Wanda Cassidy, Chantal Faucher, Margaret Jackson - Cyberbullying at University in International Contexts-Routledge (2018)
Wanda Cassidy, Chantal Faucher, Margaret Jackson - Cyberbullying at University in International Contexts-Routledge (2018)
AT UNIVERSITY IN
INTERNATIONAL CONTEXTS
Edited by
Wanda Cassidy,
Chantal Faucher, and
Margaret Jackson
First published 2019
by Routledge
711 Third Avenue, New York, NY 10017
and by Routledge
2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
Routledge is an imprint of the Taylor & Francis Group, an informa business
© 2019 Taylor & Francis
The right of Wanda Cassidy, Chantal Faucher, and Margaret Jackson to be
identified as the authors of the editorial material, and of the authors for
their individual chapters, has been asserted in accordance with sections 77
and 78 of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced
or utilised in any form or by any electronic, mechanical, or other means,
now known or hereafter invented, including photocopying and recording,
or in any information storage or retrieval system, without permission in
writing from the publishers.
Trademark notice: Product or corporate names may be trademarks or
registered trademarks, and are used only for identification and explanation
without intent to infringe.
Library of Congress Cataloging-in-Publication Data
A catalog record for this Book has been requested
ISBN: 978-1-138-73039-7 (hbk)
ISBN: 978-1-138-73044-1 (pbk)
ISBN: 978-1-315-18940-6 (ebk)
Typeset in Bembo
by Apex CoVantage, LLC
CONTENTS CONTENTSCONTENTS
List of tablesviii
Forewordix
Prefacexi
Acknowledgementsxiii
List of contributors xiv
PART I
Nature and extent 7
PART II
Impacts97
PART III
Solutions139
PART IV
Policy179
Index225
TABLES TABLESTABLES
The study of traditional, or offline, bullying has a history of some 40 years. Thou-
sands of publications have come from what has developed, over that period, into a
very vigorous research program.This has gone along with increased public aware-
ness of the prevalence of bullying; the harm it can cause both in the short and
long term; and the steps that can be taken to reduce the prevalence and the
harm. Progress is only partial. The temptation to abuse power, and attempt to get
status or material advantage, by bullying others, is likely to be present in human
groups, and especially those from which the victim cannot easily depart – families,
schools, colleges, the workplace. It would be foolhardy to imagine that we can
‘eliminate’ bullying. But it is not foolhardy to imagine that we can do a great deal
to diminish the extent to which it occurs and the harm it brings about. Actions
can include improving the climate of human groups, dealing with bullying inci-
dents promptly, empowering bystanders, and supporting victims effectively. There
are indications that rates of traditional bullying are declining – not in all countries
and contexts, but in many. If widely substantiated, this would suggest that the
extensive body of research knowledge has helped feed into awareness and action,
and improved many people’s well-being as a result.
Cyberbullying, or online bullying, has a much shorter history. Although the
phenomenon may go back around 20 years, it is only in the last 10 years that
it has been a noticeable topic of research. However, the flow of publications in
the area has expanded rapidly, with hundreds of articles appearing in the last few
years. Although much of this research has extended methods and concepts from
offline bullying, cyberbullying brings its own particular features and challenges.
These include the possible anonymity of the perpetrator, the 24/7 nature of the
phenomenon, and the extent to which criteria for traditional bullying, notably
repetition and imbalance of power, are useful in the cyber domain. At the time
x Foreword
A few years ago, when we (two of the editors) were researching cyberbullying
at the K–12 level, we experienced cyberbullying from undergraduate students
taking courses with us through distance education. At the same time, during our
presentations at conferences, audience members were telling us their stories of
being cyberbullied in the academy, or stories they knew of, encouraging us to
extend our research from schools to the post-secondary environment.
These experiences prompted us to secure funding from the Social Sciences
and Humanities Research Council of Canada to investigate the extent to which
cyberbullying was occurring at Canadian university campuses; the impact on stu-
dents and faculty; whether policies, intervention, and prevention practices were in
place to counter cyberbullying; and ways to more effectively address the problems
as identified. We were curious whether the motivation to cyberbully at the post-
secondary level was similar to the reasons younger students gave for targeting a
friend, acquaintance, or stranger, and what the impacts might be on adults and the
wider university culture.
We have since reported on the findings from this research at conferences and
in academic journals (some of which are also included in Chapters 5, 8, and
16 of this volume). Furthermore, in 2014, we co-organized a symposium titled
Cyberbullying at Canadian Universities: Linking Research, Policy, and Practice, where we
shared preliminary findings with various university stakeholders including faculty,
students, staff, and administrators/policymakers gathered for a day of dialogue
on this issue. Participants clearly indicated the need to increase awareness of the
nature and extent of this problem at the university level and for concrete informa-
tion about applicable policies and solutions.
Interestingly, scholars in several other jurisdictions were also curious about
the phenomenon and were undertaking similar research. Many of these scholars,
xii Preface
along with several of the participants from the symposium, are contributors to this
book, adding valuable insights to the discussion, and providing an international
and applied perspective. What is clear is that cyberbullying at the post-secondary
level among students, and towards and among faculty members, is not restricted to
one country; rather, it appears to be a global problem. Higher education environ-
ments are not immune to the online bullying problems identified at the primary
and secondary school levels, nor can they be seen as separate from workplace
cyberbullying.
The aim of this book is to begin to fill that gap in the research literature by
discussing the nature, extent, impacts, proposed solutions, and policy and prac-
tice considerations of bullying in the cyber-world at post-secondary. It is our
hope that the range of international and multi-disciplinary perspectives brought
together in this book will serve to raise awareness regarding this problem and offer
insights into approaches for addressing it in a meaningful way.
ACKNOWLEDGEMENTS ACKNOWLEDGEMENTSACKNOWLEDGEMENTS
Tara Black was, at the time of the writing of her chapter, an Associate Director of
a health promotion program at Simon Fraser University, Canada. She co-chaired
an international group that led to the development of the Okanagan Charter: An
International Charter for Health Promoting Universities and Colleges.
researches and writes in the areas of social justice and law-related education, the
ethic of care, marginalized youth, and cyberbullying at K–12 and post-secondary.
Natalie Sharpe, B.A. (Hon), M.A., has been a practicing ombudsperson at the
University of Alberta for over three decades and is President of the Association
of Canadian College and University Ombudspersons. She has presented nation-
ally and internationally at ombuds professional conferences and contributed to
ombuds journals.
For well over a decade now, cyberbullying has been recognized as an issue similar
to, and yet also quite distinct from, traditional forms of bullying that were docu-
mented well before the proliferation of technology in everyday life. The topic of
cyberbullying has increasingly been researched throughout the world, and a better
understanding of the nature, extent, impacts, coping strategies, solutions, policy,
and practice has begun to emerge with respect to cyberbullying among students
at the elementary, middle, and secondary education levels (Cassidy, Faucher, &
Jackson, 2013; Navarro,Yubero, & Larrañaga, 2016; Smith & Steffgen, 2013).
However, cyberbullying is no longer viewed just as a problem faced by the
young. In recent years, the media has highlighted several serious cases of cyber-
bullying between students on university campuses that have resulted in suicide.
As technology increasingly becomes the vehicle of communication on campuses,
faculty members, too, are being subjected to online harassment and demands,
from students, as well as from colleagues. University administrators recognize their
responsibility to provide a healthy workplace for their staff, as well as a safe and
respectful environment for their students.
While no clear consensus exists as far as the definition of cyberbullying, many
researchers have tended to extrapolate some of the defining features from the
accepted definition of bullying: repeated aggressive behaviours, intent to cause
harm, and power imbalance between victim and bully (Olweus, 1993). How-
ever, the way in which those features manifest in the online context has been a
source of interest among researchers. For instance, the self-perpetuating nature
of online posts that can be re-visited and re-circulated transforms the meaning
of repetition in the cyber context (Dooley, Pyżalski, & Cross, 2009; Kowalski,
Limber, & Agatston, 2012; Menesini, 2012). Also, the disinhibition and deindi-
viduation associated with online exchanges, and particularly anonymity in those
2 Wanda Cassidy, Chantal Faucher, and Margaret Jackson
communications, and the wider potential audience that characterize the cyber-
world redefine the common notion of power imbalance (Davis & Nixon, 2012;
Hinduja & Patchin, 2012; Lyu & Zhang, 2017; Suler, 2004).
Cyberbullying is carried out using electronic devices through text messaging,
email, websites (such as rating websites and course websites, in particular, for the
university context), blogs, chats, various online platforms such as Twitter, Snapchat,
Instagram, Facebook, WhatsApp, and other social networking sites, game servers,
YouTube and other video-sharing websites, Skype, and many more. It can include
a wide range of behaviours such as using language or images that can defame,
threaten, harass, bully, exclude, discriminate, demean, humiliate, stalk, or disclose
personal information without consent, or that are offensive, vulgar, or derogatory.
It can also be understood to include online incivility, mobbing, and online harass-
ment. Some of these behaviours may also extend into criminal offences, depend-
ing on the jurisdiction as well as the extent and intent of the behaviours.
Relatively little research attention, however, has been paid to the nature, extent,
and impact of cyberbullying among adults, including what is occurring at the
post-secondary level. Some researchers have suggested that bullying and cyberbul-
lying behaviours exist on a continuum from childhood into adulthood (Cowie &
Myers, 2016; Faucher, Cassidy, & Jackson, 2015). Recent research has begun to
document an increase in uncivil online discourse at the university (Clark,Werth, &
Ahten, 2012; Lampman, 2012; Wildermuth & Davis, 2012) as well as the preva-
lence, negative effects, coping strategies, and policy and practice implications of
cyberbullying among undergraduate students and faculty members (Blaya, Kaur,
Sandhu, & Sundaram, 2018; Blizard, 2016; Cassidy, Faucher, & Jackson, 2014;
Faucher et al., 2015; McKay, Arnold, Fratzl, & Thomas, 2008; Orel, Campbell,
Wozencraft, Leong, & Kimpton, 2017; Vance, 2010; Wright, 2016; Yubero, Nav-
arro, Elche, Larrañaga, & Ovejero, 2017).
The aim of this book is to begin to fill that gap in the research literature by
discussing the nature, extent, impacts, proposed solutions, and policy and prac-
tice considerations of bullying in the cyber-world at post-secondary. The research
findings that are discussed in this book have policy and practice implications for
university decision-makers who are increasingly faced with the growing problems
and impacts of cyberbullying on campuses.
This edited volume draws on recent research on cyberbullying at the post-
secondary level conducted by scholars from North America, South America, the
United Kingdom, Europe, Asia, and Australia. Since the editors, as well as the par-
ticipating chapter authors, are rooted in a variety of scholarly perspectives (edu-
cation, criminology, psychology, sociology, communications, law, health sciences,
social work, humanities, labour studies), the book reflects a multi-disciplinary lens
and array of approaches, interpretations, and solutions.
The book is divided into four main parts. In the first part, six contributions
examine the nature and extent of cyberbullying in the post-secondary context. In
Chapter 1, Catherine Blaya discusses her findings from two studies (surveys and
Introduction 3
Loraleigh Keashly from the United States examines the role of cyber-bystanders
and how to prepare members of the campus community to intervene when they
witness cyberbullying. The chapter explores the unique opportunities and chal-
lenges associated with decision-making processes available for cyber-bystander
engagement. In Chapter 11, Natalie Sharpe, ombudsperson at the University of
Alberta, Canada, describes the role of the university ombudsperson in not only
responding to cyberbullying incidents on campus but also preventing such inci-
dents through education initiatives as well as policy and protocol development. In
Chapter 12, Tara Black discusses inscribing approaches to cyberbullying within a
campus-wide “healthy campus” initiative led by the student services department,
and in particular the health and counselling services at Simon Fraser Univer-
sity, Canada. In Chapter 13, Kenichi Kanayama and Shinji Kurihara discuss one
Japanese university’s approach to the prevention of cyberbullying, combining dif-
ferent levels of support for students, including peer support, mental health screen-
ing, media literacy education, teamwork among professionals at the university,
counselling services, and medical referrals. This comprehensive student support
approach has proven successful. In Chapter 14, Samuel Farley and Iain Coyne pro-
vide insight for post-secondary institutions’ administrators and human resource
personnel looking to limit workplace cyberbullying in universities. They suggest
evidence-based practices for interventions, drawing from the youth cyberbullying
and traditional workplace bullying intervention literatures.
