Skip to main content

Cyberbullying: Playground Politics (and Worse) in Cyberspace

  • Chapter
  • First Online:
Bullying and Victimization Across the Lifespan

Abstract

Cyberbullying is the act of using electronic means (e.g., e-mail, instant messaging, chat rooms, websites, gaming sites, cellular phones) to threaten, humiliate, insult, exclude, or intimidate others. However, given unique aspects of virtual communication (e.g., lack of vocal intonation, facial expression, body language) it is sometimes difficult to identify cyberbullying. Further, the three central features of traditional bullying (e.g., bullying not using electronic means), repetition, power imbalance, and intent to harm are complicated by the nuances of cyberbullying. This chapter discusses the definition of cyberbullying as well as defining the roles in the cyberbullying dynamic and explaining the different methods (e.g., exclusion, flaming) and means (e.g., text messaging, e-mail) used to cyberbully. The devastating consequences of cyberbullying on cybervictims, cyberbullies, and cyberbully-victims are discussed as well as the commonalties between cyberbullying and traditional bullying.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Aboujaoude, E., Savage, M. W., Starcevic, V., & Salame, W. O. (2015). Cyberbullying: Review of an old problem gone viral. Journal of Adolescent Health, 57, 1018.

    Article  Google Scholar 

  • Aftab, P. (2011). http://www.wiredsafety.net

  • Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Sevcikova, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal of Interpersonal Violence, 30(18), 3192–3216.

    Article  Google Scholar 

  • Burton, K. A., Florell, D., & Wygant, D. B. (2013). The role of peer attachment and normative believes about aggression on traditional bullying and cyberbullying. Psychology in the Schools, 50(2), 103–115.

    Article  Google Scholar 

  • Centers for Disease Prevention and Control. (2016a). High school youth risk behavior surveillance-United States. Atlanta, GA: Author. Retrieved from https://nccd.cdc.gov/youthonline/App/Default.aspx

    Google Scholar 

  • Centers for Disease Prevention and Control. (2016b). Middle school youth risk behavior surveillance-United States. Atlanta, GA: Author. Retrieved from https://nccd.cdc.gov/youthonline/App/Default.aspx

    Google Scholar 

  • Chew, C. (2010). Prevalence of cyber bullying in Singapore. In E. Ng & K. Rigby (Eds.), Breaking the silence: Bullying in Singapore (pp. 65–84). Singapore: Armour Publishing.

    Google Scholar 

  • Evans, C. B. R., & Smokowski, P. R. (2016). Understanding weaknesses in bullying research: How school personnel can help strengthen bullying research and practice. Children and Youth Services Review, 69, 143–150.

    Article  Google Scholar 

  • Fahy, A. E., Stansfield, S. A., Smuk, M., Smith, N. R., Cummins, S., & Cark, C. (2016). Longitudinal associations between cyberbullying involvement and adolescent mental health. Journal of Adolescent Health, 59, 502–509.

    Article  Google Scholar 

  • Forbes. (2018). Donald Trump’s 10 most offensive tweets. Jersey City, NJ: Author. Retrieved from https://www.forbes.com/pictures/flji45elmm/7-lightweight/#435dc286e162

    Google Scholar 

  • Gladden, R. M., Vivolo-Kantor, A. M., Hamburger, M. E., & Lumpkin, C. D. (2014). Bullying surveillance among youths: Uniform definitions for public health and recommended data elements, Version 1.0. Atlanta, GA: National Center for Injury Prevention and Control, Centers for Disease Control and Prevention and U.S. Department of Education.

    Google Scholar 

  • Goebert, D., Else, I., Matsu, C., Chung-Do, J., & Chang, J. Y. (2011). The impact of cyberbullying on substance use and mental health in a multiethnic sample. Maternal Child Health Journal, 15, 1282–1286.

    Article  Google Scholar 

  • Huang, Y. Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26, 1581–1590.

    Article  Google Scholar 

  • Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140, 1073–1137.

    Article  Google Scholar 

  • Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2012). Cyberbullying: Bullying in the digital age. Malden, MA: Wiley-Blackwell.

    Google Scholar 

  • Langos, C. (2012). Cyberbullying: The challenge to define. Cyberpsychology, Behavior, and Social Networking, 15(6), 285–289.

