Académique Documents
Professionnel Documents
Culture Documents
John C. Molluzzo
jmolluzzo@pace.edu
James P. Lawler
lawlerj@aol.com
Pace University
Seidenberg School of Computer Science and Information Systems
1 Pace Plaza
New York, New York 10038
Abstract
Cyberbullying is a concern for all citizens. Harassment and hostility continue to be evident on digital
media in society. In this study, the authors evaluate the perceptions of college students on cyberbul-
lying at Pace University. The findings from a research survey disclose a higher level of knowledge of
the perceived prevalence of cyberbullying and of the perceived perpetration of cyberbullying towards
distinct populations of students. The findings from the study concurrently disclosed a lower level of
knowledge of perceptions of institutional pro-action on problems of cyberbullying at the university.
This study will benefit administrators, counselors and instructors, and especially information systems
instructors, considering an improved process to respond to the sensitivity of students confronting
cyberbullying in both society and university.
Keywords: cyberbullying, electronic media, harassment, hostility, internet, mobile computing, priva-
cy, sexting, social networking, victimization
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 1
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
ence for students in schools in the United States drawal (Baldry, 2004) of victims. Peer harass-
and has been cited by President Barack Obama ment of high school students might be a factor
(Shepherd, 2011). in suicides of victims (Cleary, 2000). School
incidents of cyberbullying contributing to sui-
Cyberbullying is essentially an extension of bul- cides are highlighted by Cyberbullying News
lying. Cyberbullying is “any behavior performed (Cyberbullying News, 2010) in Table 1 of the
through digital or electronic media by [college Appendix. Such incidents are important inas-
students or groups of college students] that re- much as literature indicates that incidents of
peatedly [over time] communicates aggressive cyberbullying as a culture of high school stu-
or hostile messages intended to inflict discomfort dents contributes to further incidents of this
or harm on [other students] (Tokunaga, 2010, form of bullying in the culture of college stu-
p. 278). Behavior of cyberbullies may be in the dents (Laster, 2010).
form of cellular or digital imaging messages;
chat and discussion room messages; e-mail, in- Estimates of incidents of cyberbullying in colleg-
stant messaging, pictures and photographs, and es differ because of the diverse focus of authors
unauthorized video; messaging on profiles on in the literature (Cyberbullying Research Center,
social gaming and networking sites, such as 2011). However, 20% - 40% of children and
ChatRoulett, Formspring, Facebook and teenagers have experienced cyberbullying (To-
MySpace, and on systems, such as Twitter and kunaga, 2010, p, 277). Literature indicates in
YouTube; and Web blogs, pages or polling sites the past six months 34% of college students
targeting victims (Smith, Mahdavi, Carvalho and have experienced cyberbullying as victims; 64%
Tippett, 2006 and Li, 2007). Behavior of college of students have observed cyberbullying of other
students, especially teenagers, may be in sex- student victims; and 19% have been perpetra-
ting in “the sending or receiving of sexually- tors of cyberbullying victimization. Further liter-
explicit or sexually- suggestive [messaging or ature indicates increased homophobic incidents
photographs]” through the cellular telephone or and sexting of student victims, 39% as female
the social networking Web sites (Hinduja and victims and 25% as male victims – Tyler Clem-
Patchin, 2010). Victims may be repeatedly vic- enti of Rutgers University in New Jersey was a
timized by perpetrators through cyberstalking. male suicide victim of cyberbullying (Swearer,
2010). Incidents of cyberbullying may be in-
Cyberbullying is a devastating form of behavior creased in the culture of college students be-
because the goal of the perpetrator may not be cause of the closed community of a university,
clear to the victim. The perpetrator may cover especially of a suburban university, in which po-
her or his identity in anonymous e-mail address- tential student victims may be easy to find by
es or pseudonymous names and harass the vic- perpetrator students (Bostonia, 2009, p. 5).
tim without detection 24/7 (Phillips, 2010). This This college culture of cyberbullying may argue
form of bullying may be done from a location in for better education and enforcement about the
schools or from locations not in schools through problems of cyberbullying if college students
electronic media, and the material may be ex- perceive cyberbullying as a concern.
tended to a large number of students and non-
students on the Internet. Cyberbullying is 2. INTRODUCTION TO STUDY
heightened in schools by increased mobile and
social networking – 30% of teenagers with pro- “In ‘1984,” the abolition of personal space was
files on social networking sites have experienced part of an overarching government policy, but
harassment on the sites (Janviere, 2010). Frus- nowadays it [is] often nothing more than a side
tration is evident in the lack of privacy (Paul, effect of wired high spirits. The era of the ‘viral
2011). Cyberbullying as a form of bullying is a video,’ when footage of some absorbing slice of
concern cited in the literature. life can spread overnight around the globe, is
bringing out the anarchist in all of us.” (Kim,
Cuberbullying may contribute far greater prob- 2010)
lems of performance and sociality for student
victims (College Degrees, 2011) than the earlier The authors’ study attempts to evaluate the per-
form of non-electronic bullying. Cyberbullying ceptions of college students on cyberbullying.