Finally, the fourth part of the book adopts a policy lens for approaching the
problem of cyberbullying. In Chapter 15, Colette Langos and Mark Giancaspro
discuss the notion of harm and the ways in which it relates to the legal and policy
contexts of universities in Australia. Survey findings reported in this chapter sug-
gest that not all forms of cyberbullying are perceived to be equally harmful, and
respondents have relatively little knowledge about the laws and policies governing
cyberbullying behaviour. In Chapter 16, Margaret Jackson, Chantal Faucher, and
Wanda Cassidy, review the evolution of Canadian post-secondary cyberbullying
policies along with their intents and values. Arguments from differing perspec-
tives and geographic locations are explored for a rights-based policy framework.
In Chapter 17, Jon Driver provides his own observations of how best to handle
faculty members who engage in cyberbullying behaviours based on his years of
experience in the office of provost and other administrative positions within the
university. In Chapter 18, Dov Schafer uses his own experience as a student who
was anonymously cyberbullied to reflect on methods of eliminating anonymity
from cyber-exchanges, such as user reporting and distributed ledger technologies,
in order to reduce some types of cyberbullying such as those he endured.
The concluding chapter summarizes the dominant themes discussed in each
of the chapters, including the nature, extent, and rationale for cyberbullying at
the post-secondary level, the role of gender as a factor, identified impacts on
the health and well-being of student and faculty victims, participants’ frustrations
with the lack of redress, recommended solutions including practical approaches
Introduction 5
that are being implemented, the need for appropriate policy and policy values to
guide the development and implementation of those solutions, as well as areas
for further research. The editors conclude with a call to action for universities to
make cyberbullying prevention and intervention a priority and to work collabo-
ratively with stakeholders to develop research-based, creative solutions to address
the identified problems.
References
Blaya, C., Kaur, K., Sandhu, D., & Sundaram, S. (2018). Cyberbullying in higher education
in India and France: An empirical investigation. In P. K. Smith, S. Sundaram, B. Spears,
C. Blaya, M. Schäfer, & D. Sandhu (Eds.), Bullying, cyberbullying and student well-being in
schools: Comparing European, Australian and Indian perspectives (pp. 107–129). Cambridge,
UK: Cambridge University Press.
Blizard, L. M. (2016). Faculty members’ experiences of cyberbullying by students at one
Canadian university: Impact and recommendations. International Research in Higher Edu-
cation, 1(1), 107–124. doi:10.5430/irhe.v1n1p107
Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A compre-
hensive review of current international research and its implications and application
to policy and practice. By invitation, in special international issue of School Psychology
International, 34(6), 575–612. doi:10.1177/0143034313479697
Cassidy,W., Faucher, C., & Jackson, M. (2014).The dark side of the ivory tower: Cyberbul-
lying of university faculty and teaching personnel. Alberta Journal of Educational Research,
60(2), 279–299.
Clark, C. M., Werth, L., & Ahten, S. (2012). Cyber-bullying and incivility in the online
learning environment, Part 1: Addressing faculty and student perceptions. Nurse Educa-
tor, 37(4), 150–156.
Cowie, H., & Myers, C. A. (Eds.). (2016). Bullying among university students: Cross-national
perspectives (pp. 3–14). London: Routledge.
Davis, S., & Nixon, C. (2012). Empowering bystanders. In J. W. Patchin & S. Hinduja
(Eds.), Cyberbullying prevention and response: Expert perspectives (pp. 93–109). New York:
Routledge.
Dooley, J. J., Pyżalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying:
A theoretical and conceptual review. Journal of Psychology, 217(4), 182–188.
Faucher, C., Cassidy, W., & Jackson, M. (2015). From the sandbox to the inbox: Compar-
ing the acts, impacts, and solutions of bullying in K-12, higher education, and the
workplace. Journal of Education and Training Studies, 3(6), 111–125. doi:10.11114/jets.
v3i6.1033
Hinduja, S., & Patchin, J. W. (2012). School climate 2.0: Preventing cyberbullying and sexting one
classroom at a time. Thousand Oaks, CA: Corwin Press.
Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2012). Cyberbullying: Bullying in the digital
age (2nd ed.). Malden, MA: Wiley-Blackwell.
Lampman, C. (2012). Women faculty at risk: U.S. professors report on their experiences
with student incivility, bullying, aggression, and sexual attention. NAPSA Journal About
Women in Higher Education, 5(2) 184–208.
Lyu, W., & Zhang, J. (2017). The influence of childhood psychological maltreatment
on Mainland China college students’ cyberbullying: The mediating effect of moral
6 Wanda Cassidy, Chantal Faucher, and Margaret Jackson
disengagement and the moderating effect of moral identity. Eurasia Journal of Mathemat-
ics, Science and Technology Education, 13(11), 7581–7590.
McKay, R., Arnold, D. H., Fratzl, J., & Thomas, R. (2008). Workplace bullying in academia:
A Canadian study. Employee Responsibility and Rights Journal, 20, 77–100. doi:10.1007/
s10672-008-9073-3
Menesini, E. (2012). Cyberbullying: The right value of the phenomenon. Comments on
the paper “Cyberbullying: An overrated phenomenon?” European Journal of developmen-
tal Psychology, 9(5), 544–552.
Navarro, R.,Yubero, S., & Larrañaga, E. (Eds.). (2016). Cyberbullying across the globe: Gender,
family, and mental health. Basel, Switzerland: Springer.
Olweus, D. (1993). Bullying at school:What we know and what we can do. New York: Blackwell.
Orel, A., Campbell, M., Wozencraft, K., Leong, E., & Kimpton, M. (2017). Exploring uni-
versity students’ coping strategy intentions for cyberbullying. Journal of Interpersonal Vio-
lence, 32(3), 446–462.
Smith, P. K., & Steffgen, G. (Eds.). (2013). Cyberbullying through the new media: Findings from
an international network. London: Psychology Press.
Suler, J. (2004). The online disinhibition effect. CyberPsychology & Behavior, 7(3), 321–326.
Vance, J. W. (2010). Cyber-harassment in higher education: Online learning environments. Ed.D.
dissertation, University of Southern California.
Wildermuth, S., & Davis, C. B. (2012). Flaming the faculty: Exploring root causes, con-
sequences, and potential remedies to the problem of instructor-focused uncivil online
student discourse in higher education. In L. A. Wankel & C. Wankel (Eds.), Misbehavior
online in higher education: Cutting-edge technologies in higher education (pp. 379–404). Bing-
ley: Emerald.
Wright, M. (2016). Cyber victimization on college campuses: Longitudinal associations
with suicidal ideation, depression, and anxiety. Criminal Justice Review, 41(2), 190–203.
Yubero, S., Navarro, R., Elche, M., Larrañaga, E., & Ovejero, A. (2017). Cyberbullying vic-
timization in higher education: An exploratory analysis of its association with social and
emotional factors among Spanish students. Computers in Human Behavior, 75, 439–449.
PART I
Catherine Blaya
Introduction
In France, as in many countries, concern about cyberbullying has become a soci-
etal issue. Although research in the past focused primarily on teenagers’ use of
the internet and their negative online experiences, it is shifting now towards the
university setting, since recent research in Europe and North America indicates
young adults are also involved (Chapell et al., 2004; Molluzzo & Lawler, 2012;
Smith & Yoon, 2013). Kowalski, Giumetti, Schroeder, and Reese (2012) found
that one out of three college students experienced cyberbullying for the first time
while at college, and that for six out of ten students who had been previously
cyberbullied, the major part of their negative experience occurred when they
attended university. These findings strengthen the necessity for researching and
understanding cyberbullying during post-secondary education.
The main reported types of victimization towards students in post-secondary
education are insults, threats and harassment (Molluzzo & Lawler, 2012) but also
obscene content and grooming (Kennedy & Taylor, 2010; Vance, 2010). Females
are more likely than males to be victims and are at a higher risk of distress (Bau-
man & Newman, 2013). The most used technologies for cyberbullying are social
networks (Walker et al., 2011). Studies examining the characteristics of perpetra-
tors (Doane, Pearson, & Kelley, 2014; Gibb & Devereux, 2016) highlight that as
for traditional bullying, cyberbullies show low levels of empathy for the victims
and favourable attitudes towards cyberbullying.
In terms of negative consequences, victims experience anxiety and/or depres-
sion, tend to consume alcohol and drugs, and their social life is reduced (Kowal-
ski & Limber, 2013; Kraft & Wang, 2010). Victimization also impacts negatively
on victims’ academic achievement. The vast majority of university students need
10 Catherine Blaya
support for developing coping strategies as they do not know how to handle
the situation themselves or where to seek help (Adams, Lawrence, & Schenck,
2008).The most heavily victimized individuals tend to think the solution lies with
seeking legal action and intervention from the university authorities (Crosslin &
Crosslin, 2014).
Recently in France, more scholarly attention has been given to cyberviolence1
and cyberbullying. In this chapter, we present the findings from two research
projects: a written questionnaire survey that was completed at two universities in
the South and East of France (Berthaud & Blaya, 2014, 2015), and a qualitative
study involving face-to-face student interviews completed in the South of France.
Students completed the survey at the end of their academic year. Using a
Likert-type scale, participants were asked for the frequency of their engagement
with identified behaviours, ranging from: never; once or twice; two or three
times per month; once a week; to several times per week. The scale for duration
included: once; a few days; about a month; six months; the whole year; several
years. The survey also included checklist questions about the victims’ feelings
and coping strategies, as well as some questions about the perceived respon-
sibility of the university and the ways the university could prevent or reduce
cyberviolence.
Analyses
The way we define and measure violence and online aggression does influence
the quality of response and analyses (Corcoran, McGuckin, & Prentice, 2015). For
both studies, therefore, we did not propose a set definition of cyberbullying to the
students. Instead, we drew a distinction between students who were victimized
several times and those who reported only one negative experience. We labelled
behaviour as cyberviolence when it involved occasional victimization and as
cyberbullying for repeated victimization. We did not use “cyberbullying” as the
umbrella term to avoid confusion as to what was being measured and to reduce
opportunities for intra-national and cross-national comparisons. We completed
logistic regression analyses to check the predictive power of the independent
variables (socio-demographics, digital practices, etc.) with the following profiles:
victims, authors, and victims/authors.
The 20 interviews were then transcribed and analysed using content analysis
and inductive open coding to identify emerging themes, the prevalence of these
themes, and to check for potential patterns.
12 Catherine Blaya
Prevalence
Cyberviolence is not an issue that is restricted to secondary education students,
as previously demonstrated in other countries (Molluzzo & Lawler, 2012; Walker
et al., 2011; Zacchilli & Valerio, 2011). As shown in Table 1.1, over 50% of the sur-
vey respondents were victims of cyberviolence at least once during the academic
year, 41% were victims only, 14% were authors only, and 12% (or just over 1 out
of 10) were both victims and authors.
In contrast, repeated victimization, labelled here as cyberbullying, involved 10%
of the students as victims only, 0.5% as authors only, while 1% of the respondents
declared they were both victims and authors.
These results show that university students in France are affected by cybervio-
lence and cyberbullying, and that occasional online violence is more frequent
than cyberbullying. As in other research (Molluzzo & Lawler, 2012), the most
common forms of aggression are nasty or intimidating messages via SMS (26%),
the sharing of personal information without previous consent (15%), unpleasant
or nasty emails (16%), and sexting (10%).
The findings from the logistic regression analyses to check the predictive
power of the independent variables (socio-demographics, digital practices, etc.)
in relation to the following profiles – victims, authors, and victims/authors –
show that gender is strongly associated with being a victim/author (OR = 1.83,
p < .001), as well as a perpetrator of cyberviolence (OR = 2.28, p < .001). These
results echo studies conducted by Chapell and colleagues (2006) and Faucher
et al. (2014), which showed that male students at university were more likely to
be involved as perpetrators. However, according to our results, being a female is
not significantly associated with victimization. This contradicts previous research
by Francisco, Veiga Simão, Ferreira, and Martins (2015) in Portugal; they found
that females were more involved as victims and as perpetrators. MacDonald and
Roberts-Pittman (2010) in the United States, on the other hand, did not find any
difference between genders. As a result of these conflicting findings, the issue of
gender needs further investigation.
Cyberviolence 41 14 11
(one aggression)
Cyberbullying 10 0.5 1
(repeated victimization)
Total 51 14.5 12
Cyberbullying among students in France 13
Regardless of gender, victims are 3.6 times more likely to become authors
(OR = 3.60, p < .001), and authors are equally more at risk to become vic-
tims (3.62, p < .001), thus confirming other research findings (Zacchilli &
Valerio, 2011). These findings support the lifestyle theory, where certain behav-
iours such as delinquent lifestyles elevate one’s odds of being victimized: the more
one offends, the higher the risk of being victimized (Henson,Wilcox, Bradford, &
Cullen, 2010). As in other research, our analyses show evidence that the amount of
time spent online (5 hours and more, OR = 1.71, p < .01) and to a lesser extent,
the involvement in online social networking (OR 1.52, p < .05), increases the
odds of being a victim. The other variables most associated with perpetration are
to be very active online, as the respondents who declared eight or more different
activities are more likely to be authors of cyberviolence (OR = 2.19, p < .05),
and to be both victim/authors (OR = 3.10, p < .01).
