Admin, Li
Admin, Li
Admin, Li
Educational Technology
2007, 23(4), 435-454
The fast development of new technology in recent years has also increased
school and student access to new technologies such as computers and cell
(or mobile) phones. Substantial research studies have shown that
computers in classrooms can have positive effects on learning of all
subjects. The introduction of electronic communication into classrooms,
however, also brings problems that deserve our attention. One such issue
436 Australasian Journal of Educational Technology, 2007, 23(4)
The problem of school bullying has been examined in the last two decades
and as a result, many schools have developed effective bully-prevention
programs. Many teachers and administrators now recognise this problem.
Few, however, are aware that students are being harassed through
electronic communication. Parallel to this lack of awareness by school
professionals, researchers have yet to examine the nature of cyberbullying
(Beran & Li, 2005). Although cyberbullying incidences have been reported
in different countries around the world, few studies, if any, have explored
the issue taking different variables such as culture, gender, bullying into
consideration. The growing number and the level of severity of
cyberbullying incidents reported worldwide calls for educators,
researchers, and policy makers to take action (Patchin & Hinduja, 2006).
Definitions
Although bullying traditionally has been equated to physical harassment,
researchers now define bullying as a form of aggression including verbal or
physical harassment. Specifically, “a student is being bullied when he or
she is exposed, repeatedly and over time, to negative actions on the part of
one or more students. The person who intentionally inflicts or attempts to
inflict, injury or discomfort upon someone else is engaging in negative
actions” (Olweus, 2003, p. 15). Bullying may take a wide range of forms
including hitting, pushing, holding, hostile gesturing, threatening,
humiliating, degrading, teasing, name calling, put downs, sarcasm,
taunting, staring, sticking out the tongue, eye rolling, silent treatment,
manipulating friendship and ostracising (Ma, 2001).
Objectives
Giving the fact that the cyberbullying is a new phenomenon, the first
objective for this study is to examine nature and extent of adolescents’
experience of cyberbullying and cyber victimisation in Canadian and
Chinese schools. The period of early adolescence for the study of
cyberbullying and cyber victimisation is chosen because adolescence is a
time when bullying is reported to be at its peak and “this period …
witnesses a series of abrupt changes in the social lives of youngsters”
(Pellegrini & Bartini, 2000, p.700). Most importantly, this paper explores the
extent to which certain factors contribute to cyberbullying and cyber
victimisation. These factors are: bullying, culture, gender, knowledge of cyber
safety, frequency of computer use, and academic achievement.
Related literature
According to Nelson (2003), “cyber bullying is often very serious, including
stalking and death threats… I can say anything I want. It’s impersonal.
Face to face is a little intimidating.” Many news stories have reported
cyberbullying incidents all over the world. Cyberbullying also takes
various forms and electronic communication tools - from email, listserve,
mobile phone, to websites. For example, a 15 year-old boy in Quebec,
Canada became an unwilling “celebrity when a film he made of himself
emulating a Star Wars fight scene was posted on the Internet by some
classmates. Millions downloaded the two-minute clip… He was so
humiliated he sought counseling, and his family has launched a lawsuit
against his tormentors” (Snider & Borel, 2004). In Japan, mobile phone
438 Australasian Journal of Educational Technology, 2007, 23(4)
pictures of an overweight boy, which was taken on the sly in the locker
room, were distributed to many of his peers (Paulson, 2003). Another
incident happened in Calabasas High School in California. “It was a
website – schoolscandals.com – on which vicious gossip and racist and
threatening remarks grew so rampant that most of the school was affected”
(Paulson, 2003). Combating cyberbullying is more difficult for schools than
people initially expected. Many bullies are anonymous. Further, under the
free speech rights, it is difficult to take down a website.
Aside from the many reported news stories, several surveys have been
conducted to explore cyberbullying issues. In a survey conducted in Britain
in 2002, it was found that one out of four youngsters aged 11 to 19 had
been cyberbullied (National Children's Home, 2002). An earlier survey
conducted in New Hampshire in 2000 found that about 6 percent of youths
had the experience of being harassed online (Thorp, 2004). A study
reported at a cyberbullying conference in Westchester indicated that “only
six kids out of 200 said they had not been involved in some form of
cyberbullying” (Dickstein, 2005).
These studies and the stories suggest that cyberbullying indeed occurs
around the world, yet it is unclear how different factors affect adolescents’
cyberbullying behaviors.