may constrain learning performance in schools. Though literature indicates problems of cyber-
High school incidents of cyberbullying or bullying bullying, the perceptions of higher-aged college
may contribute to problems of social unhappi- students on bullying may indicate that cyberbul-
ness (Luster, Small and Lower, 2002) and with- lying is a basic condition of college culture if not
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 2
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
human nature (Greenya, 2005, p. 6). Percep- with few incidents higher than misdemeanors
tions may indicate that cyberbullying is a condi- (Cruz-Griffith, 2010), and in lack of policies re-
tion of experience for college students that do quired for schools, and furthermore, laws may
not have negative impact (Rigby, 1999) – per- not be helpful to students because of the lack of
haps in the perceptions of some students Tyler recent reflection of technology. School staff
Clementi was not courageous at Rutgers Univer- may not be helpful to the students because of
sity? Might not sexting be defended by the First their lack of skills – 25% of staff may not even
Amendment of the Constitution (Sullivan, be skilled in the cyberbullying laws of the states
2011)? Might sexting be a status symbol (Hen- (Hinduja and Patchin, 2010). The Department
derson, 2011)? Indifference of observer stu- of Education has had to inform colleges and high
dents to cyberbullying victims is indicated in the schools of the need for staff to be skilled in the
literature. Perpetrators portrayed in the culture laws (Dillon, 2010). Laws defined by the federal
of society may be more popular than victims, as government are limited nevertheless in the Unit-
in the “Simpsons”, in which Bart is victimized by ed States, as in the Education Amendments of
Nelson (Greenya, 2005, p. 3). The power of 1972 anti-discrimination laws (Title IX), though
perpetrators is recognized by students. The im- the Megan Meier Cyberbullying Preventation Act
portance of cyberbullying as a concern in a col- by Representative Sanchez (Kravets, 2009) and
lege setting of students may not be clear in the the Cyberbullying as a Form of Harassment Act
literature, but the evident and frequent prob- by Senator Lautenberg (Lister, 2010) are pend-
lems in the literature may indicate that cyber- ing in Congress. Perceptions of these proposals
bullying is not a benign issue. are often that they are impulsive and intrusive,
as there are already state cyberbullying laws.
Given the continuance of problems of cyberbul- The impact of these perceptions and problems
lying, colleges may have to consider further eti- and perceptions of “underprosecution” (The
quette (Mason, 2008) or guidelines for helping Economist, 2011) may be that colleges and
students (Edwards, 2010). Guidelines may be schools may have to be more involved in the
hindered however in the perceptions of adminis- prevention of cyberbullying, in order to lessen
trators and instructors in schools that bullying, if negative perceptions of students.
not indirect cyberbullying, is an experience in
the growth of students (Smith and Brain, 2000) Schools might consider a cyberbullying guideline
– pranks - and is not an important problem. The policy or process designed by the authors of the
perceptions of observer students and students study from the literature and highlighted in Ta-
victimized by cyberbullying may be that admin- ble 3 of the Appendix. Such a process might be
istrators, instructors and staff may not respond engaged in cyberethics (Kraft and Carlisle,
enough to the victimization – 30% of students 2010) at college, instructors and other levels in
may not even report the victimization to an a university. The process is interdisciplinary, so
adult person (Gomez, 2010). Observer students students might learn the context of cyberethics
who do not report cyberbullying fuel perpetra- as a desired experience integrated and internal-
tion of victimization (Greenya, 2005, p. 4). Cur- ized into the norms of a university. In fact, the
rent perceptions may be that guidelines of process is of internalizing new norms of sociality
schools may not helpful in intervening in the bul- of the university involving observer students
lying of perpetrators or in the prevention of that might be helpful in the prevention of cyber-
cyberbullying. The impact of the perceptions bullying. This process is an institutional pro-
may be that guidelines for intervention may con- gram for the prevention of perpetration and vic-
strain incidents of cyberbullying in colleges, but timization in the university and for the providing
they may not be effective in constraining cyber- of safety strategies for student non-victims and
bullying as an example of cultural problems victims (Bryce and Klang, 2009). Importantly
(Wong, 2009), absent laws. this process is a program for providing an inves-
tigative structure (Bostonia, 2009, p. 8) and
Bullying laws are already defined by almost all software tools (Tozzi, 2011). The impact of this
governments in the United States and are high- college cyberbullying guideline policy process or
lighted and identified by the Cyberbullying Re- other social media networking processes, in
search Center (Hinduja & Patchin, 2010) in Table providing a presumable prevention and safety
2 in the Appendix. However, these laws may structure, may have to be decided by positive
not be helpful to students because of differing perceptions of the structure by the students.
