Kraft Wang July I JCC 2009
Kraft Wang July I JCC 2009
Kraft Wang July I JCC 2009
Jinchang Wang
This study examined teenagers perspectives on the effectiveness of a variety of cyber bullying
prevention strategies. The data was collected from a nation-wide online survey of middle school and
high school students. The 713 students who had completed responses to all of the 39 survey questions
were grouped into four categories according to their roles played in cyber bullying: pure-offender, purevictim, both-offender-and-victim, and neither-offender-nor-victim. Correlation between a students
role in cyber bullying and his or her perspective on the effectiveness of a prevention strategy is studied.
The five most effective cyber bullying prevention strategies for the students in each of the four
categories are analyzed. Teens in this study perceive the theme of taking away the offenders access to
technology as the most effective measure, regardless of their roles in cyber bullying. The findings of this
study could be useful for schools and communities in setting up policies and regulations to effectively
reduce cyber bullying.
Keywords: cyber bullying, cyber bullying prevention, preventing online harassment,
513
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
stopping and preventing cyber bullying may not be the same as the strategies students
perceive to be effective.
Furthermore, within the peer group students bully as means of gaining and
maintaining power over a victim (Vaillancourt, Hymel, & McDougall, 2003). Students
are not necessarily classified as either bullies or victims. They can be classified as both
bullies and victims (Espelage & Swearer, 2003). Victims of bullying may bully younger
children (Beran & Li, 2007; Willard, 2007b) or retaliate by bullying online (Beran & Li,
2007; Juvonen & Gross, 2008; Hinduja & Patchin, 2009; Shariff, 2008; Willard, 2007b).
Some students are not involved in bullying or cyber bullying (Beran & Li, 2007). For this
research, participants were grouped into four categories based on their role in cyber
bullying as a pure-offender, pure-victim, both-offender-and-victim, or neither-offendernor-victim.
In this research we surveyed 713 students to determine:
1. Which strategies are considered most effective from the students point of view, for
all as a whole and for each of the four categories of students? If we were to pick five
strategies to adopt based on the data, which would they be?
2. Are there statistically significant differences among the four categories of students in
their views on the effectiveness of each of the 14 cyber bullying prevention strategies? If
so, how do the four categories correlate to the views of effectiveness of the strategies?
The Growing Problem of Cyber bullying
Cyber bullying is a problem that exists worldwide among youth today (Kraft, 2006;
Shariff, 2008). As a result of this problem some teenagers harassed by cyber bullying are
suffering from depression, having their education compromised, and committing suicide
(Patchin & Hinduja, 2006; Shariff, 2008). Patchin and Hinduja studied 1,500 adolescents
and found that 33% of the respondents were victims of cyber bullying (Patchin, 2006). In
a February 2007 survey of 832 teenagers the National Crime Prevention Council reported
that 43% of teens ages 13-17 had experienced cyber bullying (Moessner, 2007). The
demographic group with the highest percentage reporting they experienced cyber bullying
was 15 to 16 year old girls (Moessner, 2007). A University of New Hampshire study
showed an increase in the prevalence of cyber bullying in 2005 from 2000 (Ybarra &
Mitchell, 2007). Two-thirds of the teens surveyed in a May 2009 survey thought cyber
bullying was a serious problem (Thomas, 2009).
Relationship of Bullying and Cyber bullying
Cyber bullying and bullying are often interrelated (Beran & Li, 2007; Willard, 2007b.)
A student who is being bullied at school may be bullied online (Beran & Li, 2007;
Willard, 2007b). A study by Beran and Li (2007) showed that more than one-third of the
participants, ages 12-15, who were bullied online were also bullied in school (Beran & Li,
2007). According to research by Patchin & Hinduja (2009) and Juvonen & Gross (2008)
there is a significant relationship between bullying and retaliation online and at school
(Szoka &Thierer, 2009, p.5). A student who is being bullied at school may become an
online bully to retaliate against the bully at school (Beran & Li, 2007; Juvonen & Gross,
2008; Patchin & Hinduja, 2009; Shariff, 2008; Szoka &Thierer, 2009; Willard, 2007b).
Although bullying and cyber bullying can be interrelated cyber bullying can take place
as a separate phenomenon (Ybarra, Diener-West, & Leaf, 2007). Victims of cyber bullying
514
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
are not always victims of bullying at school. A study by Ybarra, Diener-West, and Leaf,
(2007) found that 64% of youth who are bullied online are not being bullied at school.
Most harmful cyber bullying incidents occur away from campus because technology
use is often not supervised (Beran & Li, 2007; Shariff, 2007; Willard, 2008). Off-campus
cyber bullying incidents have been shown to have a negative impact on school climate
(Feinberg & Robey, 2008, Willard, 2007b), make it difficult for victims to function in
school (Feinberg & Robey, 2008), increase the risk for psychosocial problems for victims
(Ybarra & Mitchell, 2007) and place students safety at risk (Feinberg & Robey, 2008).
Online incidents that occur away from school can trigger in school behavior such as
school violence (Willard, 2008). Students may come to school angry as a result of conflicts
that occurred through online communication (Szoka &Thierer, 2009). A student may not
know what was said about him or her online until he or she hears about it the next day at
school (Feinberg & Robey, 2008). Being upset about a cyber bullying incident while in
school can interfere with a students ability to concentrate on learning while at school
(Beran & Li, 2007).
Schools are reluctant to discipline students for off campus cyber bullying incidents as
they fear being sued for violating a students First Amendment Free Speech rights (Tully,
2007; Willard, 2007b). A school can only discipline a student for off campus speech if the
speech materially disrupts (Tinker v. Des Moines, 1969) school activities or
substantially interferes with the rights of others (Tinker v. Des Moines, 1969).
