Cyberbullying: Playground Politics (and Worse) in Cyberspace

  • Paul R. Smokowski
  • Caroline B. R. Evans


Cyberbullying is the act of using electronic means (e.g., e-mail, instant messaging, chat rooms, websites, gaming sites, cellular phones) to threaten, humiliate, insult, exclude, or intimidate others. However, given unique aspects of virtual communication (e.g., lack of vocal intonation, facial expression, body language) it is sometimes difficult to identify cyberbullying. Further, the three central features of traditional bullying (e.g., bullying not using electronic means), repetition, power imbalance, and intent to harm are complicated by the nuances of cyberbullying. This chapter discusses the definition of cyberbullying as well as defining the roles in the cyberbullying dynamic and explaining the different methods (e.g., exclusion, flaming) and means (e.g., text messaging, e-mail) used to cyberbully. The devastating consequences of cyberbullying on cybervictims, cyberbullies, and cyberbully-victims are discussed as well as the commonalties between cyberbullying and traditional bullying.


Cyberbullying Electronic bullying Cyberbully Cybervictim Cyberbully-victim 


  1. Aboujaoude, E., Savage, M. W., Starcevic, V., & Salame, W. O. (2015). Cyberbullying: Review of an old problem gone viral. Journal of Adolescent Health, 57, 1018.CrossRefGoogle Scholar
  2. Aftab, P. (2011).
  3. Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Sevcikova, A. (2015). Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and cyberbully-victims in a Czech adolescent sample. Journal of Interpersonal Violence, 30(18), 3192–3216.CrossRefGoogle Scholar
  4. Burton, K. A., Florell, D., & Wygant, D. B. (2013). The role of peer attachment and normative believes about aggression on traditional bullying and cyberbullying. Psychology in the Schools, 50(2), 103–115.CrossRefGoogle Scholar
  5. Centers for Disease Prevention and Control. (2016a). High school youth risk behavior surveillance-United States. Atlanta, GA: Author. Retrieved from Scholar
  6. Centers for Disease Prevention and Control. (2016b). Middle school youth risk behavior surveillance-United States. Atlanta, GA: Author. Retrieved from Scholar
  7. Chew, C. (2010). Prevalence of cyber bullying in Singapore. In E. Ng & K. Rigby (Eds.), Breaking the silence: Bullying in Singapore (pp. 65–84). Singapore: Armour Publishing.Google Scholar
  8. Evans, C. B. R., & Smokowski, P. R. (2016). Understanding weaknesses in bullying research: How school personnel can help strengthen bullying research and practice. Children and Youth Services Review, 69, 143–150.CrossRefGoogle Scholar
  9. Fahy, A. E., Stansfield, S. A., Smuk, M., Smith, N. R., Cummins, S., & Cark, C. (2016). Longitudinal associations between cyberbullying involvement and adolescent mental health. Journal of Adolescent Health, 59, 502–509.CrossRefGoogle Scholar
  10. Forbes. (2018). Donald Trump’s 10 most offensive tweets. Jersey City, NJ: Author. Retrieved from Scholar
  11. Gladden, R. M., Vivolo-Kantor, A. M., Hamburger, M. E., & Lumpkin, C. D. (2014). Bullying surveillance among youths: Uniform definitions for public health and recommended data elements, Version 1.0. Atlanta, GA: National Center for Injury Prevention and Control, Centers for Disease Control and Prevention and U.S. Department of Education.Google Scholar
  12. Goebert, D., Else, I., Matsu, C., Chung-Do, J., & Chang, J. Y. (2011). The impact of cyberbullying on substance use and mental health in a multiethnic sample. Maternal Child Health Journal, 15, 1282–1286.CrossRefGoogle Scholar
  13. Huang, Y. Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26, 1581–1590.CrossRefGoogle Scholar
  14. Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140, 1073–1137.CrossRefGoogle Scholar
  15. Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2012). Cyberbullying: Bullying in the digital age. Malden, MA: Wiley-Blackwell.Google Scholar
  16. Langos, C. (2012). Cyberbullying: The challenge to define. Cyberpsychology, Behavior, and Social Networking, 15(6), 285–289.CrossRefGoogle Scholar
  17. Lenhart, A. (2015). Teen, social media and technology overview 2015. Washington, DC: Pew Research Center. Retrieved from Scholar
  18. Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23(4), 1777–1791.CrossRefGoogle Scholar
  19. Macmanus, R. (January 31, 2007). 55% Of people regularly or always fake their web identity. Readwrite. Retrieved from
  20. Megan Meier Foundation. (n.d.). Megan’s story. Saint Charles, MO: Author. Retrieved from
  21. Olweus, D. (1993). Bullying at school: What we know and what we can do. Malden, MA: Blackwell.Google Scholar
  22. Popovic-Citic, B., Djuric, S., & Cvetkovic, V. (2011). The prevalence of cyberbullying among adolescents: A case study of middle schools in Serbia. School Psychology International, 32(4), 412–424.CrossRefGoogle Scholar
  23. Raskaukas, J., & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying among adolescents. Developmental Psychology, 43(3), 564–575.CrossRefGoogle Scholar
  24. Roberts-Pittman, B., Slavens, J., & Balch, B. V. (2012). The basics of cyberbullying. School Administrator, 69(4), 32–37.Google Scholar
  25. Romer, D. (2010). Adolescent risk taking, impulsivity, and brain development: Implications for development. Developmental Psychobiology, 52(3), 263–276.PubMedPubMedCentralGoogle Scholar
  26. Salkowitz, R. (January 17, 2017). Trump’s 20 million Twitter followers get smarter under the microscope. Jersey City, NJ: Forbes. Retrieved from
  27. Seife, C. (July 29, 2014). The weird reasons why people make up false identities on the internet. Wired. Retrieved from
  28. Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154.CrossRefGoogle Scholar
  29. Smith, P. (July 4, 2015). Chilling stories of fake online identities and why people create them. New York, NY: Buzzfeed. Retrieved from
  30. Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., … Helenius, H. (2010). Psychosocial risk factors associated with cyberbullying among adolescents. General Psychiatry, 67(7), 720–728.CrossRefGoogle Scholar
  31. Spears, B. A., Taddeo, C. M., Daly, A. L., Stretton, A., & Karklins, L. T. (2015). Cyberbullying, help-seeking and mental health in young Australians: Implications for public health. International Journal of Public Health, 60, 219–226.CrossRefGoogle Scholar
  32. Steinhauer, J. (November 26, 2008). Verdict in MySpace suicide case. The New York Times. Retrieved from
  33. Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321–326.CrossRefGoogle Scholar
  34. Sumter, S. R., Valkenburg, P. M., Baumgartner, S. E., Peter, J., & van der Hof, S. (2015). Development and validation of the multidimensional offline and online peer victimization scale. Computers in Human Behavior, 46, 114–122.CrossRefGoogle Scholar
  35. Van Geel, M., Vedder, P., & Tanilon, J. (2014). Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: A meta-analysis. Journal of American Medical Association Pediatrics, 168(5), 435–442.Google Scholar
  36. Vandebosch, H., & van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior, 11, 499–503.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Paul R. Smokowski
    • 1
  • Caroline B. R. Evans
    • 2
  1. 1.School of Social WelfareUniversity of KansasLawrenceUSA
  2. 2.Rhode Island CollegeProvidenceUSA

Personalised recommendations