Bullying in Adolescence: An Analysis of Two Studies. California State University, Sacramento. Fall 2012 CHDV 138: Social and Emotional Development

Similar documents
HIGH SCHOOL FOR RECORDING ARTS

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

Chapter Five Socialization. Human Development: Biology and Society. Social Isolation

Bullying: A Systemic Approach to Bullying Prevention and Intervention

FAQs: Bullying in schools

Cyberbullying. How common is cyberbullying?

Crossing. the. L ne. Sexual Harassment at School

Infusion of School Bullying Prevention Into Guidance Curriculum. Significance of Bullying Prevention Program

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence

Cyber-bullying is covered by this policy: all members of the community need to be aware that

Springfield Public Schools

Bullying 101: Guide for Middle and High School Students

Toronto District School Board

Bullying: Analysis of 10 year Global Data

Applying the Washington State HIB Law in Your School

Comments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying.

General Symptom Measures

BULLY PREVENTION: ARE YOU PROMOTING HEALTHY RELATIONSHIPS IN YOUR CLASSROOMS AND SCHOOLS?

Mental health and social wellbeing of gay men, lesbians and bisexuals in England and Wales A summary of findings

Preventing Bullying and Harassment of Targeted Group Students. COSA August 2013 John Lenssen

Virtual Child Written Project Assignment. Four-Assignment Version of Reflective Questions

Psychology Works Fact Sheet: Bullying among Children and Youth

Bullying Prevention: Steps to Address Bullying in Schools. Getting Started

Socialization From Infancy to Old Age A. Socialization and the Self self a. Self-identity Socialization

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

Restorative Parenting: A Group Facilitation Curriculum Activities Dave Mathews, Psy.D., LICSW

ACADEMIC DIRECTOR: Carla Marquez-Lewis Contact: THE PROGRAM Career and Advanced Study Prospects Program Requirements

Children / Adolescents and Young Adults

The Respectful Workplace: You Can Stop Harassment: Opening the Right Doors. Taking Responsibility

THE TRUTH ABOUT BULLIES

Bullying/Harassment Policy

What Is the Olweus Bullying Prevention Program?

8 th European Conference on Psychological Assessment

Bully-Proof Your School

HARTFORD PUBLIC SCHOOLS DISTRICT SAFE SCHOOL CLIMATE PLAN

School Counselor (152)

NEW PERSPECTIVES ON BULLYING PREVENTION: WHY ARE CURRENT PROGRAMS NOT WORKING?

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

Young Men s Work Stopping Violence & Building Community A Multi-Session Curriculum for Young Men, Ages From HAZELDEN

Theories of Moral Development

Bullying Prevention and Intervention:

Girls & Cyber- bullying

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Chapter 5. Socialization

Jenny Walker, Ph.D.

Tools for Screening and Assessment of Suicide Risk

Massachusetts Anti-bullying Law:

Noah s Ark Nursery. Behaviour Policy

Today s teens use technology more than ever. Most have

The Relationship between the Fundamental Attribution Bias, Relationship Quality, and Performance Appraisal

Bullying in school: A study of Forms and Motives of Aggression in Two Secondary Schools in the city of Palu, Indonesia. Darmawan

Positive Psychology in the Israeli School System. Evaluating the Effectiveness of the Maytiv Center s Intervention Programs in Schools Research Report

Continuous vs. Discontinuous Nature vs. Nurture

Presented by Molly A. Gosline, Ed.M., M.A. School Climate Consultant School Climate Consulting Services, LLC

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Does student performance reduce imprisonment? *

Bullying and Harassment at Work Policy

Arkansas State PIRC/ Center for Effective Parenting

Teens and Cyberbullying

AN ACT RELATIVE TO BULLYING IN SCHOOLS.

Child Inpatient Mental Health Unit 6 North

Written Example for Research Question: How is caffeine consumption associated with memory?

Gender Stereotypes Associated with Altruistic Acts

Cyber Bullying: Promoting Healthy Schools

General Therapies for Individuals with Autism

Southeastern Community College P. O. Box 151 Whiteville, NC (910) COURSE SYLLABUS

BULLYING/ANTI-HARASSMENT

THE EFFECTS OF FAMILY VIOLENCE ON CHILDREN. Where Does It Hurt?