Cyber bullying is considered to be more serious than traditional bullying as it is 24/7
and has an infinite audience (Beran & Li, 2005; Livingstone, 2006; Patchin & Hinduja,
2006; Shariff, 2008). Technology allows information to reach a large number of people in
a short period of time (Keith & Martin, 2005). The speed of technology can spread
rumors and humiliating pictures faster and to more people (Keith & Martin, 2005) than
word of mouth. Everyone receives the same message when technology is used instead of
word of mouth. The rumors can stay on the Internet indefinitely (Shariff, 2008).
Bullying Prevention Methods
The rise in school violence during the 1990s has prompted schools to take action
against bullying. The Secret Service and the Department of Education studied 37
incidents of targeted school violence (Vossekuil et al., 2002, p. 12) that occurred from
1974 to June 2000. Of particular concern is that almost three-quarters of the attackers felt
persecuted, bullied, threatened, attacked or injured by others prior to the incident
(Vossekuil et al., 2002, p. 21). The attackers described being bullied in terms that
suggested that these experiences approached torment (Vossekuil, et al., 2002, p. 44). It
was determined that bullying was a factor that played some role in the perpetrators
decision to make the violent attack at school (Patchin & Hinduja, 2006).
Schools have developed programs to address the issues of school violence and bullying.
Successful bullying prevention programs focus on changing the school culture to a climate
that discourages bullying (Nansel, 2001 et al.; Olweus & Limber, 1999). The components
of the world class Olweus bullying prevention program were setting clear rules and
consequences (Olweus & Limber, 1999), incorporating social skills training into the
curriculum (Nansel et al., 2001; Olweus & Limber, 1999), parental involvement, and
intervention services for bullies and victims (Nansel et al., 2001; Olweus & Limber, 1999).
This program was successful in Norway, but not as successful in the United States (Smith,
Pepler, & Rigby, 2004). The results of the Olweus bullying prevention program have not
515
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
been replicated elsewhere (Smith, Schneider, Smith, & Ananiadou, 2004). It is speculated
that the success of the Olweus bullying prevention program may be due to the fact that it
was introduced into schools after there were highly publicized suicide cases that were
linked to bullying (Smith, J.D. et al., 2004).
Anti-Bullying programs have had modest success with the average reduction in
bullying incidents being about 15% (Smith, et al., 2004). Bystanders provide the audience
for bullying incidents. According to research by Hawkins, Pepler, and Craig (2001) when
a bystander intervenes in a bullying incident the bullying stops within 10 seconds 57% of
the time. The success of a bullying program can be determined by the bystanders decision
to intervene or encourage bullying.
Cyber bullying Prevention Methods in Schools
Cyber bullying most often occurs outside of school hours using home computers
(Shariff & Hoff, 2007). School officials are often reluctant to take action against students
making posts to websites while not in school (Franek, 2006). Temporary e-mail accounts
and pay as you go cell phones allow for bullies to remain anonymous (Patchin & Hinduja,
2006). The anonymity of the Internet and knowing that they are less likely to be punished
for acts taking place off school grounds makes cyber bullying attractive as kids think they
will not be held accountable for their actions (Shariff, 2008). First Amendment free speech
rights reinforce that consequences for cyber bullying may not be upheld in a court of law
(Layshock v. Hermitage School District, 2006; Associated Press, 2005) or possibly even
rewarded with a monetary settlement (Associated Press, 2005) if the school is found guilty
of violating a students First Amendment free speech rights for taking disciplinary action for
Internet postings (Associated Press, 2005). Given the vulnerability that school districts face
for lawsuits, administrators have found that cyber bullying issues have been resolved
informally by contacting the parents (Aftab, 2010b; Tully, 2007; Willard, 2007b).
Parental education can be the key to preventing cyber bullying (Aftab, 2010a; Tully,
2007; Willard, 2007a). In a study by Agatston, Kowalski, and Limber (2007) students
reported that they would be more likely to report a threatening incident of cyber bullying
to their parents than to an adult at school because they do not think the adults at school
could help them with the cyber bullying problem (Agatston, Kowalski, & Limber, 2007).
Parents who know what actions to take rather than overreacting (Aftab, 2010a) or
thinking cyber bullying is just a part of growing up (Aftab, 2010a) will be better equipped
to help their child cope with a cyber bullying incident. It is recommended that parents
contact the school (Aftab, 2010a; Ybarra et al., 2007) when their child tells them he or she
is being harassed online.
There is research evidence that ongoing communication about and supervision of
online activities can also prevent teens engaging in risk taking behaviors on the Internet
such as disclosing personal information, offline meetings, sharing photos, and exposure to
threatening messages (Berson, Berson, & Ferron, 2002). A study by Berson et al. (2002)
showed that when teachers, parents, or other caregivers have an ongoing dialogue about
cyber activities and monitor adolescent girls Internet use there is a decreased tendency to
engage in cyber activities that lead to potential harm (Berson et al., 2002, p. 51).
Adolescent girls who had ongoing discussions and monitoring by parents were less likely
to have filled out a form that discloses personal information, agreed to meet in person with
someone they met online, told personal information, or sent suggestive e-mail (Berson et
al., 2002). Having poorer parental monitoring and relationships with parents or other
516
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
518
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
519
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
represented in the sample. States with larger populations had more students in the sample.
There were no more than 10% of the participants from any single state.
The study was controlled to have 50% of the respondents self reporting that they were
cyber bullies. Table 1 shows the demographics of the four categories in terms of gender,
race, type of school attended, age, and household income. The sample of 713 students was
representative in terms of race, household income, and gender of the 2000 census data.
The sample is broken down based on the respondents role of pure-victim, pure-offender,
both- offender-and-victim, and neither-offender-nor- victim based on self reports of being
a perpetrator or victim of cyber bullying.
