approval in from their peers, but with the wide spread of social media, this need of beeing excepted transferred on the screens. It is getting more and more important to be excepted on social media.  And as explained in the next video getting likes it is very important. It gives you a feeling that everybody is paying attention to you and who wouldn’t like that?


How social media is affecting teens (The National)

The problematic part of using social media is from the young age on is that it changes your perception of the world, which in turn change your values and scientists now agree that using social media is changing also your brain. It can be a psychological addiction and it’s users have a hard time turning off. Interesting enough brain scans of these people are showing similar impairment of regions those with drug dependence have. Alarmingly this affects emotional processing, attention, and decision-making. This can be explained since the social media usage provides immediate rewards with a little of medium effort required, your brain begins craving for more and more of those neurological excitement. Interesting it is influencing also your ability of multitasking.

Communication on social medias it is also a bit more self-involved. Compared to 30 – 40% of talk about ourselves while chatting in real life, we spend around 80% of social media communication about our own experiences. Our body is even rewarding us with “dopamine” while talking about ourselves on social media.

Dopamine is a neurotransmitter that helps control the brain’s reward and pleasure centers. It also helps regulate movement and emotional responses, and it enables us not only to see rewards but to take action to move toward them.


5 Crazy Ways Social Media Is Changing Your Brain Right Now (AsapSCIENCE)

The other aspect of how the modern way of life influences our brain is making us more superficial as thinkers. The brain rewards us with dopamine for seeking new information.

The Internet is an incredible information rich environment.

For young people seeking information on the internet is a daily activity and this interrupts their focused calm thinking, which is essential for the way we learn. All the interruptions of the digital world (social media, emails, apps) are stopping our memory consilidation. It means transfering information from our short term working memory to our long term memory. And through moving information from working memory to long term memory we create connections and everything else that we know.

And the best things we can do for our minds is to find some time every day to unplug, calm down and focus our mind on one thing at a time.


What the Internet is Doing to Our Brains (Epipheo)

There is also a phenomenon of The Google effect. With the extended usage of the internet, our brain started to memorize where we find information insted of what is the information. This will happen more and more and is even more visable with young people where a relationship with devices are starthing from the birth. Not remembering pure facts can be in some situation very dangerous (like when a pilot forgets it’s initial training), but on the other hand, FMRI of the brains show, that searching for information online can make our brains more active than reading a book.


Is Google Killing Your Memory? (BrainCraft)

2.3.2 What needs of young peoples are beeing met on social media?

We used to form communities and satisfy our basic needs in local environments. But with the widespread of social media, communities outgrew local environments and become global. Previously we heard that young are joining social media to seek for fame. But that is not it. Young people are driven by two basic needs:

  • the need to belong, which refers to the intrinsic drive to feel close and accepted by others and gain social acceptance; and
  • the need for self-presentation, which is associated with the process of impression management.

Belonging somewhere

Beeing a part of a community, belonging is one of the most basic human needs. Young people are trying to fulfill it online. They are searching for the right group. Not every group is the one for them. Young people need to be a part of a community. Where they are appreciated, where they feel unique, loved and most importantly where they can be heard.  It is important to belong, to feel connected and to be a part of a community.

Self-presentation

The second need is a more egocentric one. Online communication allows you to represent yourself in the best possible way. And for young people nowadays it is important to build a superb online personality, where they look better than reality. It is important to build up somebody unique, special and me memorable.  Through building up online personas, the process of searching for the meaning of life begins.

Literature

Source:

  1. Merriam-Webster dictionary,
  2. Ben Brommell, The Rise of Social Media, Youtube,
  3. Whatis.com,
  4. Common Craft, Social Networking in Plain English, Youtube,
  5. Pete Schauer, 5 Biggest Differences between Social Media and Social Networking,
  6. Dara Fontein, The Social Media Glossary: 226 Essential Definitions, 10.11.2016,
  7. Carly Stec, Social Media Definitions: The Ultimate Glossary of Terms You Should Know, 24.8.2015,
  8. Charlotte Tomlinson, Social Media Glossary an A to Z, 23.12.2016,
  9. Jason Mander, Daily time spent on social networks rises to 1.72 hours, 26.1.2016,
  10. Alex Moore, How Social Networks Have Changed The World!, Youtube,
  11. Karehka Ramey, Modern technology advantages and disadvantages, 6.11.2012,
  12. mesjms, Did You Know 2016, Youtube,
  13. Merriam-Webster’s Learner’s Dictionary,
  14. MtoM Consulting, LLC, Social Media Trends for 2016, Youtube,
  15. krismarfilm, Social Media: Advantages and disadvantages, Youtube,
  16. Jess the Dragoon, Marc Maron: The Social Media Generation Animated, Youtube
  17. devschooluea, Does social media have the power to change the world?, Youtube
  18. Zurich Insurance Group, See how social media is changing the way we communicate , Youtube
  19. The National, How social media is affecting teens, Youtube
  20. Psychology today, Dopamine
  21. AsapSCIENCE, 5 Crazy Ways Social Media Is Changing Your Brain Right Now, Youtube
  22. Epipheo, What the Internet is Doing to Our Brains, Youtube
  23. BrainCraft, Is Google Killing Your Memory?, Youtube
  24. Silvia Casale, Giulia Fioravanti, Satisfying needs through Social Networking Sites: A pathway towards problematic Internet use for socially anxious people?, 2015

 

3. Cyberbullying

Social media sites have tremendous value and potential for learning, socializing, leisure and development of young people. However, they are not always healthy and problem-free environments. Some potential challenges include interference with cognitive processes such as attention, memory, information processing and emotional processing, “Facebook depression”, sexting, exposure to inappropriate content and cyberbullying.

In this chapter, we will be focusing specifically on cyberbullying as one of the most problematic aspects of social media and communication technology. We will be thinking about how having fun online needs to come with responsibility. Social networking can often be just one click away from cyberbullying. The key to decreasing cyberbullying among young people is to ‘think before they click3, especially as just one click has the power to change someone’s life forever.

The first section of this chapter will define key terminology connected to cyberbullying. An overview of what research tells us about cyberbullying and how it works is followed by information on key risk factors and protective factors. Finally, we will list a few guidelines for addressing cyberbullying and legal considerations that we must keep in mind when working in school contexts.

3.1.1 Bullying and cyberbullying

Bullying is an aggressive behaviour of more powerful individuals against weaker ones, for example hitting, verbally threatening or mocking, spreading rumours, taking the money and other actions. Bullying typically peaks in frequency during adolescence.

Cyberbullying is deliberately using digital media to communicate false, embarrassing, or hostile information about another person. It can happen through cell phones, computers, tablets and other electronic devices and communication tools like websites, text messages, instant messages, e-mail, social networking sites, applications or chat. Cyberbullying is the most common online risk for teens, can occur to any young person online, and can cause psychosocial outcomes4 such as depression, anxiety, severe isolation, and even suicide.

Cyberbullying can have many forms. It can be a mean, hurtful or threatening message to someone or about someone. It can be an embarrassing post, picture or video. It can be a website or a fake profile. It can be a rumour spread by e-mails, texts or posted on social networking sites and many other things. Cyberbullying is often anonymous (the bully does not use his or her name), public (in open view for other people) and viral (rapidly and widely circulates on the internet or through other media). This video can give you an idea how cyberbullying can spread quickly, much like a virus.

3.1.2 Bullies, targets and bystanders

Cyberbullying usually includes a bully (or bullies), a target and several observers. Cyberbully is someone who engages in cyberbullying. Cyberbullies use the internet and electronic devices to emotionally hurt others by making fun of them or insulting them.

Targets of cyberbullying are individuals who are hurt by such actions. Most often, cyberbullying does not stay limited to the bully and the target. There may be many observers, who can take on many roles: they can be passive bystanders, they can perpetuate the bullying or they can act to stop cyberbullying.

3.1.3 Preventative measures and strategies

Cyberbullying is difficult to stop. However, there are things individuals and communities can do to stop it from happening or limit it from spreading. For example, targets of cyberbullying can temporarily limit their online connection time; avoid opening messages from unknown sources, change passwords or accounts. In extreme cases, authorities may get involved and legal actions may be taken.

Often, cyberbullying becomes a bigger problem than just something between individuals. A community might become aware that cyberbullying has become prevalent and threatens the well-being of its members and develop specific measures to fight it and to relieve negative effects. Such activities can be simple activities or complex strategies.

For example, a school might include a simple five-minute presentation on cyberbullying during a parent meeting. But they could also organize a complex year-long, school-wide project with counselling, workshops, and awareness raising activities for students, parents, and teachers.

With the rise of cyberbullying, certain organizations, initiatives, and projects have been developed to deal specifically with this phenomenon. Their activities can be online-based (some examples include informational and promotional videos, infographics, websites, virtual campaigns, online courses for teachers and youth workers) or done in-person or through other media (workshops, counselling, lectures, research, training, skill building activities, TV shows or magazines articles). Preventative measures to fight cyberbullying often include basic online safety training.

3.1.4 Online safety

Online safety or internet safety is a preventative measure. It includes information, knowledge, and skills that help people (including children and youth) be safer while using the internet and online technologies. This includes personal safety, password protection, privacy, security risks and protection from cybercrime in general. You can learn a few simple tips for internet safety for young people in this video.

3.1.5 Digital citizenship

Digital citizenship is an expression for the norms of appropriate, responsible use of technology. Digital citizenship has nine elements: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health and wellness and digital security. Themes like digital security, etiquette, rights and responsibilities, health and wellness are closely connected to the topic of cyberbullying. Many cyberbullying prevention programs focus on teaching these skills.

Digital etiquette or netiquette is a new word that combines the concepts of ‘internet’, networking and etiquette. It means online etiquette, the rules of online communication. Netiquette covers common courtesy online as well as the informal do’s and don’ts of cyberspace.

Respect, educate and protect (REPs) is another popular concept closely connected to digital citizenship that is often used in cyberbullying prevention. It is a way to present nine elements of digital citizenship in a way that is appropriate even for very young learners (from kindergarten level onwards).

3.2 How is Cyberbullying Different from ‘Traditional’ Bullying?

Hurting someone’s feelings, causing problems for them and making them feel bad are not new phenomena among young people. We would like to believe that we are teaching young people intra- and interpersonal skills that will help them feel confident in themselves as well as emphatic and respectful towards others, but the reality is that peer bullying has been a big challenge for schools, youth organizations, and local communities for many years. Is cyberbullying just a contemporary expression of this?

Studies are beginning to show3 that cyberbullying is very different from traditional schoolyard bullying. Some important differences are shown in the picture below.

cyberbullying

Traditional bullying is mostly pre-meditated, cyberbullying is often impulsive.

Research indicates that cyberbullying is rarely premeditated like traditional bullying.3 Cyberbullying is often done impulsively and not planned out like in traditional bullying where the bully plans the attacks.

Traditional bullying is more predictable, cyberbullying can happen anytime and anywhere.

Traditional bullying is usually limited to certain times and places, for example, the playground or the way to school. This gives the target some (although limited) sense of predictability, and there are times and places where he or she can feel safe. In contrast, technology is everywhere: we have our phones and computers around us all the time. Cyberbullying can happen 24 hours a day, 7 days a week and 356 days a year. It can happen in our close proximity or through great distances. It is difficult for the target to find a safe space.

Traditional bullying uses aggression and power to gain control; cyberbullying might not.

Furthermore, traditional bullying is characterized by the need for power and control, aggression and proactively targeting the target. These characteristics may not be present in cyberbullying cases.

Traditional bullying is done face-to-face, cyberbullying can be anonymous.

Cyberbullying is “an easier way to bully because unlike traditional bullying it doesn’t involve face to face interaction.”3 Hiding behind the computer decreases empathy the bully feels toward the target. When we do not see the person’s reaction to what we post or text them, we might not know that we have gone too far. Desensitized by the computer screen, it becomes easier to say or do things we would not do to a person’s face. Furthermore, while “traditional” bullies can mostly be identified, it can be very difficult to find out who the anonymous cyberbullies are, making it easier for bullies to avoid seeing and facing the consequences of their actions.

The roles in cyberbullying are usually not as clearly divided as in traditional bullying.

In traditional bullying, we are usually working with a bully, target or bystander. Although we often find that bullies have previously experienced violence themselves (perhaps when they were younger or by someone with more power), the roles in each case are pretty clear. This is not necessarily the case in cyberbullying. Young people often play multiple roles at once, such as cyberbully, target, and witness. There is also no clear-cut profile of who can be the cyberbully and who can be the target, it can happen to anyone.

Traditional bullying is done in secret; cyberbullying can go public and viral.

An especially problematic aspect of cyberbullying is that it often has many, many onlookers. Traditional bullying is more often done in private than in public. But in cyberbullying, technology makes it easy to quickly spread content to a large number of people. Online bullying can quickly become very public or even viral. This wide audience makes the experience especially difficult and embarrassing for the target.

Traditional bullying seems to have clearer predictors and risk factors than cyberbullying.

Current research in public health indicates that many “social” factors such as education, socioeconomic conditions, access to services and resources, family ties, employment etc. are closely related to the person’s general health and mental health, including the ability to avoid or cope with violence and “traditional” bullying. Such connections with cyberbullying are less clear. It rather seems that there are no ‘typical’ cyberbullies and targets, it can happen to anyone. For example, it is well documented that in traditional bullying males are more likely to become bullies than females; that older adolescents are more likely to bully than preadolescents, and that bullies are more likely to have low than high self-esteem. For cyberbullying, on the other hand, age, gender or self-perception do not seem to be reliable predictors. Interestingly, high-quality relationships with important adults seem to be a strong protective factor in both types of bullying, traditional and cyber.

3.3.1 How does cyberbullying begin?

A big part of cyberbullying does not start out with an intention to deeply hurt someone. Young people post or text something they think is a joke or a random comment, but it may not be all that funny for the receiver. In fact, it could easily cross the line to cyberbullying.