definitions for bullying and cyberbullying, in
sanctions diverse for perpetrators and schools
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 3
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Therefore, this study explores the perceptions of dents who were enrolled in a required computing
college students on cyberbullying and a cyber- course were asked to participate in an electronic
bullying guideline process. Might the percep- perception survey on cyberbullying, to which
tions of the students be that cyberbullying is not responses were anonymous. Of the 400 stu-
an important issue and instead is a norm of so- dents, there were 121 valid responses. In the
ciety? Might the perceptions of students be that May – June period, the authors of the study,
cyberbullying guideline policies or processes for who are instructors at the university, evaluated
instructors and administrators and for students the responses using Qualtrics and SPSS
are a formality in a university? Might there be (McClave and Sincich, 2006).
perceptions that students having a disability, or
ethnic, gender, homophobic, racial or religious The survey included a definition of cyberbullying
inclinations could be inevitably victimized by (Tokunaga, 2010, p. 278) followed by 60 ques-
perpetrator students even with prevention pro- tions: 4 demographic questions; 9 fundamental
cesses? Might there be perceptions that stu- knowledge of cyberbullying questions; 7 percep-
dents may not even be knowledgeable of proac- tions of cyberbullying institutional policy ques-
tive processes and resolution sources in the tions; 8 perceptions of cyberbullying problems
event of victimization? This study evaluates the and seriousness at the university questions; 13
perceptions of college students as to the seri- questions on perpetration and victimization in-
ousness or non-seriousness of cyberbullying and ternal and external to the university; and 19
cyberbullying policy and process solutions in a population questions on perpetration and victim-
university. ization. (The survey instrument is included in
Figure 1 of the Appendix.)
3. FOCUS OF STUDY
The questions in the survey were reviewed for
The focus of the study is to empirically evaluate integrity in research design, privacy, and sensi-
college cyberbullying by exploration of the tivity of inquiry by an Institutional Review Board
knowledge of students at a major metropolitan (IRB) of a committee of faculty of the university,
institution. Exploration of the perceptions of prior to the survey.
students as to the prevalence and prevention of
cyberbullying may contribute input into a pro- 5. ANALYSIS AND DISCUSSION OF
cess resolution and safety strategy that may FINDINGS OF STUDY
limit cyberbullying, if not bullying, in a college
setting. Findings furnish a not frequently found Demographic Data
model program for potential prevention of
cyberbullying that might be leveraged by admin- The average age of the respondents was 19.5
istrators, instructors and staff and students, years. Most respondents were female (58%),
subject to the perceptions of the scope of seri- which reflects the general student population at
ousness or non-seriousness of cyberbullying in the university. Most of the respondents were
an institution. In light of an increased anti- first-year students (63%) because the course in
bullying movement (Morgan, 2010) against non- which they were enrolled, a university core
civility in the culture of society (Agress, 2010), course, is generally taken by first-year students.
the findings of this study on the culture of a uni- Also corresponding to the general student popu-
versity might even be leveraged for optimum lation at the university, 54% of the respondents
sociality of society. Finally, this study might be were liberal arts students, 33% business stu-
leveraged by instructors in information systems dents and the remainder distributed among the
as they evaluate the impact of cyberbullying on three other schools of the university.
the profession and on society (Stoodley, Bruce
and Edwards, 2010). Student Awareness of Cyberbullying
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 4
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Strongly agree that cyberbullying is a serious Note that from Tables 7 and 8, one might con-
issue at the university. clude that although a good percentage of stu-
dents believe the university is knowledgeable of
Students were asked if they are aware of cyber- cyberbullying (45% Strongly Agree or Agree),
bullying incidents at the university, with 9% an- only 21% believe (Strongly Agree or Agree) that
swering “Yes”. Of those answering “Yes”, the university is sensitive to the issues of cyberbul-
number of incidents reported ranged from one to lying.
three. The number of perpetrators of these inci-
dents ranged from one to three, and the number The survey asked if professors were knowledge-
of victims ranged from one to three. able about cyberbullying. Table 9 in the Appen-
dix shows the results. Note that the results in
Students Being Cyberbullied this table are very close to that of Table 8 that
asked the same question about the university.