Table 1
Demographics of the four categories and participants
Percent-in-category (number-in-category)
Category
Category Total
Gender
Male
Female
Race
White
African American
Asian
Hispanic-non-white
Biracial
Other
School
Elem. up to grade 8
Middle
Junior High
High
Other
Age
13
14
15
16
17
Other
Household Income
0-20k
20k-50k
neitherpurevictimvictim
nor100%(60)
offender
100%(303)
Total
number
Total %-in713-responses
100%
47.2%
52.8%
bothpureoffenderoffender
and-victim 100%(61)
100%(289)
51% (154)
49% (149)
37% (22)
63% (38)
43% (125)
57% (164)
57% (35)
43% (26)
713
336
377
75% (227)
9% (26)
7% (21)
5% (15)
4% (11)
1% (3)
75% (45)
3% (2)
3% (2)
8% (5)
7% (4)
3% (2)
78% (225)
7% (19)
4% (13)
6% (18)
4% (11)
1% (3)
66%
10%
7%
7%
8%
3%
(40)
(6)
(4)
(4)
(5)
(2)
537
53
40
42
31
10
75.2%
7.4%
6%
6%
4%
1%
5% (14)
22% (68)
14% (41)
58% (177)
1% (3)
2% (1)
25% (15)
12% (7)
62% (37)
0% (0)
6% (16)
18% (52)
14% (40)
62% (178)
1% (3)
5% (3)
21% (13)
16% (10)
54% (33)
3% (2)
34
198
98
426
8
5%
21%
14%
60%
1%
20% (60)
17% (51)
20% (62)
19% (58)
19% (58)
5% (14)
17% (10)
22% (13)
20% (12)
18% (11)
22% (13)
2% (1)
11% (32)
23% (67)
30% (87)
17% (49)
18% (53)
0% (1)
16% (10)
25% (15)
25% (15)
23% (14)
11% (7)
0% (0)
112
146
177
132
131
16
16%
20%
25%
19%
18%
2%
12% (37)
19% (58)
3% (2)
28% (17)
5% (15)
21% (62)
8% (5)
23% (14)
59
151
8%
21%
520
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
50k-75k
75k-100k
100k-150k
Over 150k
Dont know
17% (51)
11% (34)
8% (24)
3% (10)
29% (89)
13% (8)
15% (9)
5% (3)
0% ( 0)
35% (21)
22% (65)
12% (36)
9% (26)
5% (15)
24% (70)
16% 10)
5% (3)
7% (4)
3% (2)
38%(23)
134
82
57
28
203
19%
12%
8%
4%
28%
Females in our study were more likely to report being victims or both-offenders-andvictims of cyber bullying as shown in Table 1. Note that in the category of pure-victim,
37% are males and 63% are females and for both-offender-and-victim 43% are males and
57% are females.
Boys were more likely to be offenders and less likely to be victims. For the category
of pure-offenders, 57% are males and 43% are females. These results are consistent with a
study by Li (2007) that showed that boys were more likely to be cyber bullies only and
girls were more likely to be cyber victims only (Li, 2007).
Measure
This purpose of this study was to measure the perceived effectiveness of the 14
strategies presented in Table 2 by students who are offenders, victims, both offenders and
victims, and neither offenders nor victims of cyber bullying. The strategies are numbered
from one to fourteen in the first column of Table 2. The question number as it appeared
in the survey is listed in the second column of Table 2. The abbreviated strategy listed in
the third column of Table 2 provides a highlight of a strategy for the convenience of
reference later in this paper. The full strategy as presented to the participants is listed in the
fourth column of Table 2.
These strategies were selected from research in the literature, state regulations, and
programs in schools. Strategy 1, not allowing the offender to use the computer at home
or school; strategy 3, parent taking away computer and cell phone; and strategy 6, offender
not allowed to use social networking were based on the premise that teenagers did not
want to tell their parents that they had experienced cyber bullying because they feared that
they would have their computer privileges restricted (Juvonen & Gross, 2008) or taken
away (Beran & Li, 2007; Keith & Martin, 2005; Patchin & Hinduja, 2006; Shariff, 2008).
Table 2
Summary of Cyber bullying Prevention Strategies
Strategy Question Highlight of strategy Strategy stated on questionnaire
Number
1
Q-11-a
No computer use in Cyber bullies would not be allowed
school and home for to use the computer at home and
offender
school. Any assignments for school
that required using the library would
have to be done at the library using
books.
2
Q-11-b
Sending offender to Sending cyber bullies to an
another school
alternative school away from their
regular school as punishment.
521
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
Q-11-c
Parent
taking
away
offenders computers and
cell phones
Offender paying victim
money
Q-11-d
Q-11-e
Q-11-f
Q-11-g
Q-11-h
Q-11-i
No access to social
networking sites for
offender
Offender
attending
netiquette classes on
Saturdays
20 hours of community
service for offender
No
extracurricular
activities for offender
10
Q-11-j
Offender
doing
presentation about cyber
bullying
11
Q-25
12
Q-26
13
Q-28
14
Q-30
522
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
The second strategy, sending the offender to an alternative school, was taken from
Georgias state anti-bullying law that stated that the law provides for the assignment of
certain students to alternative schools to prevent bullying (Georgia HB 81, 1999, section
2(D) (2)).
Strategy 4, requiring the offender to find a job and pay the victim money from their
wages, reflects the idea that a parent could be held financially liable for damages as a result
of their teens behavior online (High, 2009; Tully, 2007; Williard, 2007a).
Strategy 5, repeat offenders would not be allowed to go to a four year college their
freshman year was based on the case in which Justin Layshock was denied admission to
Pennsylvania State University (Associated Press, 2007) as a result of posting a phony online
profile about his schools principal (Layshock v. Hermitage School District, 2006). It is
also based on the new rule on the Common Application used by 320 colleges and
universities, that has added a discipline question to screen applicants who have committed
a school violation leading to probation, suspension, removal, dismissal or expulsion
(Pappano, 2007).