In a recent online pilot study, young people who engage in cyberbullying behaviour reported the following reasons for their actions: posting without thinking they could hurt anyone (72%), to get back at someone (58%), the target deserved it (58%), for fun or entertainment (28%), to embarrass the target (21%), to be mean (14%), to show off to friends (11%) and other reasons (16%).

We will be exploring who is especially at-risk of becoming a cyberbully or a target in one of the following sections. For now, it is important to know that cyberbullying can happen to anyone. Relatively little can be said about a typical cyber target or a typical cyberbully: they can be rich kids or poor kids, left-out kids or popular ones, A-students or struggling students, majority or minority students, someone who has been bullied before or someone who has never experienced violence, someone who is online much too much or someone who rarely uses technology, it can be someone who uses technology to pass their free time by browsing and chatting, but also someone who mostly uses it for online learning, research, time management or school.

Nevertheless, there are some things young people can do to protect themselves online: 3

  • Keep privacy settings on. Secure all online information.
  • Protect their usernames and passwords. Do not share them with friends.
  • Choose friends wisely, including virtual contacts.
  • Only accept close friends on social networking sites.
  • Do not share personal information online.
  • Do not open anything from someone they don’t know.

3.3.2 What happens next?

After the hurtful messages, comments or pictures have been posted recipients are likely to respond inwardly with feelings of fear, sadness, and anxiety. Even if cyberbullying is done jokingly or unintentionally, it does not change the fact that this action can deeply hurt the targeted individual.

Signs that someone is being cyberbullied are similar to signs of being victimized in other ways. Some emotional, academic, social and behavioural indicators to look out for are listed in the chart below12.

Outward responses of cyberbullying recipients can also vary. Some recipients may just ‘shake it off’ and not let it bother them; others may react aggressively or retaliate. Some might respond, but be assertive but polite and others may stay passive and not do anything about the problem.  Some might plan steps and actions to take. Some might respond emotionally. They might tell someone or hide what is happening from others or do a range of other things.

In prevention work with young people, it is important to teach them how different kinds of responses are likely to impact the outcome of cyberbullying. For example, retaliation or aggressive response has been shown to make the situation worse, whereas passive avoidance could lead to serious psychological consequences for the targeted individual.

Some basic tips for young people who encounter cyberbullying are:

  • Tell a trusted adult if they are being cyberbullied.
  • If they know someone who is being a cyberbully tell them to stop or report it.
  • Contact host/site providers if inappropriate material is being posted on their site.
  • Save all evidence if they are being bullied online. Do not delete anything without keeping a copy for yourself.
  • Do not respond to rude messages. Rude comebacks only make things worse.
  • Do not post anything online that they would mind their parents and friends seeing.
  • Most importantly, treat others as they want to be treated. Consider what they are posting or uploading and ask themselves: “Would I want someone saying or putting that about me online?”

3.3.3 How does cyberbullying end?

Cyberbullying might die out on its own in time. However, if not stopped, cyberbullying can go on for a long time, and due to its public and viral nature, it can be especially damaging. Prolonged exposure can lead to serious consequences, so it is not advisable to wait. Cyberbullying often stops only through the involvement of outside support, either by contacting the social media used that takes down the offending content and informs the cyberbully of the consequences or through parental and teacher involvement.

Prevention and intervention work for combating cyberbullying should include some simple strategies An example of a useful, simple four-step strategy for dealing with cyberbullying is presented in this video and this worksheet.

After the cyberbullying has stopped, follow-up work needs to be done with targets of cyberbullying as well as the bullies. Targeted young people need support to work through feelings of embarrassment, shame, guilt, fear, isolation, sadness and anxiety. Counselling is often useful.

Cyberbullies, on the other hand, need to be shown the impact of their action and strengthen their social and communication skills, moral reasoning, empathy and conflict resolution skills. Non-judgemental and restorative approaches have been shown effective to stop cyberbullies repeat their behaviour.

3.4 Who is At Risk?

What does it mean to be at-risk of cyberbullying? This means that it is quite likely that someone might become involved in cyberbullying; either as a target, as a bully or as a bystander. In the last subchapter, we already mentioned some things that might put someone at risk of or protect them from bullying or cyberbullying.

3.4.1 What puts someone at risk and what protects them?

When we talk about at-risk groups for any problems that children and youth face, we like to think in terms of risk factors and protective factors: what puts someone at risk of unwanted things happening to them? What protects them from the problem or at least from suffering serious consequences? We understand many risk factors and protective factors that influence the physical and mental wellbeing of children and youth, their educational success, their relationships, their self-esteem, their future happiness, job prospects and their resilience to difficult events or other challenges.

For example, we know that children and young people, who face higher risks of becoming involved in ‘traditional’ bullying, often feel lonely, perceive their parents as distant and have problematic relationships with other adults in their lives like their teachers. They might have personal experience with violence in the family, peer group or other immediate environment. Many also have low self-esteem, poor social skills and communication skills. Traditional bullies are more likely to be male than female and more likely to be older adolescents than preadolescents. Targets of ‘traditional’ bullying, on the other hand, are likely to have low self-esteem, distinct physical features are also very common (for example short and weak, glasses, obesity, disability), they are also often less popular among their peers. A very strong protective factor for someone that is a target of traditional bullying, for example, is having a trusted adult that they can talk to about what is happening, or growing up in an environment where information and support are available.

This short sampling of risk factors and protective factors probably seems so self-evident that we do not even need to mention them! However, it is worth mentioning them because something interesting happens when we take a closer look at cyberbullying.

3.4.2 What are risk factors and protective factors in cyberbullying?

A number of studies and scholarly papers investigate which children and adolescents are most and least at risk of experiencing cyberbullying. Results are interesting and unexpected: when it comes to cyberbullying, there are almost no common risk factors except opportunity. Online access and unsupervised online time and technology use is clearly a ‘prerequisite’ for cyberbullying. However, not all forms of media usages raise the risk of experiencing cyberbullying. Children and adolescents who spend more time using their cell phone are more likely to report receiving aggressive or threatening electronic communication, but no such relationship seems to exist between time spent on the internet and either form of online bullying6.

There are no common risk factors except opportunity.

Most studies find that age and gender do not have a very clear predictive role in cyberbullying. Some early research findings suggested that cyberbullies are often kids who were themselves bullied in real life. But later research found that cyberbullies and targets can just as well be popular, well-adjusted kids who have not been exposed to peer-aggression before. Whereas low self-esteem is usually linked to traditional bullying, many cyberbullies demonstrate a high perception of self-esteem in perceiving their relationships with peers as satisfying. However, feelings of loneliness and a perception of unsafety at school were often linked to cyberbullying.

In short, there seem to be very few common risk factors and even fewer protective factors that would prevent children and young people from becoming involved in cyberbullying. It really can happen to anyone. Research findings suggest that the most important protective factors against cyberbullying are strong parent relationships and positive experiences at school. Restrictions on media use enforced by adults were far less effective in fighting cyberbullying.6

It really can happen to anyone.

However, although there are few risk factors that can help us predict involvement in cyberbullying and very few protective factors that would prevent children and young people from becoming involved, there are some important protective factors that can help them respond to cyberbullying resiliently. We might not be able to prevent cyberbullying from happening, but we can do things to minimize the damage so that the children and young people do not suffer prolonged or even life-threatening consequences. This can make a key difference in outcomes of cyberbullying both for the bullies and the targets.

Again, strong relationships among children and adults and positive school experiences are the strongest predictors of resilient response for children and adolescents who have faced cyberbullying. More specifically, students tended to behave resiliently if they:

  • they could find an environment that felt emotionally and physically safe,
  • had a trusted adult to talk to about problems,
  • had parents of caretakers with basic digital competencies and awareness of online safety,
  • experienced peer support and felt they are not alone in their experience,
  • had access to practical information on what they can do to stop cyberbullying,
  • had strong self-esteem, empathy, and social skills,
  • were able (or given support) to cope with emotions, especially feelings of shame, guilt, sadness and fear.
Finally, an alarming statistic is that being a passive observer of cyberbullying, especially if there are no consequences or if the behaviour is not challenged, raises the likelihood of acting as a cyberbully in the future.

Children and young people who have been onlookers are often at risk of perpetuating such behaviour. This is why it is so important to build healthy, empowering communities where cyberbullying does not go unrecognized, where such behaviour is talked about and challenged and where solutions for better relationships are found and invested in.

3.5 Types of Cyberbullying

Cyberbullying has many forms and can include a variety of acts. It can be sending a mean text message, making online threats, sending unwanted provocative photos, posting insults or hate speech, attempting to infect the target’s computer with a virus, flooding an e-mail inbox with messagesor sending harmful material and any other form of social aggression using the Internet or other digital technologies. Some of the most common cyberbullying tactics are briefly described below.

Cyberstalking: a bully repeatedly and intensively harasses, denigrates or threatens the target, enough to create fear. When Annie broke up with Sam, he sent her many angry, threatening, pleading messages. He spread nasty rumors about her to her friends and posted a sexually suggestive picture she had given him in a sex-oriented discussion group, along with her e-mail address and cell phone number.

Cyberthreats: a bully makes threatening remarks on the internet or implies violent behaviour. It can also be threatening with suicide. Greg set up an anonymous IM account and sent a threatening message to his older sister suggesting that she would be killed the next day at school.

Denigration: a bully starts rumours about a person to damage their reputation. “Dissing” someone online. Some boys created a “We Hate Joe” Web site where they posted jokes, cartoons, gossip, and rumors, all dissing Joe.



Exclusion: a group of bullies excludes someone from online conversations, groups or from events shared online to hurt their feelings. Millie tries hard to fit in with a group of girls at school. She recently got on the “outs” with a leader in this group. Now Millie has been blocked from the friendship links of all of the girls.

Flaming: a bully starts or fuels online fights exchanged through emails, instant messages, chat rooms or comments. There is often harsh language directed towards a specific person. Joe and Alec’s online exchange got angrier and angrier. Insults were flying. Joe warned Alec to watch his back in school the next day.

Harassment: a bully repeatedly sends or posts mean, hurtful or insulting messages or comments. Sara reported to the principal that Kayla was bullying another student. When Sara got home, she had 35 angry messages in her e-mail box. The anonymous cruel messages kept coming—some from complete strangers.

Masquerading/impersonation: a bully creates a fake identity to harass someone anonymously or impersonating somebody else to him send malicious messages or post material to get that person in trouble or danger or to damage that person’s reputation or friendships. Laura watched closely as Emma logged on to her account and discovered her password. Later, Laura logged on to Emma’s account and sent a hurtful message to Emma’s boyfriend, Adam.

Outing: a bully shares someone’s secrets or embarrassing photos online. Greg, an obese high school student, was changing in the locker room after gym class. Matt took a picture of him with his cell phone camera. Within seconds, the picture was flying around the phones at school.

Trickery: a bully tricks someone to share private information or photos with them and then shares this online. Katie sent a message to Jessica pretending to be her friend and asking lots of questions. Jessica responded, sharing really personal information. Katie forwarded the message to lots of other people with her own comment, “Jessica is a loser.”

Of course, this is just one way of classifying cyberbullying. You might find another model that helps you and the young people you are working with even better. But it is always useful to have some language and tools to think and talk about a problem. Take a look at some real life examples below and think about them. Can you identify types of cyberbullying in the following examples? What would you do if you came across one of these messages in real life? How could you talk to a sender of these messages? How could you talk to the recipient?

cyberthreads

Source:

Nancy Willard, M.S., J.D., Educator’s Guide to Cyberbullying and Cyberthreats Center for Safe and Responsible Use of the Internet

3.6 Case studies

Educators, youth workers, parents and other adults working with children and young people are likely to come across cyberbullying incidents. To successfully deal with cyberbullying we must first learn to recognize it, analyse it and understand what exactly is going on. Secondly, we need to be aware of effective strategies to support the victim and challenge the bullying behaviour.

Our reactions will often determine the outcomes of cyberbullying incidents: what will be the consequences for the victim, the bully, and the onlookers; how will the community and relationships be shaped by this experience; will children and young people learn from it or be harmed by it? Furthermore, when faced with cyberbullying cases we might want to think about how to prevent similar events in the future and how to help children and young people develop skills for healthy, positive use of online media and communication technology.

In the following section, we have compiled short descriptions of six real-life cyberbullying cases that are also available on the internet in even more detail. We would suggest you take the time to read through them, think about them and try to propose solutions or guidelines for intervention. For the first three cases, we have already outlined some bullet points to help you think through them. However, these are suggestions rather than definite solutions. You might find solutions that are even more appropriate for your school, your community, your group of children or young people.

3.6.1 How to use case studies

Case studies are a helpful tool to practice and apply concepts and skills that we have learned in Chapter 3 of this manual. What is a case study? It is a form of problem-based learning. A case study describes a situation that needs a solution, an idea, an intervention, a strategy. You may want to do this by yourself or with the discussion in small groups. Case studies are a wonderful tool to help you understand key concepts in much more depth. This is more important than finding perfect solutions. They are also great team-building opportunities. To solve a case, team members will have to work through different opinions, ideas, perspectives, and ways of working. This is why we recommend you use the following case studies in your training sessions for school staff, parents and youth workers.
To facilitate a training session using case studies, you might follow these steps:

  1. Greet the group and introduce yourself.
  2. Briefly, present the topic of a session (e.g. types of cyberbullying and effective strategies for each type).
  3. Present the case study:

    • Introduce the situation in a sentence or two.
    • Give a print of the case (and perhaps some thought-provoking discussion questions) to each participant.
    • Have participants quietly read through the text.
    • Have the group summarize the key points; make sure everyone understands the basics of the case.
    • Divide participants in pairs or small groups. Have them talk about the case and the discussion questions. Have them brainstorm and discuss possible solutions and strategies.
    • Ask each pair or small group to contribute one or two important ideas.