Respondents were asked if they were ever This indicates that students closely identify “the
cyberbullied at the university, with 7% respond- university” with their professors.
ing “Yes”. Of those answering “Yes”, the number
of times victimized ranged from 1 to “a few”. There are two courses that all students in the
The number of perpetrators ranged from one to university are required to take and where it
two. Students who admitted being cyberbullied might be appropriate for professors to discuss
were asked which method was used to cyberbul- issues of cyberbullying. One such course is CIS
ly them. Table 4 in the Appendix shows the re- 101, the university core computing course in
sponses. which the respondents were students; the se-
cond is UNIV 101, a non-credit bearing course
Respondents were asked if they are aware of required of all first-year students that introduces
cyberbullying of certain groups of people at the them to university life. 74% of the respondents
university. Table 5 in the Appendix shows the believed that cyberbullying should be discussed
results. Note that the largest groups being in CIS 101 and 73% believed that cyberbullying
cyberbullied are gay and lesbian students, fol- should be discussed in UNIV 101. The survey
lowed by females. asked if cyberbullying had ever been discussed
in any university course, with 29% responding
Students were also asked if they were victims of “Yes”. The number of professors discussing
cyberbullying outside the university, with 20% cyberbullying ranged from 1 to 5, with 50% re-
responding “Yes”. Of those answering “Yes”, the sponding that 2 professors had discussed cyber-
number of times victimized ranged from one to bullying and 38% responding that 1 professor
“countless.” The number of perpetrators ranged discussed cyberbullying.
from one to, unfortunately, “my whole junior
high.” Students who admitted being cyberbullied Interestingly, there are statistically significant
were asked which method was used to cyberbul- differences (at the p=0.05 level) in gender in
ly them. Table 6 in the Appendix shows the re- those believing that cyberbullying should be dis-
sponses. Note that the most prevalent method cussed in CIS 101 and UNIV 101. Nearly 80% of
of cyberbullying is through posting messages on females want cyberbullying discussed while only
social networking sites. 60% of males want it discussed.
The survey also asked if the respondents be- Student Awareness of Cyberbullying
lieved that the university is knowledgeable of Policies
cyberbullying as an activity harmful to students.
Table 8 in the Appendix shows the results. Students were asked if they were aware of the
university’s policy and cyberbullying laws in the
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 5
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
U.S. Only 21% either Strongly Agreed or Agreed which is perhaps not surprising for college-age
that they were aware of the university’s cyber- students. There was a statistically significant
bullying policy, while 34% Strongly Agreed or difference (at the p=0.05 level) between male
Agreed that they were knowledgeable of U.S. and female respondents in choosing “The Coun-
cyberbullying laws. seling Center” with 32% of males and 50% of
females making that choice. There was also a
Ethical Evaluation and Response high statistical difference in gender (p=.004)
between males and females in choosing “Par-
The survey asked if cyberbullying is a serious ents”, with 38% of males and 64% of females
issue for the respondent. See Table 11 in the making that choice.
Appendix. The results indicate that cyberbullying
is a serious issue for about 34% of the respond- 6. FINAL IMPLICATIONS OF STUDY
ents. This agrees with the previously stated re-
sult that about 7% of the respondents had been “It is not technology as such, which affects soci-
cyberbullied at the university and 20% outside ety for good or bad, but its uses, which are …
the university. shaped by the values of society … We must re-
member that we are not trapped helplessly in
The survey asked if the respondent had ever front of an unstoppable technological steamroll-
consciously been a perpetrator of cyberbullying. er. Our control is how we use our knowledge
Surprisingly, 10% admitted to doing so. Also that we will be required to live with the results
asked was the question “Might it be acceptable of our decisions on the use of this new technolo-
for freshman or sophomore students to be gy.” (Solomon, 1985)
cyberbullied by junior or senior students?” Sur-
prisingly, 8% responded “Yes”. The study shows that cyberbullying is a serious
issue for the respondents. A vast majority also
Respondents were also asked to make value believe that cyberbullying is wrong and a viola-
judgments on the privacy and ethics of cyberbul- tion of one’s privacy. This belief is confirmed
lying. Table 12 in the Appendix summarizes the (see Table 13) by the fact that a majority of stu-
results. Note that 84% either Agree or Strongly dents want a moderate to severe penalty for
Agree that cyberbullying is wrong, but 73% be- perpetrators of cyberbullying.