Strategy 7, requiring the offender to attend netiquette classes on Saturday, follows
Thorbahns research result that Saturday school programs were effective in changing
student attitudes and helping them to understand the consequences of their behavior
(Thorbahn, 1995). The SMART (Saturday Morning Alternative Reach and Teach)
Program is a Saturday school program for students who have serious disciplinary violations
that can include cyber bullying. The SMART program is used by the School District of
Philadelphia and in the Chicago Public Schools (School District of Philadelphia, 2009;
Chicago Public Schools, 2008). Saturday morning classes and community service are
frequently used as a disciplinary measure in the SMART programs reflecting the ideas
proposed strategies 7 and 8 (Chicago Public Schools, 2008; Bannester, 2000).
Some schools punished students for cyber bullying by not allowing them to participate
in extracurricular activities and to go on field trips (Associated Press, 2005). Such a strategy
was addressed in strategy 9. Strategy 10 was from a case discussed in (Dickerson, 2005).
Strategies presented in questions 11, 12, 13, and 14 are strategies are commonly used in
schools for bullying/cyber bullying prevention (Willard, 2007 b).
Survey Design
A survey instrument was used to collect the data for the study. The survey was
approved by Richard Stockton College of New Jerseys IRB for Human Subjects
committee. The format of the survey was designed by the authors with Zoomerang.coms
online survey tool.
There were a total of 39 questions in the survey, of which two questions were used to
obtain and verify parental consent, ten demographic questions, four about students roles
as offenders and victims of cyber bullying, six about their roles as bystanders to cyber
bullying, nine about their views on prevention strategies, three about why teens choose
to or not to cyberbully, three about the cyber bullying problem and prevention measures
at their school, one about how the respondent would prefer to report cyber bullying, and
one about whose responsibility it was to prevent cyber bullying. Four of the 39 questions
were open-ended. The others were multiple-choice questions.
523
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
Survey Administration
A professional market research firm, Market Tools, Inc. was hired to recruit subjects
and collect the data online. Market Tools, Inc. is a leading full-service provider of market
research services. They are the parent company of www.zoomerang.com. This
organization deploys surveys created with the Zoomerang survey tool through the
Zoomerang website. The people who answer the surveys are part of the ZoomPanel that
consists of over two million people (Market Tools, Inc, & Zoomerang.com). The profile
of ZoomPanel members is based on United States census data to ensure accurate
population (Market Tools, Inc, & Zoomerang.com). The ZoomPanel is used by
multinational companies such as McDonalds, General Mills, KFC, Procter and Gamble
and Microsoft (ZoomPanel.com, 2010). We chose to use the Market Tools because they
use True Sample Technology to verify that participants are, unique, real, and engaged
(Conklin, 2009). True Sample is a unique Market Research technology that systematically
ensures data quality. To ensure that data was real, Market Tools verified that information
about gender, zip code, and household income matched with the data in extensive
databases with validated consumer demographics that are used by the financial services
industries for each member of the ZoomPanel. Market Tools used digital fingerprinting
technology to check that the respondents did not repeat surveys, and used TrueSample
technology to identify fraudulent responders and removed them from the sample
(Conklin, 2009). True Sample technology detects common markers of erroneous data that
include respondents repeating surveys, taking the survey too quickly and not reading the
questions, and fraudulent data.
The time to take the survey was about 20 minutes. The survey was administered
online from June 26, 2008 to July 8, 2008. Market Tools e-mailed the survey to the
members of the ZoomPanel panel that have identified in their demographic profile that
they have teenagers living in their home. The teenagers who live in homes with
ZoomPanel members completed the survey for our study. The investigators did not have
access to any personal identifiable information such as e-mail addresses.
Since it impossible to personally obtain informed consent in most online surveys
having implied consent from respondents is an accepted practice when using online survey
research (Patchin & Hinduja, 2006; Walther, 2002). Respondents obtain implied consent
by presenting participants with a consent letter before starting the survey (Patchin &
Hinduja, 2006). The consent letter tells what specific actions must be performed before
taking the survey (Patchin & Hinduja, 2006). Having the respondents click on an icon to
start the survey and then click a submit button to return the data back implies consent
(King, 1996).
For this study the researchers presented participants with a consent letter. A participant
under age 18 was asked to have his or her parents give them permission to participate in
the survey. To give consent the parent entered his or her initials in a text box below the
consent letter. This method is similar to the method Patchin and Hinduja (2006) used to
obtain parental permission in their online survey. After parental permission was obtained
the respondent clicked on an icon to start the survey. Because the survey is anonymous it
is impossible to verify if parental consent was obtained. As a check the researchers asked
the students in the first question if they had their parents permission to take the survey. If
the student responded no, the survey was terminated.
The Zoomerang survey tool has a quota feature that rejects respondents based on
responses after the desired sample size for a category is achieved. The limit of respondents
524
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
was set to 350 for cyber bullying offenders and 350 for non-offenders based on the
funding available for the study. Once the number of completed surveys reached the quota
for a group, the survey was closed to the filled group. There were 13 extra samples for
non-offenders.
The 713 samples of the survey were complete and valid based on our pre-set
qualifications such as ages and parents permissions, and within the quota. This data is from
a convenience sample in which participants decide to participate in the study. It is not
possible to generalize convenience samples to a larger population (Couper, 2000), but the
technique has been used for exploratory studies (Patchin & Hinduja, 2006) to obtain initial
data for further research (Berson et al., 2002). There is limited empirical research about
what methods students perceive to be effective to prevent cyber bullying. We believed
that using a convenience sample would provide data that could lead to further study using
more scientific methods.
Results and Discussion
This study compares the perspectives of pure-victims, both-offenders-and-victims,
pure- offenders, and neither-offenders-nor-victims, and explains correlations between a
students role in cyber bullying and his or her views of the effectiveness of various cyber
bullying prevention strategies. The results of the data analyses presented in this section are
organized into answers to the inquiries about cyber bullying prevention strategies that
school administrators, researchers, and legislators may be concerned about.
Students Roles in Cyber bullying vs. Their Views
Inquiry 1. Are there statistically significant differences among the four categories in their views on the
effectiveness of each of the 14 cyber bullying prevention strategies? If so, how do the four categories
correlate to the views of effectiveness of the strategies?
