Bullying
All children are the target of occasional teasing or aggression. In fact, during the early elementary years, it is normal for children to test their understanding of boundaries and power within their peer relations. As they get older, children gain a greater capacity to empathize, problem solve and take another's point of view. Conflict is a normal part of social development. Aggression and hurtful remarks are a typical response to conflict, but that does not necessarily mean a bully-victim problem exists. True bullying is repeated exposure over time to negative actions. In true bullying there is an imbalance of power which results in the victim having a hard time defending or standing up for themselves. Bullying is when one or more people use power to willfully hurt another person. Bullying is willful aggression that can take many forms including physical, verbal and psychological.
Normal Peer Conflict
|
Bullying
|
Physical Bullying
The use of physical aggression with the intent to harm. Examples include:
-Pushing-Shoving-Spitting-Kicking-Tripping-Hitting-Stealing-Defacing Property-Restraining or Locking in a Confined Space-Physical Violence Against Family or Friends-Threatening with a Weapon-Inflicting Bodily Harm
-Pushing-Shoving-Spitting-Kicking-Tripping-Hitting-Stealing-Defacing Property-Restraining or Locking in a Confined Space-Physical Violence Against Family or Friends-Threatening with a Weapon-Inflicting Bodily Harm
Verbal Bullying
The use of verbal aggression with the intent to harm. Examples include:
-Mocking-Name Calling-Teasing-Intimidating Phone Calls-Verbal Threats of Aggression Against Property or Possessions-Threats of Violence or Infliction of Bodily Harm-Threats of Violence Towards Friends/Family-Extortion
-Mocking-Name Calling-Teasing-Intimidating Phone Calls-Verbal Threats of Aggression Against Property or Possessions-Threats of Violence or Infliction of Bodily Harm-Threats of Violence Towards Friends/Family-Extortion
Social Aggression/Relational Aggression
RA is defined at the intent to harm another through the exploitation of a relationship or the destruction of a reputation. The attacks are usually indirect and designed to control a person by damaging social relationships, reputations and status within peer groups. Examples of RA include:
-Gossiping-Rumor Spreading-Public Humiliation-The Silent Treatment-Manipulative Affection-Exclusion
Generally speaking, females tend to be more relationally aggressive than males, across cultures and ethnicities. RA is the most difficult type of bullying to identify as it is "hidden" or very subtle. It is the least likely to be reported as RA often takes place between friends and among a girls' closest circle of friends. More recent studies have found the number of boys partaking in this type of bullying is increasing. One theory for this rise is the fact that such an emphasis has been placed on "No Bullying" policies and RA has a higher likelihood of going unnoticed. It has also been documented that while boys tend to use physical bullying more often with other boys, they do use RA more often with girls.
-Gossiping-Rumor Spreading-Public Humiliation-The Silent Treatment-Manipulative Affection-Exclusion
Generally speaking, females tend to be more relationally aggressive than males, across cultures and ethnicities. RA is the most difficult type of bullying to identify as it is "hidden" or very subtle. It is the least likely to be reported as RA often takes place between friends and among a girls' closest circle of friends. More recent studies have found the number of boys partaking in this type of bullying is increasing. One theory for this rise is the fact that such an emphasis has been placed on "No Bullying" policies and RA has a higher likelihood of going unnoticed. It has also been documented that while boys tend to use physical bullying more often with other boys, they do use RA more often with girls.
Biblio ResourcesThe Bully, The Bullied and the Bystander by Barbara Coloroso
Take the Bully by the Horn by Sam Horn Best Friends, Worst Enemies by Michael Thomas The Parents Book About Bullying by William Voors Little Girls Can Be Mean by Michelle Anthony Cliques: 8 Steps to Help Your Child Survive the Social Jungle by Gianetti & Sagarese Queen Bees and Wanabees: Helping Your Daughter Survive Cliques, Gossip, Boyfriends, and other Realities of Adolescence by Rosalind Wiseman Cliques, Phonies and Other Baloney by Trevor Romain BullyProofing Your Child by Garrity, Baris and Porter Bullies are a Pain in the Brain by Trevor Romain |
On-Line Resourceswww.opheliaproject.org
www.RachaelSimmons.com www.stopbullying.gov www.kidpower.org |
Cyberbullying
Cyberbullying refers to the use of modern communication technologies to embarrass, humiliate, threaten or intimidate an individual in an attempt to gain power or control. Technology includes instant messaging, texting, picture phones, and social networking sites such as Twitter, Facebook and MySpace. The prevalence of Cyberbullying is increasing as the access to technology becomes readily available to our youth. This technology provides the ability to communicate instantly and "behind a curtain" with a 24/7 availability. The idea of anonymity allows a person to easier rationalize an irresponsible or harmful action. It distances a person from the perception of harm that their behavior can cause. Perception of "I can't see you, you can't see me" keep a person from receiving immediate feedback from another through facial expressions or wounded responses.
Recent Statistics from the CDC:
Statistics from our most recent CHVE Climate Survey:
A few points to keep in mind...
Just because technology exists and is accessible to all ages does not mean that it is developmentally appropriate for all ages. Our children are still developing cognitively, socially, physically and morally. As such, it is generally recommended to :
Recent Statistics from the CDC:
- Girls are twice as likely as boys to not only be the victim, but to be the perpetrators of Cyberbullying.
- 67% of the targets report being harassed through instant messaging
- 25% through email
- 23% through a social website
- 15% through texting
Statistics from our most recent CHVE Climate Survey:
- 25 % of the third and fourth graders surveyed use text messaging
- 36% of the fifth graders surveyed use text messaging
- 6% of our fifth graders reported that they have a page on a social networking site
- 38% of all students surveyed report that they have unsupervised access to the internet at home
A few points to keep in mind...
Just because technology exists and is accessible to all ages does not mean that it is developmentally appropriate for all ages. Our children are still developing cognitively, socially, physically and morally. As such, it is generally recommended to :
- Limit screen time, your child should be spending more time interacting with their peers and family face to face than via technology. While devices allow for easier communication access at times, it does not always provide the appropriate opportunity to practice social skills.
- Supervise your child. Do not allow them to use computers in isolated areas where they cannot be supervised by a responsible adult. For younger children, take time to sit with them while they discover how to navigate the cyberworld.
- Take time to discuss with your child what responsibilities they have when using technology, as well as the consequences they might have for misuse.
- Help your child to understand that they should not do or say anything online that they wouldn't do or say in person. Warn them that the things that are said or done on-line may stay with them indefinitely.
- When choosing a phone for your child consider whether or not the "camera" is necessary. Also, check to see if that function can be turned off.
- Establish an "Open Check" policy with your child so that they understand that you have the right and responsibility to check their phones and computers at any time.
- Investigate appropriate filtering and tracking software. There is software that will track exactly where your child is going on the internet as well as what they are emailing.
Online Resources for Cybersafety:www.safekids.com
www.i-safe.org www.wiredsafety.org www.transl8it.com www.webopedia.com |
Software Information:www.keylogger.com
www.eblaster.com www.watchdogpc.com www.spectorsoft.com |