lieve that it is a violation of privacy. This shows
a possible misunderstanding of the full conse- The study shows that although the respondents
quences of cyberbullying. are very aware of cyberbullying on the Internet,
only a small number (11%) think that it is a se-
The survey asked what should be the conse- rious issue at their university and an even
quences of cyberbullying. The respondents were smaller number (9%) are aware of cyberbullying
given a list of penalties and were asked to incidents at their university. Of the 7% of re-
choose as many as they thought appropriate. spondents who admitted being cyberbullied at
See Table 13 in the Appendix. Note that the ma- the university, the study shows that the primary
jority, 63%, would want just a warning to the vector of cyberbullying is the posting of harass-
perpetrator while only 20% would suggest ex- ing messages on a social networking site, which
pelling the perpetrator. Does this indicate a view is in accord with the findings of Janviere (2010).
that cyberbullying is not that serious an issue for
students? There is a statistically significant dif- A much greater percentage of respondents
ference between males and females (at the (20%) were cyberbullied outside the university,
p=0.05 level) on suspension with 42% of males presumably for most in high school, (80% of
choosing suspension, while 64% of females respondents were first- or second-year students)
chose suspension. where again the primary cyberbullying vector
was a social networking site.
The survey also asked whom the respondents
would contact in the event they were a victim of The study also revealed some information that
cyberbullying. The respondents were presented might be useful to a university’s administration.
with a list of possibilities and were asked to As noted, only 21% of respondents believe that
choose as many as they deemed appropriate. the university is sensitive to cyberbullying is-
Table 14 in the Appendix summarizes the re- sues. A very large majority of respondents also
sponses. Note that the most popular response is believe that cyberbullying should be formally
“Your best friend” even over “Your parents”, discussed in required university courses and that
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 6
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
the university should do more to educate stu- was a concern for the students. Higher level
dents, faculty, and staff on cyberbullying issues. knowledge of the perpetration of cyberbullying
Table 14 in the appendix also shows that stu- towards distinct gender and homophobic popula-
dents are not comfortable contacting university tions of students and of the prevalence of cyber-
officials if they are cyberbullied. These results bullying at the university were in the study.
show that the university is in need of increasing Lower level knowledge of the students of the
student trust and awareness of university sup- proactive processes for safety steps with the
port for cyberbullying victims, and should take a institutional problems of perpetration and victim-
more active role in facing cyberbullying issues. ization were disclosed in the study. The study
furnished a model program that might be en-
7. LIMITATIONS OF STUDY AND gaged by administrators, instructors and staff
OPPORTUNITIES FOR FURTHER RESEARCH and also students in responding to the sensitivity
STUDY and seriousness of cyberbullying in the cultural
like norms of a university. This study will be
The findings from a sample of students in a further pursued in 2012 with a research survey
study of cyberbullying and cyberbullying policy by the university together with practitioner spe-
processes at Pace University may not be gener- cialists in the topic.
alized to other urban and suburban universities
in the United States without caution. Though
the responses of the students were largely 9. REFERENCES
through an anonymous survey, the sensitivity of
responding to a cyberbullying survey may have Agress, L. (2010). Civility – a lost art. The
underreported the perpetration and victimization Times, December 11, A9.
of the students (Cole, Cornell and Sheras,
2006). Also, the findings of the survey were Baldry, A.C. (2004). The impact of direct and
limited to the perceptions of students and lacked indirect bullying on the mental and physical
the perceptions of administrators, instructors health of italian youngsters. Aggressive Be-
and staff who are key players in policy processes havior, 30(5), 343-355.
of a university.
Bryce, J., & Klang, M. (2009). Young people,
The larger limitation of the definition of cyber- disclosure of personal information and online
bullying that may be consistent or non- privacy: Control, choice and consequences.
consistent with the definitions, focuses and the Elsevier Information Security Technical Re-
methodologies of other research studies (Cyber- port, 14, 160-166.
bullying Research Center, 2011 and Tokunaga,
2010, p. 283) may favor an opportunity for a Cleary, S.D. (2000). Adolescent victimization
new research study. Such a study might inte- and associated suicidal and violent behav-
grate with domestic practitioner specialists, as iors. Adolescence, 35(140), 671-682.
the Cyberbullying Research Center at Florida
Atlantic University and the University of Wiscon- Cole, J.C.M., Cornell, D.G., & Sheras, P. (2006).
sin – Eau Claire and the forthcoming Tyler Clem- Identification of school bullies by survey
enti Foundation (Foderaro, 2011), or interna- methods. Professional School Counseling,
tional specialists, as the Olweus Bullying Preven- 9(4), 305-313.
tation Program (Olweus, 1993, Research Center
for Health Promotion), so that a study by one Cruz-Griffith, V. (2010). Cyberbullying a prob-
university might match definitions and method- lem in college? UCTangerine: The Inde-
ologies to the specialists. Research study might pendent Student Publication of Utica College,
be further pursued by the authors of this study October 18, 1-3.
as to which cyberbullying policy processes were
successful and not successful at the university, Dillon, S. (2010). Help stop bullying, united
inasmuch as the seriousness of cyberbullying at states tells educators. The New York Times,
the university was a clear finding of this study. October 26, A12.