    Article  Google Scholar 

  • Lenhart, A. (2015). Teen, social media and technology overview 2015. Washington, DC: Pew Research Center. Retrieved from http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/

    Google Scholar 

  • Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23(4), 1777–1791.

    Article  Google Scholar 

  • Macmanus, R. (January 31, 2007). 55% Of people regularly or always fake their web identity. Readwrite. Retrieved from https://readwrite.com/2007/01/31/ake_web_identity_poll_results/

  • Megan Meier Foundation. (n.d.). Megan’s story. Saint Charles, MO: Author. Retrieved from https://www.meganmeierfoundation.org/megans-story.html

  • Olweus, D. (1993). Bullying at school: What we know and what we can do. Malden, MA: Blackwell.

    Google Scholar 

  • Popovic-Citic, B., Djuric, S., & Cvetkovic, V. (2011). The prevalence of cyberbullying among adolescents: A case study of middle schools in Serbia. School Psychology International, 32(4), 412–424.

    Article  Google Scholar 

  • Raskaukas, J., & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying among adolescents. Developmental Psychology, 43(3), 564–575.

    Article  Google Scholar 

  • Roberts-Pittman, B., Slavens, J., & Balch, B. V. (2012). The basics of cyberbullying. School Administrator, 69(4), 32–37.

    Google Scholar 

  • Romer, D. (2010). Adolescent risk taking, impulsivity, and brain development: Implications for development. Developmental Psychobiology, 52(3), 263–276.

    Google Scholar 

  • Salkowitz, R. (January 17, 2017). Trump’s 20 million Twitter followers get smarter under the microscope. Jersey City, NJ: Forbes. Retrieved from https://www.forbes.com/sites/robsalkowitz/2017/01/17/trumps-20-million-twitter-followers-get-smaller-under-the-microscope/#55c114874407

  • Seife, C. (July 29, 2014). The weird reasons why people make up false identities on the internet. Wired. Retrieved from https://www.wired.com/2014/07/virtual-unreality-the-online-sockpuppets-that-trick-us-all/

  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154.

    Article  Google Scholar 

  • Smith, P. (July 4, 2015). Chilling stories of fake online identities and why people create them. New York, NY: Buzzfeed. Retrieved from https://www.buzzfeed.com/patricksmith/this-is-why-people-create-false-identities-on-the-internet?utm_term=.bn248G5dRl#.va5wjGbV61

  • Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., … Helenius, H. (2010). Psychosocial risk factors associated with cyberbullying among adolescents. General Psychiatry, 67(7), 720–728.

    Article  Google Scholar 

  • Spears, B. A., Taddeo, C. M., Daly, A. L., Stretton, A., & Karklins, L. T. (2015). Cyberbullying, help-seeking and mental health in young Australians: Implications for public health. International Journal of Public Health, 60, 219–226.

    Article  Google Scholar 

  • Steinhauer, J. (November 26, 2008). Verdict in MySpace suicide case. The New York Times. Retrieved from http://www.nytimes.com/2008/11/27/us/27myspace.html

  • Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321–326.

    Article  Google Scholar 

  • Sumter, S. R., Valkenburg, P. M., Baumgartner, S. E., Peter, J., & van der Hof, S. (2015). Development and validation of the multidimensional offline and online peer victimization scale. Computers in Human Behavior, 46, 114–122.

    Article  Google Scholar 

  • Van Geel, M., Vedder, P., & Tanilon, J. (2014). Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: A meta-analysis. Journal of American Medical Association Pediatrics, 168(5), 435–442.

    Google Scholar 

  • Vandebosch, H., & van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior, 11, 499–503.

    Article  Google Scholar 

  • Willard, N. (2007). Educators guide to cyberbullying and cyberthreats. Retrieved from https://education.ohio.gov/getattachment/Topics/Other-Resources/School-Safety/Safe-and-Supportive-Learning/Anti-Harassment-Intimidation-and-Bullying-Resource/Educator-s-Guide-Cyber-Safety.pdf.aspx

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Smokowski, P.R., Evans, C.B.R. (2019). Cyberbullying: Playground Politics (and Worse) in Cyberspace. In: Bullying and Victimization Across the Lifespan. Springer, Cham. https://doi.org/10.1007/978-3-030-20293-4_5

Download citation

Publish with us

Policies and ethics