To answer this inquiry, one needs to investigate (1) whether the students in each of
the four categories have significantly different views on the effectiveness of the prevention
strategies, and (2) how they are correlated. For that purpose, the regression method was
selected to be used in the analysis. By using this method the researchers could tell the
significance of a correlation, as well as whether the correlation was positive or negative.
Considering possible colinearity existing among the 14 strategies, single regression, instead
of multiple regressions, was used. Each single regression model takes the effectiveness of
one strategy as the independent variable X, and the category of the respondent as the
dependent variable Y. There are five possible values for X, one through five, representing
very ineffective to very effective. There are four values for Y, 1 through 4, each
representing a category of a students role in cyber bullying. Since different ways of
numbering categories may have different results in regression, twenty four (permutation of
four) single regression models were run for every strategy. Each model is associated with a
way of category numbering. The results showed that the most significant differences
always occur when numbering the categories as 1 for pure-offender, 2 for both-offenderand-victim, 3 for neither- offender-nor-victim, and 4 for pure-victim.
Table 3 lists the eight strategies that students views of effectiveness are significantly
different among the four categories. The eight strategies are sorted according to their pvalues for statistical correlation with the smallest (most significant) on top. The table does
525
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
not include those strategies that are not significantly correlated with the categories such as
p > 0.056. The plus or minus sign in the parentheses after a p-value gives the correlation
direction telling whether the correlation between X and Y is positive or negative. For
example, 0.005(+) for strategy 3 means that the chance of making an error is 0.005 by
asserting that different categories of students would have different views of the
effectiveness of this strategy, and the correlation is positive.
In the regression models that derived the results in Table 3, the meanings of values of
dependent variable Y are 1 for pure-offender, 2 for both-offender-and-victim, 3 for
neither-offender-nor-victim, and 4 for pure-victim. Since independent variable Xs values
are 1 through 5 representing very ineffective through very effective, a positive correlation
between a strategy and four categories implies that students who have had experience
cyber bullying others (pure-offender and both-offender-and-victim) tend to rate a
prevention strategys effectiveness lower than those who have never bullied others. Also,
with positive correlations students who have been victims of cyber bullying tend to rate
the effectiveness of a particular strategy higher than the offenders. When there are positive
correlations pure-victims give a prevention strategy the highest ratings while pureoffenders give the same prevention strategy the lowest ratings. The reverse is true when
negative correlations exist. When there are negative correlations pure victims give a
strategy the lowest ratings while pure offenders give the same strategy the highest ratings.
A high rating for a strategy means that a student views that strategy as effective. Hence,
offenders view strategies with negative correlations as effective since negative correlations
mean that offenders gave that strategy a high rating.
Table 3
Eight Strategies those Four Categories of Participants Have Significant Different Views
Strateg
p-value (+ or
Description
y
relation)
9
No extracurricular activities for offender.
0.000000(+)
10
Offender doing presentation about cyber bullying.
0.000008(+)
7
Offender attending netiquette classes.
0.00008(+)
3
Taking away offenders computers and cell phones.
0.005(+)
1
No computer use in school and home for offender.
0.01068(+)
4
Offender paying victim money.
0.0202(+)
12
Setting clear rules and enforcing penalties on offender.
0.002235(-)
14
Ongoing cyber bullying prevention programs.
0.05562(-)
The results in Table 3 provide important references for school administrators and
educators who are setting up cyber bullying prevention strategies. The students view on
the effectiveness of a strategy is a determinant of its effectiveness in implementation.
However. students views typically differ on a strategy, depending on their roles in cyber
bullying. When deciding to use a strategy, one should not only consider the strategys
overall effectiveness, but also to whom it is most effective and to whom it is least effective.
For example, if a policy is to prevent cyber bullying by penalizing offenders, a negative
correlation would be better than a positive one, since such a policy is mainly for the
offenders and a negative correlation shows that the pure-offenders tend to view the
strategy as effective. On the other hand, if the goal is to prevent ordinary students from
cyber bullying others, a positive correlation would be better, since such a strategy is
526
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
mainly for non-offenders. In this case a positive correlation shows that the non-offenders
tend to view the strategy as effective.
The top three strategies listed in Table 3, strategy 9, no extracurricular activities for
offender; strategy 10, offender doing a presentation about cyber bullying; and strategy 7,
offender attending Netiquette classes on Saturday, are relatively mild prevention
strategies. The extremely low p-values show that students views are significantly different.
Considering the fact that the three strategies are all penalties to offenders or something
against the wills of offenders, the effectiveness of implementing these strategies would be
most dependent on offenders views. However, the correlation directions are all positive,
which suggests that offenders tend to view these strategies as ineffective compared to nonoffenders.
Offenders often have low school commitment (Patchin, 2006) and may not care if
they are not allowed to participate in extracurricular activities as they may not want to
participate in these activities in the first place. Hence, strategy 9, revoking the privilege to
participate in extracurricular activities would not be an effective strategy to deter offenders
from cyber bullying. Offenders may not perceive cyber bullying to be wrong and would
not be embarrassed to give a presentation about it making strategy 10 ineffective. They
may not believe that strategy 7, netiquette classes, are necessary and may perceive taking
the classes as being told what to do online (Moessner, 2007). Hence, they may view
strategy 7 as ineffective because it is a strategy in which adults at school tell them what to
do online.
There are two strategies in Table 3 with negative correlations. They are setting clear
rules and consequences and having ongoing cyber bullying prevention programs. The
negative correlation is interpreted as that offenders tend to view the strategies as being
more effective than victims. Students who have had experience cyber bullying others
tend to view clear rules and ongoing programs as being more effective than those
who have never cyber bullied others. Compared to strategies 7, 9, and 10 that have
positive correlations, strategies, 12 and 14, are general and not specific. It suggests that
although cyber bullying offenders may not view the three specific and mild strategies as
being effective, they would not consider any rule to be ineffective. Clear rules with
penalties enforced and ongoing cyber bullying prevention programs are in general viewed
as effective by the offenders. So, when a specific cyber bullying prevention strategy is
established, its effectiveness should be accessed carefully and individually.