  4. Address open questions and dilemmas. But remember: you are not expected to have all the answers. Your job is to help participants think deeply about this important topic, not to give answers and recipes.
  5. Review key concepts of the training session together with participants.

Case studies are also a very helpful tool to work with children and young people. Real cases and specific situations are something they can understand and relate to. Experience helps them learn. You can use case studies during cyberbullying awareness workshops, mediation club meetings and in conflict-resolution training sessions. You might want to have the students read and discuss the cases or even use role-play to act them out.
However, a word of caution: students might perceive these cases very differently than adults. Make sure the case descriptions are age-appropriate, understandable, short and concise. A very important point is also NOT to overburden students emotionally: for example, it might be very difficult for them to process stories about cyberbullying resulting in suicides of young people. We also strongly encourage you to use case studies with happy or open endings when working with students.

It is your responsibility to ensure that you have enough time and skills to process any emotional and cognitive processes that selected activities might evoke in students.

3.7 Case study 1: Ashley’s new website, unknown to her

Ashely-11Ashley lives in Colorado and has been growing up like any other teen, being influenced by her peers as much as she’s influenced by her parents’ guidance. However, she never expected how invasive the Internet could be without her knowing about it or even having a say in the matter. In Ashley’s case, the bullying that occurred may seem benign on the surface, but it had the potential to be far more.

Unknown to Ashley at the time, a classmate when she was 11 began taking photos of her. The images were then made part of a portfolio of information posted on the Internet with a fake social media page. The topic was Ashley and the website page was made to look as if Ashley posted everything herself. It was only through friends and third parties that Ashley became aware of the existence of the online information. The data was detailed as well; it included her school name, her home address, her family information, birthdays and more. Worse, all the data was set to be wide open to the public without any filtering or restriction. The creator of the page was confronted but denied the act. In the meantime, Ashley began to be ostracized by her friends at school. To break the freeze-out cycle Ashley had to enrol in a different middle school to regain a “clean slate.”

In Ashley’s case, the damage was limited and constrained to the loss of a few friends. However, it could have been far worse. Further, the damage was caused by another child who simply had the time and access to post whatever was desired on the Internet for anyone to read.

Source:

Type of cyberbullying:

Masquerading (creating a fake identity or impersonating someone)

The  (we try to avoid an ascription like typical because anyone can be affected) victim profile:

Could be anyone. Likely to be an outsider

The  cyberbully profile:

Could be anyone. Likely does it for fun or out of revenge.

How to promote constructive use:

  • Work on social skills and communication skills.
  • Work on empathy.

prevent-01 How to prevent it from happening:

  • Raise awareness about cyberbullying.
  • Teach kids how to be good bystanders.
  • Look for signs of cyberbullying and intervene as soon as possible.
  • Build a relationship of trust among teens and adults (so if something happens, they will tell).

react-01 How to react if it happens: 

  • Document it (PrintScreen, save it).
  • Do not reply.
  • Tell an adult.
  • Contact the website provider and ask for the site to be taken down.
  • Get the authorities involved to find out the identity of the cyberbully (IP address).
  • Work with the victim, the bully and the bystanders ( – mediation is not an appropriate tool in case of (cyber)bullying, no blame approach, individual counselling, group counselling, and workshops).

3.8 Case study 2: Nude photo leaked online

Jessica-18Jessica Logan was an 18-year-old high school senior who sent nude photos of herself to her boyfriend. After the couple broke up the boyfriend sent the photo that was meant for his eyes only to hundreds of other teenagers via group chats. The photo sharing led to name calling and taunts at school. Phrases like “slut, porn queen, and whore” were regularly spoken referring to Jessica by schoolmates. The taunting continued via Facebook and through text messages.

Jessica was feeling miserable and depressed. She was afraid to go to school and started skipping classes. Jessica’s mother only learned of a problem at all when she started getting letters from school reporting that her daughter was skipping school. Jessica’s mother took away her daughter’s car and drove her to school herself, but Jessica still skipped classes. She told her mother there were pictures involved and a group of younger girls had received them and were harassing her and calling her vicious names. Unfortunately, the mother didn’t realize the full extent of her daughter’s despair.

When the school officials became aware of the harassment they offered to go to one of the girls who had the pictures and tell her to delete them from her phone and never speak to Jessica again. Jessica’s mother saw the solution in talking to the parents of the girls who were bullying Jessica, but her daughter said that would only open her to even more ridicule.

2 months later Jessica committed suicide.

Source:

Type of cyberbullying:

Outing (sharing someone’s secrets or embarrassing photos online).

The victim profile:

  • Can be anyone. Might have low self-esteem, people pleasing, in abusive relationships.
  • Likely to need help with developing a positive self-image, body image, boundaries.

The  cyberbully profile:

  • Revenge, anger, hurt, highly emotionally invested, low empathy.
  • Needs help with emotional development (emotions, recognizing, dealing with, expressing…)

How to promote constructive use:

  • Teach teens about good behaviour online (»netiquette«).
  • Work on self-esteem, body image, personal boundaries.

prevent-01 How to prevent it from happening:

  • Teach teens (especially girls) to know their boundaries and how to communicate them.
  • Raise awareness on cyberbullying, sexting etc.
  • Teach kids to be good bystanders (do not forward, tell someone, show empathy…).
  • Try to catch the signs early. If possible, work with the bully before it is leaked to try to prevent it from happening, work with the girl to prepare her for the worst case scenario (, no blame approach, individual counselling).

react-01 How to react if it happens: 

  • Do not waste time! Work with the victim (dealing with shame), the bully, the bystanders.
  • Limit the damage if you can. Stop the spreading if possible.
  • Document it (prtscreen…), but get kids to delete it from their devices.
  • Help the victim to block the abusers. Report abusers to social platforms, phone companies…
  • Get the schools or the authorities involved. But be sensitive, respect the privacy.
  • Keep the media out.

3.9 Case study 3: Emails from an unknown sender

SaraAt the beginning of the school year, Sara moved into a new school. At first, things were great and Sara was very popular. However, after a couple weeks at her new school, her parents noticed that she seems depressed and anti-social. They observe that she rarely socializes with her friends. Sara’s parents are worried about her and suspect that something is not quite right at school. They try to talk to Sara, but she is reluctant to talk. She tells them that she and her friends had an argument and are not getting along. Sara’s parents do not realize the problem is more dangerous than a disagreement between friends.

One day as Sara arrived at school, other students began to giggle and laugh at her. Some even made strange remarks about her eating lunch in the lunchroom. Sara was embarrassed and confused. She did not mention this to anyone that day and thought that it would just go away.

After returning home from school, Sara decided to check her email. She had one email from a person that she did not recognize. Inside the email, was an embarrassing picture of Sara in the lunchroom eating. Immediately, Sara realized that this picture was the reason that all the students had been laughing at her when she arrived at school that day. Another student must have taken this picture in the lunchroom at school and sent it to everyone in her class. Sara was alarmed and began to cry. She immediately deleted the email and did not tell anyone about the email.

As the weeks passed, the incidents escalated. Sara received more and more embarrassing and sometimes even threatening emails from the person. She deleted each and every one. Sara was too humiliated to tell her parents or her teachers. Her teachers noticed that she had begun to fall behind in school and seemed to be very depressed.

Source:

Type of cyberbullying:

Outing & Harassment (sending or posting nasty, mean, embarrassing messages).

The  (we try to avoid an ascription like typical because anyone can be affected) victim profile:

Likely to be an outsider (new kid, shy, different…), but could be anyone.

The  cyberbully profile:

  • Likely to do it for fun, out of boredom. Could also be out of anger or revenge, unresolved conflict.

How to promote constructive use:

  • Help teens to be included. Be attentive to kids who are isolated. Build empathy and respect among peers.
  • Build a culture where online activities are encouraged, but monitored (still respecting privacy).

prevent-01 How to prevent it from happening:

  • Raise awareness about cyberbullying.
  • Teach conflict resolution skills, tolerance, and empathy.
  • Help new students (and isolated students) feel included.
  • Get the opinion leaders among teens on your side. Use them as role models.
  • Teach parents to limit the online time and monitor their children’s online activities (to a realistic extent).

react-01 How to react if it happens: 

  • Document it (print or save the messages). Then delete.
  • Do not reply. Block sender(s).
  • Report sender to his/her e-mail provider (give evidence).
  • If it escalates, sometimes a very formal short reply from an adult helps. If you do this, introduce yourself as an adult figure (authority), keep it polite but firm, show that you have evidence, tell the bully to stop or you will report him, tell the bully that in similar cases, authorities could find out identities of the bullies by tracking which computers they use. Tell them to stop or you will take action. Only do this once. If it continues, take action (no empty threats!).
  • If it escalates, get the e-mail provider or the authorities to find out the sender’s identity (IP address).
  • Work with the victim, help them feel better about themselves and help them to be included.
  • Understand that if the cyberbully is unknown, there can be a lack of closure for the victim. Help them deal.

3.10 Case study 4: Hateful texting

Gina 14Gina, an exuberant and spirited high school freshman, had a falling out with a girlfriend over a boy they both liked at school. It wasn’t long before Gina began getting rude text messages to her phone at all hours, calling her names and saying inappropriate things such as, “I hope you die soon.” The angry friend had enlisted others to text hateful remarks to Gina too.

Gina’s parents had never talked to her about bullying, or how to handle such behaviour when you become the victim. The 14-year-old was completely unprepared to face such a major assault on her self-esteem. She was devastated, and soon began to withdraw from her friends and active social life. She spent more and more time alone in her room. Her mom grew concerned when Gina would no longer talk about what was going on at school or in her life. So she reached out to one of Gina’s closest friends and learned about the hateful texts her daughter was receiving.

Gina’s mom took action before the emotional toll became worse. She told Gina she knew about the cyberbullying, and together, they discussed the situation with the school counsellor and principal. With support from her family and teachers she trusted, Gina found the strength to talk to the girlfriend she had argued with, apologized for the quarrel and asked her to call off the texting campaign. While their friendship was over, the cyberbullying stopped.

Source:

3.11 Case study 5: Rumours and exclusion

Ryan13Ryan Halligan was a 13-year-old middle schooler from Vermont who first experienced bullying in the fifth grade because of his poor physical condition. By the time he made it to seventh grade Ryan was begging his parents to home school him or if they could move. His parents contacted the school and tried to work out the issues. Boys at school started rumours that he was gay. Over the summer he worked on establishing a relationship with a popular girl from his school online. When he returned for his eighth grade year, and went to approach his girlfriend in real life, where she told him in front of all her friends he was a loser and that everything she had said to him online was a lie. The girl had copy/pasted all of their instant messages and sent them to a friend for a laugh at Ryan’s expense. Humiliated, Ryan took his life.

Source:

3.12 Case study 6: The New Kid at School

Henry 12Henry was a shy sixth-grader who recently arrived at school from out of state. One day as he was browsing a social media site he came across a page about the school with pictures of students, including one of him labelled “The Fat Nerd.” Upset, he posted a reply expressing his dismay.

The postings became nastier, and soon some students were making loud comments in the lunchroom and on the playground. Henry had to endure many weeks of feeling humiliated and hurt before anyone realized what was going on. His parents didn’t even know because Henry was too embarrassed to tell them. Finally, a teacher overheard some of the names and asked Henry what was going on. He described the social media page and cyberbullying.

The school, which had trained its teachers and had a zero-tolerance policy on bullying, responded quickly. They identified the ringleaders, and with the help of their parents, had the creator of the unauthorized school page take it down from the social media site. School officials hosted sessions for parents and students about cyberbullying and how to prevent it.

Source:

4. Addressing Cyberbullying in Schools

As we learn more about cyberbullying, the question inevitably arises: What can we do about it? In fact, a lot can be done. Effective programs, strategies and initiatives have been developed all over the world. Activities to fight cyberbullying can be online-based or take plalce in-person, they can focus on awareness raising or skill building, on individuals or groups, they can be designed as preventative measures or intervention plans… it would be impossible to list and analyse all possibilities.

This section of the manual is designed as an overview of guidelines, ideas and resources on how to tackle cyberbullying. Guidelines can provide a useful framework for all concerned to reduce cyberbullying and its negative effects1, but of course they need to be followed by practical and effective action plans.

We will be focusing specifically on guidelines and suggestions for school environments. Throughout the world, school environments are (apart from online environments) the most utilized platforms for cyberbullying prevention and intervention. School-based efforts to fight cyberbullying seem to be most effective if a whole-school approach is used and if school-family-community partnerships are involved. Key elements of a school-wide approach are building a supportive school culture, development of skills and knowledge about cyberbullying among school staff, students and parents; consistent implementation of policy and practice to reduce cyberbullying behaviours; and partnerships between staff, students, families and the wider community1.

During 2008-2012, an interesting international study was done in 29 (mostly European) countries, including Germany, Slovenia, Poland, Italy and Hungary1. In addition to a comprehensive review of available literature and research on cyberbullying, one of the project objectives was to analyse existing nationally published guidelines connected to technology use and cyberbullying from different countries. The aim was to disseminate best practices and to develop a set of common guidelines applicable on the European level.

Researchers reviewed 54 national guidelines (two per country) and scored each document on a number of criteria. They found that the most common target groups were parents (addressed in 41 documents), young people (35 documents), teachers (32 documents) and schools (23 documents). The key findings were that the existing guidelines varied greatly in covering important aspects of cyberbullying. Many documents emphasized skill building, awareness raising and modelling appropriate behaviour. School policies were often mentioned but not elaborated on. Few guidelines recognized the importance of peer relationships, peer leadership and peer influence, although research consistently recognizes them as important aspects of cyberbullying.

4.1 General Guidelines

Based on this comprehensive analysis, a number of recommendations were made for each target group. The following subchapters will summarize the recommended guidelines1 blended with some ideas and resources for further exploration. Guidelines are divided in four sections that are important for designing a good school-wide strategy:

  • knowledge and competences
  • proactive policies and practices
  • collaborative partnerships and
  • social environment.