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 7
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
and youth violence: Causes or consequences
Foderaro, L.W. (2011). Parents of Rutgers stu- of psychopathologic behavior? Archives of
dent in suicide say no ‘harsh’ penalty is General Psychiatry, 63(9), 1035-1041.
needed. The New York Times, March 23,
A24. Kraft, T.A., & Carlisle, J. (2010). Computer eth-
ics: A slow fade from black and white to
Gomez, N. (2010). Cyberbullying: The nation’s shades of gray. Proceedings of the Infor-
epidemic. Converge, December 14, 1-2. mation Systems Education Conference
(ISECON), Nashville, Tennessee, 27(1331),
Greenya, J. (2005). Bullying: Are schools doing 1,2,7,9.
enough to stop the problem? CQ Research-
er, 15(5), February 4, 2,3,4,6. Kravets, D. (2009). Cyberbullying bill gets a
chilly reception. Wired, September 30, 1-9.
Hazler, R.J., Hoover, J.H., & Oliver, R. (1992).
What kids say about bullying. Executive Ed- Laster, J. (2010). 2 scholars examine cyberbul-
ucator, 14(11), 20-22. lying among college students. The Chronicle
of Higher Education, June 6, 2.
Henderson, T. (2011). Sexting: Case of 14-year
old girl provides cautionary tale to share Lister, J. (2010). Cyberbyllying suicide could
with teens. Parent Dish, March 28, 1-5. mean new college laws. Tech Blorge, Octo-
ber 11, 2.
Hinduja, S., & Patchin, J.W. (2010). Cyberbully-
ing Fact Sheet, Cyberbullying Research Cen- Li, Q. (2007). New bottle but old wine: A re-
ter, 5. search of cyberbullying in schools. Comput-
ers in Human Behavior, 23, 1779.
Hinduja, S., & Patchin, J.W. (2010). Sexting: A
brief guide for educators and parents. Luster, T., Small, S.A., & Lower, R. (2002). The
Cyberbullying Research Center. correlates of abuse and witnessing abuse
among adolescents. Journal of Interpersonal
Hinduja, S., & Patchin, J.W. (2010). State Violence, 17(12), 1323-1340.
cyberbullying laws: A brief review of state
cyberbullying laws and policies. Cyberbully- Mason, K.L. (2008). Cyberbullying: A prelimi-
ing Research Center, July. nary assessment for school personnel. Psy-
chology in the Schools, 45(4), 323-348.
Janviere, J. (2010). Cyberbullying: What we can
do to stop the growing epidemic. Commu- McClave, J., & Sincich, T. (2006). A First Course
nic8: The Diederich College of Communica- in Statistics. Pearson Prentice Hall, Upper
tion Blog, October 11, 1-3. Saddle River, New Jersey.
Juvonen, J., & Graham, S. (2001). Peer Har- Morgan, S. (2010). The office-bully mogul; How
assment in School: The Plight of the Vulner- one man capitalized on a workforce’s fears –
able and Victimized. Guilford Press, New and parlayed them into a touchly-feely em-
York, New York. pire. Business Week, November 1-7, 75-77.
Juvonen, J., Nishina, A., & Graham, S. (2000). Olweus, D. (1993). Bully / victim problems
Peer harassment, psychological adjustment, among school children: Long-term conse-
and school functioning in early adolescence. quences and an effective intervention pro-
Journal of Educational Psychology, 92(2), gram. In S. Hodgins, Mental Disorder and
349-359. Crime, Sage Publications, Thousand Oaks,
California, 317-349.
Kim, W. (2010). Little brother is watching: In
the web era, we are eroding our privacy all Olweus, D. (1993). Bullying at School: What We
by ourselves. The Sunday New York Times Know and What We Can Do About It. Re-
Magazine, October 17, 18. search Center for Health Promotion, Black-
well Publishers, Oxford, United Kingdom.
Kim, Y.S., Leventhal, B.L., Koh, Y.J., Hubbard,
A., & Boyce, W.T. (2006). School bullying
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 8
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Parker-Pope, T. (2011). Web of popularity, Sullivan, B. (2011). Sexting: crime and pun-
achieved by bullying. The New York Times, ishment. Journal of Computing Sciences in
February 15, 1,6. Colleges, 26(3), 52.
Paul, P. (2011). Does facebook make someone Swearer, S.M. (2010). Five myths about bully-
social offline? The New York Times, January ing. Washington Post, December 30, 1-4.