Students views on effectiveness of the strategies other than the above eight were not
significantly different, and they are not shown in Table 3. Those six strategies are: strategy
2 (sending offender to another school), strategy 5 (one year delay to 4-year college for
offender), strategy 6 (no access to social networking sites for offender), strategy 8 (20 hours
of community service for offender), strategy 11 (telling in class what to do as a victim),
and strategy 13 (having written policy on zero toleration about bullying).
Top-Five Effective Prevention Strategies
Inquiry 2. Which strategies are considered most effective from the students point of view, for all as a
whole and for each of the four categories? If you were to pick five strategies to adopt based on the
data, which would they be?
527
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
Table 4
Average effectiveness of 14 strategies in the eyes of students
(1=very ineffective, through 5=very effective)
Strategy
1
2
3
4
5
6
7
8
9
10
11
12
13
14
pureoffender
(n=61)
3.459
3.262
3.770
3.098
2.738
3.869
3.066
3.264
3.148
3.213
3.426
3.221
3.426
3.426
both-offender-andvictim(n=289)
3.858
2.962
4.066
3.495
2.696
4.080
3.547
3.844
3.367
3.592
3.522
3.920
3.474
3.540
purevictim
(n=60)
3.983
3.083
4.150
3.583
2.883
4.150
3.683
4.050
3.967
4.033
3.617
4.083
3.483
3.683
neitheroffender-norvictim (n=303)
3.937
3.281
4.132
3.617
2.846
4.089
3.848
3.997
3.812
3.845
3.637
4.109
3.495
3.657
Table 5
Strategies Ranked on Effectiveness with Four Categories
pureboth-offenderpureneitherEffective
offender
and-victim
victim
offender-nor(n=61)
(n=289)
(n=60)
victim(n=303)
Most
6
6
3
3
2nd most
3
3
6
12
3rd most
1
12
12
6
4th most
11
1
8
8
5th most
13
8
10
1
6th most
14
10
1
7
7th most
2
7
9
10
8th most
8
14
7
9
9th most
12
11
14
14
10th most 10
4
11
11
11th most 9
13
4
4
12th most 4
9
13
13
13th most 7
2
2
2
Least
5
5
5
5
Each of the fourteen cyber bullying preventing strategies had five choices in the survey
for the students to pick. Five numbers were assigned to the five choices with 1 for very
ineffective and 5 for very effective. Table 4 summarizes the statistics of the effectiveness of
528
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
14 strategies with respect to the four categories. For each strategy, Table 4 shows its
category mean in each category. A larger mean indicates a higher average rating of
effectiveness given by the students. To identify the strategies that are effective from the
perspective of students, the fourteen strategies are sorted in descending order of the means
within each of the four categories. Table 5 shows the results of the sorting, which tells for
each category which strategy is viewed as most effective and which strategy is viewed as
the least effective. From Table 5 it would be convenient to pick the top-five or top-three
most effective strategies viewed by students in a category.
Note the difference between category means in Table 4 and the correlations in Table
3. A strategy whose correlation with categories is statistically significant, as those shown in
Table 3, does not have to have a high mean as in Table 4. Moreover, a strategy that has a
low mean in Table 4 may show a significant correlation in Table 3. Of the eight strategies
in Table 4, three strategies, 1, 3, and 12, are among the top nine most effective strategies
from the perspectives of students in any of the four categories as in Table 5. Actually, a
ranking under a category in Table 5 is derived by comparing means of the fourteen
strategies within a category, while Table 3 is derived by comparing students views on a
strategy among categories.
For three categories, both-offender-and-victim, pure-victim, and neither-offendernor-victim, the top five most effective cyber bullying preventing strategies are as follows,
albeit their orders in categories are different.
(1) Strategy 6: No access to social networking sites for offender.
(2) Strategy 3: Parent taking away offenders computers and cell phones.
(3) Strategy 12: Setting clear rules and enforcing penalties on offender.
(4) Strategy 8: 20 hours of community service for offender.
(5) Strategy 1: No computer use in school and home for offender.
The top-five most effective strategies for category pure-offender are somewhat
different from the other categories:
(1) Strategy 6: No access to social networking sites for offender.
(2) Strategy 3: Parent taking away offenders computer and cell phone.
(3) Strategy 1: No computer use in school and home for offender.
(4) Strategy 11: Telling in class what to do as a victim.
(5) Strategy 13: Having written policy on zero toleration about cyber bullying.
If the top-three most effective strategies are selected, then two strategies will be picked
by every category. These strategies are strategy 3 (taking away offenders computers and
cell phones) and strategy 6 (no access to social networking sites for offender). Students, no
matter whether they are offenders or victims, believed that not allowing offenders to
access to social networking sites and parent taking away offenders computers and cell
phones are among the top-three strategies that could most effectively prevent cyber
bullying. That is a strong message for school administrators and parents.
The finding is consistent with research that teenagers use technology as a link to their
friends and social life (Keith & Martin, 2005). They fear losing their technology privileges
(Beran & Li, 2007; Keith & Martin, 2005; Patchin & Hinduja, 2006; Shariff, 2008).
Without the Internet and cell phone they feel disconnected from their peer group. No
student, regardless of whether they are a pure-offender, pure-victim, both-offender-andvictim, or neither-offender-nor-victim, would want to be isolated from their social
network online. In contrast with strategies 3 and 6, strategy 5, one year delay to 4-yearcollege for offenders, is rated as least effective consistently by all the four categories. This
529
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
is another strong message for school administrators when considering avoiding ineffective
cyber bullying prevention policies. The disciplinary question on the application for
colleges will most likely not be a deterrent for cyber bullying.