In each section, suggestions are given for each of the main identified stakeholders: young people, parents, teachers, and schools.

4.1.1 Knowledge and competences

Firstly, guidelines for raising awareness about cyberbullying and skill building are presented for all stakeholders. This is the strongest area of many anti-bullying programs, including typical school strategies.

Young people need:

  • Awareness raising activities to help them understand cyberbullying, its effects, and consequences.
  • Technical skills to use technology effectively and to stay safe online or using smartphones.
  • Specific skills for various online activities like social networking, blogging, chatting or gaming.
  • Principles of netiquette (the same standards of behaviour apply online as they do in real life).
  • Knowledge and the confidence to respond effectively to a cyber-attack.
  • Information about the risks and benefits of responding to cyber-attacks in different ways (what is likely to happen if they respond assertively, aggressively, passively, emotionally…).
  • Opportunities to improve their social skills, level of empathy, moral reasoning, conflict resolution skills and anger management.
Parents need:

  • Information about a safer mobile phone and Internet use, about different modes of electronic communication and how they are used in cyberbullying.
  • Knowledge how to help their children determine how they can report a problem, secure privacy settings or block unwanted communication.
  • Awareness that even though their children are skilled technically they may not know how to use the technology in safe ways.
  • Information on signs of cyberbullying, particularly becoming withdrawn, moody or depressed, upset or angry when online or reading a text, so they can provide support for their children during this time.
  • Skills to talk with their children about cyberbullying and not to wait until bullying happens.
Teachers need:

  • Professional training to intervene effectively in cyberbullying situations.
  • Understanding of group dynamics and conflict management skills.
  • Development of their own digital competences including technology use, cyber-safety, and online etiquette rules.
Schools need:

  • Age appropriate strategies for action and behavioural change when intervening in bullying.
  • Support to consistently implement existing strategies.
  • Positive discipline, cooperative learning methods, and effective conflict resolution approaches,
  • Endorsement of positive uses of technology and anti-cyberbullying interventions.
  • Strategies to develop online communication and other social skills, such as digital citizenship.

4.1.2 Proactive policies, plans and practices

A good school-wide approach against cyberbullying includes proactive school policies, plans, and procedures that are effectively implemented in practice and regularly evaluated. The following guidelines emphasize some relevant considerations from the viewpoint of different stakeholders.

Firstly, guidelines for raising awareness about cyberbullying and skill building are presented for all stakeholders. This is the strongest area of many anti-bullying programs, including typical school strategies.

Young people need:

  • A sense of ownership of their school’s anti-bullying policy.
  • Their opinions on the definition, procedures for reporting and investigating and intervention strategies for dealing with cyberbullying to be taken into consideration as relevant.
  • Encouragement to be responsible for their own online safely rather than relying on restrictive adult supervision.
  • Development of digital citizenship through peer support programmes, cyber-mentoring and counselling.
Parents need:

  • Attitude of respect and tolerance of others.
  • Ability to be explicit in their disapproval of cyberbullying.
  • Familiarity with policies and procedures in place in their children’s school.
  • Opportunities to participate in developing school policies and strategies.
Teachers need:

  • Clear, consistent and accurate information, support, and procedures for preventing, detecting, reporting, and responding to cyberbullying from the school management.
  • Training on how to act when cyberbullying happens.
  • Encouragement from school management to consistently implement and evaluate effective responses to cyberbullying situations.
Schools need:

  • An integrated and uniform approach for staff and all other members of the school community to preventing, detecting, reporting, and responding to cyberbullying.
  • Support and consistency from the school management on issues of cyberbullying.
  • On-going conversations with students about cyberbullying.
  • Staff members acting as role models and students supporting those who are victimised.

4.1.3 Collaborative school-family-community partnerships

Schools and families are among the most important risk factors as well as protective factors in cyberbullying. To deal with cyberbullying effectively, links between communities need to be established and resources in local communities should be utilized. The following guidelines discuss the needs of all stakeholders from the partnership building perspective.

Young people need:

  • Empowerment to report cyberbullying to school staff, parents or other trusted adults.
  • Awareness of resources in local communities, including agencies and organisations where they can find information, advice and guidance on internet safety and cyberbullying.
  • Encouragement to seek counselling if affected by cyberbullying.
  • Awareness that the sooner unacceptable behaviour is addressed the sooner cyberbullying will stop.
Parents need:

  • Encouragement to take action when they suspect their child is being cyberbullied or is bullying someone else.
  • Awareness that children can both be cyberbullied and bully others and that cyberbullying might also be linked to ‘traditional’ bullying.
  • Encouragement to familiarize themselves with their children’s school’s policies and procedures for cyberbullying.
  • Communication skills to stress to their children there is no shame in being bullied and that they should not hesitate to seek help from parents, teachers, youth leaders or others.
  • The ability not to over-react to cyberbullying or deny their children online and phone access if they are being targeted, but instead cooperating with their children to find possible ways of dealing with cyber-attacks.
Teachers need:

  • Active collaboration with parents to establish strategies for dealing with cyberbullying.
  • Contact with parents when appropriate, and increased parental and community awareness about cyberbullying.
Schools need:

  • Active participation of all members of the school community, teachers, parents and students in order to combat cyberbullying.
  • Awareness of all stakeholders that cyberbullying is a shared responsibility.
  • In cyberbullying situations, all parties involved need to contact each other and work together.

4.1.4 Social environment and school culture

The ‘climate’ or rather the ‘culture’ of social environments that students are a part of, plays an often invisible but important role in cyberbullying prevention and intervention. The following guidelines examine what different stakeholders need to contribute to a positive, healthy, bully-free social environment.

Young people need:

  • Awareness of how important it is to support peers that are targets of cyberbullying in and out of school and awareness of the importance of reporting the incidents.
  • Training in effective strategies which they can use should they be witness to their peers being cyberbullied.
  • Support when defending or seeking help for peers that are targets of cyberbullying.
  • Opportunities to develop leadership skills, moral reasoning, empathy, and emotional coping.
  • Students are in a unique position to have a vital role in addressing the problems of cyberbullying in schools, and should be actively engaged in these processes.
  • Opportunities to practice safe bystander skills in the school.
  • Assurance that parents, teachers and other adults will not over-react if they report cyberbullying as they often fail to report incidents of cyberbullying behaviour to school personnel for fear that the technology will be taken away.
Parents need:

  • Awareness of the role of bystanders, peer pressure and positive peer influence in relation to cyberbullying. They should encourage their children to intervene when they witness cyberbullying.
  • Should parents learn of their children’s involvement in cyberbullying, they need to stress their disapproval and talk to their children about its damaging impact and consequences.
  • Understanding of how important it is to lead by example and to have a positive and supportive relationship with their children.
  • Established trust with their children, support in a non-judgemental and positive style.
  • Encouragement to promote good social skills, in particular empathy, good moral reasoning, self-esteem and resilience of their children to reduce the risk of them becoming involved in cyberbullying.
Teachers need:

  • Active involvement of all stakeholders in creating a positive atmosphere in the classroom and positive relationships with their students.
  • Training how to enable, assist and reinforce students in supporting targets of cyberbullying and how to work with students who cyberbully others.
  • Ways to encourage students to report cyberbullying behaviour.
  • Close teacher-student relationships to ensure a more positive class and school climate.
  • Skills to notice and address conflicts and problematic situations between students.
  • Opportunities to learn about the ways students use the Internet, while the students need to learn ways to solve social problems and develop social skills from teachers.
Schools need:

  • A positive and supportive school culture developed through positive relationships they build among staff and students.
  • Caring, supportive and authoritative school personnel that contribute to better relationships, positive classroom climate, and supportive school culture.
  • Open, supportive and trustworthy atmosphere with clear guidelines about how the community is expected to behave and respond to cyberbullying.
  • Knowledge and skills to effectively respond and give support to those who are cyberbullied; to effectively teach these skills to all stakeholders.
  • Strategies to encourage help-seeking behaviours from students, staff and parents.
  • Promotion of positive discipline models instead of punitive approaches.
  • A school culture that does not tolerate cyberbullying.

4.2 Supporting School Staff

Cyberbullying is a real problem and it happens more often than we know or expect. Schools sometimes became aware of the problem but are poorly equipped to handle it. School staff might not know how to respond, what their competencies are and what is out of their area of expertise, how to respond to one-time incidents or how to develop a school-wide strategy if cyberbullying has escalated. Teacher and other school staff members often report that they would like to react, but do not know how and they feel powerless.

In this section, we will explore some basic guidelines and strategies for schools that wish to address specific cases of cyberbullying among students. Members of school staff will need to recognize the problem, explore it, plan, implement and evaluate an intervention or a strategy. The role of the multiplier in the intervention process is to be a facilitator, support person, and counselor. Multipliers cannot develop cyberbullying strategies and interventions for the school staff or instead of the school staff.  They can, however, offer their knowledge and skills to help with the process. Most often, this will mean that they will help the school think and talk through the following steps:

  1. Recognizing incidents of cyberbullying
  2. Assessing incidents
  3. Reporting incidents
  4. Immediately responding to specific incidents
  5. Developing, implementing and evaluating a general strategy for dealing with cyberbullying

Cyberbullying is only one form of unacceptable behaviour that we might encounter among students. Schools often do not have a strategy or a procedure to deal specifically with cyberbullying; however, most schools have codes of conduct, policies for dealing with unacceptable behaviour or even counter-bullying policies. Cyberbullying should be dealt in the context of these policies.

4.2.1 Recognizing Incidents of Cyberbullying

Staff members usually become aware of cyberbullying through student reports, parent reports or by noticing problematic online activities or changes in student behavior. Awareness raising activities for school staff, especially information on how to recognize common signs that students might be victims of bullying and cyberbullying, can be very helpful.

4.2.2 Assessing the Incident

The cyberbullying incident may take many forms and need different approaches. The first step is to think about the incident. Some of the key questions are:

  • Impact: how extensive is the problem? How serious are the possible consequences?
  • Location: where and when is the bullying happening? Cyberbullying is especially difficult to deal with because unlike “traditional” bullying it can happen anywhere and anytime.
  • Duration: how long has the unacceptable behaviour been going on?
  • Identity: does the person being bullied know who the bully or bullies might be? Cyberbullying can be especially challenging because the bully can be anonymous or the bullying can go viral and include many bullies and onlookers.
  • Motivation: is there a motivation, a purpose behind the bullying? Is it possible the bully does not realize that his or her actions are cyberbullying? Does he or she come clean at an early stage and try to amend the damage that was caused?
  • Evidence: what evidence is there of what happened?
  • School context: how is the school involved? What can and cannot the school do? What is the school’s policy for dealing with such incidents?

4.2.3 Responding to Cyberbullying Incidents

Each case of suspected or alleged cyberbullying should receive an immediate response. If needed, a wider strategy should also be implemented.

If staff member suspects or is told about a possible cyberbullying incident, there are some steps they can take to immediately respond to the incident.

Cyberbullying over mobile phones:

  • Ask the student to show you the phone.
  • Record the content of the inappropriate message or image. Include names, phone numbers and other identifying information.
  • If the message is spoken, make a transcript.
  • Tell the student not to delete the communication for the moment.
  • Go with the student to the principal (or the person in charge of cyber safety if the school has one).
Cyberbullying on computers:

  • Ask the student to show you the inappropriate content on the computer screen. If the material is disturbing for the student, use other methods to locate it, such as checking browsing history.
  • Record the material, save it to a secure location. Copies should not be accessible to the public.
  • Print the problematic material out and save a hard copy in a safe place.
  • Inform the principal or the person responsible for cyber safety.
  • Talk to the student. Take the student’s statement, especially if there are concerns about child protection issues. When talking to the student, follow standard procedures for interviewing students.

4.2.4 Supporting the victims

Students that are victims of cyberbullying may need different types of support:

  • Emotional support and reassurance that reporting the incident was the right thing to do.
  • Advice not to take revenge, but to keep the evidence and show it to parents or staff members.
  • Advice on how to prevent further hurtful communication (change passwords, block numbers or senders change numbers, report offensive content etc.)
  • Take action to remove the problematic material, if possible
  • Discuss contacting the police if the content might be illegal.

Offer students what you can and help them find support in areas you are not able to help them. School counsellors are usually key staff members for organizing a support strategy and support network for the student.

4.2.5 Investigating

The nature of investigation will depend on each specific case of cyberbullying. It might include:

  • Reviewing available evidence
  • Saving available evidence (printing, taking a picture, saving on a secure location etc.)
  • Interviewing students (victims, bullies, bystanders)
  • Trying to identify the bully
  • Looking at the media and technologies used

Take note that in most European countries, school staff members do not have the authority to search students’ belongings, including their phones, tablets, and other devices. You may ask the students to show you the devices and the content, but you cannot make them do it.

If the incident has signs of a criminal offense, the school is mandated to report to authorities and should be careful not to interfere with police investigations.

4.2.6 Working with the cyberbullies

Working with the cyberbully or bullies is just as important as working with the victims. The consequences should be determined on an individual basis and should be in accordance with the rules and procedures the school has in place. Working with the bully should have the intention to:

  • Help the victim to feel safe again
  • Make sure the bullying stops
  • Hold the bully accountable
  • Help the bully recognize the harm and consequences of their actions so that it is less likely for behaviour to be repeated
  • Demonstrate that cyberbullying and any kind of bullying is unacceptable behaviour, that it will not be tolerated by the school, and that the school has effective ways of dealing with unacceptable behaviour.

4.2.7 A strategic approach

A strategic approach to cyberbullying is not always needed. Usually, a general strategy to ensure a good school climate, a strategy to develop students’ social skills and/or a conflict resolution strategy might be enough to prevent most cases or at least the most serious cases of cyberbullying.

If the school detects one isolated incident of cyberbullying, it should deal with that specific incident, but it might not make sense for a school-wide strategic approach. However, if there are many incidents or if their impact is potentially harmful, the school should review its existing policies and if needed, develop new ones.