Standards for the School Counselor [23.110]

Anti Harassment and Bullying Policy

AN INVESTIGATION OF THE DEMAND FACTORS FOR ONLINE ACCOUNTING COURSES

The Mozart effect Methods of Scientific Research

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander

Chapter 3. Online Bullying

School Bullying Survey

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12

How To Prevent Bullying In The United States

School Bullying and the Law in the Republic of Ireland David Quirke BA, LLM

Cork Education and Training Board. Programme Module for. Child Psychology. leading to. Level 6 FETAC

Performance objectives Determinant Change objective Theoretical Method Practical application. thoughts differing. 2. Tailoring. Demonstrate how to

Running head: THE EFFECTS OF EXTRA-CURRICULAR ACTIVITIES

Jean Piaget: Cognitive Theorist 1. Theorists from centuries ago have provided support and research about the growth of

Chapter 2. Theories of Psychosocial and Cognitive Development

WHOLE SCHOOL ANTI-BULLYING POLICY

Running head: SCHOOL COUNSELORS AND THE CYBERBULLY. School Counselors and the Cyberbully: Interventions and Implications. Julia S.

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Key Points. SNAPSHOT The impact of domestic violence on children. Domestic violence and children

Edward W. Brooke Charter School Bullying Prevention and Intervention Plan

Psychology of Women PSY-270-TE

Overview of School Counselling

Cognitive Development

Chapter 7 MIDDLE CHILDHOOD. Instructor: Monica Moreno Tuesday evening class: 6:50 pm to 10:00 pm Section: 3080 Fall 2015

Scientific Methods II: Correlational Research

PREA COMPLIANCE AUDIT TOOL QUESTIONS FOR INMATES. Prisons and Jails 05/03/2013

OPENING ACTIVITY BALL OF STRING FLING

e-rate toolkit Cyberbullying: Crossing the Line

Canadian Pacific Railway

Chief Paletta welcomed the group, and members and guests introduced themselves.

July 1 Dec. 31 for HIB Trainings and Programs Sept. 1 Dec. 31 for HIB Investigations and Incidents

Transcription:

1 RUNNING HEAD: BULLYING IN ADOLESENCE Bullying in Adolescence: An Analysis of Two Studies Sierra Dimberg California State University, Sacramento Fall 2012 CHDV 138: Social and Emotional Development

2 There is a growing concern among youth, parents, teachers, and individuals all over the world regarding bullying. Bullying is a dysfunction in peer relationships and is defined as repeated exposure over-time to negative actions by one or more persons that is intended to harm and includes a power imbalance (Espelage & Swearer, 2003). The reason bullying is a concern is because it has been related to a vast array of social and emotional adjustment problems for victims including loneliness, anger, anxiety, depression/suicide ideation, decreased self-esteem, and a growing dislike for or avoidance of school (Moore et al., 2012; Schaffer, 2009). It is also a cause for alarm because of the high numbers of children who are victims of being bullied. Espelage and Swearer report in their review that 77% of children in middle and high school report being victims of bullying at school. Bullying at school can take many forms including physical, verbal, or relational, and recent research has also found that it occurs in cyberspace too (called cyber bullying) (Law, Shapka, Hymel, Olson, & Waterhouse, 2012; Moore, Huebner, & Hills, 2012). This paper analyzes the findings of an empirical article to see the incidence, nature, and effects of cyberbullying using social-emotional concepts and developmental theories. Article I: Electronic bullying and victimization and life satisfaction in middle school students. Summary & Critique The first article that I reviewed explored the nature and prevalence of electronic bullying and victimization. There are different terms for bullying via technology such as electronic bullying, cyber bullying, and online social cruelty. In this study the Center for Safe and Responsible Internet Use used online social cruelty and defined it as a discourse that defames, constitutes bullying, harassment, discrimination, discloses personal information, and contains offensive, vulgar, or derogatory comments (Moore et. al., 2012). This research examined how prevalent cyber bullying had become. Previous research had shown that thirteen million six to seventeen year olds have been victims of electronic bullying and that there is an 85% overlap in

3 bullying that takes place online and at school (see Moore et. al., 2012). This means that although the bullying may take place outside of school, it may be carried into the school as well. This study included 855 participants that were in the seventh or eighth grade and in the South Eastern United States with relatively equal representation of males and females. Participants were asked to fill out the Multidimensional Students Life Satisfaction Scale, Students Life Satisfaction Scale, and Electronic Bullying Questionnaire. There were five domains looked at which included family, friends, school, living environment, and the self. Researchers were examining the relationships between electronic bullying and being a victim with global life satisfaction and satisfaction in the five domains. A Pearson correlation was conducted as well as a hierarchical regression analysis for this cross sectional design. Moore et al. s (2012) results showed that 14% of participants engaged in electronic bullying behavior and 20% were victims of electronic bullying. Electronic bullying was significantly correlated with gender, parent s marital status, and self reported grades while electronic victim was significantly correlated with ethnicity, grade, SES, parent s marital status, and self reported grades. Males were more likely to have encountered electronic victimization while females were more likely to be electronic bullies. Global life satisfaction was significantly correlated with parental custody and marital status as well as with self reported grades. Across Comment [j1]: For each of these you should identify who had more so for gender (females more bullied or more likely bullies?) You can break this into smaller sentences weaving in that information or else add another sentence after that says Males, and children from single parent homes etc. the domains, family satisfaction was correlated with parent s custody and marital status as well as self reported grades. Friend satisfaction was correlated with gender, parent s status, and self reported grades while living environment was correlated with grade, age, parent s marital status, and self reported grades. The self was correlated with race and self reported grades and school satisfaction was correlated with gender, SES, and self reported grades. These results suggest that