Contributing factors
Earlier research has indicated that many dimensions have negative impacts
on youngsters’ school lives (Wigfield, Eccles, MacIver, Reuman, &
Midgley, 1991). Many factors relate to bullying and victimisation, and I
hypothesise that they also relate to cyberbullying and cyber victimisation.
Li 439
Considering that there are limited research studies available that address
cyberbullying and that it may be seen as bullying moving to the new
medium, it makes sense to base hypotheses about the contributing factors
of cyberbullying on the relatively well researched literature in traditional
bullying. This section discusses the elements that are identified as
significant factors effecting bullying in the existing literature, and
consequently hypothesised as contributing factors to cyberbullying. These
are: bullying, gender, culture, use of technology, knowledge of cyber safety and
academic achievement.
considered in this study because they are not allowed in many Canadian
schools.
The fifth factor is awareness of cyber safety. According to the past two
decades of research into the prevention of bullying, awareness is identified
as one of the four most important areas that can reduce bullying in schools
(Campbell, 2005), and educating students about safety approaches plays a
major role in any effective anti-bullying programs. Campbell (2005) further
suggests that increasing awareness should also help reduce cyberbullying.
Methods
Data
Two sets of data were collected in 2004: Canadian and Chinese data. For
Canadian data, the participants were randomly selected from three middle
schools in Calgary. The three schools were chosen because of the schools’
enthusiasm about technology. The schools were involved in a large
educational technology integration project of the Province. Two schools are
Li 441
located in areas where residences are mainly at middle class range, and the
third is in a low to middle socio-economic status (SES) area. A total of 264
grade seven students (130 males and 134 females) completed the
questionnaire. Among them, only 7.6 percent are English as a second
language (ESL) students. Further, about three quarters of the students are
white, 6.5% Asian, and about 18% are Black, Hispanic Aboriginal, or other.
Close to 60% of the students reported that their school grades were usually
above average; while about forty% of them were average. Only several
students reported their grades to be below average.
The Chinese data were collected from 197 grade seven students (107 males,
90 females) who were randomly selected from two secondary schools in
Changsha, China. The same questionnaire was administrated to the
students. Amongst them, one in three reported that their school grades
were usually above average, while half of them were average. Close to ten
percent of the students reported their grades to be below average. Detailed
demographic information is presented in Table 1.
Table 1: Demographics of the students
Country Gender (%) Academic achievement (%)
M F Above average Average Below average
Canada (n=264) 49.2 50.8 57.2 39.4 1.9
China (n=197) 54.3 45.7 37.6 53.8 8.6
*Total percentages may not add up to 100 due to missing values.
Instrument
The survey instrument used was a questionnaire developed by Li (2007)
(see Appendix). It included a total of 22 questions which collected
information from two major areas: students’ demographic information and
their experience related to cyberbullying. It is important to note that no
student name or identification was collected and therefore, the survey was
anonymous. Because computers are an integral part of class instruction,
and mobile (cell) phones are not allowed in the Canadian schools surveyed
in this study, the emphasis was on computer use rather than mobile
phones. Frequency of mobile phone use was not included in the questions.
To collect the Chinese data, this original questionnaire was translated into
Chinese by a professor who is a native speaker with over ten years
experience in teaching English in Chinese universities. The Chinese version
of the questionnaire was administered in the two Chinese schools.
Analysis
This paper employed quantitative analyses of student surveys using SPSS.
Specifically, descriptive statistics was first used to explore the nature and
442 Australasian Journal of Educational Technology, 2007, 23(4)
Results
To date, cyberbullying has not been examined in relation to traditional
bullying issues. Evaluating traditional bullying behavior as a predictor
may add to the understanding of how cyberbullying is influenced by
traditional ways of harassment. Furthermore, factors like gender, culture,
knowledge of safety strategies, and frequency of computer use, may
provide valuable information to assess possible involvement with
Li 443
cyberbullying. The present study has explored these factors and others that
may predict which students were likely to be involved in cyberbullying.
What tools were involved in cyberbullying? For the 133 cyber victims, one
out of 5 was cyberbullied by emails only. About one third was cyberbullied
in chatrooms only and about 13% by mobile phone only. Another one third
was victimised via other technologies or mixed electronic means. What
tools did cyberbullies use to harass others? About one fifth of the
cyberbullies used email only, close to 28% used chatrooms only, and about
6% used mobile phone only. A large majority of the cyberbullies used other
electronic means or mixed types of technology to harass others (Table 3).