Some of the tools that the school might use are:

  • Develop a communication strategy for relevant target groups.
  • Develop educational activities and skill building activities for relevant target groups.
  • Review existing policies and procedures for dealing with unacceptable behaviour.
  • Develop a crisis response plan and procedures to deal with unexpected incidents.
  • Examine the school culture and the hidden curriculum and messages.
  • Engage in a strategic planning process and plan for organizational change.

4.3 Case Studies

The following case studies can be used as an exercise to help you think about common scenarios, connected to cyberbullying, that might happen in schools. In each case, a cyberbullying incident is summarized and a brief description of a context is given. Think or talk about how you might respond to such cases. Try to plan an immediate response as well as a school-wide strategic intervention if it is needed.

4.3.1 Case study 1: Sara, 14

sara14School context: High school in an urban setting, in the city centre. The student population is very diverse: some students come from middle-class families, some from a poor background and a few from wealthy families. The school has about a third of minority students. The school general climate is pleasant, students tend to like school and most of them have a group of friends in the school. Students often approach teachers with their problems. There have not been many cases of cyberbullying reported yet and very few cases of traditional bullying. The school has an anti-bullying policy and monthly bullying prevention assemblies for students.

Case summary: Sara, age 14, has reported being cyberbullied to the school counsellor. She had sent some ‘dirty’ photos to her 15-year-old boyfriend through Snapchat. He has shown the photos to his friends and now the boys are making fun of her. They are calling her names as she walks by them in the hallway. She has also received 13 Snapchat messages requesting naked pictures of her. The principal and the teachers have not reacted yet but plan to discuss the incident during the teachers’ conference next month. None of the other students have been approached about the incident so far.

Initial investigation: When Sara reported the incident, the school counsellor took notes of her statement. Since Snapchat deletes shared content after it has been viewed, no record of either the photo or the messages exists.

In general, students in the school are very skilled in using social media. Almost everyone has a cell phone and most of the students use Facebook, Instagram, Twitter, Snapchat, Viber and Whatsapp. They use social media for fun, to send photos, videos, to express themselves. Teachers are mostly familiar with social media platforms, more than half of them also have Facebook, Twitter and Instagram profile, some are also using Whatsapp.

4.3.2 Case study 2: Tom, 15

Tom15School context: High school in a small town. Most students come from upper middle class families and live in suburban areas. The local communities are close-knit, most students, parents and teachers know each other by name.

Case summary: One case of cyber bullying has happened so far: exclusion of a boy Tom, age 15. His peers were calling him names and making fun of him through Facebook. Tom was also bullied in person: two boys hit him in the stomach and threatened to do it again if he told anyone. One of the teachers has seen that incident (in person) and after asking the boy, Tom told her that he was also bullied through social media, mainly Facebook. After that, the homeroom teachers talked with the bullies: three older students aged 18. They denied that they did anything bad or wrong; they didn’t see it as hurtful, just as innocent jokes. They promised not to do it again.

But the question remains – do they really understand the harm cyber bullying can cause?

Initial investigation: After this incident, teachers wanted to know more about how students use social media. One of the teachers mentored a student research group which wrote a research paper on the topic: they did a survey among all students and found that students know and love to use social media, mainly Facebook, Instagram, Twitter, Snapchat, Viber, and Whatsapp. They use the applications and platforms to stay in touch with friends abroad or from other cities, to talk in groups, to send photos and videos to each other. Teachers mainly use and know only Facebook, less than half of teachers have their own profile social media sites.

4.3.3 Case study 3: Tina, 10

Tina10School context: Primary school in an urban setting.

Case summary: Tina (age 10) mentioned during one of her random conversation with her teacher that some unknown ‘boy’ was inviting her to meet up with him. They started talking through Facebook (he ‘added her as a friend’ and she responded, even though she does not know him in person). At first, he was nice and friendly, but after some time he started asking her to send him photos of her and pushing her to meet up in person. The teacher asked if her parents know and she said that “Of course not”, they don’t talk about that at home, her parents do not know/use social media, and therefore they cannot understand the situation. She does not think of the situation as problematic, she is just a little bit annoyed with that boy and not sure if she wants to meet up with him in real life.

Initial investigation: Social media and technology is popular in the school. Some teachers are very fond of Social media and use it daily. One of the teachers (Geography professor) made a survey and realized that more than 80 % of students are using social media. They use mostly FB, Instagram, Whatsapp, Snapchat. Teachers also started an official FB and Twitter profile of the school one year ago and are posting interesting photos, motivational quotes, videos, events on the wall. The profiles have cca. 500 followers. Most students have computers or tablets at home, about half of them have cell phones. Most students know about Social media and apps like Snapchat, Viber, Whatsapp, and about half of the students use them and have social media profiles. Teachers and students are “friends” on social media.

4.4.1 A sampling of cyberbullying laws around the world

Several countries across the globe have already developed seemingly effective cyberbullying laws. The strictest cyberbullying laws in the world are reported to be those found in Canada where under the Education Act individuals who engage in cyberbullying face suspension from school, and repeat offenders may also face expulsion from school and possible jail time. In United Kingdom, cyberbullying could result in six months or more in prison and a fine under the Malicious Communications Act. Certain states of the USA are also considered to have strict legislation with legal consequences ranging from monetary fines, charges of misdemeanour or imprisonment; whereas other US states have looser or no specific cyberbullying laws. Effective legislature is also reported to be in place in the Philippines and Australia.2

In Europe, most countries do not have specific cyberbullying laws, but there are a number of existing laws that can be applied in cases of cyberbullying. Some countries have specific measures for certain online behaviours (for example, cyber stalking is illegal in Poland). International law covers some of the problematic areas: Convention on Cybercrime and European Data Protection Legislation is now being applied to issues of cyberbullying, online harassment and identity theft. The European Commission has also formed agreements with 17 of the world’s leading social networks, including Facebook and MySpace, to stop online abuse and to better protect young people online.3

 

4.4 Legal Considerations in Combating Cyberbullying

Cyberbullying is a relatively new phenomenon. A need for anti-cyberbullying legislation is being recognized in many countries as cyberbullying can have serious consequences for individuals and communities. Many countries are beginning to recognize the emotional and physical harm that can result from cyberbullying and are designing protective measures and policies.2

Most legal definitions describe cyberbullying as:

  • Actions that use information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group that is intended to harm another or others.
  • Use of communication technologies for the intention of harming another person.
  • Use of Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or text messaging with the intention of harming another person.

 

4.4.2 Applicable legislature

Because the use of mobile and online communications has grown so rapidly and the crime is relatively new, many jurisdictions are deliberating over cyberbullying laws. However, if an online activity has indications or elements of a criminal act, existing laws should be considered, for example criminal law (assault, threats, harassment, protection of minors), civil law (defamation, data protection, consent), and in some cases regulations in special areas are also applicable (education, family, employment, human rights, data protection).

Cyberbullying is a serious problem, but not always illegal.

Cyberbullying is a serious problem and potentially extremely harmful. But in fact, a very small part of cyberbullying can be considered illegal activity. Most such behaviours are unacceptable behaviours that can and should be dealt with in the context of family and school environments.

However, at times cyberbullying incidents can have signs of criminal activity. We might believe there is a real threat to the target or the line toward harassment can be crossed. In such cases, local police departments or attorneys can be consulted to determine if the case should be reported to authorities.

It is important to realize that even if cyberbullying behaviours are not considered criminal acts, civil lawsuits may still be filed to determine the damage resulting from cyberbullying.

When designing policies and actions to fight cyberbullying, the applicable legislature should be considered. Specifically, school staff, youth workers, and parents should be aware which actions need to be reported to authorities.

4.4.3 Mandated reporting

In some cyberbullying cases, it may be advisable to inform the local police department or consult an attorney. Very few cases of cyberbullying are being reported to the police, and even fewer are found to have characteristics of criminal acts and are investigated, eve fewer are persecuted. However, it might be better to err on the side of caution.

In most European countries, professionals working with children are required to report to authorities if they suspect a child is being abused, in danger or if there is a criminal act being planned. This is called ‘mandated reporting’. Often, schools and organizations have procedures and rules in place for such situations. It is advisable to review such rules and consider how they might be applicable to cyberbullying.

‘Mandated reporting’ is when professionals working with children are required to report to authorities if they suspect a child is being abused, in danger or if there is a criminal act being planned.

It might be difficult to assess if an incident or behaviour needs to be reported to authorities, especially in the context of cyberbullying. Some questions to consider are: Was the child physically or psychologically harmed in the incident? Does the incident pose a future threat to the wellbeing of the child? Would a reasonable, impartial person believe that there is a serious threat? Is there anyone that can be consulted? Often police officers specializing in child protection or cyber-crime are happy to help you discern if the case should be reported, or a national agency dealing with cyber safety might be able to provide some insight.

Lack of awareness about reporting cyberbullying can be detected in many settings. For example, a study of national-level guidelines for cyberbullying prevention and intervention in 27 European countries1 found that whereas the importance of maintaining privacy and the need for reporting procedures were mentioned in around 50% of the guidelines, only about one-third included references to reporting incidents to the Police.

4.4.4 Social Media Rules and Terms of Use

Even though not all cases of cyberbullying can be considered criminal acts and although not every case needs to be reported to the police, cyberbullying should be reported to the platforms used to carry out the abuse.

Most social media providers have clear rules and terms of use deeming cyberbullying as unacceptable and a violation of terms of use. Most social media also have easy, anonymous reporting systems. For most social networking sites, the general reporting address is: [email protected]

Social media tend to take reports of cyberbullying and other forms of online abuse very seriously. In most cases, the site will take down the offending content and sometimes ban the bully from using the site. They also have resources to track activities, restore deleted content and identify the bully, although this information might not be available unless specifically requested by authorities.

The key step is to teach young people to be aware that social media they use have rules about acceptable online behaviour and terms of use that need to be followed. Not complying with these rules can have consequences. Cyberbullying is not acceptable online behaviour, and if they see it, they should report it right away. The site will take down the content and they can feel good knowing that they took assertive action to help stop cyberbullying.

5. Our approach

In previous chapters, we encountered how young people live their lives merged with social media and  which are the posing risks of this kind of a lifestyle. We presented cyberbullying and recommendation for lessening its effects in the school environment.

In the project Joining Forces to Combat Cyberbullying in Schools, we tested different approaches of to tackling cyberbullying and compared them  with conclusions and researches of previously implemented projects. Based on our conclusions we believe that we can only stop cyberbullying  with a holistic approach that entitles:

  • raising problem awareness of cyberbullying,
  • promotion of safer behaviours and changing the attitude of all involved parties towards cyberbullying,
  • minimising risks in specific groups of young people,
  • trainings for school staff and
  • interventions in specific cases of cyberbullying.

This approach addresses three target groups whose behaviour affects at most the occurrence of cyberbullying in the school environment:

  • pupils,
  • school staff and
  • parents.

This chapter represents the core of this publication. Interlinking knowledge about cyberbullying, youth and social networks (more detailed presentations can be found in previous chapters) with concrete measures and guidelines for implementation (which are presented in next chapters).

5.1 Measures on Different Levels

The World we live in consists of different subsystems. Each individual has certain genetic predispositions, lives in a specific family and grows up in a unique local environment with all its specifics. He attends school with a specific subculture, becomes friend  with certain people and with them develops specific activities. His behaviour and attitude towards cyberbullying can be influenced by all of those predispositions.  Some have more effect and others less, some can have a bad, others a good influence and the amount and connotation can differ from a person to person. It is not enough to change individual attitude and behaviour (we can do that with education,…). For an efficient change, we need to address everything around him, all categories and subsystems.

Socio-Ecological Model

Source: http://www.balancedweightmanagement.com/Socio-Ecological%20Model.jpg

Socio-ecological model recognises various levels of addressing social problems: individual, interpersonal, organisational, community, and public policy.

Approaches on different levels require specific unique unalike strategies. As with all others issue it is usually easier to tackle them on lower levels (individual, interpersonal) and most cyberbullying prevention project is presenting educational workshops and raising youth awareness as their main outcome.  Addressing the higher levels can require more sources, more time and a higher level of professionalisation.

A set of actions presented in this manual is primarily focusing on the organisational level.

Addressing these levels automatical includes tackling all the lower levels as well, individual and interpersonal.

We chose organisational level because it:

  • feels the most natural for prevention of cyberbullying in the school environment (don’t forget schools are organisations as well),
  • exceeds and upgrades outreach of most other projects about preventing cyberbullying,
  • allow us to show strong points of project partners (school access, the ability to address various target groups,…).

The project has certain effects also on the community level (cooperation project partners and schools in the coalition, creating a joint knowledge) and on a public policy level (action proposals).

The project has certain effects also on the community level (cooperation project partners and schools in a coalition, creating a joint knowledge) and on a public policy level (action proposals).

5.2 Our Philosophy

The aim of Joining Forces to Combat Cyberbullying in Schools project was

To change school cultures towards bullying-free zones through addressing the challenge of cyberbullying from different angles and through the combination of different actions.

During the implementation of pilot activities in the project, several principles stood out, that would apparently be important when addressing the challenge of cyberbullying in schools.

  • Promotion, prevention and intervention. Cyberbullying should be simultaneously addressed using various strategies: informing stakeholders about its forms and potential risks, implementing preventive actions and interventions in occurring
  • Community Building. Different stakeholders should be addressed and included: pupils, parents, teachers, social workers, youth workers and NGOs.
  • Building Competences. The key to our project is in developing people’s competences (knowledge about cyberbullying, skills connected with recognising and preventing it and building a healthy attitude towards cyberbullying). Active participation of all stakeholders is needed to address the issue.

5.3 Measures

Following these principles, 4 measures have been developed and tested. Together, they form a system of measures prepared to implement in a specific school culture.

