ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Cyber Bullying: A New Kind of Victim

Updated on September 25, 2013

Quick Facts

Types of cyber bulling can include any of the following:

  • posting hateful comments
  • sending abusive messages
  • forwarding personal information to others without permission
  • posting pictures or videos of someone without permission
  • slandering or dispersing defamatory information about someone (spreading rumors)
  • using any type of social media to cause pain to another

The Casualty

Megan is alone in her room, or so she thinks. Her heart is pounding, and she knows that it's coming. Inevitably, her phone lights up to her her know that she has a Facebook notification. She's been waiting for it.Saturday nights are never without these awful intrusions.

She's fighting herself, wishing she could ignore it. But soon, she can't resist. Everyone will have seen it by now, and many will have joined in. She steels herself and checks her phone.

"Hey fatty! You enjoying your donuts?"

"You definitely beat anorexia!"

"How can you even stand to look at yourself?!"

Megan is devastated. She's seen it all before, but each comment brings on a new wave of pain. She can't take it anymore. She writes a note to her mom, apologizing for being such a disappointment. Megan cries as she swallows pill after pill. Soon... too soon... Megan is gone.

"Argentina Lost."
"Argentina Lost." | Source

Before the Internet

In the past, there have been two main types of bullying among students: direct and indirect.

Direct bullying consists of verbal abuse, forceful removal of personal property, and physical violence.

Indirect bullying involved actions such as exclusion of the victim or spreading rumors.

Previous to social networking, bullying in schools was a very personal assault. For the most part, students had known each other for years. There would be, albeit ridiculous, reasons behind the attacks. Also, there were other students actively or passively participating in the assault or exclusion. Bullying was a way for students to exert power over one another or a way to create a social hierarchy.

In a school setting, there is also an authority figure to intercede with the bullying. Educators are trained in procedures to follow when they encounter an incident, and they can stop the assault right then and there. They also have the ability to inflict immediate consequences on the aggressor. These consequences can serve to set an example for other students in order to show that antagonistic behavior will not be tolerated.

Granted, the issue of bullying will most likely always be problematic in school systems, but there are ways to help curb the number and severity of the consequences.

The Breakdown

Cyber bullying has created many new ways for students to torment their peers. For example:

  • They could pretend that they are different people in order to trick others into revealing personal information or opinions.
  • They could spread lies and rumors much more easily and efficiently, and the information is available to a much larger audience.
  • They could post embarrassing or humiliating photos of the victim without his or her consent.

The ability to post anonymously contributes to the bravery of the attackers because they have no real fear of being caught or retaliated against.

What's worse is that the bullying behavior is no longer confined to the school campus. These attacks can be made anywhere and anytime. The victim is not safe from assault simply because they are not on school grounds. The attackers are also doing this from the comfort of their own homes, and, to some bullies, it is simply a form of entertainment.

Quick Poll

Have you ever been a cyber bully?

See results

The Bully

Students who are questions about their bullying behavior tend to respond similarly. They say that they do not think that it is a "big deal." They are even encouraged by friends to attack their peers. A big problem also stems from the fact that they do not believe they will get caught. This is legitimate reasoning because, unlike in a school setting where there are teachers and staff, there are no designated authority figures to police this bullying behavior. The attacks continue unchecked unless the victims speak up, which they are often unwilling to do. Even then, there may not be any consequences for the attackers.

Source

My Experience

When I first graduated from high school, I spent four years coaching middle school color guard. For the most part, the girls were very friendly and courteous to one another, and many became best friends. However, one situation occurred about halfway through my second year as a coach.

One girl decided that it would be funny to capture an image with her cell phone of a fellow guard member while she was changing in the locker room. The picture did not contain any serious nudity, but the victim was portrayed with no shirt on. The attacker, then, uploaded the image to Facebook and asked her friends to rank the photo.

Many of the students who attended school with the girls saw and commented on the image. In addition, the image was almost instantly copied onto several other sites, and the victim was completely humiliated.

Her parents were enraged and immediately contacted the school officials.

Because the actual photo taking occurred on the school campus, the school administrators had the authority to punish the attacker. She was removed from the color guard team, and she was suspended from school for a week.

The victim, on the other hand, was traumatized by the event. She transferred to a different school and cut all contact with her previous friends.

That kind of hurt can be so detrimental to the emotional health of a young girl, and this case was no exception.

Bully Documentary

This documentary is an inspiring film following the parents and students dealing with bullies. It is an extremely revealing film that shows just how severe the problem is, and it highlights how many school staff members will turn a blind eye to the problems. If you are interested in this topic, I highly recommend seeing this movie.

Activity For Students

The Crumpled Paper Activity

I followed the trail as best as I could, and I ended up at a blog that describes the activity in wonderful detail. The following is a direct quote:

"The teacher gave each student a clean crisp sheet of paper. She then instructed the class to crumble up the piece of paper, toss it around, get angry with it, and stomp on it.


After which, she told the students to return to their seats (with their piece of paper), flatten it out on the top of their desks, making it as flat and perfect as they can, and finally, apologize to the paper.


When all the students had done their best to iron out the paper and apologize to it, the teacher picked up the paper on the first classmates desk, held it up so the entire class could see it and said:


If this piece of paper had been another person, and you had done all those things to him or her, by making them feel less than perfect (through your words or actions), these are the scars you would leave. That person would never be the same, no matter how many times you tell them you are sorry, no matter how many times you try to smooth things out..."


This is such a great way to introduce the topic of bullying in a classroom. Students need to be taught to realize how their actions can affect people.

The scars we leave on people can never really go away.
The scars we leave on people can never really go away. | Source

Call to Action

It has become very obvious just how serious the problem is. The attackers are becoming more and more harsh, and the victims are too afraid or embarrassed to bring attention to the problem or to ask for help. In addition, these attacks are happening all day, everyday. The victims have no escape.

As a society, we ned to realize that these students need us to intervene. We cannot allow this problem to continue unchecked. We need to set up some form of policies or rules in order to help deter students from this kind of aggressive behavior, and we need to make sure that those being attacked know that they will have concern and support from the adults in their lives.

Otherwise, cyber bullying may grow and irreparably damage a large part of our nation's youth.

© 2013 Stephanie Constantino

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)