30, 8.
Tokunaga, R.S. (2010). Following you home
Phillips, S. (2010). Coping with cyberbullying: from school: A critical review and synthesis
The use of technology to terrify. Public of research on cyberbullying victimization.
Broadcasting Service (PBS), This Emotional Computers in Human Behavior, 26,
Life, October 19, 2. 277,278,283.
Rigby, K. (1999). What harm does bullying do? Tozzi, J. (2011). Cyber guardian. Bloomberg
Proceedings of the Children and Crime: Vic- Business Week, May 2-May 8.
tims and Offenders Conference, Brisbane,
Australia. Wong, J.S. (2009). No bullies allowed: Under-
standing peer victimization, the impacts on
Rigby, K. (2004). Addressing bullying in delinquency, and the effectiveness of pre-
schools: Theoretical perspectives and their vention programs. Rand, Pardee Rand Grad-
implications. School Psychology Interna- uate School, March, 254.
tional, 25(3), 287-300.
_____ (2009). Cyberbullying goes to college.
Shelton, J.C. (2010). Online cyberbullying, so- Bostonia: The Alumni Magazine of Boston
cial media’s role in teen sucide. Hub Pages, University, Spring, 5,8.
1-2.
_____ (2010). List of cyberbullying related sui-
Shepherd, S. (2011). White house conference cides. Cyberbullying News, May 10, 2-3.
tackles bullying. CNN, Politics, March 10, 1-
3. _____ (2011). A call for consistency in infor-
mation reported in cyberbullying research
Smith, P., Mahdavi, J., Carvalho, M., & Tippett, articles. Cyberbullying Research Center,
N. (2006). An investigation into cyberbully- Blog, January 11, 2.
ing, its forms, awareness and impact, and
the relationship between age and gender in _____ (2011). The cruel reality of student
cyberbullying. Research Brief, RBX03-06, cyberbullying. College Degrees, January 19,
July, 1. 2.
Smith, P.K., & Brain, P. (2000). Bullying in _____ (2011) Creepy crawlies: The Interbet al-
schools: Lessons from two decades of re- lows the malicious to menace their victims.
search. Aggressive Behavior, 26(1), 1-9. The Economist, April 23, 63.
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 9
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Appendix
Gender?
Male Female
What is your status?
Freshman Sophomore Junior Senior
To which school of the University do you belong?
Liberal Arts Education Nursing Business Computing
Definition of Cyber-bullying
Cyber-bullying is any behavior performed through electronic or digital media by individuals or groups
that repeatedly communicates hostile or aggressive messages intended to inflict harm or discomfort
on others. In cyber-bullying experiences, the identity of the bully may or may not be known. Cyber-
bullying can occur through electronically-mediated communication at school; however, cyber-bullying
behaviors commonly occur outside school as well.
You are aware of cyber-bullying activities at other schools (for example the Rutgers student who
committed suicide as a result of cyber-bullying)?
Neither Agree nor
Strongly Disagree Disagree Agree Strongly Agree
Disagree
Might it be acceptable for freshman or sophomore students to be cyber-bullied by junior or senior stu-
dents>
Yes No
Have you discussed issues of cyber-bullying in your fraternity or sorority at the University?
Yes No
Should cyber-bullying be discussed in UNIV 101?
Yes No
Should cyber-bullying be discussed in CIS 101?
Yes No
Have professors in your courses at the University discussed incidents or issues of cyber-bullying?
Yes No
How many professors have done so?
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 10
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Professors at the University are knowledgeable on cyber-bullying as an activity that is harmful to stu-
dents.
Neither Agree nor
Strongly Disagree Disagree Agree Strongly Agree
Disagree
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 11
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Perpetrator?
Have you ever consciously or unconsciously been a perpetrator of cyber-bullying?
Yes No
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 12
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Male Female
Foreign Non-foreign
Gay Straight
Lesbian Straight
Disabled Non-disabled
African-American White
Hispanic White
Muslim White
Asian White
For each of the following pairs, choose the one you think is more likely to be a PERPETRATOR of
cyber-bullying at the University.
Male Female
Foreign Non-foreign
Gay Straight
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 13
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Lesbian Straight
Disabled Non-disabled
African-American White
Hispanic White
Muslim White
Asian
White
Source: _____ (2010). List of cyberbullying related suicides. Cyberbullying News, May 10, 2-3
[Adapted].