  1. Awareness raising. Informing stakeholders (mainly pupils, teachers and parents) about forms of cyberbullying, recognising it and its possible consequences (Chapter 6)
  2. Mediation Clubs. Small groups of pupils meeting regularly and being active to speak about cyberbullying and prevention of it (Chapter 7)
  3. No blame approach. Training for teachers to use this specific methodology in cases of intervention when cyberbullying appears (Chapter 8)
  4. Creativity Groups. Offering pupils to use social media in a different way. Promoting positive use of social media through creativity clubs and creativity camps (Chapter 9)

Each of individual measures focuses on more fields like promotion, prevention and intervention.  But each acts primarily just on one.

Promotion Prevention Intervention
Awareness raising X
Mediation Clubs X
No blame approach X
Creativity Groups X

As an actor in the school environment with its specifics needs and challenges, you can focus on one, two, three or all four of proposed measures. The decision is yours. In the frames of project, we also implemented two additional measures, that can help you:

  • Training of Multipliers. Within the project, we educated 20 multiplicators, that are entering school environment from inside or outside and are helping school staff on implementation of provided measures. Their typical tasks are implementations of awareness raising, education of school staff, facilitation of mediation clubs and leading creative groups,…
  • Social Media Campaign on Cyberbullying. Campaign’s main focus are parents and school staff and transmits messages that are presented in the table
TG1: Parents TG2: School staff
Aim 1: the phenomena of Cyber Bullying and its consequences. There is bullying going on in social media. Some teenagers suffer. Probably your kid was already part of cyberbullying – in one way or another. Bullying and cyberbullying exist in nearly every classroom. If it escalates, you could have many problems. Prevention is a key to success.
Aim 2: proper use of Social Media Your teenagers are well equipped with technical skills but they lack social skills on social media! Learning to use social media is not only about technical skills. It is also about social skills.
Aim 3: possible strategies to combat Cyber Bullying. Pay attention to symptoms of possible cyber bullying. Symptoms are … There are many ways to address cyberbullying in schools: promotion, prevention, intervention.
Aim 4: possibilities this project will offer them in the future. Your kid could visit a summer camp about cyberbullying, he/she could also attend some mediation courses and obtain these skills. You can get trained in NBA skills. You can facilitate a mediation club in school / become a mediator yourself or train peer mediators.

6. Awareness Raising

Based on school testing in schools within the project “Joining Forces to Combat Cyber Bullying in Schools”, we are suggesting a holistic combined approach which we presented in the fifth chapter. It consists of four activities: Awareness Raising, No Blame Approach, Mediation Clubs and Creativity Groups.

And in this chapter, we will introduce you to our first activity: Awareness Raising. It is focusing on three target groups that are most involved in cases of cyberbullying in the school environment: student, school staff, and parents.

We are presenting two implementation plans of awareness raising with students – one that takes half to one working day and the other that can be implemented in a short workshop. We also prepared a program for school staff and another one for parents and at the end you can find suggestions for additional activities, that you can use if needed.

Methodological notes

The time of awareness raising activities will probably be short and the number of participants high. However, it is strongly suggested to find ways to interact and start a dialogue with the audience in order to engage them in the lesson and especially push them to come out with their own idea before we explain our point of view.

We recommend the use of some short videos to break the flow of the lesson and keep their attention on a high level. Some suggestions include:

  • the mind reader: (Virus, hacker, and data safety)
  • Little Red on Facebook: (privacy)
  • the sheep series: http://www.sheeplive.eu/
  • guess who:

6.1 Meeting with students 1

Duration:

4-5 hours

Program Time Material
Warm welcome, presentation of the trainer team, objective of the activity, presentation of the students Up to 30 min circle of chairs, flipchart, moderation material – should be organized beforehand!
Expectations of the day of the participants

Division into groups up to 4, 5 min discussion, group chooses 5 expectations and visualizes them on cards (per card only one expectation), Groups share their results – team wraps up

15 min cards, markers, scotch, pin board
Overview of media usage and equipment
Oral exchange in a big circle:

  • what are you using regularly?
  • what are doing exactly? Playing, internet surfing, chats etc.?
  • which social networks are you using?
  • which websites are most interesting for you?
10 min circle – plenary
Exchange of the danger of using the net – “to carve out” the disadvantages – group work:

  • What do I know – what can happen? What has happened already to persons I know, to me…?

Each group writes the experiences on a flipchart as a list or mind map and presents it
Alternative: pairs who will exchange experiences more in depth and then come together with another pair – they write the paper without telling the stories again – only facts – and then present

30 min
markers and flipchart paper
Break 15 min
Transfer of perspectives – opinion barometer

Group will listen to statements and every individual decides which position reflects his/her personal opinion – the team will ask some students representing different positions for their reasons – the other students only listen – no discussion

After some statements and listening to arguments, the students will take their seats again and the team will raise open questions:

  • What have you experienced?
  • How did you assess the arguments of the others?
  • How come that perception is so different?
30 min Prepared statements
line with comments
Verbalisation of a definition of cyber-bullying by listening to a little story – presented by the team

Plenary: what does cyberbullying mean?

Brainstorming and the team will pick the main elements to formulate the definition with the agreement of the students

15 min Flipchart and the story in your country language
Deepening of knowledge of different perspectives:

  1. Show the video clip “ Let´s fight it together” for only 5 minutes and then stop. Cards of the different roles will be placed in the room and the students are asked to imagine the different roles (Joe, Kim, teacher, mother, bystander)

  • How does X feel in the clip?
  • What do you think what could be his/her wish?
  • What can he/she do to change the situation?

  1. Show the rest of the clip – notice the atmosphere in class and reflect the situation: “I observe you are a little bit shocked,…we will go on and you can express what you think.”

Students take turns to slip again into the different roles. The team doesn´t comment at this point.

Students who approach Kim´s card will be asked:

” Why is Kim doing this, what do you think?”

The question to the bystander role: “ Why do they join in, what could be their motivation?”

Question for the observers: “What hindered the observers to intervene in favor of Joe?

Summary of the team, students are asked to let go of the roles.

20min

 

 

 

 

 

 

 

 

25min

Internet-connection , beamerRole cards with the name of the actors of the videoclip
Long break

 

30-60 min
Energizer 10 min
Development of strategies to react in situations of cyberbullying and prevention – students will be divided into two-three groups, parallel group work sessions and presentation – the other group can add ideas and propositions. 30min
Evaluation and feedback. How was the day – looking back to the expectations and giving space to express impressions and feelings? In addition, students could be asked to write a letter to themselves where they reflect how they will react in the future in case of cyberbullying. Letters will be collected by the team and send to them later by post.

The team will cordially thank the students for their participation and input.

20 min Feedback questionnaires if wanted
Lists of links and material should be prepared for the students.

A follow-up session after 2-3 weeks would be appreciated to enhance the motivation to fight cyberbullying.

Possible questions:

  • Has the project day changed your attitude/perception?
  • Was the project day helpful to prevent cyberbullying?
  • Any other ideas to fight cyberbullying?

6.2 Meeting with students 2

Duration:

90 minutes

Aim:

  • Inform the students about the on-going project
  • Help students to realize how little they actually know about the web
  • Help students to think about the consequences of their on-line behavior
  • Inform students about “Cyber-bullying” and how we expect to face it through this project
Program Time Details
The project 10 min What is this European project about?
Which other countries are working together with us?
Introduction: what is the Internet? 15 min Question and interaction to warm up:

  • Is the Internet virtual or real?
  • Do we really know what the internet is?

(What is the “Internet”? When was the Internet born? How can the information “run” to the other part of the world in less than a second?…)

  • Is the internet good or bad?

(What are the best use and the worse?)

Conclusion and message:

The Internet is not virtual at all… it is the biggest communication network ever existed, based on a huge number of infrastructures (servers, fiber-optic cables, ocean cables, antennas…) and services companies with thousands of employees and billions of real people connected to it.
It represents the biggest archive of information ever and is constantly growing.

Good or bad? It can be both very good and very bad… it’s up to us, and the way we choose to use it. We all are responsible for making it a better and useful place.

Overview of the main “web-safety” issues 20 min Question to kids

  • What behaviors can be risky on the Internet?

Presentation (each topic may be associated with a catchy image and a keyword)

  • Virus
  • Privacy (image of the “social toilet”)
  • Personal data exposure (image of tooth-brush-passwords)
  • Masquerading (Do we know who is behind?)
  • Insulting and hate speech
  • Addiction
  • Outing (diffusion of embarrassing information and photos)

Conclusion with interaction and message:

  • Why do we take risks on the web?

(because we don’t know the consequences because we feel smarter because we follow the “crowd”, or the fashion of the moment, lack of EMPATHY…)

Cyberbullying 20 min Presentation of the topic

  • What is cyber-bullying?
  • What is the difference between traditional bullying? (why can the consequences be much worse)
  • How to protect ourselves
  • How to react (the role of the victim and of the group)
  • Examples (raising of empathy)

Conclusion and message:

Cyber-bullying is not a game. It can happen to anyone. Everyone is responsible for stopping / reporting it to reduce the damages. Empathy is a key point: if we put ourselves in the victims´ shoes than we can understand there is no excuse not to act against it.

Conclusions 15 min What we can do together:

  • The mediation club, soon to be active in school: a team of students who will be trained to support their classmates to solve conflicts non-violently by offering a mediation which enables students to find fair solutions in case of conflict.

(suggest not to mention NBA approach in this context since this is more useful for Teachers and Parents)

  • Promote a better climate in school
  • Promote a positive use of the web
  • Become a positive “digital-community”
Conclusions 10 min

  • Discussion of activity calendar
  • Question & answer time

6.3 Meeting with Teachers

Duration:

90 minutes

Aim:

  • Present the project to the teachers
  • Share with teachers an overview of the risks and the social issues related to web use
  • Inform teachers about cyberbullying issues and collect their opinion and stories
  • Motivate teachers to be an active part of the project
Program Time Details
The project 10 min What is this European project about?
Which other countries are working together with us?

Presentation of the general goals:

  • Promoting a better climate in the school
  • Promoting a positive use of the web
  • Become a positive “digital-community”
Introduction to topics and dialog 15 min  Question and interaction to warm up:

Are students more experts than adults in Internet use?

Is the Internet mainly a positive or a negative invention? Why?

Can we (as adults and educators) support students to prevent and solve problems related to internet misuse?

Conclusion and message:

The Internet has a great potential for students learning, but can also be a significant source of distraction and risk if not used with awareness, creative and constructive approach. Teachers and educators may have an important role in this field through a variety of strategies of promotion, prevention, and intervention.

Overview of the main “web-safety” issues 15 min Quick overview (each topic may be associated with a catchy image and a keyword)

  • Virus (mind your clicks)
  • Privacy (image of the “social toilet”)
  • Personal data exposure (image of tooth-brush-passwords)
  • Masquerading (Do we know who is behind?)
  • Insulting and hate speech
  • Addiction
  • Outing (diffusion of embarrassing information and photos)

Conclusion and message:

Why do students take risks on the web?

(Because they are in the “exploring” age because they don’t know consequences, because they feel smarter, because they follow the “crowd” or the fashion of the moment, because of lack of EMPATHY…)

Conclusion with interaction and message:

  • Why do we take risks on the web?

(because we don’t know the consequences because we feel smarter because we follow the “crowd”, or the fashion of the moment, lack of EMPATHY…)

Cyberbullying 25 min  Presentation of the topic 

  • What is cyber-bullying?
  • What is the difference between traditional bullying? (why can the consequences be much worse)
  • Examples (raising of empathy)

What can we do as educators (teachers or parents)?

  • talk about theuse of the digital media with youngsters: this can also help to keep updated with the technologies they use the most
  • Set rules (can be discussed together, but once approved should be followed)
  • Keep the dialogue open: besides the rules, youngsters should know they can refer to adults if something goes wrong, and they will get help, not blame.

    Conclusion and message:

    Cyber-bullying is not a game. It can happen to everyone.

    Every student should feel responsible for stopping / reporting it to reduce the damages.

    Empathy is a key point: if students put themselves in the victims´ shoes then they can understand there is no excuse not to act against it.

    It’s very important that kids know they can talk with adults when something happens: “we all are in the same boat!”

Project details 15 min The activities of the project:

  • The mediation club: a team of students who will be trained to support their classmates to solve conflicts non-violently by offering a mediation which enables students to find fair solutions in case of conflict.
  • No Blame Approach:a way to reduce bullying and cyberbullying acts and their consequences, by asking all the students involved (on different levels) to contribute to changing the situation of the bullied child to the better and take responsibility to restore a positive climate

This approach requires not to “blame” (= publicly accuse) the “bully”right away but rather try first to involve him in the problem solution. This is an important point which Teachers and Parents should discuss(especially) and agree on before starting to apply it.

Conclusions 10 min

  • Discussion of activity calendar
  • Question & answer time

6.4 Meeting with Parents

Duration:

90 minutes

Aim:

  • Present the project to the parents
  • Share with them an overview of the risks and the social issues related to web use
  • Inform parents about cyberbullying issues and collect their opinion and stories
  • Motivate parents to keep informed and be an active part of the project
Program Time Details
The project 10 min What is this European project about?Which other countries are working together with us?
Introduction to topics and dialog 15 min Question and interaction to warm up:

Are students more experts than adults in Internet use?

Is the Internet mainly a positive or a negative invention? Why?

Can we (as adults and educators) support students to prevent and solve problems related to internet misuse?

Conclusion and message:

The Internet has a great potential for students learning, but can also be a significant source of distraction and risk if not used with awareness and a creative and constructive approach. Teachers and educators may have an important role in this field through a variety of strategies of promotion, prevention, and intervention.

Overview of the main “web-safety” issues 15 min Presentation (each topic may be associated with a catchy image and a keyword)

  • Virus (mind your clicks)
  • Privacy (image of the “social toilet”)
  • Personal data exposure (image of tooth-brush-passwords)
  • Masquerading (Do we know who is behind?)
  • Insulting and hate speech
  • Addiction
  • Outing (diffusion of embarrassing information and photos)

Conclusion and message:

Why do students take risks on the web?

