Article Preview
TopIntroduction
The evolution of electronic media and their speedy adoption by minors has swiftly caused profound changes for them in areas such as socialisation processes, communication strategies among peers, learning styles and forms of leisure (Sureda Comas & Morey, 2010). As a result of these changes, young people have considerably new opportunities, but they are also exposed to complex and multivariate risks. Some of these are related to access to inappropriate content and contacts, while others stem from the commercial use of the Internet or are related to behavioural issues, such as addiction and social skills. In any case, the use of information and communication technologies (ICTs) to intimidate, humiliate, threaten and bully is one of the most important risks. However, ranking the severity and frequency of such incidents is difficult and always relative (The Internet Safety Technical Task Force, 2008), what seems certain is that its prevalence has been increasing rapidly over the past few years (Wolak, Mitchell & Finkelhor, 2006).
ICTs have facilitated the emergence of a new form of bullying or harassment: cyberbullying (also known as electronic bullying, e-bullying, digital bullying, cyber harassment, etc.), a specific form of deliberate, repeated attacks based on the disparity of power between the victims and the bullies (Nansel & Overpeck, 2003). Cyberbullying has been identified as a problem in education and public health (Ybarra & Mitchell, 2007) that affects the psychosocial balance of millions of children (Abada, Hou & Ram, 2008). Because it is a recent phenomenon, many questions about the characteristics, causes and effects of cyberbullying remain unanswered. Although three of the latest papers on the subject (Kiriakidis & Kavoura, 2010, Schrock & Boyd 2008; Tokunaga, 2010) agree on its definition, the concept of cyberbullying still does not have a clear, generally agreed upon definition. In this sense, Tokunaga’s characterisation, based on an analysis of the most common definitions, may be a good starting point to analyse the issue: “…any behaviour performed through electronic or digital media by intended to inflict harm or discomfort on others” (Tokunaga, 2010, 278). Furthermore, it should be noted that the bully’s identity may or may not be known by the victim and the attacks may occur in multiple scenarios and on numerous platforms.
What seems clear is that the use of ICT, especially mobile phones and the Internet, increases the effects of traditional bullying -a phenomenon that has been studied since the 1970s- because it provides anonymity for bullies and blurs the temporal and geographical boundaries in which the attacks take place. Indeed, in many cases, ICTs greatly amplify the potential audience because the attacks can be viewed with no limit of time by a massive number of people that escape the control of both the bully and the victim (Sureda, Rigo & Comas, 2009).