How often did cyberbullying occur? Over 30% of the cyberbullies reported
they harassed others less than 4 times, about 43% did it between 4 to 10
times and another 20% did it more than 10 times. The cyber victims
reported a somewhat different pattern: close to 55% were cyber assaulted
less than four times, about 20% were cyber harassed between 4 and 10
times, and another 21% were cyberbullied frequently, i.e. over 10 times.
Table 4 provides details.
Table 4: Frequency of cyberbullying
< 4 times 4-10 times >10 times
Cyberbully(N=82) 30.5 43.4 20.7
Cyber victim (N=133) 54.9 20.3 21.1
444 Australasian Journal of Educational Technology, 2007, 23(4)
Who were the predators? The results showed that out of the 133 cyber
victims, 25.6% were cyberbullied by school mates, 12.8% by people outside
school, 46.6% did not know who cyberbullied them and 8.3% were
cyberbullied by mixed groups of people (i.e. school mates and people
outside). In addition, only 48.9% of the cyber victims informed adults (e.g.
parents or teachers) about the incidents.
When considering the total student sample, only 34.5% reported that when
they knew someone being cyberbullied, they told adults. What were
students perceptions about adults’ intervening in schools? Only 63.6%
believed that adults in schools tried to stop cyberbullying when informed.
Further, over 65% of the students thought that they knew cyber safety
strategies. Who taught them those safety strategies? The results of the
survey showed that 30.2% of the students learned by themselves, about
13% learned from parents, less than 10% learned from schools, and another
9.1% from other sources.
Out of the potential predictors list, the most significant predictors of cyber
victim, in descending importance, were: traditional bullying (chi square (3)
= 11.79, p = .008), knowledge of safety strategies (chi square (1) = 3.43, p =
.064), and country (chi square (1) = 2.71, p = .100). The percentage of correct
classification was 71.4% and the goodness of fit (chi square (8) = 6.90, p =
.55) indicated a good fit model.
Given the same scores in other variables, Chinese students were more
likely to be cyber victims than their Canadian counterparts. In addition,
when other variables were controlled, cyber victims tended to report that
they knew safety strategies in cyberspace. In fact, students who reported
that they knew safety strategies were 1.54 times more likely, than not, to be
cyber victims compared with students who reported that they had no
knowledge of safety strategies.
Cyberbullying
Again, logistic regressions were used to analyse the same potential
predictors for cyberbullying. Out of the potential predictors list, the most
significant predictors of cyber victim, in descending importance were:
country (chi square (1) = 17.48, p <.001), bullying (chi square (3) = 16.38, p
= .001), gender (chi square (1) = 6.06, p = .014), and frequency of computer
use (chi square (1) = 2.68, p = .102). The percentage of correct classification
was 82.4% and the goodness of fit (chi square (8) = 6.81, p = .56) indicated a
good fit model (see Table 6).
Discussion
Nature and extent
As evidenced in this study, cyberbullying has become an increasingly
significant problem in schools and it deserves our serious consideration.
One in three adolescents participating in this study were cyber victims and
about one out of five students had cyber harassed others. Over half of the
sample reported that they knew someone being cyberbullied. It is
important to also note that over forty percent of the cyber victims had been
cyber harassed more than three times and 2 in 3 cyberbullies harassed
others four or more times. These results suggest that cyberspace has
become another “playground” for bullying. Bullying does occur in
cyberspace and it occurs frequently.
The tools used for cyberbullying includes emails, chatrooms, mobile (cell)
phones and other type of technologies. Cyberbullies and cyber victims
show similar patterns in terms of the type of tools used for cyber
harassment. A majority of the cyberbullying incidents involve the use of
computers or a mix of technologies, which suggests that a range of
technological means have been used negatively.
The fact that a majority of the bystanders or the cyber victims chose to keep
quiet underscores the importance of systematic education in safety
strategies from early age. A preliminary analysis of student narratives
suggests that many students held shallow understandings of safety in
cyberspace, even though many reported that they had the knowledge. For
example, students had some naïve understanding of cyber safety. Some
students believed that as long as they avoided online chat, they would be
safe. Just like approaches proven to be effective in fighting bullying,
educating cyber victims and bystanders may provide some key strategies
in combating cyberbullying. Focusing attention on empowering cyber
victims and bystanders has the potential to prevent a significant amount of
cyberbullying.
One of the most important results of this study is that engagement in the
traditional form of bullying is a very strong predictor for both
cyberbullying and cyber victimisation. Victims of traditional bullying,
regardless of whether they are victims or bully victims, are more likely to
be cyberbullied than the students who do not engage in bullying activities.