parent s marital status and self reported grades may have a high impact on life satisfaction and 4 that there are factors that may lead to being a bully or victim. The participants were in seventh or eighth grade, suggesting they were late adolescents. The results of this study for electronic bullying and electronic victimization were not surprising because gender, ethnicity, parent s marital status, and self reported grades may be seen as a power imbalance among peers and cause the bullying or victimization. There are many influences, such as the life domains previously listed, that affect a child s development socially Comment [j2]: Maybe make a statement here about multiple influences on social and emotional development since these factors are also related to this and reference Shaffer s text. and emotionally. Whether the child is the bully or the victim, there are influences outside of the bullying incident that can even influence the act. The sample has a major limitation of only being applicable to junior high students, thus leaving out a majority of student population and a small percentage was identified as involved in cyber bullying. The survey method was appropriate for the age of the participants but may leave out important information. This study used correlation and regression analysis which cannot show causation, which limits conclusions about direction of effects. This research leads me to question what other factors might correlate with electronic bullying or victimization. It also has me question if a person s life satisfaction might affect how the individual views being a bully or victim. Article II : The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization. Summary & Critique Law and colleagues (2012) examined the roles of bullying online as a bully, victim, or Comment [j3]: Maybe add a point from the selfesteem chapter in Shaffer. Comment [j4]: I moved thi section from above and made it the article II critique because I thought it flowed better to discuss the roles after the prevalence and correlates the other article discusses. Since we needed to shave words off the total of the paper, I also removed the summary of the first part of their study since the second part added more to the conversation. bystander (witness). 733 eleven to eighteen year olds (62% female) were asked to fill out the Social Responsibility on the Internet survey that looked at a difference in methods among cyber bullying. The results showed a variation in methods used but not roles. The two most common forms included aggressive messaging and commenting or posting embarrassing photos or videos.

5 This part of the study also showed an increase in retaliation between the bully and victim which could be due to an increased perceived feeling of comfort saying things online due to an anonymity of the internet. The finding that there was no variation in roles for cyber bullying means that the participant was seen as a bully and a victim instead of being solely a bully or a victim. It also showed the most common methods of cyber bullying and that it is more reciprocal because there is not a distinction between roles. Comment [j5]: Sierra, explain and expand on this finding a little more, please. This article raises important implications for prevention and intervention of bullying, as well as for parenting. It shows that bully prevention techniques for cyber bullying should include teaching the differences of being a bully, victim, and bystander and that parents need to make their child aware that the computer is not a protective screen that allows them to say whatever they want to whoever they want. The sample size was quite large and the methods of obtaining the information were successful for the age group of participants. However, one of the limitations is that the findings may not have generalizability to the adolescent population as a whole. Another limitation is that participants may not have been honest when answering the surveys and provided false information, which would affect the results. This article mentioned a need for future research regarding cyber bullying to be longitudinal to look at longer effects and see if there are changes in electronic aggression over the course of development (Law et al., 2012). Theory Application Two developmental theories were used to examine cyber bullying and its effects: Piaget s Cognitive-development Theory and the Frustration/Aggression Hypothesis. Cognitivedevelopmental Theory focuses on intellectual growth and development of reasoning over four stages: sensorimotor, preoperations, concrete-operations, and formal-operations (Shaffer, 2009). The participants in both of the studies from the articles fall under Piaget s formal-operational

