A few journal reviews of cyberbullying already exist (e.g. Mora-MerchĂĄn & JĂ€ger, 2010; Smith, 2012; Smith & Slonje, 2010; Tokunaga, 2010), but the area is developing very rapidly, in part as new technologies develop and new fashions (such as particular social networking sites) appear. In this review we briefly highlight some important aspects, including definitional criteria; types of cyberbullying; age and gender differences; overlap with traditional bullying and sequence of events; differences between cyberbullying and traditional bullying; motives for perpetration and impact on victims; student coping strategies, and school-based prevention/intervention.
Definitional issues
Over the last decade, awareness of cyberbullying, followed by research activity and publications, has increased dynamically. Much of the literature (though not all) is on cyberbullying in young people. Also, much of the literature (though not all) stems from a psychological perspective, and has built on a thirty-year tradition of research on what is often called âtraditionalâ bullying, or âofflineâ bullying. This carry-on includes both early definitions of cyberbullying, as well as the kinds of topics pursued (such as characteristics of cyber-bullies and cyber-victims). Nevertheless, other disciplinary perspectives are also present, and the area presents some new challenges as well as opportunities for researchers (Bauman, Walker, & Cross, 2013; Smith, 2010).
Bullying is generally seen as intentional behaviour to harm another, repeatedly, where it is difficult for the victim to defend himself or herself (Olweus, 1999). It is based on an imbalance of power and can be defined as a systematic abuse of power (Rigby, 2002; Smith & Sharp, 1994). By extending the definition from traditional bullying, cyberbullying has been defined as âan aggressive act or behaviour that is carried out using electronic means by a group or an individual repeatedly and over time against a victim who cannot easily defend him or herselfâ (Smith, Mahdavi, Carvalho, Fisher, Russell, & Tippett, 2008). From this perspective, cyberbullying is a systematic abuse of power which occurs through the use of information and communication technologies (ICTs).
Although the definition mentioned above (or similar ones) is quite common within the cyberbullying context, some of these definitional aspects are under debate. Two criteria in particular separate bullying from more general aggression (i.e. intent to cause harm). These are the aspects of repetition, and power imbalance. Both can be seen as relatively clear for traditional bullying, but have more difficulties in application to cyberbullying.
First, the idea of repetition within cyberbullying is not straightforward; one cyberbullying act may readily âsnowballâ out of the initial control of the bully, due to the technology used. An example is a picture that is sent (or uploaded onto the Internet), that at a later stage is distributed by other people (not the initial perpetrator). Thus a single act by one perpetrator may be repeated many times by others, and experienced many times by the victim. If the repetition is not carried out by the perpetrator, is this still cyberbullying?
The second definitional issue is that of power imbalance. In traditional bullying this might refer to physical strength, psychological confidence, numbers, or popularity/rejection in a peer group context. But physical strength is not necessary for perpetration of cyberbullying, nor is strength of numbers. However, two rather new possibilities of power imbalance in cyberbullying are technical ability with ICTs, and anonymity (Vandebosch & Van Cleemput, 2008). For example, it is more difficult to respond effectively if you do not know the identity of the perpetrator; conversely, if a victim does know the perpetrator, then the more conventional criteria of physical/psychological strength and peer group popularity may come back into play (i.e. a victim may be fearful of retaliating against a popular and stronger pupil who may take further revenge offline).
Although it is possible to mount a defense of the criteria of repetition and imbalance of power in the cyberbullying domain, there are clearly difficulties (Smith, del Barrio, & Tokunaga, 2013). In practice, some studies actually measure cyber-aggression or cyber-abuse since they do not clearly include these two aspects (Bauman, Underwood, & Card, 2013). These issues are also discussed in Chapter 2.
Types of cyberbullying
Some studies just look at cyberbullying as a single construct. While suitable for some purposes, many aspects of cyberbullying (such as gender differences, or impact) seem to vary by the specific type of cyberbullying experienced. Some studies have divided cyberbullying into the two main media of Internet and mobile phone bullying (e.g. Ortega, Elipe, Mora-MerchĂĄn, Calmaestra, & Vega, 2009). However, in recent years the advent of smartphones makes it possible to send and receive emails via a mobile phone as well as use these phones to access the Internet more broadly; this makes the earlier distinction between mobile phone and Internet bullying problematic.
Some studies have investigated cyberbullying via a range of more specific media. Smith et al. (2008) used seven main media described by secondary school pupils: mobile phone calls, text messages, picture/video clip bullying, emails, chatroom, instant messaging, and websites. Hinduja and Patchin (2010) used a nine-item cyber victimization scale, covering similar media. Wachs and Wolf (2011) used a five-item scale, again covering similar media but grouping some of those together (e.g. text message/mobile phone call). In South Korea, cyberbullying in Internet game contexts has been found to be a very common form (Tippett & Kwak, 2012). These lists of types of cyberbullying and aggression are not exhaustive, and as technology develops, new forms of cyberbullying emerge.
An alternative to looking at the medium used in cyberbullying is to look at the type of action, or its content. There are a range of types of action, including flaming (online verbal fights); online harassment; cyberstalking (online intimidation/harassment); denigration (put-downs); masquerade (pretending to be someone else to send/post material to damage someone); outing (sharing embarrassing information or images of someone); exclusion (from an online group); putting up false profiles; distributing personal material against someoneâs wishes. Pyzalski (2012) listed 20 such categories of âelectronic aggressionâ. These are, to some extent, independent of the media used. Rivers and Noret (2010) described the content of abusive text messages and emails, in an English sample. Their ten main categories were: threat of physical violence, abusive or hate-related, name calling (including homophobia), death threats, ending of platonic relationship(s), sexual acts, demands/instructions, threats to damage existing relationships, threats to home/family, and menacing chain messages.
The ways young people communicate through ICT are rapidly changing. Over the last few years the spread of smartphones has enabled someone to use his/her mobile phone both for Internet as well as text messaging and calling. There has been a rapid increase in popularity of social networking sites such as Myspace or Facebook. Twitter has been another social networking development that has seen very rapid growth in recent years. New descriptive words are coming in: for example âsextingâ describes the circulation of sexualized images on mobile phones or the Internet; âtrollingâ describes persistent abusive comments on a particular website; âgriefingâ describes harassment of someone in a cyber game or virtual world. Researchers in the field need to keep up to date with such changes and expansions regarding new modes of cyberbullying and cyber aggression.