Source One - Uncovering the Structure of and Gender and Developmental Differences in Cyber Bullying
Griezel, L., Finger, L. R., Bodkin-Andrews, G. H., Craven, R. G., & Yeung, A. (2012). Uncovering the structure of gender and developmental differences in cyber bullying. Journal Of Educational Research, 105(6), 442-455. doi:10.1080/002206
71.2011.629692 |
Uncovering the Structure of and Gender and Developmental Differences in Cyber Bullying is an article that focuses on how internet and technology make cyber bullying an activity that can take place 24 hours a day, seven days a week. The authors break down cyber bullying into two types, visual and text. Yet, one of the main parts of the article that will be useful to my group’s research is that it touches upon gender and cyber bullying. After speculating the stereotypical bullying behavior of boys and girls, many people believe that boys bully in the traditional and physical form more then girls, however, girls are more likely to spread rumors as a form of bullying. Yet, it is stated that it is still difficult to determine the cyber bullying and gender differences. The researchers use an Adolescent Peer and Relations Instrument and Bully Target (APRI-BT) test to study the relationship between gender and cyber bullying.
This source is useful for research on not only cyber bullying but also cyber bullying and gender. It takes two ideas that have tons of research, but studies them together which is not usually done. Since this source provides information from an actual conducted study, not only does it deem reliable, the researchers objectivity relays results that are known to based strictly off conducted research.
|
Source Two - Online Bullies Pull Schools Into the Fray
Hoffman, N. (2010, June 27). Online Bullies Pull Schools Into the Fray. The New York Times. Retrieved from http://www.nytimes
.com/2010/06/28/style/28bully.html?page wanted=all&_r=0 |
This article’s overall subject is cyber bullying. It talks about a 12-year-old girl who was bullied via text by what parents thought was a 12-year-old boy as well. However, though that statement was proven false, the article talks about how schools don’t want to handle cases of cyber bullying that happen outside of the classroom. Specifically, “according to the Anti-Defamation League, although 44 states have bullying statutes, fewer than half offer guidance about whether schools may intervene in bullying involving “electronic communication,” (1). Battles of cyber bullying never stop with the technology available. And since cell phones, facebook, and email is open to basically anyone, studies show that Internet bullying can start with students as young as fourth grade.
This source covers several real cases of cyber bullying and how parents, students, and educational professionals reacted to these situations. It offered many different view points on whose to blame, if it is right for a school to get involved in the situation, and why students choose to bully through digital methods. The information was unique because of all the situations and examples presented throughout. Comparing it to other research is hard due to the fact no actual studies were preformed. However, because of the amount of information, it gives an unbiased view point that is extremely helpful.
|
Source Three - Teen Cyberbullying Investigated: Where Do Your Rights End and Consequences Begin?
Jacobs, T., (2010) Teen cyberbullying intvestigated: where do your rights end and consequences begin?. Free Spirit Publishing.
|
This book was a very useful source for my research because it dealt specifically with the controlling values of my research project. It talks about where your rights end with the freedom of speech and creative expression and the consequences of being extremely hurtful to others. There is a judge Tom Jacobs that presents court cases involving teens and charges with cyberbullying. Some of these cases include the use of text messages, emails, blogs, chat rooms, and people stealing passwords and sending out false information. Each chapter features a different case.
This book really influenced my research because it gave very specific examples of cases that any individual can read and see the consequences I know it is reliable since these cases are backed up with evidence and proven to be true. It was also useful because even though it contained statistics, important facts, and suggestions to those that want to research further, it was also a book that had a narrative aspect to it. I was able to read through it a lot easier then just a regular article.
|
Source Four - Cyber-Bullying: Creating a Culture of Respect in a Cyber world. Reclaiming Children & Youth
Keith, S., & Martin, M. E. (2005). Cyber-bullying: creating a culture of respect in a cyber world. reclaiming children & youth, 13(4), 224-228.
|
The article Cyber-Bullying: Creating a Culture of Respect in a Cyber world focuses on cyber bullying and its new form since individuals are able to bully without being under supervision. The researchers used surveys to understand how many children all over the country have come across cyber bullying. In both instances, a little more then 50% of kids had said hurtful things, or had someone say hurtful things to them. The article also discusses the signs of cyber bullying, tips for children and parents to prevent or help it, as well as key terms that parents may want to know when discussing this topic.
This article was useful in the sense that it was not a research article. Besides surveys, no actual participant study was conducted, however it is a reliable source since not only does it mention the surveys used and results, but it quotes other research articles as well. This source was unique from the other sources because it includes solutions and offers advice to individuals either going through or individuals who know someone being cyber bullied. This is a much different perspective then the other sources giving my research a variety.
|
Source Five - Cyber-bullying: Issues and solutions for the school, the classroom, and the home
Shariff, Shaheen. (2008). Cyber-bullying: Issues and solutions for the school, the classroom and the home. New York: Routledge.
|
This is a very informative book broken into several chapters. It discusses how to profile a person who cyber bullies, specific types of bullying, the effects, how cyber bullying affects other countries and how different individuals or groups play roles in cyber bullying. Like most sources, the one over lapping theme is how cyber bullying is still a relatively new concept due to the every changing technological world. Every day people join new forms of social media, therefore, this book proves to be a great source for educators, parents and the media so we may understand the ever changing and complex topic of cyber bullying.
This source proves to be superior then others since it has the chance to cover a wide range of topics. This can be a negative, since when articles are focused on one specific topic they go more in depth, but being able to cover so many different types of situations involving cyber-bullying leads to an excellent source and reference. What is unique about this source is that it defines what bullying is before moving onto the actual cyber bullying. I believe it is crucial to understand one before understanding how bullying evolved into the other.
|
Source Six - High school teachers' perceptions of cyberbullying prevention and intervention strategies
Stauffer, S., Heath, M., Coyne, S., & Ferrin, S. (2012). High school teachers' perceptions of cyberbullying prevention and intervention strategies. Psychology In The Schools, 49(4), 352-367. doi:10.1002/pits.21603
|
High school teachers' perceptions of cyberbullying prevention and intervention strategies discusses the impact of cyber bullying, schools responses to cyber bullying, and ultimately examines attitudes that teachers have towards perceptions, interventions and prevention strategies on cyber bullying. Though like most articles on the subject, another main concept is that the fact the cyber bullying is rather new occurrence and that anti-cyber bullying strategies and plans do not yet exist, but should be implemented.
The key to why this article can be very important towards my groups research is that it is not just an outside perspective, but talks about how schools can be held legally responsible for cyber bullying that is not reported. This is a new piece of information that is barely brought up in most of my academic journal articles. Also, reading responses from teachers about prevention instead of victims or parents/guardians of victims offered a new point of view to my research. Yet, unlike some of the other research I found, this article touches upon gender in a different light. It believes that almost 50% of the time cyber bullying victims have no idea of the gender of the attacker. Looking at different viewpoints between article proves to be extremely helpful while researching.
|