Disputes you can have when you are young, due to the difficulty to find
your place, to get included into a group or not. I cannot remember some-
thing specifically; they were mainly unpleasant and nasty messages about
her dress code and behaviour.
( female, undergraduate)
I was on a game and someone ridiculed and excluded me from the game
because I was not performing well enough.
(male, undergraduate)
14 Catherine Blaya
It started with a photograph that was taken during a party and uploaded on
Facebook. Boys started making unpleasant comments about my appearance.
They were 5–6 and I found it particularly upsetting. I was living on my
own, so I was quite lonely. I wanted to stop seeing what they wrote but at
the same time, I wanted to know, I could not help it. I started feeling very
low and depressed.
( female, undergraduate)
I was not really depressed. It is just that I was so ashamed; I was more and
more ashamed of myself. I felt ugly and useless because they were criticizing
me permanently. I felt I had to change everything in me. I thought I was
ugly. I started being obsessed with my physical appearance and every detail
was of great importance so that they could not post any degrading com-
ment anymore. I was in a state that made me reject what I was, I could not
accept myself anymore so it was really difficult from a psychological point
of view.
( female, undergraduate)
This student was not only ashamed: her comments show how she became very
anxious about her physical appearance – how the domination of the group of
other girls overpowered her life. It affected her self-esteem, reflected her need to
be accepted by the dominant group, and the impact and importance of having a
positive reputation both online and offline (Coutant & Stenger, 2010).
I felt like crap. Everything I was saying was picked on, everything I was
wearing was criticized by this group of girls. The only thing they were
16 Catherine Blaya
interested in was gossiping and boyfriends. I thought I could not cope any-
more and that the only solution was to go for an online course.
( female, undergraduate)
I was new in the city and I knew no one, the other students had attended
the same high schools and had known each other for a while. As I was not
from the same region, they picked on me because of my accent. It carried
on online and they started sending nasty comments on my accent and the
way I dressed or talked.They picked on me continuously. I was not invited to
parties and no one would sit next to me in the lecture theatre. I felt so lonely,
I thought there was no way I could carry on like that and I wanted to leave.
( female, Master’s student)
In the examples described here, the victimization was both online and offline,
impacting the victims’ motivation to stay in school. A similar impact on victims’
levels of concentration (abilities), motivation, and academic achievement was pre-
viously documented for secondary school students (Kowalski & Limber, 2013).
However, we did not expect this to be a major factor among a more mature
student population.
Coping strategies
The victims were asked about their coping strategies. Most respondents said that
they ignored the problem, while just over 1 out of 10 tried to solve it (11.9%).
Among the other strategies: 8.8% of the victims said they tried to ask the aggres-
sor to stop the behaviour; one out of four shared it with someone else (a friend,
their partner, parents); and only two students reported the problem to university
staff – perhaps reflecting the lack of trust in the university staff to handle the situ-
ation, or a perception that it is not up to the university to manage cyberbullying.
Just over 24% of the victims stated they had tried to seek support from friends.
Moreover, 6 out of the 20 interviewees said they tried to find some distance from
the situation:
Relativize maybe. When you have done nothing wrong, there is no reason
you should be belittled.Talk to friends so that they help you to put the situ-
ation into perspective and to find a solution if you do suffer because of it. It
is very important not to keep it to yourself.
(male, undergraduate)
I tried to sort it out on my own and then I waited. I did not ask for any help
to start with. Later, when my friends started putting me down on MSN also,
I asked a friend to give me support and that did help me.
( female, undergraduate)
Cyberbullying among students in France 17
Both the survey and the interview responses showed that students tended to avoid
or ignore the problem, while only a minority tried to take an active approach to
solving the situation. As a second step, victims tended to seek help from acquaint-
ances or friends rather than family, which might be explained by the fact that they
are young adults.
To create forums for students to help each other and not only on the inter-
net, but also face-to-face.
( female, undergraduate)
To set up discussion groups where students could get to know each other
better, including with university staff.
( female, undergraduate)
One of the challenges in bullying and cyberbullying is to get victims and wit-
nesses to speak up, as they tend to keep quiet for fear of retaliation or because of
the lack of spaces where they can share their concerns and negative experiences.
The majority of the participants in the study (60.8%) stated that they would
report problems if there was a means of doing so anonymously and if they knew
how and to whom they could report:
Quite a few students advocated for the creation of spaces for dialogue in the form
of forums, conversation groups, and support groups. The porosity between offline
and online spaces is a common response among those who recommend increasing
communication offline to reinforce positive values (Doane et al., 2014). There is
a growing trend towards counter-speech or rather “positive speech”, as a way to
prevent assaultive discourse, mainly in relation to increasingly hateful discourse
targeting some specific communities. Even as early as the beginning of the 20th
century, Brandeis (1927) was arguing for education over censorship, noting that
the best remedy for harmful speech “is more speech, not enforced silence” (as
cited in Richards & Calvert, 2000, p. 1). Learning to handle and contest hate
Cyberbullying among students in France 19
Try and develop models of counter-speech so that the students know that
the internet can also be a place where you care for the others; show students
how to write positive messages.
( female, Master’s student)
This last point supports the idea that colleges and universities have a prevention
role to play in providing their students with the social and communicative skills
required to build a better community, as well as to foster more positive social
relationships.
Our findings highlight that students think they can play an active part in the
prevention and intervention against cyberbullying and that a greater culture of
caring and dialogue would contribute to a healthier learning environment. Stu-
dents stress the need for greater information and raising awareness. As noted by
the students themselves, universities should offer curriculum content (aware-
ness raising, information on how to cope with the issue, consequences of online
aggression, how to behave in an ethical way when online, writing and managing
counter-speech), as well as organizational aspects (more space and time for dia-
logue, specific referees and adapted means for reporting incidents, a more caring
attitude as a collective value).
Conclusion
This study sought to assess the extent of cyberviolence or cyberbullying in French
universities. Findings show that cyberviolence is indeed of concern, since more
than 50% of the respondents had been victimized, 14% were authors, while 12%
declared a double status as both authors and victims. The more students are active
on the internet (time spent online, multiple activities, social network activities),
the higher the odds of becoming a victim, thus replicating conclusions from pre-
vious studies (Kubiszewski et al., 2013). Victims are more at risk to be offenders,
and offenders are equally as likely to become victims. Gender is also strongly asso-
ciated with cyberviolence, as males declared a greater involvement as both per-
petrators and victim/authors. More specifically, online gamers seem to be at risk
of victimization. As the interviews demonstrated, underperforming in the gaming
community is linked to insults, humiliations, and exclusion – echoing findings by
Przybylski and colleagues (2014).
Cyberviolence can have deleterious effects on some victims’ academic careers
(Cassidy, Faucher, & Jackson, this volume; Crosslin & Crosslin, 2014; Kowalski &
Limber, 2013). It is, therefore, of paramount importance that university leaders
take the issue seriously and that guidelines be included in students’ portfolios
20 Catherine Blaya
Note
1 We refer to cyberviolence as any type of violence perpetrated through electronic media
of communication. Cyberviolence is different from cyberbullying in the sense that
cyberviolence is not repeated violence and can be an occasional incident.
References
Adams, F. D., Lawrence, G. J., & Schenck, S. (2008). A survey on bullying: Some reflections
on the findings. NASCD News & Notes, 8, 1–7.
Anderson, C. A., Shibuya, A., Ihori, N., Swing, E. L., Bushman, B. J., Sakamoto, A., . . . &
Saleem, M. (2010). Violent video game effects on aggression, empathy, and prosocial
behavior in Eastern and Western countries. Psychological Bulletin, 136, 151–173.
Bauman, S., & Newman, M. L. (2013). Testing assumptions about cyberbullying: Perceived
distress associated with acts of conventional and cyber bullying. Psychology of Violence,
3(1), 27–38.
Berthaud, J., & Blaya, C. (2014). Premiers résultats de l’enquête française Cyberviolence à
l’université. Adjectif, Analyses et Recherches sur les TICE. Retrieved from www.adjectif.net/
spip/spip.php?article279
Berthaud, J., & Blaya, C. (2015). Pratiques numériques, perception de la violence en ligne
et victimation chez les étudiants. Recherches en éducation, Hors série 7, 146–161.
Blaya, C. (2013). Les ados dans le cyberspace, prises de risque et cyberviolence. Bruxelles: De
Boeck.
Blaya, C., & Fartoukh, M. (2015). Digital uses, victimization and online aggression: A com-
parative study between primary school and lower secondary school students in France.
European Journal on Criminal Policy and Research, 22(2), 285–300.
Cassidy,W., Faucher, C., & Jackson, M. (this volume).“You need a think skin . . .”: Impacts of
cyberbullying in Canadian universities. In W. Cassidy, C. Faucher, & M. Jackson (Eds.),
Cyberbullying at university in international contexts (pp. 112–125). Oxford, UK: Routledge.
Catalano, R. F., Haggerty, K. P., Oesterie, S., Fleming, C. B., Hawkins, J. D. (2004). The
importance of bonding to schools for healthy development: Findings from the social
development research group. Journal of School Health, 74, 252–262.
Chapell, M., Casey, D., De la Cruz, C., Ferrel, J., Forman, J., Lipkin, R., . . . & Whitaker, S.
(2004). Bullying in university by students and teachers [Electronic Version]. Adolescence,
39, 53–64.
Cyberbullying among students in France 21
Chapell, M. S., Hasselman, S. L., Kitchin, T., Lomon, S. N., MacIver, K. W., & Sarullo, P. L.
(2006). Bullying in elementary school, high school, and college. Adolescence, 41, 633–648.
Corcoran, L., McGuckin, C., & Prentice, G. (2015). Cyberbullying or cyber aggression?
A review of existing definitions of cyber-based peer-to-peer aggression. Societies, 5,
245–255.
Cross, D., Lester, L., Barnes, A., Cardoso, P., & Hadwen, K. (2015). If it’s about me, why do
it without me? Genuine student engagement in school cyberbullying education. Inter-
national Journal of Emotional Education, 7(1), 35–51.
Crosslin, K. L., & Crosslin, M. B. (2014). Cyberbullying at a Texas university: A mixed meth-
ods approach to examining online aggression. Texas Public Health Journal, 66, 26–31.
Coutant, A., & Stenger, T. (2010). Pratiques et temporalités des réseaux socionumériques:
logique de flux et logique d’archive. Mémoires et Internet – Médiation et Information, 32,
125–136.
Doane, A. N., Pearson, M. R., & Kelley, M. (2014). Predictors of cyberbullying perpetration
among college students: An application of the theory of reasoned action. Computers in
Human Behavior, 36, 154–162.
Faucher, C., Jackson, M., & Cassidy, W. (2014). Cyberbullying among university students:
Gendered experiences, impacts, and perspectives. Education Research International,
2014, 1–10.
Francisco, S. M.,Veiga Simão, A. M., Ferreira, P. C., & Martins, M. J. D. D. (2015). Cyberbul-
lying:The hidden side of college students. Computers in Human Behaviour, 43(0), 167–182.
Gibb, Z., & Devereux, P. G. (2016). Missing link: Exploring repetition and intentionality
of distress in cyberbullying behaviors within a college population. Translational Issues in
Psychological Science, 2(3), 313–322.
Goebert, D., Else, I., Matsu, C., Chung-Do, J., & Chang, J.Y. (2011). The impact of cyber-
bullying on substance use and mental health in a multiethnic sample. Maternal Child
Health Journal, 15, 1282–1286.
Hasan,Y., Bègue, L., Scharkow, M., & Bushman, B. J. (2013). The more you play, the more
aggressive you become: A long-term experimental study of cumulative violent video
game effects on hostile expectations and aggressive behavior. Journal of Experimental
Social Psychology, 49(2), 224–227.
Henson, B.,Wilcox, P., Reyns, B.W, & Cullen, F.T. (2010). Gender, adolescent lifestyles, and
violent victimization: Implications for Routine Activity Theory. Victims & Offenders,
5(4), 303–328.
Kennedy, M. A., & Taylor, M. A. (2010). Online harassment and victimization of college
students. Justice Policy Journal, 7(1), 1–21.
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Reese, H. (2012). Cyberbullying
among college students: Evidence from multiple domains of college life. In C. Wan-
kel & L. Wankel (Eds.), Misbehavior online in higher education (pp. 293–321). Bingley, UK:
Emerald.
Kowalski, R. M., & Limber, S. P. (2013). Psychological, physical, and academic correlates of
cyberbullying and traditional bullying. Journal of Adolescent Health, 53(Suppl.), S13–S20.
Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and cyberstalking
experiences and factors related to victimization of students at a public liberal arts col-
lege. International Journal of Technologies, 1(4), 74–91.
Kubiszewski, V., Fontaine, R., Hure, K., & Rusch, E. (2013). Le cyber-bullying à
l’adolescence: problèmes psycho-sociaux associés et spécificités par rapport au bullying
scolaire. L’Encéphale. 39(2), 77–84.
22 Catherine Blaya
about the ease of obtaining credits in specific subjects, as well as complaints and
rumours concerning faculty members and lecturers. The problem with this unof-
ficial syllabus is that not all posted information is written fairly or impartially,
and some posts are simply slanderous. Many universities have now started offi-
cial evaluations of lectures and of students’ daily lives at university, which gives
students an opportunity to comment on lectures and university life in general,
including services and facilities, club activities, and relationships with lecturers and
staff. Such formalization of the evaluation process can be a good countermeasure
to control and prevent students from inappropriately posting online about their
university experiences, which may prevent the escalation of cyberbullying cases.
Flaming posts on the internet are another recent problem among university
students. Since 2013, there has been a significant upsurge in the posting of pic-
tures and videos of students exhibiting deviant and inappropriate behaviour via
Twitter and other Social Networking Service (SNS) sites. Many of these pictures
and videos seem to be posted in an attempt to attract attention and/or to be
enjoyed by a limited group of friends. However, due to lack of proper knowledge
about the internet and an absence of insight into how such a posting might affect
others, these are often posted without restrictions and, therefore, can be circulated
quickly and widely. As a consequence, in many cases, the person who posted the
information is not only accused of deviant behaviour but also suffers verbal abuse
from unspecified internet users. Furthermore, such accusations of deviant postings
often do not remain on the internet, but they also impact the person who posted,
revealing their offline identity. Many of those who post end up facing severe sanc-
tions, including arrest and/or expulsion from their universities. Although many
Japanese consider such an end to be the reasonable outcome of the person’s own
deed, sometimes the individual identified as the perpetrator and accused of the
offences is innocent. Such unjust victimization is another serious online problem
that can occur, unless due diligence is undertaken to fully investigate the situation.
Recently, tragic news about the suicide of a university student due to revela-
tions of secrets on the internet shocked Japanese society (Sasagawa, 2016). A male
student plunged to his death after one of his friends disclosed his homosexuality
through SNS.The student’s parents filed a complaint for compensation against the
university for insufficiently protecting him, and against the person who exposed
the secret online without his consent. The legal counsel of the parents claimed
that because there is much discrimination and prejudice against LGBT individuals
in society, their son must have felt great fear and anxiety, and the university did not
take any measures to protect him from the classmate’s exposure, but only to deal
with the perceived problem that the student himself was homosexual (Sasagawa,
2016). Although the verdict of this trial is still pending, this news, along with other
internet-related incidents covered by the media, is prompting Japanese society to
rethink what it considers responsible online behaviour.
Tashiro (2012) raised an alert over these series of problematic online behaviours
by university students, claiming that inadvertent dissemination of information on
26 Tomoyuki Kanetsuna, Ikuko Aoyama, and Yuichi Toda
the internet caused serious problems including suspension, expulsion from uni-
versity, and withdrawal of job offers.
then it may be assumed that university-level students have the same knowledge.
Yaguchi (2013) studied 315 university students and found that for those who had
previously learned about the risks of the internet, 70% knew that anonymity on
the internet is limited, while less than 60% of those who had not learned about
the risks had appropriate knowledge about anonymity on the internet. Takeuchi,
Toda, and Takahashi (2015) argue that even if it is merely a belief, strong beliefs
about anonymity on the internet could lead to “Moral Disengagement” (Bandura,
1999) of people online, and this in turn may trigger the possibility of them easily
becoming perpetrators.
act differently. This process often escalates arguments and enables people to reach
biased consensus (Chiba, 2011).This perspective could explain why a person who
publicly posts an inappropriate piece of information tends to believe that people
who share the post will also share their amusement. It also explains why people
with common values join forces to accuse an outsider’s post as inappropriate
and unacceptable. Regarding such group behaviour, Toda, Strohmeier, and Spiel
(2008) argued that perpetrators of bullying often embrace the illusion that they
are the majority force and think the victims are deserving of being bullied. Toda
et al. further argued that such illusions of being a majority force could increase
their motivation to bully and escalate the attack on the victims.
depression, anxiety, high levels of stress, and low self-esteem, all of which could
lead to social withdrawal.
With 581 high school and university students (248 and 333, respectively),
Aoyama (2014) found that there was a moderate negative correlation between
propensity for acute social withdrawal and problematic use of the internet and
mobile phones, and a moderate positive correlation with the experience of online
victimization. Although the Cabinet Office (2010) claimed that those who are
socially withdrawn are more likely to use the internet excessively, Aoyama (2014)
revealed that those who are not exactly socially withdrawn but merely have a pro-
pensity for it are less likely to show symptoms of excessive or addictive internet
use. However, consistent with the findings of MEXT (2012), the experience of
cyberbullying does seem to affect social withdrawal.
References
Aoyama, I. (2014). The association between an affinity for acute social withdrawal (hikiko-
mori) and problematic use of Internet/cell phone and cyberbullying among Japanese
high school and college students [in Japanese]. Educational Studies: Bulletin of International
Christian University, 56, 43–49.
Aoyama, I., Saxon, T. F., & Fearon, D. D. (2010). Internalizing problems among cyberbully-
ing victims and moderator effects of friendship quality. Multicultural Education & Technol-
ogy Journal, 5(2), 92–105.
Bandura, A. (1999). Moral disengagement in the perpetration of inhumanities. Personality
and Social Psychology Review [Special Issue on Evil and Violence], 3, 193–209.
Cabinet Office. (2010). Fact-finding survey on social withdrawal of adolescents [in Japanese].
Tokyo: Cabinet Office, Government of Japan.
Cabinet Office. (2016). Environmental consideration for safe and secure Internet use for adolescents
[in Japanese]. Tokyo: Cabinet Office, Government of Japan.
Chiba, K. (2011). Sociological study of flaming in cyberspaces: Diffusion of discourse
beyond the intention [in Japanese]. Social Movement and New Types of Working, Report on
Research Project, 231, 24–37.
Coyne, I., & Farley, S. (this volume). Cyberbullying within working contexts. In W. Cas-
sidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international contexts
(pp. 80–96). Oxford, UK: Routledge.
Diener, E. (1977). Deindividuation: Causes and consequences. Social Behavior and Personal-
ity, 5, 143–155.
Gini, G., Pozzoli, T., & Bussey, K. (2015). The role of individual and collective moral disen-
gagement in peer aggression and bystanding: A multilevel analysis. Journal of Abnormal
Child Psychology, 43, 441–452.
34 Tomoyuki Kanetsuna, Ikuko Aoyama, and Yuichi Toda
Internet White Paper. (2008). General Incorporated Foundation of Internet Association Japan.
Tokyo: Impress R & D.
Japan Internet Safety Promotion Association (JISPA). (2016). Internet Literacy Assessment
indicator for Students (ILAS) Final Report 2015 [in Japanese].Tokyo: Japan Internet Safety
Promotion Association (JISPA).
Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT). (2008).
Study for unofficial school homepage (e.g. anonymous BBS) used by adolescents [in Japanese].
Department of Juveniles. Tokyo: Japanese Ministry of Education, Culture, Sports, Sci-
ence and Technology (MEXT).
Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT). (2010).
Guidelines for information, moral education at school, and cooperation with family and commu-
nity [in Japanese]. Tokyo: Japanese Ministry of Education, Culture, Sports, Science and
Technology (MEXT).
Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT). (2012).
Annual fact-finding survey on problematic behaviour in school [in Japanese]. Tokyo: Japanese
Ministry of Education, Culture, Sports, Science and Technology (MEXT).
Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT). (2016).
Annual fact-finding survey on problematic behaviour in school [in Japanese]. Tokyo: Japanese
Ministry of Education, Culture, Sports, Science and Technology (MEXT).
Japanese Ministry of Internal Affairs and Communications. (2016). Improvement of safe and
secure computer-mediated environment for adolescents [in Japanese]. Tokyo: Japanese Ministry
of Internal Affairs and Communications.
Kamihama,T., Shimizu, S., Sawamura, S., & Shimizu, S. (2013). Utilization and the depend-
ence tendency in mobile phone use among university students [in Japanese]. Department
of Education Research Bulletin of Iwate University, 72, 1–10.
Kanetsuna, T. (2014a). General perception and understanding for the nature of different forms of
cyberbullying among adolescents. Poster presented at International Society for Research on
Aggression XXIst World Meeting, Atlanta, Georgia, US.
Kanetsuna, T. (2014b). The relationships between risk perception, fear of victimization, and coping
potential in Cyberbullying. Paper presentation at 14th Biennial Conference of the Euro-
pean Association for Research on Adolescence, Izmir, Turkey.
Kanetsuna, T. (2016a). Comparisons between English bullying and Japanese ijime. In P. K.
Smith, K. Kwak, & Y. Toda (Eds.), School bullying in different cultures: Eastern and Western
perspectives (pp. 153–169). Cambridge, UK: Cambridge University Press.
Kanetsuna, T. (2016b). Effects of anonymous beliefs of the Internet on the levels of caution for vari-
ous online risk behaviour. Paper presentation at 31st International Congress of Psychology,
Pacifico Yokohama,Yokohama, Kanagawa, Japan.
Kohara, K. (2004). The Influence of the diffusion of mobile phones to the relationship of
university students [in Japanese]. Socio-Cultural Studies of Education, 10, 1–17.
Kollerová, L., Soukup, P., & Gini, G. (2017). Classroom collective moral disengagement
scale: Validation in Czech adolescents. European Journal of Developmental Psychology,
15(2), 1–8.
Morita, Y. (2001). Cross-national comparative study of bullying [in Japanese]. Japan: Kaneko
Shobo.
Morita,Y., & Kiyonaga, K. (1994). Bullying:The ailing classroom [in Japanese]. Tokyo: Kaneko
Syobo.
National Police Agency. (2013). Propulsive movement of cyber-patrol [in Japanese] (Report on
National Police Agency, 130).
Students/faculty and cyberbullying in Japan 35
Okamoto, Y., Miyake, Y., Jinnin, R., Yashiki, H., Uchino, T., Isobe, N., . . . & Yoshihara, M.
(2014). The Internet use situation in university students: Association between tendency
of dependence and mental condition [in Japanese]. Sogo Hoken Kagaku, 30, 7–13.
Olweus, D. (2012). Cyberbullying: An overrated phenomenon? European Journal of Develop-
mental Psychology, 9(5), 520–538.
Ono, A., & Saito, F. (2008). Educational psychological review about understanding and
coping with cyber bullying [in Japanese]. Bulletin of Senri Kinran University, 5, 35–47.
Orita, A. (2009). A report on the username squatting problem of social-media [in Japanese].
Information Processing Society of Japan Technical Report, 44, 5–14.
Postmes, T., Spears, R., & Lea, M. (1998). Breaching or building social boundaries? SIDE-
effects of computer-mediated communication. Communication Research, 25(6), 689–715.
Reicher, S. D. (1984). The St. Pauls’ riot: An explanation of the limits of crowd action in
terms of a social identity model. European Journal of Social Psychology, 14, 1–12.
Sasagawa, K. (2016, August 7). Plunge to his death after exposure of homosexuality [in
Japanese]. The Huffington Post.
Sato, H., Hibino, K., & Yoshida, F. (2010). The effects of computer-mediated communica-
tion (CMC) on verbal aggression [in Japanese]. Psychology Bulletin of Tsukuba University,
39, 35–43.
Smith, P. K. (2012). Cyberbullying: Challenges and opportunities for a research program –
A response to Olweus (2012). European Journal of Developmental Psychology, 9(5), 553–558.
Sproull, L., & Kiesler, S. (1986). Reducing social context cues: Electronic mail in organiza-
tional communication. Journal of Management Science, 32(11), 1492–1512.
Takeuchi, K., & Abe, K. (2014). “Smart” online violence in Japan and the United States:
Discussing the similarity/difference of them and applicability of inter-school peer sup-
port system. The Japanese Journal of Educational Practices on Moral Development, 8(1), 28–31.
Takeuchi, K., Toda,Y., & Takahashi, T. (2015). How should we cope with smartphone and
the Internet problems among adolescence? For further collaboration of society and
educational psychologists [in Japanese]. The Annual Report of Educational Psychology in
Japan, 54, 259–265.
Tashiro, M. (2012). Analysis of university students’ Internet flaming, prevention, and pro-
posal of correspondence [in Japanese]. Bulletin of Otsuma Women’s University School of
Information, 21, 233–240.
The Office for Youth Affairs and Public Safety of Tokyo Metropolitan Government. (2008).