Strategy 11 (telling in class what to do as a victim) and strategy 14 (having written
policy on zero toleration about bullying) are in pure-offenders top five picks. However,
the two strategies are ranked very low in the other categories. It seems that pureoffenders tend to rate these two strategies as more effective than the students in the other
categories as strategy 11 does not penalize them. Note the six strategies that offenders
rated lower than any other categories. These strategies are strategy 4 (offender paying
victim money), strategy 7 (offender attending netiquette classes), strategy 8 (20 hours
community service for offender), strategy 10(offender doing presentation about cyber
bullying), and strategy 12 (setting clear rules and enforcing penalties on offender). For
those strategies that restrict technology access, pure-offenders tended to view strategy 1,
(No computer use in school and home for offender), strategy 3 (Taking away offenders
computers and cell phones), and strategy 6 (No access to social networking sites for
offender) as effective. Penalties that would consume an offenders time or money were
viewed to be ineffective. That is a message from the pure-offenders that they are deterred
by the penalties restricting their access to technology rather than consuming their time or
money.
Conclusion: Implications for Preventing Cyber bullying
First, the category of students that prevention strategies must deter is the offenders.
The data revealed that the specific strategy that offenders viewed as effective was the
penalty that restricted his or her Internet and technology use. In general, clear rules with
enforced penalties and ongoing prevention programs were perceived as effective by the
offenders. Secondly, teens perceived the theme of taking away the offenders access to
technology as an effective prevention measure, regardless of their roles in cyber bullying.
This finding makes sense as all teenagers, regardless of their roles in cyber bullying, are part
of a generation that engages in cyber immersion (Brown, Jackson, & Cassidy, 2006).
Cyber immersion means that the Internet serves as the primary way that they
communicate for relationships, commerce, and recreation (Brown et al., 2006). By taking
away access to Internet and technology teenagers would lose their primary means of
communication and feel isolated.
Teenagers view having their own cell phone and computer as prize possessions,
regardless of their roles in cyber bullying. They use these items everyday and would miss
them if they were taken away. Having these personal possessions taken away by their
parents, even for a short period of time, would cause them to lose their social status within
their peer group. So even though the argument could be made that if a teens cell phone
or computer were taken away they could use a friends technology or go to a public
library, losing the technological convenience and the stigma would indeed serve as a
punishment.
Parents, schools, and social networking sites all are important stakeholders in
preventing cyber bullying (Ybarra el al., 2007). Hence their cooperation is needed to for
that purpose. Policies need to be in place at school, and the school should involve parents
when a cyber bullying issue arises. Meanwhile, parents have a responsibility to establish
and enforce rules at home. Such a joint work is necessary for effectively resolving the
problem of cyber bullying.
530
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
Associated Press. (2005, April 5). N.J. school rapped for punishing student over web site.
Retrieved
June
22,
2010,
from
http://www.firstamendmentcenter.org/news.aspx?id=15073.
Associated Press. (2007, July 13). Student had right to parody, federal judge rules. Retrieved
June 22, 2010, from http://www.firstamendmentcenter.org/news.aspx?id=18795.
Belsey, B. (2006). Bullying.org: A Learning Journey. Bulletin Newfoundland and Labrador
Teachers Association, 49(4), 20.
Belsey, B. (2010). www.cyber bullying.org: Always on, always aware. Retrieved April 30,
2010, from http://www.cyber bullying.org/.
Beran, T., & Li, Q. (2005). Cyber harassment: A study of a new method for an old
behavior. Journal of Educational Computing Research, 32(3), 265-277.
Beran, T. & Li, Q. (2007). The relationship between cyber bullying and school bullying.
Journal of Student Wellbeing, 1(2), 15-33.
Berson, I. R., Berson, M. J., & Ferron, J. M. (2002). Emerging risk of violence in the
digital age: Lessons for educators from an online study of adolescent girls in the United
States. Journal of School Violence, 1(2), 51-71.
Brookover, L. (2008). State policies on school cyber bullying. Retrieved June 18, 2010, from
http://www.firstamendmentcenter.org/PDF/cyber bullying_policies.pdf.
Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to
responses that are equitable and effective in addressing this special form of bullying.
Canadian Journal of Educational Administration and Policy, 57, 8-11.
Bullypolice.org. (2010). Forty-three states have anti-bullying laws. Retrieved June 17, 2010,
from http://www.bullypolice.org/.
Campbell, M. A. (2006). Cyber bullying: An old problem in a new guise?. Australian
Journal of Guidance and Counseling, 15(1), 68-76.
Chibnall, S., Wallace, M., Leicht, C. & Lunghofer, L. (2006). I-safe evaluation. Final
Report.
Chicago Public Schools. (2008, July 23). Chicago public schools policy manual: Student code of
conduct for the Chicago public schools for the 2008-2009 school year. Retrieved June 22,
2010, from http://sayre.cps.k12.il.us/documents/general/scc08.pdf.
Conklin, M. (2009, April). What impact do bad respondents have on business decisions? A
Market
Tools
white
paper.
Retrieved
June
21,
2010,
from
http://marketing.markettools.com/WP_BadRespondents.html.
Couper, M. P. (2000). Web-based surveys: A review of issues and approaches. Public
Opinion Quarterly. 64, 464-494.
Crombi, G., & Trinneer, A. (2003) Children and Internet safety: An evaluation of the Missing
Program. A report to the research and evaluation section of the National Crime Prevention
Centre Justice of Canada. Ottawa: University of Ottawa.
Dickerson, D. (2005). Cyber bullies on campus. Toledo Law Review, 37(1) Retrieved on
June
22,
2010,
from
http://law.utoledo.edu/students/lawreview/volumes/v37n1/Dickerson.htm.
Espelage, D., & Swearer, S. M. (2003). Research on school bullying and victimization:
What have we learned and where do we go from here? School Psychology Review,
32(3), 365-383.
Franek, M. (December 2005/January 2006), Foiling cyber bullies in the new wild west.
Educational Leadership, 39-43.
532
2009 International Journal of Cyber Criminology. All rights reserved. Under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Feinberg, T., & Robey, N. (2008, September). Cyber bullying. Principal Leadership (Middle
School Edition), 9(1), 10-14.