(Because they don’t know the consequences because they feel smarter because they follow the “crowd”, or the fashion of the moment, lack of EMPATHY…)

Conclusion and message:

Why do students take risks on the web?

(Because they are in the “exploring” age because they don’t know consequences, because they feel smarter, because they follow the “crowd” or the fashion of the moment, because of lack of EMPATHY…)

Conclusion with interaction and message:

  • Why do we take risks on the web?

(because we don’t know the consequences because we feel smarter because we follow the “crowd”, or the fashion of the moment, lack of EMPATHY…)

Into Cyberbullying 25 min Presentation of the topic

  • What is cyber-bullying?
  • What is the difference between traditional bullying? (why can the consequences be much worse)
  • Examples (raising of empathy)

What can we do as educators (teachers or parents)?

  • talk about theuse of the digital media with youngsters: this can also help to keep updated with the technologies they use the most
  • Set rules (can be discussed together, but once approved should be followed)
  • Keep the dialogue open: besides the rules, youngsters should know they

can refer to adults if something goes wrong, and they will get help, not blame.

Conclusion and message:

Cyber-bullying is not a game. It can happen to everyone.

Everyone is responsible for stopping / reporting it to reduce the damages.

Empathy is a key point: if we put ourselves in the victims´ shoes then we can understand there is no excuse not to act against it.

It’s very important that kids know they can talk with adults when something happens: “we all are in the same boat!”

Project details 15 min The activities of the project:

  • The mediation club:a team of students who will be trained to support their classmates to solve conflicts non-violently by offering a mediation which enables students to find fair solutions in case of conflict.
  • No Blame Approach a way to reduce bullying and cyberbullying acts and their consequences, by asking all the students involved (on different levels) to contribute to changing the situation of the bullied child to the better and take responsibility to restore a positive climate.

This approach requires not to “blame” (= publicly accuse)the “bully” right away but try first to involve him in the problem solution. This is an important point which Teacher and Parents should discuss (especially) and agree on before starting to apply it.

Conclusions 10 min

  • Discussion of activity calendar
  • Question & answer time

6.5 Activity Suggestion: Bullying – Gray area – No bullying

Duration: 

30 min

Target group: 

applicable for classes or groups of teachers, 5 – 25 persons

Aim: 

Participants will be stimulated to classify negative behavior patterns into 3 groups: bullying, gray area, no bullying. This is a preparatory activity for the introduction of the definition of (cyber)bullying. It intends to sharpen the ability to distinguish between negative behavior and bullying.

Materials:

prepared cards, each describing one behavior, moderation cards

Instruction for implementation:

The facilitators have prepared small cards, each describing a behavior pattern and distribute these among the participants. Depending on the size of the group participants receive one or two cards. They have also prepared moderation cards  which will be placed on the ground in order to separate three different fields: Bullying/  Gray area/ no bullying.  Participants are asked to read their card aloud and place it into the field they consider correct with a short explanation.

Behavior

  • insulting looks
  • to talk behind so. back
  • to exclude so. (e.g. from a soccer game)
  • to mock so.
  • to take  sth. from a classmate
  • to spread theembarrassing news
  • verbal threats
  • to have a negative view of things
  • to make jokes
  • to quarrel
  • to not invite so.
  • to inflict damage on so.
  • to incite classmates
  • to publish embarrassing material of another person on Facebook, Instagram etc.
  • not to go to a birthday party although he/she has been invited
  • physical attacks
  • to refuse to sit next to so.
  • to blackmail so.
  • to ridicule so. because of looks to damage books, pens … from so. else

to damage books, pens … from so. else

Evaluation procedure:

The facilitator will point out that there will probably be differences in the judgment of the participants what can be identified as bullying. The next step is to introduce the definition of (cyber)bullying, underlining the difference between a conflict/quarrel

7.1 Context of the No Blame Approach

The No Blame Approach (NBA) has been developed in the beginning of the 1990-ties in England by George Robinson, long term headmaster of a school for children with behavioral disorders and Barbara Maines, school psychologist. They were looking for a constructive method to fight bullying in the case of a teenage boy whose teacher had asked them for help as Maines and Robinson describe in their publication: Crying for help – the No Blame Approach to Bullying: “We wanted a strategy that was safe, did not accuse, interrogate or alienate young people. We wanted a process that would improve relationships between young people and the adults working with them.” 1

Source: http://www.no-blame-approach.de/
Source: http://www.no-blame-approach.de/

Up to then different bullying intervention tools have been applied which foresaw severe consequences for the bullying student. However, punishment and negative consequences did not necessarily improve the situation for the bullied child but also carried the danger of revenge. So Barbara Maines and George Robinson designed a concept which did not focus on punishment but rather on the belief that, if group dynamics in a classroom changed – meaning that the bullying actions would no longer be considered cool or funny by the other classmates – the bully will change his behavior and stop bullying. The NBA takes the fact into consideration that bullying is not just an interaction between the offender and the victim but rather a situation where a whole group, in this case a class is involved. The bullying activities are being watched by others – and in a lot of cases it is the open or silent approval of the others which encourage a bully to continue. An intervention which leads to the withdrawal of support for the offender by bystanders or silent students will have an impact on this student.

And the results of the NBA intervention proved that it worked. In most cases the bullying was stopped.

Barbara Maines and George Robinson had the chance to apply the No Blame Approach and teach it in workshops in hundreds of cases, vividly described in several publications. 2

By now the No Blame Approach is used in the following countries: New Zealand, Switzerland, the Netherlands, Belgium and Germany.

7.2 Theoretical background

Source: <a href=
Source: http://www.gordontraining.com/thomas-gordon/

The development of the NBA was inspired by the ideas of Thomas Gordon, an US-American clinical psychologist who became well known with his publication: “Parent Effectiveness Training”, a plea for a nonviolent education. It also represents a systemic approach, involving several members of a class in a change process. The systemic approach was introduced by the US-American therapists Steve de Shazer and Insoo Berg and their team at the Brief Family Therapy Center in Milwaukee. The therapists were convinced that individual behavior changes in a system (a group) influence the functioning of the whole group.3 Consequently, a shift in behavior of some group members will have an impact on the other ones. Another important aspect is the future and resource – orientation.  The idea is not to look back and not to analyze reasons for behavior patterns. It tries to create a setting which enables looking for solutions. The attitude of the teacher is to initiate a change in behavior. The bullying student will not be confronted with his wrongdoing (“no blame”) but he/she will be integrated into a group process to improve the situation for the victim. Resource orientation means that the bully is not only perceived as a deviant person but also as someone who has shown positive character traits before.

In case of bullying, this process can be initiated by the class teacher or another teacher who knows the class well, a social worker or school psychologist.4 Often the teacher has observed a change in behavior of the bullied student, parents turn to the teacher or bullying activities are reported by others. Since the NBA is working without blame the wording will also be changed, the teacher will address the victim as affected student and bullies will be called protagonists or actors. The process consists of 3 steps:

    • A talk with the affected student
    • A meeting with a selected group of students of the class (neutral students, actors and bystanders) which is called “support group”
    • Follow-up meetings with the affected student and the members of the support group.

 

7.3.1 Meeting with the affected student

The first meeting with the affected student is crucial. The teacher expresses his/her concern about the situation, assures the student that he/she will take initiative to help him or her and conveys confidence that the situation will change. By doing this the teacher signalizes first of all that he/she knows about the bullying and is determined to intervene. Bullying is an unacceptable behavior and will not be tolerated. Secondly, the teacher tries to build up trust that the situation can change – like in a lot of other cases of bullying. In the course of the talk, the teacher asks for the names of the bully(-ies) and bystanders on the one hand and for the names of friendly students on the other hand. He/she explains the following steps and asks the affected student to watch out for positive signals from other students during the next days. There will be a follow-up meeting after 8 – 14 days (depending on the age of the pupil).

The teacher informs the parents of the affected student about the intervention (see also comment: Parents and the No Blame Approach). Parents can contribute a lot to the success of the NBA by being positive about it and not insisting on sanctions. Research has shown that parental intervention (addressing the bully themselves or contacting the parents of the bully) leads to an aggravation of the incidents and is most likely contra productive.5

7.3.2 Meeting with the support group

The second step (and most challenging) one is the meeting with the “support group”, consisting of the bully(ies) and colluders/bystanders on the one hand and friendly students on the other hand (6-8 pupils). The students receive an individual invitation for a meeting during classes. There needs to be a close consultation with the teacher whose lesson is concerned. The support group meets in a separate room.  Initially, the teacher expresses also here his/her deep concern about the fact that one of the students is being bullied and clarifies that this is an unacceptable situation which needs to be changed. He/she tries to arouse empathy with the affected student. Then he/she is going to ask the students for help to overcome the bullying and addresses them as “experts” for the situation in class. This expresses the explicit difference to other bullying interventions.

The view is future oriented; students are treated as potential supporters/subjects of a change of group dynamics.

This attitude also involves the protagonists, in a setting where it is obvious that the teacher knows who is bothering whom it will not be possible for the bullies to just continue. They are observed by teachers and classmates. But – and this is the big chance for them:  stopping the deviant behavior now also means not being punished plus having the chance to re-define their role in class, it is face saving. The teacher explicitly mentions a positive skill each of the students has, including the bullies, focusing on resources rather than on deficits. The next step is to ask the students to come up with concrete ideas how to help/support the affected student X. What can be done? (E.g. walking X home, inviting X, spending time with X…) The teacher takes notes of the ideas on a flipchart/ blackboard and adds the names that are responsible for what.  In the case of the protagonist(s), it is sufficient to say: I will stop bothering him/her.

Finally, the teacher thanks the students for their constructive ideas and support and finds a date for follow-up meetings.

7.3.3 Follow-up meetings

The first meeting will be held with the affected student in a separate room. The aim is to find out whether the situation has improved. What has happened? What was different? How does he/she feel now?  Is there anything else that he/she needs or wants?

If the answers are positive, the bullying has stopped and classmates are friendly and supportive the NBA was successful.  The teacher will thank the student for the trust and invite him/her to turn to him/her in case of difficulties.

However, if this is not the case, the teacher will announce a second meeting with the support group and assure the student that he/she will continue to take care of the problem.

After the meeting with the affected student the teacher meets the members of the support group individually. He/she asks for an estimate how the affected student is feeling now.  Have things improved?  What did you notice? Were you able to contribute?  Do you have any other ideas what can be done? In case of a positive course (the bullying stopped) the teacher expresses his thankfulness about the constructive role the student played. In case of an unsatisfying development the teacher announces another meeting of the support group in order to reflect the effectiveness of measures and develop new ideas.

In most cases a second round can attribute to an improvement of the situation of the affected student.

Nevertheless, in case of a failure, other measures should be considered.

7.4 The No Blame Approach and cyberbullying

As pointed out in chapter three, in a cyberbullying case it might be difficult to identify the bullies unless the authorities are contacted to find out the IP address. Also, the provider can be contacted to take down the website. But even in a situation where it is not clear who is the wrongdoer, in the beginning, the No Blame Approach can be applied. A cyberbullying attack can harm the affected student much more since it is a 24/7 harassment visible for anybody in the net. In this situation, it is extremely important for the affected student to receive help and support by peers and classmates to avoid a complete withdrawal of the affected student. The support group needs to be sensitized for the devastating effects cyberbullying has on the affected student, can agree to delete the film etc., openly demonstrate solidarity and empathy. It can be agreed to conduct an awareness-raising workshop with the whole class or take other measures to prevent a future case.

Sometimes there might be a suspicion who is responsible for the act. in this case, the potential bully should be invited into the group. One possibility is to set a deadline for deleting the offending messages/website (the same day). If the bully is known he/she will also be invited to join the support group. Deleting the message/film/website etc. is mandatory.

If the cyberbullying has caused severe psychological and personal damages further steps need to be taken to stabilize the student (e.g. counseling, therapy).

7.5 Why is it good for teachers to know and apply the No Blame Approach?

The fundamental idea of the NBA is to have a tool at hand which significantly improves the possibility to stop bullying. Punitive measures always carry the danger of revenge on the part of the bully, a vicious circle of fear and harm. Measures like swapping the class, especially if the victim is asked to change classes, are disadvantageous for the student. The NBA offers the chance to correct an unbearable situation by protecting the affected student with the support of classmates plus initiating a behavioral change of the bully and establishing a more peaceful atmosphere in class. Empathy will be fostered. A student, grade 7, expressed in a follow-up meeting: “If I were bullied I would also feel awful therefore I won´t bully anymore.” 6

A survey conducted in 220 German schools who work with the NBA has shown that the bullying was stopped by the NBA intervention in 192 cases (87%). 7

Ideally, the NBA is not a single tool in school but is embedded in a set of measures e.g. the mediation club, awareness raising activities and other (preventive) programs.

7.6.1 Informing the headmaster and colleagues

The headmaster and other teachers will be informed in detail about the steps of the concept, the philosophy of the approach and organizational conditions. The fact that this is a non-punitive tool will certainly provoke discussions amongst the teachers. Often the approach is accepted but not applied by all teachers. If this is the case it is important to ensure a general support of the application even if not every teacher agrees that he/she will work with the NBA. The application can also be delegated to a convinced colleague who knows the class. It should be agreed on that open dissent should not be expressed. However, the support of the headmaster is crucial for a successful implementation.

Sometimes the whole teaching team is interested in participating in the NBA workshop which is an opportunity to fully understand the program.

Many schools have developed their own profile, the “school program”. It might be considered to officially include the NBA and other possible tools of constructive conflict resolution into the school program.

7.6.2 Informing the parents

In several countries there are regular meetings of the class teacher and the parents. A meeting is a good opportunity to inform the parents about the introduction of the NBA in case of bullying at school. Sometimes parents are also interested in attending a NBA workshop if possible.