Fact-finding survey of social withdrawal of adolescents. Tokyo: The Office for Youth Affairs
and Public Safety of Tokyo Metropolitan Government.
Toda, Y. (2016). Bullying (Ijime) and related problems in Japan: History and research. In P.
K. Smith, K. Kwak, & Y.Toda (Eds.), School bullying in different cultures: Eastern and western
perspectives (pp. 73–92). Cambridge, UK: Cambridge University Press.
Toda, Y., Strohmeier, D., & Spiel, C. (2008). Process model of bullying [in Japanese]. In T.
Katoh & H. Taniguchi (Eds.), Darkside of interpersonal relationships (S.117–131). Kyoto:
Kitaohji-Shobo.
Watanabe, N., Kubota, M., Ishizaki, T., & Oyanagi, K. (2008). The study of cellular phone,
the state of use and the influence on the living environment of junior high school,
high school, and university students [in Japanese]. Bulletin of Niigata Seiryo University,
8, 31–40.
Yaguchi, S. (2013). Internet usage among university students [in Japanese]. Bulletin of Tokoha
University Junior College, 44, 125–132.
3
EXPERIENCES OF CYBERBULLYING
AT A CHILEAN UNIVERSITY RAYÉN CONDEZA, GONZALO GALLARDO, AND PABLO REYES PÉREZEXPERIENCES OF CYBERBULLYING AT A CHILEAN UNIVERSITY
Introduction
This chapter presents the first exploratory study on cyberbullying from the per-
spective of undergraduate students at Pontificia Universidad Católica de Chile
(UC). Located in Santiago, Chile’s capital city, and with one campus in the south-
ern region of the country, this is Chile’s second oldest university. Each year, UC
receives students with the best high school graduation rankings and the most
outstanding scores on the national university selection exam. It is considered to
be one of the best universities in Latin America (first in 2018 QS ranking for the
region). Throughout the past years, this institution has made progress in terms of
social and geographical inclusion through the implementation of scholarships and
additional admission mechanisms. However, the majority of students still repre-
sent a higher socio-economic status.
As in other countries, in Chile, the research on cyberbullying has focused
mainly on behaviours at middle and high school levels (Varela, Pérez, Schwa-
derer, Astudillo, & Lecannelier, 2014). The interest for this type of study in higher
education is increasing, driven by the frequent use of information and commu-
nication technologies (ICT) by university students (Faucher, Jackson, & Cassidy,
2015), for whom ICT is not something “new”, “but rather it is an accepted and
normalized part of everyday life” (Myers & Cowie, 2017, p. 1172). In Chile, 91%
of people between 18 and 29 years old use smartphones to connect to the web,
making them the more intensive users compared to other age groups (Gobierno
de Chile, 2016).
Among university students, digital environments are active contexts of every-
day life that offer opportunities and pose risks, such as aggression, social exclusion,
and suffering in many shapes and degrees (Bartlett et al., 2014; Faucher et al.,
Experiences of cyberbullying at a Chilean university 37
2015; Walker, Sockman, & Koehn, 2011). In order to promote well-being for
all, higher education managers are now responsible for gathering information
about this phenomenon to generate actions, limit its scope, and support its victims
(Myers & Cowie, 2017).
In Chile, as well as in the rest of South America, investigations into this topic
at higher education are rare. Cyberbullying is a social phenomenon and public
health issue that is “polymorphous, multi-causal, complex and that is also a cause
of suicide in young people” (García Peña, Moncada Ortiz, & Quintero Gil, 2013,
p. 299). Evidence such as this should promote the development of policies and
proactive practices that reduce the effects and impacts of cyberbullying (Cassidy,
Faucher, & Jackson, 2013; Myers & Cowie, 2017; Walker et al., 2011).
This study may help to address the issue of cyberbullying at the university
level in Chile by shedding light on its extent and providing additional data to
inform existing protocols and regulations within UC, which are oriented toward
fostering well-being and respect among students and professors. The university
currently has an Office of the Ombuds and a helpline (2013), a Directorate for
Inclusion (2015), and a Protocol to prevent sexual assault and support sexual
assault victims (2016). The effort to promote a respectful environment between
students and professors is included as a particular dimension evaluated by students
in the teaching survey. Furthermore, addressing cyberbullying as an institutional
concern supported by evidence may promote the discussion of regulations aimed
at developing specific lines of action within UC and in other institutions.
What is cyberbullying?
Cyberbullying is a complex phenomenon of interaction among peers that carries
serious social and personal consequences (Ortega-Ruíz & Zych, 2016). Studies
concerning this issue are relatively new and mostly descriptive (Bartlett et al.,
2014). Cyberbullying is a type of bullying between peers, where behaviours are
carried out using virtual media (text messages, chats, emails, webpages, Twitter,
blogs, Facebook, YouTube or videogame chats, among others) causing different
types of damage (Cassidy et al., 2013; Condeza & Fontcuberta, 2015). Its distinc-
tive features include (Cassidy et al., 2013):
Current study
This study aims to understand the scope of cyberbullying among undergraduate
students at UC, identify risk factors and describe the specific influence of univer-
sity life on this phenomenon.
We employed a survey based on the research of Cassidy, Jackson, and Faucher
(2012), adapted to fit into the sociocultural Chilean reality, in order to understand
the students’ points of view regarding cyberbullying, as well as their experiences
as victims, witnesses, or bullies.
The survey consisted of 36 items, using the following variables: major, year in
major, gender, age, people with whom they live, region of origin, type of high
school they attended, nationality, identification with ethnic groups, and presence
of special needs. Frequency of daily media use was also considered. Those who
declared being victims were asked about the media through which they experi-
enced said violence, and whether they shared this experience with others. A space
was provided for students to tell their stories, and open-ended questions covered
possible solutions and concrete preventive actions.
The research was approved by the University Research Ethics Committee.
The survey was made available to all UC undergraduate students (n = 22,605)
through an online platform. We received 961 completed surveys, which repre-
sents 4% of the total number of undergraduate students. The main findings of
the survey are described as follows, identifying four sections: (1) experiences
from undergraduate cyberbullying victims, (2) witnesses of cyberbullying, (3)
offenders, and (4) general perceptions of the undergraduate student community
about cyberbullying.
Variable Category N %
Declared offender n %
offenders, or they may observe the cyberbullying directly. Thirty-eight point one
percent of the participants mentioned having witnessed cyberbullying. Some of
these students said that they were emotionally affected, expressing discomfort and
concern about this type of relationship among classmates, with some reporting
that they felt empathy and attempted to support the victims.The following exam-
ples are indicative of the comments received:
I thought that it was not right to expose a classmate like that, it upset me,
and I believed that it was a shame that we treated each other like that.
( female, fourth year)
I felt powerless about the offenders’ anonymity, and I felt ignorant because
I did not know what to do.
( female, second year)
I was very angry . . . I felt rage, and I just wanted to let my friend know that
she could count on me any time.
( female, fifth year)
I worry that people will be attacked in this way. However, I admit that I did
not take any action in this regard.
(male, sixth year)
It is also relevant to note that among the participants who identified themselves as
witnesses of cyberbullying, 44.5% mentioned that they were sometimes afraid of
becoming cyberbullying victims themselves.
How to move forward? Myers and Cowie (2017) emphasize that prevention and
intervention against cyberbullying must be the institution’s responsibility. Faucher
et al. (2015) mention that preventive actions should be implemented at the very
beginning of university life, “such as during the initial orientation sessions and on
the first day of a course” (p. 115), in order to promote immediate awareness of
cyberbullying as an issue. Other possible lines of action would be to offer report-
ing options and direct support for witnesses, encouraging them to step forward
and “break the silence” that permeates these practices (Myers & Cowie, 2017).
Doing so is not easy. As this study suggests, students do not look for support from
institutional agents (university helpline, counsellor’s office, teachers); rather, they
resort to family and friends. Furthermore, some students do not believe that the uni-
versity should be responsible for intervening in, or preventing, these issues. It will be
a challenge to generate a change of attitude and perception. Defining cyberbullying
in institutional policies, describing the harmful consequences, and creating clear
action protocols are all initiatives worth considering (Faucher et al., 2015).
Actively promoting good peer relationships in educational contexts is also
important. Creating affection and close bonds among classmates promotes self-
esteem, well-being, and a sense of belonging (Strayhorn, 2016; Tinto, 2015).
Neither bullying nor cyberbullying behaviours can be explained in terms of the
bully’s personality, the witnesses’ indifference, or the victim’s lack of strategies:
this is a systemic issue (López de Lerida, Berger, & Pizarro, 2012). It is essential
to encourage and model respect and good relationships within educational com-
munities and in society as a whole.
Finally, it is necessary to activate and disseminate resources already available
at UC, and also to create new approaches for effective intervention, to stop vio-
lence when detected, protect victims, and generate opportunities for learning
and reparation for aggressors. Among the resources already available at UC are
the Ombuds, the undergraduate and teacher regulations, the unit of psychologi-
cal support (Bureau of Health students), and the helpline “Fono-Ayuda UC”,
48 Rayén Condeza, Gonzalo Gallardo, and Pablo Reyes Pérez
which offers guidance, support, and information about procedures and channels
for victims and witnesses of harassment and physical or psychological abuse or
violence. In addition, just as UC created the “Protocol against sexual harassment
and abuse”, it could create a protocol of “Good treatment in cyber space”. As
with the “Protocol against sexual harassment”, it would be important to source
codes and norms through dialogue among the different members of the commu-
nity. Mass diffusion of information regarding cyberbullying and disseminating the
results of this study in a fact-sheet or easily readable infographic could contribute
to increasing awareness of the problem. Promoting national and international
meetings of higher education in this field will continue to foster the interdiscipli-
nary international research networks such as the one that gave rise to this study.
Finally, this topic demands collective reflection throughout the campus context
and in every career program. Furthermore, more research is needed to support
policy development and the implementation of new practices at the university
and state levels. For example, regarding the Chilean higher education system, the
government could consider the implementation of specific policies and protocols
in this area as a requisite for university accreditation, encouraging institutional
attention to this area of student well-being across the country.
Acknowledgements
We thank all the students who trusted us with their experiences.
References
Aricak, O. T. (2009). Psychiatric symptomatology as a predictor of cyberbullying among
university students. Egitim Arastirmalari-Eurasian Journal of Educational Research, 34,
167–184.
Bartlett, C., Gentile, D., Anderson, C., Suzuki, K., Sakamoto, A.,Yamaoka, A., & Katsura, R.
(2014). Cross-cultural differences in cyberbullying behaviour: A short-term longitudi-
nal study. Journal of Cross-Cultural Psychology, 45(2), 300–313.
Bellei, C. (2013). El estudio de la segregación socioeconómica y académica de la educación
chilena [The study of the socioeconomic and academic segregation of Chilean educa-
tion]. Estudios Pedagógicos, 39(1), 325–345.
Experiences of cyberbullying at a Chilean university 49
Brunner, J. J., & Miranda, D. (2016). Educación Superior en Iberoamérica Informe 2016 [Higher
Education in Ibero-America Report 2016]. Santiago de Chile: CINDA (Centro Interuni-
versitario de Desarrollo)/RIL Editores.
Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A compre-
hensive review of current international research and its implications and application to
policy and practice. School Psychology International: Special Issue on Cyberbullying, 34(6),
575–612.
Cassidy,W., Faucher, C., & Jackson, M. (this volume). “You need a thick skin . . .”: Impacts
of cyberbullying in Canadian universities. In W. Cassidy, C. Faucher, & M. Jackson
(Eds.), Cyberbullying at university in international contexts (pp. 112–125). Oxford, UK:
Routledge.
Cassidy, W., Jackson, M., & Faucher, C. (2012). Survey to investigate the extent, nature and
impact of Cyber-Bullying among university students in select universities in Canada. Canada:
Simon Fraser University.
Condeza, R., & Fontcuberta, M. (2015). Redes sociales: luces y sombras en el ámbito de
la Comunicación & Educación [Social networks: Lights and shadows in the field of
Communication & Education]. In V.Tomé, E. Bévort, & V. Reia-Baptista (Eds.), Research
on social media: A glocal view [Investiugacao em media sociais: uma visiao glocal] (pp. 51–78).
Lisboa: RVJ.
Ezcurra, A. M. (2005). Diagnóstico preliminar de las dificultades de los alumnos de primer
ingreso a la educación superior [Preliminary diagnosis of the difficulties of first-year
students entering higher education]. Perfiles Educativos, 27(107), 118–133.
Faucher, C., Cassidy, W., & Jackson, M. (this volume). Power in the tower: The gendered
nature of cyberbullying among students and faculty at Canadian universities. In W. Cas-
sidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international contexts
(pp. 66–79). Oxford, UK: Routledge.
