ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Stop Bullying and Cyber-Bullying

Updated on October 9, 2011
How one family deals with the drama of the bully and the wimp.
How one family deals with the drama of the bully and the wimp. | Source

We Can Help Bullies and Protect their Targets

There has been a lot of talk lately about bullying and cyber-bullying.

No one likes a bully. Even bullies don’t like bigger bullies.

According to the Concise Oxford Dictionary, a bully is “a person who uses strength or power to coerce others by fear.” To bully is to “persecute or oppress by force or threats.”

The word bully comes from the Dutch word for lover (boele), a term of endearment. This suggests that there is a loop between the bully and the bullied. The commonality is that both lack confidence. We could call this loop “the bully and the wimp.” The bully gets mad or displays an I can hurt you stance and the wimp cries or displays an I can be hurt stance.

Threats and cringing, however, are not the basic behavior. Behind these are actual force and real physical pain. Think of women through centuries who have accepted beatings and rape from a husband or male owner because they had no legal rights, no way to provide for themselves outside a male dominated household. There are women today who stay in abusive relationships because they have no skills—or think they have none. These women cannot protect their children from the abuse. All bullies are first helpless children. Then physical bullying occurs among children. Even in the same age group, children come in different sizes, and children in a range of ages and sizes play together or walk home from school along common routes. Big boys beat up little boys, unless the grownups and the kinder big boys provide protection.

Beyond physical force there are a whole range of bullying tactics which rely for their power on the threat of force, whether an immediate threat, a threat buried in our deep memories of spankings and beatings delivered by our caretakers, or an even deeper cultural memory of the painful wrongs committed by bullies.

Bullying is more than a gender issue, since the more powerful and meaner men have routinely beat up the smaller and milder men. Ultimately, in any group that runs on force and the threat of force, there is only one king bully, with all other men playing flunkies or biding their time until they can set matters straight, just as women have bided their time.

There is an old expression lovers used, “Come bide with me.” It’s a sweet way of inviting the other into an abiding relationship. Biden is the Germanic root for these words and suggests, again, the boele or lover of the Dutch. These words may have a common Indo-European root.

Stephen Gaskin, a spiritual teacher, likes to say, “If you’ll run one end of the loop, you’ll run the other.” A bully will cower even when “threatened” only with truth. I once witnessed such a reversal. There was a woman who liked to accuse and harass me where we worked together in a co-op. Finally I said, “You are hurting me. Are you doing it on purpose?” She fled in tears.

Fortunately it is possible to understand bullying, even when it goes on in cyber space. It is possible to rescue bullies as well as their targets. Bullies who don’t want to stop, need to be quarantined until they have a change of perspective. At very least, their participation on the internet and in text messaging should be monitored or limited. And we grownups must do that work. We may protest that it's too hard, that there's not enough of us, but if we do, we are only saying that the kids are out of our control. Let's get together, meet on the issue, and act to take back enough control in families and in schools to prevent our children from harming one another.

Let’s raise confident children and redeem the confidence of every child who has lost it, for his happiness and knowledge of his own real abilities depend on confidence in his basic self, like in the old poster of a kid saying, “I know I’m good stuff ‘cause God don’t make no junk.”

Don’t let a bully convince you that you are seeing the real person. Invite the apparent bully persistently, over as much time as needed, to show you a genuine self. With trust, she or he will shine for you. And won’t need to bully anyone.

Comments

    0 of 8192 characters used
    Post Comment

    • triciajean profile imageAUTHOR

      Patricia Lapidus 

      7 years ago from Bantam, CT

      Thanks, isettl. Your comments are important to me. Yeah, the potential for law suit puts a new twist on an ancient problem. But I still think, fear nothing and take smart strong action. Killing them with kindness is a part of simply being confident, right?

    • izettl profile image

      Laura Izett 

      7 years ago from The Great Northwest

      What is amazing to me is the girls who are getting downright mean to each other. THe bad thing about girls is they always travel in packs so the whole pack is bullying you. I had two girls in high school bully me and my mom handled things "old school". Her friend had an older, bigger daughter and she had her go talk to the girls bullying me and that solved it. Nowadays parents fear getting involved because of being sued.

      I just can't imagine the cyber bullying that's all new to me and I'll have to deal with that when my daughter is older.

      My mom used to say "kill them with kindness" and I've found many times it works. I've said to mean or rude people "I know you don't mean to be rude, but are you just having a bad day?" Totally catches them off guard.

      Great hub- important topic.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)