Georgia House Bill (1999) 84 Chapter 282. (O.C.G.A. 20-2-751.4 and O.C.G.A. 202-751.5.) Retrieved June 21, 2010, from http://www.bullypolice.org/ga_law.html.
Hawkins, D. L., Pepler, D. & Craig, W. (2001). Peer interventions in playground
bullying. Social Development, 10, 512-527.
High, B. (2009). Suggestions for parents when dealing with bullying. Retrieved June 22, 2010,
from http://www.bullypolice.org/dealing_with_bullying.pdf.
Hinduja, S., & Patchin, J. W. (2009). Bullying Beyond the Schoolyard: Preventing and
Responding to Cyber bullying. California: Corwin Press.
Juvonen, J., & Gross, E. (2008). Extending the school grounds?- Bullying experiences in
cyberspace. Journal of School Health, 78 (9), 496-505.
King, S. (1996). Researching Internet communities: Proposed ethical guidelines for the
reporting of results. The Information Society, 12, 119-128.
Keith, S., & Martin, M. (2005). Cyber-Bullying: Creating a culture of respect in a cyber
world. Reclaiming Children and Youth, 13(4), 224-228.
Kraft, E. (2006). Cyber bullying: a worldwide trend of misusing technology to harass
others. In K. Morgan, C.A. Brebbia, & K.M. Spector (Eds.).The Internet society II:
Advances in Education, Commerce, & Governance. Southampton, England: WIT Press.
Layshock v. Hermitage Sch. Dist. 2:06-cv-116, UNITED STATES DISTRICT
COURT FOR THE WESTERN DISTRICT OF PENNSYLVANIA, 2006 U.S.
Dist. LEXIS 21080, April 7, 2006, Decided, Reconsideration denied by Motion
denied by Layshock v. Hermitage Sch. Dist. 2006 U.S. Dist. LEXIS 20354 (W.D. Pa.,
Apr. 13, 2006).
Li, Q. (2007). New bottle but old wine: A research of cyber bullying in schools.
Computers in Human Behavior, 24(4), 1771-1791.
Livingstone, S. (2006). UK children go online end of award report. Retrieved June 22, 2010,
from http://www.lse.ac.uk/collections/children-go-online/.
Market Tools (2010) Sample from ZoomPanel. Retrieved June 21, 2010, from
http://www.markettools.com/sites/default/files/resources/data_sheet/DS_ZoomPane
l.pdf
Market Tools, Inc, & Zoomerang.com (2010). Survey respondents: Profile reference
book.
Retrieved
June
20,
2010,
from
http://www.zoomerang.com/resources/Panel_Profile_Book.pdf
McCormick, S. (2005) Bullying: Sticks, Stones, and Web Chat. The Independent Online
Edition.
Retrieved
June
22,
2010
from
http://education.independent.co.uk/schools/article328882.ece.
Megan Meier Cyber bullying Prevention Act. Retrieved June 24, 2009, from
http://thomas.loc.gov/cgi-bin/query/z?c111:H.R.1966.
Missouri Statutes 160.261, 565.090, 565.225.
Moessner, C. (2007). Cyber bullying. Trends and Tunes, 6(4). Retrieved on June 21, 2010,
from
http://www.harrisinteractive.com/news/newsletters/k12news/HI_TrendsTudes_2007
_v06_i04.pdf.
Nansel, T., Overpeck, M., Pila, R., Ruan, W., Simmon-Morton, B., & Scheidt, P.
(2001). Bullying behaviors among U.S. youth: prevalence and association with
533
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License
Kraft & Wang - Effectiveness of Cyber bullying Prevention Strategies: A Study on Students Perspectives
Vaillancourt, T. Hymel, S., & McDougall, P. (2003). Bullying is power: Implications for
school based intervention strategies. Journal of Applied School Psychology, 19, 157-176.
Vossekuil, B., Fein, R. A., Reddy, M., Borum, R., & Modzeleski, W. (2002). The final
report and findings of the safe school initiative: implications for the prevention of school attacks
in
the
United
States.
Retrieved
June
21,
2010,
from
www.secretservice.gov/ntac/ssi_final_report.pdf.
Walther, J. B. (2002) Research ethics in Internet enabled research: Human subjects issues
and methodological myopia. Ethics and Information Technology, 4, 205.
Willard, N. (2007a). Parents Guide to Cyber bullying and Cyberthreats in Cyber bullying and
Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress.
Champaign, IL: Research Press. Retrieved June 22, 2010, from
http://www.cyberbully.org/cyberbully/docs/cbctparents.pdf.
Willard, N. (2007b). Educators Guide to Cyber bullying and Cyberthreats. Center for Safe and
Responsible use of the Internet. Retrieved June 22, 2010, from
http://cyberbully.org/cyberbully/docs/cbcteducator.pdf.
Willard, N. (2008). Should schools be able to regulate off campus cyber bullying? CQ
Researcher Online, 20(48), 23-24.
Witte, J.C., Amoroso, L.M., & Howard, P.E.N. (2000). Research methodology-Method
and representation in Internet-based survey tools-Mobility, community, and cultural
identity in Survey, 2000. Social Sciences Computer Review, 18, 179-195.
Ybarra, M., & Mitchell, K. (2007). Prevalence and Frequency of Internet Harassment
Investigation: Implications for Adolescent Health. Journal of Adolescent Health, 41(2),
189-195.
Ybarra, M., Diener-West, M., & Leaf, P. (2007). Examining the overlap in Internet
harassment and school bullying: Implications for school intervention. Journal of
Adolescent Health, 41, S42-S50.
ZoomPanel.com
(2010).
Retrieved
June
21,
2010,
from
http://join.zoompanel.com/zoompanel/index.php?menu=About+Us.
535
2009 International Journal of Cyber Criminology. This work is licensed under a under a creative commons Attribution-Noncommercial-Share Alike 2.5 India License