Faucher, C., Jackson, M., & Cassidy, W. (2014). Cyberbullying among university stu-
dents: Gendered experiences, impacts, and perspectives. Education Research Interna-
tional, 2014, 1–10 [online]. Retrieved from https://www.hindawi.com/journals/
edri/2014/698545/
Faucher, C., Jackson, M., & Cassidy, W. (2015). When online exchanges byte: An examina-
tion of the policy environment governing cyberbullying at the university level. Cana-
dian Journal of Higher Education/Revue canadienne d’enseignement supérieur, 45(1), 102–121.
Gallardo, G., Espinosa, C.,Vergara, M., Sanhueza, M., & Cruz, S. (2016). Apoyo institucional
para la inclusión educativa universitaria: actividades deportivas de integración [Institu-
tional support for inclusion at higher education: Sports integration activities]. In PAIEP
(Comp.), Primer Congreso de Inclusión en la Educación Superior: Acciones afirmativas para
igualar oportunidades. Santiago de Chile: PAIEP USACH.
Gallardo, G., Lorca, A., Morrás, D., & Vergara, M. (2014). High school to college transition
experiences of students admitted in a Chilean traditional university (CRUCH) through
Inclusive Special Admission. Pensamiento Educativo. Revista de Investigación Educacional
Latinoamericana, 51(2), 135–151.
García Peña, J., Moncada Ortiz, R., & Quintero Gil, J. (2013). El bullying y el suicidio
en el escenario universitario [Bullying and suicide in the university scenario]. Revista
colombiana de ciencias sociales, 4(2), 298–310.
Gobierno de Chile. (2016). Séptima encuesta de Acceso, Usos y Usuarios en Internet [Seventh
Survey on Access, Uses and Users on the Internet]. Santiago: Subtel/Ipsos.
González, R. (2005). Movilidad social: el rol del prejuicio y la discriminación [Social
mobility: The role of prejudice and discrimination]. En foco, Expansiva, 59, 1–23.
50 Rayén Condeza, Gonzalo Gallardo, and Pablo Reyes Pérez
Roberts, J. S., & Rosenwald, G. C. (2013). Ever upward and no turning back: Social mobil-
ity and identity formation among first generation college students. In D. P. McAdams,
R. Josselson, & A. Lieblich (Eds.), Turns in the road: Narrative studies of lives in transition
(pp. 91–119). Washington, DC: American Psychological Association (APA).
Sobrero, V., Lara-Quinteros, R., Méndez, P., & Suazo, B. (2014). Equidad y diversidad en
universidades selectivas: la experiencia de estudiantes con ingresos especiales en las car-
reras de la salud [Equity and diversity in selective universities: Experiences of students
admitted to health majors via equity programs]. Pensamiento educativo, Revista de Investi-
gación educacional latinoamericana, 51(2), 152–164.
Strayhorn, T. (2016). Student development theory in higher education: A social psychological
approach. New York & London: Routledge.
Tinto,V. (2015). Through the eyes of students. Journal of College Student Retention: Research,
Theory and Practice, 19(3), 254–269.
Varela, J., Pérez, J. C., Schwaderer, H., Astudillo, J., & Lecannelier, F. (2014). Caracterización
del cyberbullying en el gran Santiago de Chile, en el año 2010 [Characterization of
cyberbullying in the city of Santiago, Chile, in 2010]. Revista Quadrimestral da Associação
Brasileira de Psicologia Escolar e Educacional, 18(2), 347–354.
Walker, C. M., Sockman, B. R., & Koehn, S. (2011). An exploratory study of cyberbully-
ing with undergraduate university students. TechTrends: Linking Research and Practice to
Improve Learning, 55(2), 31–38.
4
MYSPACE OR YOURS? AYNSLEY PESCITELLIMYSPACE OR YOURS?
Aynsley Pescitelli
Literature review
both in the past year” (GLSEN et al., 2013, p. 8). LGBT participants also reported
much higher rates of sexual harassment than their non-LGBT peers, both online
and through text messaging (GLSEN et al., 2013).
While there is still a dearth of research in this area, researchers are starting to
explore the topic by comparing the experiences of LGBTQ and non-LGBTQ
post-secondary students. Finn (2004) found higher rates of stranger-perpetrated
email harassment among sexual minority-identified participants at the University
of New Hampshire. In an Australian study, Wensley and Campbell (2012) found
that, compared to their heterosexual peers, non-heterosexual male university stu-
dents were significantly more likely to be victims of cyberbullying. Overall rates
of cyberbullying in this study were comparable to those found in middle and high
school settings, suggesting that cyberbullying continues to be a problem experi-
enced by post-secondary students. Although, in a re-examination of Finn’s (2004)
study at Arizona State University, Lindsay and Krysik (2012) did not find LGBT
students’ stated sexual orientation to be linked to more frequent experiences of
online harassment.
The continuing presence of subtle and overt homophobic and transphobic
harassment in post-secondary settings is quite troubling, especially since the inter-
net provides a wider context in which to perpetrate similar forms of bullying. If
homophobia and transphobia are this prevalent in face-to-face contexts, there is
a strong possibility that it is even more common on the internet, where anonym-
ity and disinhibition may further encourage such behaviour. Although several of
these studies discuss the overlap of online bullying and LGBTQ young adults,
very few have focused on this topic exclusively. Furthermore, the studies con-
ducted to date have been entirely or predominantly quantitative in nature. Thus,
the research outlined in this chapter attempts to fill this gap and examine the topic
through an exploratory, qualitative lens.
Research methods
Because very little research has been conducted to date on post-secondary stu-
dents’ experiences with homophobic and transphobic cyberbullying, this study
is both exploratory and descriptive. The primary research question is: “What are
post-secondary students’ experiences with homophobia and transphobia in online
environments?”
Participants were selected through purposive and snowball sampling meth-
ods. It was important that interviewees met several criteria for inclusion. These
requirements included: current registration at a post-secondary institution in the
Greater Vancouver area of British Columbia, being a minimum age of 19, and
personal or witnessed experience of homophobic or transphobic cyberbully-
ing.4 Additional participants were recruited through a snowball sampling method,
wherein early-stage interviewees spread the word about the study to contacts that
also fit the sampling criteria. Snowball sampling is often used in research with
MySpace or yours? 55
hard-to-contact populations and studies that address sensitive topics (Dantzker &
Hunter, 2012; Palys & Atchison, 2014). These considerations both apply in the
current study, as information about an individual’s sexual orientation and/or gen-
der identity may not be readily apparent (Janoff, 2005); members of the LGBTQ
community, however, may know others who meet study requirements who are
unaware of the research being conducted.
Recruitment was carried out primarily through posters placed in general areas
of multiple local university and college campuses, as well as in several inclusive
spaces (both on campuses and in the community). Additional recruitment meth-
ods included: free and paid advertisements on online news and classified sites,
as well as in local newspapers; Facebook recruitment through former partici-
pants and colleagues; email newsletters through LGBTQ organizations (on and
off campus); and email recruitment through several departmental undergraduate
mail lists.
The final sample consisted of six participants, including both undergraduate
and graduate students from post-secondary institutions throughout the Greater
Vancouver region. All information in Table 4.1, as well as further demographic
information, was obtained through a follow-up questionnaire administered after
each interview. Questionnaire results were submitted in the participants’ own
words and are reported as written. Interviewees were given additional space to
expand on answers or to discuss anything not covered in the interview. Partici-
pants were provided the opportunity to select their own pseudonyms. They were
also encouraged to define their own sexual orientation and/or gender identity,
rather than having these personal features presumed or assigned. Finally, inter-
viewees were asked how they would like to be referred to in the study (e.g., in
masculine, feminine, or neutral terms) to allow them to have additional ownership
over their representation.
In-depth, semi-structured interviews were conducted between January and
June of 2013. Interview length ranged from 45 minutes to 1 hour and 50 minutes.
Participants were given the opportunity to select a location for the interview
(as recommended by Legard, Keegan, & Ward, 2003). Interviews were recorded
on a digital device (with permission), and field notes were taken to supplement
recordings. Although this project was designated minimal risk by the institutional
Office of Research Ethics, bullying, homophobia, and transphobia are difficult
topics – interviews can involve the recounting of painful memories, experiences,
and emotions. For this reason, interviewees were also provided with a list of
local counselling contacts. Recorded interviews were transcribed and uploaded
to NVivo 10 qualitative analysis software for coding. Coding was conducted in
several stages, beginning with an initial round of open coding, followed by axial
coding, shifting the focus to more specific categories and key themes present
throughout the entire sample (see Corbin & Strauss, 2008; Strauss, 1987; Scott &
Garner, 2013).
Results
Even on Tumblr, the gayest site in the world, you will still find occasionally
a bit of abuse. Especially toward gays, because there are some, you know,
58 Aynsley Pescitelli
Republicans in America who will get online and make a whole bunch of
posts about how evil gays are. There’s a small conservative niche on Tumblr.
And they’re very adamantly and staunchly anti-gay.
(Fox, personal communication, 2013)
There was agreement among participants that they have never personally expe-
rienced a safe space online. Clark Kent felt that, because online environments are
shared, it is impossible to rely on other people for safety. Despite this belief, several
interviewees thought that the creation of such spaces was possible. Fox argued that
a safe space would have to be self-created and limited only to people you know
and truly trust. Damon felt that boundaries would need to be clear and fixed, and
that all members would have to agree to and abide by pre-set norms. These con-
cerns are warranted but troubling, as participants have accepted the constant risk
of harmful behaviours in an online setting. Given the frequent use of the internet
by all participants, for both educational and social purposes, such a risk has the
potential to seriously disrupt online activities and freedom.
members of the trans community presume that he, as a trans-male, should be dat-
ing a woman. Damon reported similar experiences. Damon also explained that
trans people are not always on the same page about issues, definitions, or concerns,
which can lead to disagreements. Ultimately, such in-community debate and dis-
cord was perceived by participants as being more harmful than helpful.
I mean, we call them by their username, and it’s that identity on the internet
that we’re getting pissed off at. Not the actual person behind the screen.
Unless we know that person. Then we can link it to another identity.
(Clark Kent, personal communication, 2013)
The non-linear nature of the internet can also be problematic, as people are often
receiving communications at later times, which may affect how far removed the
perpetrator is from the situation and possible repercussions.
Several participants argued that the internet brings out the worst in people.
They argued that specific aspects of the internet encourage people to say things
they likely would not say offline. Gia had her own theory about this phenom-
enon, arguing that anonymity plus an audience encourages abusive behaviour that
users would never be courageous (or foolish) enough to engage in offline. She
also discusses the troubling tendency of people distinguishing their online activi-
ties from in-person ones by using the term IRL (in real life), delineating their
60 Aynsley Pescitelli
I watched a documentary once on the Pirate Bay . . . called The Pirate Bay
AFK, and I didn’t know what that meant, but during the documentary,
someone says IRL. And they’re like, “well, actually, we don’t say IRL (in real
life) we say away from keyboard [AFK], because the internet is real life”. It
is real life! This is your actual life, and what you do on it is going to impact
others and impact you. You have to behave accordingly. But yeah, saying
IRL I feel sort of backs up these people who just say whatever they want
on the internet.
(Gia, personal communication, 2013)
This IRL versus online distinction may allow cyberbullies to separate themselves
from their online actions, as well as minimize the perception of the harm expe-
rienced by victims.
rather than negative intent. While these findings are promising and point to
high levels of resiliency (as was similarly noted by Woodford et al., 2012), other
findings are more troubling.
The perception of a strong societal acceptance of transphobic views is sad-
dening, as is the common experience of cyberbullying within the LGBTQ com-
munity. Similar findings emerged in Dispenza, Watson, Chung, and Brack’s (2012)
study of in-person career-related discrimination experienced by female-to-male
trans adults. In their study, transphobic discrimination was perpetrated by both
LGB and trans individuals. Findings of transphobic actions perpetrated by the LGB
community are not entirely surprising, as heterosexist beliefs are also sometimes
held by LGB individuals (Weiss, 2003). As pointed out by Jackson, Faucher, and
Cassidy (this volume), any policies developed in this area should take into account
the vulnerability to potential homophobic and transphobic discrimination.
As this present study was conducted in 2013, however, it is possible that societal
views and norms may have shifted since the research period (either positively or
negatively), both within and outside of the LGBTQ community. Furthermore,
students are now using different sites and applications, rendering some of the
earlier sites nearly obsolete.This provides additional venues and options for cyber-
victimization that may have been neglected, as well as options for potentially safer
online communities.
Ultimately, this study offers an important jumping-off point. This information
is useful for raising awareness of problems that exist, persist, and may need more
(or less) focus. Awareness is the first step in problem solving, and these data are
certainly a step in the right direction in improving the internet experiences of
LGBTQ individuals, and in creating truly safe online spaces.