If a meeting is not scheduled for the near future parents should be informed in written form to explain the approach. It is advised to inform the parents of an affected student in a concrete case.

Annalena Scholz, teacher at the Aloisiuskolleg in Bonn: Before the introduction of the NBA it was important to inform all colleagues and the principal to gain their support. And the concept works. We are able to stop difficult bullying situations. It was also important to explain the approach in detail to the parents of bullied children.”8

7.6.3 Organization

What is required: a room where the meeting with the affected student and the support group can take place without interruptions, a flip chart or blackboard, a circle of chairs, duration: Approx. 20 minutes meeting with the affected student, 30 – 40 minutes meeting with the support group.

The NBA is a tool which does not need a lot of preparation. What is essential is a room for the meetings with the affected student and the support group where no interruptions are allowed during the meetings, a corner somewhere in another room is not acceptable. If possible there should be a flipchart or a blackboard where the teacher can collect the ideas of the support group. Everybody should be able to look at each other, so a circle (with or without tables) is a good solution.

There should be close communication between the teacher who will apply the NBA and the teacher who is teaching in class. He/she has to be informed that 6 – 8 students will participate in the support group meeting.

At the end of the chapter interested teachers can find guidelines for the three steps of the concept.

7.7 Guidelines for a teacher training

Duration:

7,5 hours including lunch break and short coffee breaks

Materials:  (What is required: depending on the size of the group)

A circle of chairs (no tables),
1 larger room and a smaller room,
1 flipchart,
2 pin boards,
prepared flipchart papers (see the material in the following chapter),
moderation material.

target group-01 Group size:

6 – 10 participants: 1 trainer
11 – 18 participants: 2 trainers

Instruction for implementation:

Multipliers who want to offer a No Blame Approach workshop need to have participated in a workshop before or already have experience in applying the approach, e.g. teachers, social workers. The workshop members can be a team of one school or a mix of teachers (social workers, psychologists) from different schools, sometimes one or two parents are also interested and can be included. Handouts with instructions (e.g. guidelines for the meetings) have to be prepared.

An example of a possible structure of a one-day training of the No Blame Approach including samples of flipchart visualizations is added.

7.8 No Blame Approach Workshop: Sample Agenda

Duration:

1 day

Group size:

6 – 16 participants/ 1 or 2 trainers

 

Exercise, handout number Time Method Material
Welcome, introduction
Previous experiences with bullying interventions (positive/negative)
20 min  

 

Flipcharts:A - welcome
Agenda 10 min Flipcharts:B Agenda for the workshop
Understanding bullying
How do I recognize bullying?
“Bullying glasses”
40 min Groups of 2-3
Collection of points on pin board
Flipcharts:
C Understanding Bullying 3D-Bullying glases
Definition of (cyber) bullying 5 min
 Flipcharts:
E - definition of bullying 4abF-Definition of cyberbullying 4c
Break 15 min
The Bullying system

The Characteristics of the No Blame Approach

Steps of the NBA

30 min
Flipcharts:
G-bullying system 5H-the no blame approach 6
I-steps of the process 7Flipchart_08
Preparation 1st role play: meeting with the affected student


 

 90 min Groups of 3
O-meeting affected student role play 13P-observation role 14
Lunch 60 min
Preparation 2nd role play: meeting with the support group (H12, H13, H14)


 

 120 min Depending on the group size: 1 or 2 role plays (parallel)
Flipcharts:
Flipchart 15Q-meeting with the support group 16
R-express personal concern 17S - dealing with accusations 18

SAM_0040

Handouts: guideline, evaluation

Teachers handout 3: Guideline meeting with the support group

Break  15 min
Follow up meetings with affected student and support group
How to continue?
Flipcharts:
U- follow up meetings 20V-with members of the support group 21

Parents and the NBA
Open questions
Handout: Parents
Evaluation
Goodbye

Comment: This is a possible agenda for a 1-day-long workshop. If there is more time available, the trainers can include additional activities or exercises (see: Additional material).

7.8.1 Welcome, introduction

Duration: 

approx. 20 min

Aim: 

Getting to know each other, participants are sharing their motivation for attendance, reflection of previous experiences with bullying situations.

Materials:

Flipchart No. 1, (flipchart samples see additional material)

Instruction for implementation:

After welcoming the participants the facilitators make sure that everyone gets the chance to introduce him/herself in case they have not met the others beforehand. They ask for the motivation to attend the workshop and how long the teachers have been teaching at their school.

Next questions:
Who of you had to deal with/solve a concrete case of bullying in your class/ at your school?

  • Looking back, were you satisfied with the outcome?
    If yes, what did you do exactly? Which measures did you take? What was successful?
    If no, what do you think, why the intervention didn´t work?
Source:

  • Fairaend, Heike Blum and Detlef Beck, No Blame Approach Workshop, Handbuch für Trainerinnen und Trainer 2010, translated and partially revised by Beate Roggenbuck

Further reading:

  • Heike Blum, Detlef Beck, No Blame Approach Praxishandbuch 2010
  • Heike Blum, Detlef Beck, Eltern und der No Blame Approach, Ergänzung zum Praxishandbuch, 2013
  • George Robinson, Barbara Maines, Crying for help – the No Blame Approach to Bullying, 2000
  • George Robinson, Barbara Maines, Bullying – A complete guide to the Support Group Method, 2008

7.8.2 Agenda

Overview of the program

Duration: 

Approx. 10 min.

Aim: 

Participants receive an overview of the workshop program and are informed about the relevance of active involvement.

Materials:

Flipchart No. 2.

Instruction for implementation:

The facilitators give a brief overview of the workshop agenda.

  • How can bullying be identified? Who can be helpful?
  • What is bullying exactly? What are the main characteristics? Distinction conflicts from bullying.
    The focus of the workshop will be the training of the No Blame Approach (NBA)
  • The trainers will introduce the steps of the NBA and give instructions how to proceed.
  • Experiencing and learning the procedure of the NBA by taking part in role plays will take the majority of the training time.

At the end of the training, participants will discuss possible additional steps to combat further bullying and deal with open questions.

7.8.3 How do I recognize bullying?

Duration: 

40 min

Aim: 

Participants will be introduced to the analytical tool “bullying glasses” in order to recognize a bullying situation. They will sharpen their observation by reflecting possible signs like bullying activities and bullying signals or hints from colleagues, students etc.

Materials:

Flipchart No. 3a, 3b, pin board, markers

Instruction for implementation:

The facilitators ask the participants to form small groups of two or three persons in order to reflect the questions on flipchart No. 3 (Approx. 5 minutes).Facilitators have prepared a chart on the pin board:

“Bullying glasses” Information sources Bullying activities Bullying signals
Stabilizers

Facilitators invite the participants to share their collection of answers. One facilitator moderates the exchange and the other one takes notes, classifying the answers and writing them down. There is no discussion at this point, just the collection of answers and the correct classification. If there is no fluent exchange, the trainers try to stimulate further thoughts, e.g.:

  • What else did you observe in former bullying cases?
  • Why does bullying work/ stabilizers?
  • What are your sources of information?

Once the columns have been filled in, facilitators introduce the “bullying glasses”, explaining that not only one or two observations/signals/activities justify labeling a certain behavior as bullying. But if a teacher observes several symptoms in different columns there is a strong likelihood for bullying. Also: Once a teacher becomes suspicious that there might be a case of bullying it is helpful to put on the bullying glasses and have a close look at the specific situation of a student.

7.8.4 Definition of bullying

Duration: 

5 min

Aim: 

On the basis of the definition of bullying and cyberbullying participants will be able to distinguish between a conflict between two or more parties and a bullying situation.

Materials:

Flipchart No. 4ab, 4c

Instruction for implementation:

After the introduction of the bullying glasses the definition of bullying will be presented. In this context, the facilitators emphasize that bullying is not a case for peer mediation since there is an extreme power imbalance between the protagonists.

 

 

7.8.5 Bullying System

Duration: 

10 min

Aim: 

Participants are introduced to the basic idea of a systemic approach, meaning that bullying is a group phenomenon which involves protagonists (the bully or bullies), colluders, bystanders, and observers. It is a functioning destructive system of a group which needs an intervention from the outside in order to change the situation for the better. Participants understand that the bullied person is hardly ever able to disburden him/herself.

Materials:

Flipchart No. 5

Instruction for implementation:

The facilitators present bullying as a closed system with different roles. There are protagonists (the bully or bullies), colluders, bystanders, and observers. Since there is an extreme power imbalance between the bullies and the bullied student, an intervention from outside is necessary. The facilitators point out that bullying will not be regarded from the perspective of the offender and the victim but rather from a systemic approach. This means that representatives of the class will be in the focus including the protagonists, colluders, and observers as well as the affected student. Bullying is a group phenomenon.

7.8.6 The No Blame Approach – characteristics

Duration: 

10 min

Aim: 

Participants get to know the “special” attitude of the NBA. Contrary to common educational interventions in case of bullying the teacher will not blame the bully/bullies but rather involve him/them and other students in a process of behavior change, thus initiating a supportive structure for the bullied student and an end of bullying activities.

Materials:

Flipchart No. 6

Instruction for implementation:

Facilitators explain the characteristics of the NBA. There is possibly a need to discuss the aspect: “no blame, no punishment” since this contradicts the usual educational responses. If participants are very critical it is helpful to talk about bullying cases where the offender was punished and might have taken revenge or where a bullied student left the class, in both cases a win-lose result. The NBA tries to change behavior patterns by influencing group dynamics and thus withdrawing a supportive atmosphere for the bullying protagonists.

Background information:

The concept was developed by George Robinson and Barbara Maines in the 1990-ies in England. In 2002 Christopher Szaday introduced it in Switzerland since 2003 Heike Blum and Detlef Beck from the German organization Fairaend have been spreading the approach in Germany.Furthermore, the concept is in use in the Netherlands, Belgium, Luxembourg, Australia and New Zealand.

7.8.7 Bullying Intervention without sanctions – overview of the steps of the process

Duration: 

10 min

Aim: 

Participants will be introduced to the steps of the NBA approach and get an idea about the concrete procedure.

Materials:

Flipcharts No. 7, 8

Instruction for implementation:

The facilitators point out that these two flipcharts give an overview of the NBA procedure. The facilitators comment on the illustrated steps:

Firstly, the teacher meets with the affected student in order to win his/her trust and his/her agreement to intervene. This meeting is crucial, the teacher should not only show concern about what is happening but also his/her commitment to help and confidence that the problem can be solved.

The student will be informed about the planned steps. In order to form the support group the teacher asks the names of friends and of classmates who are still supportive. On the other hand, he/she asks who is bothering the affected student (offender and bystanders).

The goal of this meeting is not

  • to find out in detail what happened to the student
  • give him/her advice concerning possible changes of behavior
  • reflect possible reasons why he/she is affected

The meeting lasts 30 – 45 minutes.  The student should be relieved of any responsibility, the teacher signals his/her commitment. A date for a follow-up meeting will be found (within 8 – 14 days), until then the student observes carefully what happens.

Secondly, the teacher forms a support group. This group includes 3 – 4 bullying protagonists plus 3 – 4 friends of the affected student or at least neutral students.The group´s unique factor is that it is not a support group for the affected student but for the teacher who asks for help to solve the bullying problem.The support group aims at developing ideas and measures which can be carried out by members of the group to stop bullying activities.

The meeting with the support group will take place during regular classes (colleagues need to be informed beforehand).  Students will be invited personally or in written form, the purpose of the meeting will not be mentioned, just the need for solving a problem together. The teacher shows an appreciative attitude towards all participants without blaming anybody and mentions skills and resources each and every student has to help.

Thirdly, follow up meetings with the affected student and members of the support group (individually) will take place 8 – 14 days later. The teacher talks to the affected student in order to find out whether any (positive) changes occurred and how he/she is doing.There will also be individual meetings with the group members to evaluate the situation. Have the students been able to put their ideas into practice? Has the bullying stopped?

At this point, the facilitators don´t allow a lot of questions. Open questions can be answered later on when the steps will be dealt with in detail.

Background information:

The concept was developed by George Robinson and Barbara Maines in the 1990-ies in England. In 2002 Christopher Szaday introduced it in Switzerland since 2003 Heike Blum and Detlef Beck from the German organization Fairaend have been spreading the approach in Germany.Furthermore, the concept is in use in the Netherlands, Belgium, Luxembourg, Australia and New Zealand.

7.8.8 Meeting with the affected student

Duration:

15 min

Aim:

Participants receive a detailed overview how to approach a bullied student including a possible interview guide.

Materials:

Flipcharts No. 9, 10, 11, 12 – fastened on a pin board next to each other

Instruction for implementation:

The facilitators explain that the group is now at the point to actually start with the training of the 3 steps of the concept. The first step is to meet with the affected student. Depending on the situation the teacher will call the student at home (if he/she is not going to school anymore) or contact him/her in school. The meeting will be arranged in a separate room where nobody will disturb them.

The teacher greets the student warmly: “How nice to see you. Don´t worry I´m not talking about the lessons that you missed during the last days…” He/she will share his/her observations:

“I have noticed that…”
“I don´t see you anymore…”
“Your parents are worried…”

In the next phase, the teacher asks how the student feels at school. It is not necessary to go into details of the bullying incidents but rather to get a general idea.

The teacher will question the student concerning his/her will to change the situation, will convey confidence and express his/her commitment to help.

Flipchart No. 11

The teacher explains the next steps, emphasizes that he/she wants to relieve the burden and conveys safety.

Flipchart No. 12

Next, the teacher will inquire the names of friends or companions of the affected student but also the names of the bullying protagonists. Afterward, he/she assures confidentiality and finds out what should not be mentioned. Finally, the student is asked for his/her approval to proceed and a date for a follow- up meeting is agreed on.At the end of the presentation of the guideline for the talk, the facilitators will underline that it is of utmost importance to create an atmosphere of trust and confidence during the whole conversation.