Characteristics of Cyberbullying Among Native and Immigrant Secondary Education Students

Characteristics of Cyberbullying Among Native and Immigrant Secondary Education Students

Rubén Comas-Forgas, Jaume Sureda-Negre, Aina Calvo-Sastre
DOI: 10.4018/978-1-5225-8909-9.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This article details the results of a descriptive study that analyzes the characteristics and impact of cyberbullying among native and immigrant students enrolled in secondary education. Results indicate that immigrant children experience higher levels than native students of cyberbullying victimisation and they also perpetrate bullying to a greater degree through digital media; there were significant differences in the majority of cases analysed (immigrant students had higher levels of victimisation and perpetration than native students in 27 of 33 cyberbullying incidents studied). In addition, the study found that immigrant students considered being a native of another country to be an explanatory factor in their experiences with cyberbullying. Both groups showed similar frequencies in the explanation given for perpetrating cyberbullying: they bullied in response to being provoked.
Chapter Preview
Top

Introduction

The evolution of electronic media and their speedy adoption by minors has swiftly caused profound changes for them in areas such as socialisation processes, communication strategies among peers, learning styles and forms of leisure (Sureda Comas & Morey, 2010). As a result of these changes, young people have considerably new opportunities, but they are also exposed to complex and multivariate risks. Some of these are related to access to inappropriate content and contacts, while others stem from the commercial use of the Internet or are related to behavioural issues, such as addiction and social skills. In any case, the use of information and communication technologies (ICTs) to intimidate, humiliate, threaten and bully is one of the most important risks. However, ranking the severity and frequency of such incidents is difficult and always relative (The Internet Safety Technical Task Force, 2008), what seems certain is that its prevalence has been increasing rapidly over the past few years (Wolak, Mitchell & Finkelhor, 2006).

ICTs have facilitated the emergence of a new form of bullying or harassment: cyberbullying (also known as electronic bullying, e-bullying, digital bullying, cyber harassment, etc.), a specific form of deliberate, repeated attacks based on the disparity of power between the victims and the bullies (Nansel & Overpeck, 2003). Cyberbullying has been identified as a problem in education and public health (Ybarra & Mitchell, 2007) that affects the psychosocial balance of millions of children (Abada, Hou & Ram, 2008). Because it is a recent phenomenon, many questions about the characteristics, causes and effects of cyberbullying remain unanswered. Although three of the latest papers on the subject (Kiriakidis & Kavoura, 2010, Schrock & Boyd 2008; Tokunaga, 2010) agree on its definition, the concept of cyberbullying still does not have a clear, generally agreed upon definition. In this sense, Tokunaga’s characterisation, based on an analysis of the most common definitions, may be a good starting point to analyse the issue: “…any behaviour performed through electronic or digital media by intended to inflict harm or discomfort on others” (Tokunaga, 2010, 278). Furthermore, it should be noted that the bully’s identity may or may not be known by the victim and the attacks may occur in multiple scenarios and on numerous platforms.

What seems clear is that the use of ICT, especially mobile phones and the Internet, increases the effects of traditional bullying -a phenomenon that has been studied since the 1970s- because it provides anonymity for bullies and blurs the temporal and geographical boundaries in which the attacks take place. Indeed, in many cases, ICTs greatly amplify the potential audience because the attacks can be viewed with no limit of time by a massive number of people that escape the control of both the bully and the victim (Sureda, Rigo & Comas, 2009).

Complete Chapter List

Search this Book:
Reset