Action points
• As recommended by Faucher, Jackson, and Cassidy (2015), administrators
should consider both gender and sexuality when drafting policies and pro-
cedures related to online activities. Past research indicates that rates of cyber-
victimization may be higher among LGBTQ students (Finn, 2004;Wensley &
Campbell, 2012) and consequences may be more severe (Cooper & Blumen-
feld, 2012), so it is important to examine the particular needs of and risk
factors associated with LGBTQ students online.
• Administrators should also consider the needs of LGBTQ students and com-
munity members when creating general university policies and procedures. If
a university espouses a zero-tolerance response to homophobia and transpho-
bia, it can be helpful in dealing with such behaviours in the online context
as well (particularly with more subtle or unintentional forms of discrimina-
tion). Examples may include the creation of gender-neutral washrooms, or
LGBTQ-supportive spaces and organizations on campus.
MySpace or yours? 63
• To ensure that LGBTQ students feel they are a valued part of the commu-
nity, universities and colleges should ensure that they are providing adequate
orientation and identity options on official documents and institutional sur-
veys (see Rivers, 2016). They should move away from dichotomous gender
options (or the additional option that literally “others” those who do not
identify as male or female). It is difficult to feel one’s voice is heard when
your identity is not properly acknowledged by your institution.
• When defining terms such as “cyberbullying” or “cyber-harassment”, it is
worthwhile to consider the role of harm and how harm may be experienced.
While many commonly employed definitions consider only those behav-
iours where harm was deliberate (Hinduja & Patchin, 2009; Langos, 2012), it
may be more useful to direct attention to the harm that is experienced by the
victim, rather than the intent of the perpetrator (Walker, Sockman, & Koehn,
2011). It is apparent from the experiences of this study’s participants that,
while interviewees experienced harm from online actions and defined said
behaviour as cyberbullying, they still often presumed neutral or even positive
intent on behalf of their cyberbullies. We cannot discount such experiences
when the impact is equally severe. Unintentional cruelty can lead to the same
consequences as intentional cruelty.
Notes
1 Homophobia is often referred to as a “fear or hatred of homosexuality and gays and les-
bians in general” (Pickett, 2009, p. 93). It is also often used to explain orientation-based
discrimination experienced by bisexual and questioning individuals (Blackburn, 2012;
Conoley, 2008; Weiss, 2003).
2 While homosexuality and bisexuality relate to sexual orientation, transgender relates to
gender roles and identities (Nagoshi et al., 2008). Transgender is likely often subsumed
under the wider LGB category because it has only been distinguished from homosexu-
ality within the past century (Pickett, 2009; Weiss, 2003). Transphobia is described as
“fear and/or emotional disgust towards individuals who do not conform to society’s
gender expectations” (Watjen & Mitchell, 2013, p. 135).
3 The Gay, Lesbian & Straight Education Network, the Center for Innovative Public
Health Research, and the Crimes Against Children Research Center, respectively.
4 I did not explicitly define cyberbullying for potential participants, as I was interested in
how they personally perceived and defined the issue.
References
Bauman, S., & Baldasare, A. (2015). Cyber aggression among college students: Demo-
graphic differences, predictors of distress, and the role of the university. Journal of College
Student Development, 56(4), 317–330.
Beemyn, G. (2012).The experiences and needs of transgender community college students.
Community College Journal of Research & Practice, 36(7), 504–510.
64 Aynsley Pescitelli
Blackburn, M.V. (2012). Interrupting hate: Homophobia in schools and what literacy can do about
it. New York, NY: Teachers College Press.
Conoley, J. C. (2008). Sticks and stones can break my bones and words can really hurt me.
School Psychology Review, 37(2), 217–220.
Cooper, R. M., & Blumenfeld,W. J. (2012). Responses to cyberbullying: A descriptive anal-
ysis of the frequency of and impact on LGBT and allied youth. Journal of LGBT Youth,
9(2), 153–177.
Corbin, J., & Strauss, A. (2008). Basics of qualitative research techniques and procedures for develop-
ing grounded theory (3rd ed.). Thousand Oaks, CA: Sage Publications.
Cotten-Huston, A. L., & Waite, B. M. (1999). Anti-homosexual attitudes in college students.
Journal of Homosexuality, 38(3), 117–133.
Dantzker, M. L., & Hunter, R. D. (2012). Research methods for criminology and criminal justice
(3rd ed.). Mississauga, ON: Jones & Bartlett Learning Canada.
Dispenza, F., Watson, L. B., Chung, W. B., & Brack, G. (2012). Experience of career-related
discrimination for female-to-male transgender persons: A qualitative study. The Career
Development Quarterly, 60, 65–81.
Ellis, S. J. (2009). Diversity and inclusivity at university: A survey of the experiences of
lesbian, gay, bisexual and trans (LGBT) students in the UK. Higher Education, 57(6),
723–739.
Faucher, C., Jackson, M., & Cassidy, W. (2014). Cyberbullying among university students:
Gendered experiences, impacts, and perspectives. Education Research International, 2014,
1–10.
Faucher, C., Jackson, M., & Cassidy, W. (2015). When online exchanges byte: An examina-
tion of the policy environment governing cyberbullying at the university level. Cana-
dian Journal of Higher Education, 45(1), 102–121.
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal
Violence, 19(4), 468–483.
GLSEN, CiPHR, & CCRC. (2013). Out online: The experiences of lesbian, gay, bisexual, and
transgender youth on the Internet. New York, NY: GLSEN.
Hinduja, S., & Patchin, J.W. (2009). Bullying beyond the schoolyard: Preventing and responding to
cyberbullying. Thousand Oaks, CA: Corwin Press.
Jackson, M., Faucher, C., & Cassidy, W. (this volume). What’s policy got to do with it? The
focus on cyberbullying policy at the university level. In W. Cassidy, C. Faucher, & M.
Jackson (Eds.), Cyberbullying at university in international contexts (pp. 198–211). Oxford, UK:
Routledge.
Janoff, D. V. (2005). Pink blood: Homophobic violence in Canada. Toronto, ON: University of
Toronto Press.
Jayakumar, U. M. (2009). The invisible rainbow of diversity: Factors influencing sexual
prejudice among college students. Journal of Homosexuality, 56, 675–700.
Langos, C. (2012). Cyberbullying: The challenge to define. Cyberpsychology, Behavior, and
Social Networking, 15(6), 285–289.
Legard, R., Keegan, J., & Ward, K. (2003). In-depth interviews. In J. Ritchie & J. Lewis
(Eds.), Qualitative research practice: A guide for social scientists and researchers (pp. 138–169).
Thousand Oaks, CA: Sage Publications.
Lindsay, M., & Krysik, J. (2012). Online harassment among college students. Information,
Communication & Society, 15(5), 703–719.
Nagoshi, J. L., Adams, K. A., Terrell, H. K., Hill, E. D., Brzuzy, S., & Nagoshi, C. T. (2008).
Gender differences in correlates of homophobia and transphobia. Sex Roles, 59, 521–531.
MySpace or yours? 65
Palys, T., & Atchison, C. (2014). Research decisions: Quantitative, qualitative, and mixed methods
approaches (5th ed.). Toronto, ON: Nelson Education.
Pickett, B. L. (2009). The A to Z of homosexuality. Plymouth, UK: Scarecrow Press.
Rivers, I. (2016). Homophobic and transphobic bullying in universities. In H. Cowie &
C. Myers (Eds.), Bullying among university students: Cross-national perspectives (pp. 48–60).
New York, NY: Routledge.
Scott, G., & Garner, R. (2013). Doing qualitative research: Designs, methods, and techniques (1st
ed.). Upper Saddle River, NJ: Pearson Education.
Strauss, A. (1987). Qualitative analysis for social scientists. New York, NY: Cambridge Univer-
sity Press.
Varjas, K., Meyers, J., Kiperman, S., & Howard, A. (2013). Technology hurts? Lesbian, gay,
and bisexual youth perspectives of technology and cyberbullying. Journal of School Vio-
lence, 12(1), 27–44.
Walker, C. M., Sockman, B. J., & Koehn, S. (2011). An exploratory study of cyberbullying
with undergraduate university students. TechTrends, 55(2), 31–38.
Watjen, J., & Mitchell, R. W. (2013). College men’s concerns about sharing dormitory
space with a male-to-female transsexual. Sexuality & Culture, 17, 132–166.
Weiss, J. T. (2003). GL vs. BT: The archaeology of biphobia and transphobia within the
U.S. gay and lesbian community. In J. Alexander & K. Yescavage (Eds.), Bisexuality and
transgenderism: InterSEXions of the others (pp. 25–56). Binghamton, NY: Harrington Park
Press.
Wensley, K., & Campbell, M. (2012). Heterosexual and nonheterosexual young university
students’ involvement in traditional and cyber forms of bullying. Cyberpsychology, Behav-
ior, & Social Networking, 15(2), 649–654.
Woodford, M. R., Howell, M. L., Silverchanz, P., & Yu, L. (2012). “That’s so gay!”: Examin-
ing the covariates of hearing this expression among gay, lesbian, and bisexual college
students. Journal of American College Health, 60(6), 429–434.
Zalaquett, C. P., & Chatters, S. J. (2014). Cyberbullying in college: Frequency, characteris-
tics, and practical implications. SAGE Open, 4(1), 1–8.
5
POWER IN THE TOWER CHANTAL FAUCHER, WANDA CASSIDY, AND MARGARET JACKSONPOWER IN THE TOWER
Background
Cyberbullying in higher education can be situated on a continuum between
cyberbullying in kindergarten to grade 12 (K–12) education and cyberbully-
ing in the workplace (Adams & Lawrence, 2011; Faucher, Cassidy, & Jackson,
2015; Langos & Giancaspro, this volume; McKay, Arnold, Fratzl, & Thomas, 2008;
Power in the tower 67
Zalaquett & Chatters, 2014). Time spent online is a significant variable as far as
experiences with cyberbullying are concerned (Cassidy, Jackson, & Faucher, 2016;
Donner, 2016; Turan, Polat, Karapirli, Uysal, & Turan, 2011; Wright, 2016;Yubero,
Navarro, Elche, Larrañaga, & Ovejero, 2017; Zhang, Land, & Dick, 2010). Those
who spend more time online are more likely to experience cyberbullying. As time
spent online, for both personal and academic purposes, becomes more strongly
anchored in the daily life of university students and faculty members, cyberbully-
ing experiences are expected to follow.
In findings reported elsewhere, we noted that 24% of 1,925 students sur-
veyed at four Canadian universities had experienced cyberbullying in the past
12 months (Faucher, Jackson, & Cassidy, 2014) and 25% of 331 faculty members
surveyed had reported the same (Cassidy et al., 2016). Other studies on cyberbul-
lying in the post-secondary context in different countries have similarly reported
the existence of such experiences among students to varying degrees (e.g., Beran,
Rinaldi, Bickham, & Rich, 2012; Blaya, this volume; Dilmaç, 2009; Francisco,
Simão, Ferreira, & Martins, 2015; Langos & Giancaspro, this volume; Molluzzo &
Lawler, 2012; Schenk & Fremouw, 2012; Turan et al., 2011; Walker, Sockman, &
Koehn, 2011;Wensley & Campbell, 2012) as well as among faculty members (e.g.,
Blizard, 2016; McKay et al., 2008; Minor, Smith, & Brashen, 2013;Vance, 2010).
Although some youth (Fiske, 2016) and university students (Crosslin & Gol-
man, 2014) may find the term outdated or childish, cyberbullying is perceived
by a majority of post-secondary students and faculty as a problem that requires
greater attention (Cassidy et al., 2016; Crosslin & Golman, 2014; Langos & Gian-
caspro, this volume). The perception of cyberbullying as childish behaviour, or
at least behaviour which one is expected to handle independently, likely inhibits
students’ (and faculty members’) willingness to report incidents of cyberbully-
ing (Francisco et al., 2015) and relates to their preference for autonomous cop-
ing strategies (Orel, Campbell, Wozencraft, Leong, & Kimpton, 2017; Wozencroft,
Campbell, Orel, Kimpton, & Leong, 2015).
What has become apparent in the gradually mounting body of work on cyber-
bullying in post-secondary is that the role of gender warrants closer consideration.
Multiple studies employing convenience sampling methods have had a large over-
representation of female participants (see Table 5.1). Although the disproportional
representation of female participants in these studies is not significant in and of
itself (and in some studies, the gender disparity is accounted for by representation
in the student body), it does serve to alert us to a gender disparity in attention to
the issue of cyberbullying in universities. It also invites us to consider the ways in
which the experiences of cyberbullying may differ by gender.
This emerging literature on cyberbullying in post-secondary institutions has
begun to reveal certain key gender differences, but more information is needed.