Likewise, bullies, including bullies or bully victims, have higher chance to
cyber harass others than those who are not involved in bullying. This
finding, though not surprising, has significant implications. It suggests that
bullying and cyberbullying are closely related. It is possible that bullying
started in the real world but extended to the cyberspace. This means that
cyberspace provides bullies another venue to harass others. It is also
possible that the harassment began in the virtual space, but the
perpetrators took it to real world which leads to face to face bullying. As
suggested by Beran and Li (2005),
… as a result of not receiving consequences for engaging in cyber
harassment, students may then continue the harassment when in close
contact with a student at school. In addition, cyber harassment may alter
bullying at school. For example, if “electronic bullies” remain undetected,
their bullying behaviors at school may become more severe and directly,
rather than indirectly, exerted against a victim. (p. 271)
Conclusion
This study contributes to the extant literature on bullying in several
conceptual areas. Firstly, cyberbullying is a bullying problem occurring in
a new territory. To date, few research studies have examined bullying issue
in this new context. The astonishing high proportion of adolescents who
had experiences of cyberbullying observed in both Canada and China
suggests that cyberbullying is becoming an increasingly significant
problem for schools and society generally.
One important point which needs to be stressed is that schools should play
a significant role in combating cyberbullying, yet, restricting Internet
usage, emails, or any other technological tools cannot stop bullies from
finding ways around the schools’ suspension of privileges. Establishing
effective anti-bullying programs as well as creating a culture of caring and
kindness in schools has never been more important. Awareness is the first
step and it is an absolute must. As indicated in student narratives, many of
the students do not even know that this is a form of bullying and not just
another disadvantage of this age group. If they do not even know they are
victimised, how can we help them? Similarly, the cyberbullies sometimes
do not understand that what they are doing is considered to be a form of
bullying. Most students do not want the reputation of being a bully. Once
Li 451
This study has some limitations, just like any research studies. For
example, the survey question intended to discover frequency of computer
use did not consider that a majority of students in the schools have easy
access to computers in this urban city. Simply categorising it into rare, 1-3
times per month, and over 4 times a month does not appropriately reflect
the current trend of access to computers. Further, as the data were collected
from urban schools in a large city in Canada and in a large city in China,
we need to be cautious about generalising the findings to other regions.
Acknowledgement
I express my appreciation to Ms Shelley Luo for translating the question-
naire and help in collecting data from the Chinese schools.
References
Bentley, K. M. & Li, A. (1995). Bully and victim problems in elementary schools and
students' beliefs about aggression. Canadian Journal of School Psychology, 11, 153-
165.
Beran, T. & Li, Q. (2005). Cyber-harassment: A new method for an old behavior.
Journal of Educational Computing Research, 32(3), 265-277. http://www.ucalgary.ca/
~qinli/publication/cyber-bully-Journal_of_Educational_Computing_Research_final.doc
Beran, T. & Li, Q. (June 2005). Cyber-harassment: A new method for an old
behavior. Paper presented at the Annual meeting of the Canadian Psychological
Association, Montreal.
Campbell, M. (2005). Cyber-bullying - An old problem in a new guise. Australasian
Journal of Guidance and Counselling, 15(1), 68-76.
http://eprints.qut.edu.au/archive/00001925/
Crystal, S. (1994). Concepts of deviance in children and adolescence: The case of
Japan. Deviant Behaviour, 15(3), 241-266.
Dedman, B. (2001). Schools may miss mark on preventing violence. [viewed 16 Oct
2003, not found 29 Sep 2007] http://www.suntimes.com/shoot/shoot16.html
Dibbell, J. (1996). A rape in cyberspace, or how an evil clown, a Haitian trickster
spirit, to wizards, and a cast of dozens turned a database into a society. In R.
Kling (Ed.), Computerization and controversy (2 ed.). NY: Academic Press.
Dickstein, L. (2005). School bullies find a new playground. [viewed 7 Nov 2005, not
found 29 Sep 2007] http://www.nydailynews.com/front/story/298461p-255094c.html
Eslea, M. & Mukhtar, K. (2000). Bullying and racism among Asian schoolchildren in
Britain. Educational Research, 42(2), 207-217.
452 Australasian Journal of Educational Technology, 2007, 23(4)
Appendix: Survey
Section one: About you (circle one):
1. Sex: Male Female Grade level______ Year of birth____________
2. How do you describe yourself:
Asian Hispanic Black White Aboriginal Other
3. English is my second language: Yes No
4. My school grades are usually: above average average below average
5. I use computers: rarely 1-3 times/month at least 4 times/month