6 stage so I will describe that stage in more detail. Children formal-operations are typically eleven years and older and in this children are able to think rationally and systematically about abstract concepts and hypothetical events (Schaffer, 2009, 61). Moore et al. (2012) results showed that middle school student s parent marital status and self reported grades affect life satisfaction which suggests that they may be able to think abstractly about certain life events and apply it to their satisfaction in other life domains. However, while perfecting the ability to think hypodeductively, children make predictable errors in thinking in early adolescence which Elkind s termed adolescent egocentrism where adolescents also begin to obtain an imaginary audience and hold a personal fable. An imaginary audience is when the child feels that they are always being looked at or observed by peers and being judged or concerned with their behaviors (Shaffer, 2009). This imaginary audience may be heightened for victims of bullying, whether the bullying is traditional or cyber. If the victim feels like they are always on stage because they are repeatedly bullied, they might feel a lack of peer acceptance and could be a reason for increased anxiety shown in victims. Law et al. (2012) suggested that the two most common forms of cyber bullying were aggressive messaging and commenting or posting embarrassing photos or videos which, according to Piaget s Cognitive-development Theory, could create a larger imaginary audience for adolescents because more people have access to view either on the internet. The personal fable adolescent s in this stage hold is that they hold unique thoughts or feelings compared to their peers. A victim could feel that they have a uniqueness which is what causes them to get bullied and could lead to conformity to try and fit in and be accepted by peers. The theorist Piaget would say that the power imbalance seen in bullying may be due to different cognitive intelligence and understanding. A bully might rationalize actions or behaviors differently than a victim. Also, bullies and victims might have different hypothetic-deductive

7 reasoning, meaning they solve a problem differently which could be why the bully uses bullying as a tactic for conflict resolution or to show power. The second theory allows to understand the possible overlap between traditional and cyber bullying with traditional moving into cyber space. Berkowitz created the revised frustration and aggression hypothesis from Dollard s frustration and aggression hypothesis stating that frustration prepares us to act aggressively. Moore et al. (2012) suggests that there could be a frustration with gender, parent marital status, and self reported grades that can cause a person to act aggressively since it is correlated with electronic bullying. He also states that there are many things that can cause anger, including aggressive habits that have been obtained and that an aggressive cue must be present to evoke an aggressive response from a person (Schaffer, 2009, 291). This aggressive cues hypothesis considers stimuli that was once associated with aggression stimulates aggression from a person that is angry. This means that previously viewing cyber bullying as a bystander or witness could serve as aggressive cue. Law et al. (2012) results showed that there is more retaliation between bully and victim among cyber bullying which could be due to viewing other acts of cyber bullying as the aggressive cue. Even traditional forms of bullying or aggression viewed on television or video games could serve as an aggressive cue. Berkowitz would claim that the reason cyber bulling was found to be reciprocal in Law et al. (2012) was because the act of being bullied creates a frustration in the victim and serves as an aggressive cue, readying the victim to retaliate. The perceived protection of the computer screen makes it easier for a victim to retaliate and relieve their frustration. Since cyber bullying is more accessible to a wide audience to part take as a bystander, Berkowitz could also hypothesize that cyber bullying will increase due to frustration building and obtaining the aggressive habits that the viewers see. Comment [j6]: For each theory add a sentence to connect it to each of the article s findings.

Conclusions 8 I am very glad I chose this topic. Not only is bullying becoming a topic of interest for myself, it is becoming a point of interest for schools, the work place, and research. I am especially glad that I chose this topic because little research has been done on cyber bullying and I hope to contribute in this field. I learned that bullying is a problem that student s face, and cyber bullying is an increasing problem. There are many risks and effects associated with being a victim of bullying and it needs to stop. Schools need to implement training for teachers and staff on how to spot bullying behaviors and how to prevent it, as well as how to handle the situation. Instead of punishing the bully, investigation should occur as to why the student might be bullying so we can take appropriate preventative measures. Parents need to learn signs associated with being a bully or victim so they can help their child and avoid negative risks they might encounter. As a future researcher, I can do my part by studying different risks and effects so that we can try to prevent and intervene as necessary. I can use Piaget s Cognitive-development Theory to apply hypothetical events to bully and victim prevention because adolescent s are able to think rationally about hypothetical events and can determine how to properly respond if put in real situations. I can use Berkowitz s frustration and aggression hypothesis to study if seeing aggression online leads to aggressive acts by the viewers because of the aggressive cue present. It is obvious that there is much more research needed in this field so we can prevent the many risks associated with being a victim of bullying, whether traditional or cyber.

9 References Espelage, D. L., & Swearer, S. M. (2003). Research on school bullying and victimization: What have we learned and where do we go from here?, School Psychology Review, 32(3), 365-383. Law, D. M.; Shapka, J. D.; Hymel, S.; Olson, B. F.; & Waterhouse, T. (2012). The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization, Computers in Human Behavior, 28, 226-232. Moore, P. M.; Huebner, E. S., & Hills, K. J. (2012). Electronic bullying and victimization and life satisfaction in middle school students, Social Indicators Research, 107, 429-447. Shaffer, D. R. (2009). Social and Personality Development (6 th ed.). Belmont, CA: Wadsworth.