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 14
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Idaho Yes No Yes Yes Yes
Illinois Yes No Yes No Yes
Indiana No No Yes No No
Iowa Yes No Yes No Yes
Kansas Yes Yes Yes No Yes
Kentucky Yes No Yes Yes Yes
Louisiana Yes No Yes No Yes
Maine Yes No Yes No Yes
Maryland Yes No No No Yes
Massachusetts Yes Yes Yes No Yes
Michigan No No Yes No Yes
Minnesota Yes No Yes No Yes
Mississippi Yes No Yes No Yes
Missouri Yes No Yes Yes Yes
Montana No No No No No
Nebraska Yes No Yes No Yes
Nevada Yes Yes Yes Yes No
New Hamp- Yes Yes Yes No No
shire
New Jersey Yes No Yes No Yes
New Mexico Yes No Yes No Yes
New York Yes No Yes No Yes
North Carolina Yes No Yes Yes Yes
North Dakota No No No Proposed No
Ohio Yes No Yes No Yes
Oklahoma Yes No Yes No No
Oregon Yes Yes Yes No Yes
Pennsylvania Yes No Yes No Yes
Rhode Island Yes No Yes No No
South Carolina Yes No Yes No Yes
South Dakota No No No No No
Tennessee Yes No Yes Yes Yes
Texas Yes No No No Yes
Utah Yes No Yes No Yes
Vermont Yes No Yes No Yes
Washington Yes No Yes No Yes
West Virginia Yes No Yes No Yes
Wisconsin Yes No Yes Yes Yes
Wyoming Yes No Yes No Yes
Source: Hinduja, S., & Patchin, J.W. (2010). State cyberbullying laws: A brief review of state cyber-
bullying laws and policies. Cyberbullying Research Center, July [Adapted]
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 15
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Table 3: Cyberbullying Guideline Process – Model Program
Definition of Mandatory X X X X
Bullying
Definition of Mandatory X X X X
Cyberbullying
-Sexting
Cyberethics in Mandatory X
Mission State-
ment of Uni-
versity
Code of Mandatory X X X
Cyberethics for
Administrators,
Faculty and
Staff
Code of Mandatory X
Cyberethics for
Students
On Campus Mandatory X
and Off Cam-
pus Incident
Policy
Office of Optional X
CyberEthics
Introduction to Mandatory X X
Cyberethics as
a Course for
Freshman and
Transfer Stu-
dents: Cyber-
bullying Issues
and Prevention
Safety Strate-
gies
Cyberbullying Mandatory X X
School Policy
for Observer
Students
Cyberbullying Mandatory X X
School Policy
for Professor
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 16
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Victims
Cyberbullying Mandatory X X
School Policy
for Student
Victims
Potential Zero Optional X X
Tolerance
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 17
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
tion)
- Informal
Negative
Sanctions
Instructor Level
Cyberbully in Mandatory X X
Cyberethics
Course for All
Freshman and
Transfer Stu-
dents
-Etiquette on
Internet (“Neti-
quette”)
Cyberbully Mandatory X X
Modules in In-
terdisciplinary
and Occupa-
tional Courses
in All Schools of
University
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 18
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
On-Line Privacy Mandatory X X
Protection
Steps in Inter-
disciplinary and
Occupational
Courses
-Perpetration
Scenarios
-Public Perpe-
tration Scenari-
os
Cyberbullying Optional X X
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 19
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Ethics Board
on Safety
Strategies
Cyberbullying Mandatory X X X X
Information
Month
Cyberbullying Mandatory X X
Symposiums
Cyberethics Mandatory X X X X
Portal Zine for
Public Sources
Mentoring Optional X X
Network for
At-Risk Stu-
dents and Stu-
dent Victims
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 20
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Table 4
Cyberbullying method at the university %
Looking in to your cell phone 14%
Looking in to your email 14%
Sending you harassing emails 29%
Sending you harassing pictures 29%
Sending you pornographic images 14%
Posting harassing messages on a social network-
43%
ing site
Posting harassing pictures on a social networking
29%
site
Preventing a friend from contacting others on a
0%
social networking site
Sexting 14%
Other 0%
Table 5
Cyberbullied Groups %
Male students 25%
Female students 25%
Asian students 14%
Gay students 43%
Lesbian students 25%
Physically disabled students 14%
African-American students 10%
Hispanic students 10%
Muslim students 14%
African students 12%
Developmentally disabled 8%
Other 33%
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 21
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Table 6
Table 8
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 22
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Table 9
Table 10
Table 11
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 23
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Table 12
Table 13
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 24
www.aitp-edsig.org
Information Systems Educators Conference 2011 ISECON Proceedings
Wilmington North Carolina, USA v28 n1633
_________________________________________________
Table 14
_________________________________________________
©2011 EDSIG (Education Special Interest Group of the AITP) Page 25
www.aitp-edsig.org