Francisco et al. (2015) found that female students in Portugal were more prone
to be aggressors and victims in cyberbullying. Such findings are paralleled in the
work of Zalaquett and Chatters (2014), Snell and Englander (2010), and Turan
TABLE 5.1
Disparities in Gender Participation Among Studies of Cyberbullying in
Post-Secondary Institutions
focus groups.
Power in the tower 69
et al. (2011). Francisco et al. (2015) also reported that male cyberbullies tended to
act alone, whereas female cyberbullies tended to act in groups.
On the other hand, studies by Akbulut and Eristi (2011) in Turkey, Blaya (this
volume) in France, and Englander (2008) in the U.S. found cyberbullying to be
more common among male than female college students. Donner (2016) exam-
ined the gender gap in college students’ involvement in three forms of online
crime, including cyber-harassment, and found male involvement to be persistently
higher than that of female students. Dilmaç (2009) also found male students more
likely to report they had engaged in cyberbullying others, whereas female students
were more likely to report being victims of cyberbullying. Still others have found
no gender differences in prevalence of cyberbullying (Schenk & Fremouw, 2012;
Vance, 2010; Walker et al., 2011;Yubero et al., 2017).
One of the earliest studies in this field found LGBT students were twice as
likely to experience online harassment as heterosexual students (Finn, 2004).
Wensley and Campbell (2012) found higher cyberbullying perpetration rates
among non-heterosexual female students, and higher victimization rates among
non-heterosexual male students. Molluzzo and Lawler (2012) questioned students
regarding their awareness of cyberbullying against particular groups at their insti-
tution and the main target groups identified were: gay, lesbian, and female.
Preferred coping strategies may also vary by gender – female students were
more likely than males to use help-seeking coping strategies, whereas male stu-
dents were more likely to retaliate against the cyberbullying (Orel et al., 2017).
Schenk and Fremouw (2012) found that the most frequent types of coping strat-
egies were similar for male and female students (i.e., telling someone, avoiding
friends or peers, getting revenge), but some differences emerged with female stu-
dents also frequently responding that they would avoid the internet or their cell
phone, and male students reporting the use of substances such as alcohol or drugs
to cope.
Theoretical framework
A number of theoretical frameworks have attempted to account for gender dif-
ferences with respect to cyberbullying. Work on gender and cyberbullying in
elementary and secondary schools has adopted the frames of relational aggression
for girls (Jackson, Cassidy, & Brown, 2009) and cognitive and affective deficits for
boys (Topcu & Erdur-Baker, 2012). Relational aggression is used to exert a nega-
tive impact on friendships, group belonging, or standing by spreading rumours,
gossip, and slander (Crick et al., 1999). Cognitive and affective deficits may be
more likely to contribute to boys’ involvement in cyberbullying. Such deficits
may limit empathy as well as the ability to identify emotions and paralinguistic
cues. Both of these frames have some applicability to what is reportedly occur-
ring in universities as well (Faucher et al., 2014), but they are certainly lacking in
some respects.
70 Chantal Faucher, Wanda Cassidy, and Margaret Jackson
Donner (2016) has used social learning theory to account for the gender
gap in cyber-harassment and other cyber crimes among college students. He
examines socialization variables, such as self-control and immersion into cyber-
environments, in order to explain the gap. However, such variables cannot fully
account for the gender differences in male and female students’ level of involve-
ment in cyber crimes.
To orient our analysis of the gender differences, we borrow from the field
of intimate partner violence in situating our gendered analysis of cyberbullying
against the backdrop of the Duluth model (Pence & Paymar, 1993). This model
is a cognitive-behavioural approach used in counselling for males found guilty
of domestic violence. The model is premised on the Power and Control Wheel,
which specifies a range of ways in which power and control may manifest in an
abusive relationship. Of particular interest in our analysis of cyberbullying rela-
tionships are the elements relating to the use of intimidation, coercion, threats,
harmful language, emotional abuse, social standing, male privilege, exclusion, har-
assment, and using technology to send unwanted messages.
Much as in the field of intimate partner violence, the cyberbullying of women
and girls should not be divorced from the gendered hierarchies of power that
exist both online and offline and which contribute to the violence in the lives of
women and girls in numerous forms (Crooks, 2016; Halder & Jaishankar, 2009;
Navarro & Jasinski, 2013; Shariff & Gouin, 2005). While the internet may be a
source of empowerment for women and girls (Crooks, 2016), it can also contrib-
ute to maintaining their disadvantaged position in society (Navarro & Jasinski,
2013). The internet has furthered the ways in which gender exploitation may
occur, including pornography, sex trafficking, gender and sexual harassment, and
cyber-stalking (Halder & Jaishankar, 2009; Navarro & Jasinski, 2013; Shariff &
Gouin, 2005).
Power dynamics are integral to the hierarchical structure of post-secondary
institutions. Not only is power manifested through rank and status, but gender,
gender identity, sexuality, age, race, and ethnicity also are impactful features. Fur-
thermore, the manifestation of contrapower harassment (where the person with
ostensibly less power in the relationship harasses the individual with more power)
in student-faculty relations has been noted (DeSouza, 2010). De Souza (2010)
suggests that students, who may appear to be less powerful than faculty members,
may use the anonymity of the internet to engage in uncivil behaviour in retalia-
tion for actual or perceived slights.
A number of possible explanations have been offered for the use of con-
trapower harassment by post-secondary students in particular. The stress and
pressure experienced by students may cause a range of undesirable behaviours
including incivility, harassment, and bullying (Knepp, 2012). Furthermore, in a
context where faculty members hold control over students’ grades in particular,
students may experience some degree of frustration and powerlessness (Blizard,
2016). Some students adopt consumerist views of education and feel some degree
Power in the tower 71
of entitlement with respect to their grades, such that they may react negatively
when faculty members do not meet their expectations (Blizard, 2016; DeSouza,
2010; Knepp, 2012; McKay et al., 2008). These situations may be further com-
pounded by universities overlooking student incivility in order to retain students
(Knepp, 2012) and collective agreements that account for top-down harassment,
but not for harassment of faculty by students (McKay et al., 2008). “The system
is also weighted heavily in favour of the student, through the process of linking
tenure and promotion to student evaluations” (McKay et al., 2008, p. 89).
Furthermore, a range of studies relating to contrapower harassment has clearly
pointed to the fact that those faculty members who are most likely to be treated
in this way by students are those who are perceived to have the least power in the
university based mostly on gender, age, sexuality, gender identity, race/ethnicity,
and rank (DeSouza, 2010; Knepp, 2012; Lampman, 2012; Sallee & Diaz, 2012).
Lampman (2012) points out that women are at greatest risk of being bullied or
disrespected by students in universities because they are underrepresented in the
highest ranks and in leadership roles within universities, less likely to work full-
time, and less likely to have tenured positions. Women’s authority tends to be
resisted by subordinates (as is the case for others with less power, such as minori-
ties and those in low-ranking positions). Thus, when women do not accommo-
date student requests for extensions, make-up exams, etc., they may be perceived
as breaking the prescriptive gender stereotype according to which women are
sensitive, nurturing, caring, etc. (Lampman, 2012). Lampman’s study of 524 profes-
sors from 100 colleges and universities in the U.S. also found that women faculty
were more likely than male faculty to report experiences of severe contrapower
harassment.
Contrapower harassment, however, is not the only manifestation of bullying
behaviour found in universities. Bullying between colleagues or peers has also
been reported. Lester’s (2009) study of workplace harassment among community
college faculty found the use of power to be significant. “Unlike other forms
of bullying that use direct threats and obvious harassment, using formal power
occurs by using institutionally or positionally relevant powers to silence and/or
control faculty colleagues” (p. 452). Racism and sexism were prevalent through-
out the forms of bullying noted in the study.
In Hollis’s (2012) survey of 401 individuals employed at one of 175 higher
education institutions in the U.S., higher rates of experience with workplace bul-
lying were found among respondents who were African Americans, women, and
members of the LGBT community. Witnesses of academic workplace bullying
noted that those with less power within the higher education administration were
more likely to be targeted. Taylor (2012) found that tenure status impacts faculty
members’ experiences with bullying in the academic workplace, both as targets
and as bullies. Non-tenure-track faculty reported the highest levels of exposure
and felt powerless to address the situation. Tenured faculty were more likely to be
targeted if they were perceived as ‘untouchable’ (i.e., the intent of the bullying was
72 Chantal Faucher, Wanda Cassidy, and Margaret Jackson
to create conditions that would lead to their resignation, or it was due to envy).
Tenure-track faculty members reported the lowest level of exposure. They are
not as powerless as non-tenure track, but easier to terminate than tenured faculty.
Yamada, Cappadocia, and Pepler’s (2014) Canadian study of psychology grad-
uate students and their supervisors provides additional evidence on the use of
power in universities. The academic context is particularly vulnerable to work-
place bullying “due to the competitive and individualistic nature of obtaining
promotions and progress through faculties and graduate programs” (p. 59). Gradu-
ate students are particularly vulnerable due to the power imbalance with their
supervisors, who may control their grades, recommendations, references, financial
support, and career opportunities.
In order to better understand bullying between peers, Walker et al. (2011)
applied social dominance theory, which suggests that power differentials may exist
based on age, gender, and other socially valued attributes and that ‘legitimizing
myths’ may operate to allow for any discrimination that exists along these lines. In
their comparison of the proportion of student respondents who reported expe-
riencing at least one of 13 specific scenarios (which constituted cyberbullying
according to the operational definition used by the authors) with the proportion
of respondents who reported that they had been cyberbullied, a significant dis-
crepancy arose (over 30% said yes to the former, 11% to the latter). The authors
suggest that students may consider some of these behaviours to be accepted parts
of online social life, which could suggest that legitimizing myths are operating.
In the following section, we briefly outline the methods employed in our
examination of cyberbullying among post-secondary students and faculty, fol-
lowed by a summary of the findings, and their analysis in relation to the lens of
power.
Methods
In order to examine the nature, extent, impacts, and solutions to cyberbullying in
the post-secondary context, the authors developed two online surveys dissemi-
nated at four Canadian universities. The universities are situated in different parts
of the country and vary in size and profile. The surveys each contained over 100
items asking respondents about basic demographic information, background on
ICT usage patterns, experiences with cyberbullying in the past 12 months, and
solutions and opinions about the problem. Both closed and open-ended questions
were included. The research ethics office of the researchers’ university as well as
of the participating universities reviewed and approved the study. The data were
collected over short periods between late 2012 and early 2014 at the different
universities.
Cyberbullying was defined in the surveys as using language that can defame,
threaten, harass, bully, exclude, discriminate, demean, humiliate, stalk, disclose
personal information, or contain offensive, vulgar, or derogatory comments. The
Power in the tower 73
intent to harm was emphasized. Respondents were also provided with a list of
examples such as receiving nasty, mean, rude, vulgar, hurtful, or harassing email
or text messages; having terrible, derogatory, sexist, racist, or homophobic things
written about you online; someone posting an embarrassing photo or video of
you online; someone pretending to be you online; and being deliberately excluded
from an online group or chat.
Descriptive statistics were examined for the closed-ended questions and the-
matic content analysis was conducted on the open-ended questions.
Findings
More detailed findings from these surveys have been reported separately else-
where (Cassidy et al., 2016; Faucher et al., 2014). We focus here on the analysis of
similarities and differences between the results of the two surveys as they relate to
gender, which has emerged as a key consideration.
As noted previously, participation in both of these surveys was consistent with
what appears to be a trend in the literature to date on cyberbullying in the post-
secondary sector in that voluntary female participation far outnumbered male
participation. On the student survey, the female-to-male ratio was 3:1, and for
the faculty survey it was 2:1. A very small number of respondents provided an
alternate gender identity, and it was not possible to include these respondents
in the gender analysis. What is clear in terms of the female-to-male ratios is that
they are not consistent with the reported gender ratios for Canadian university
students or faculty (Council of Canadian Academies, 2012; websites of participat-
ing universities).
The student sample consisted of 1,925 students, 74% of whom were women
and 51% of whom were Caucasian. The students were primarily undergradu-
ates and were fairly evenly drawn from first, second, third, and fourth years. The
faculty sample was composed of 331 faculty members, 68% women, 84% Cauca-
sian and included professors, teaching assistants, instructors, lecturers, advisors, and
other teaching-related university personnel. There was a fairly even distribution
between those with less than five years of experience and those with more than
five years and/or permanent or tenured positions.
Respondents to both surveys reported similar rates of cyberbullying victimiza-
tion overall (24.1% of students and 25% of faculty had been cyberbullied in the
last 12 months). However, although rates for male and female students were fairly
similar (25.4% and 23.8%, respectively), female faculty members (27%) were much
more likely than male faculty members (18%) to have been cyberbullied.The rates
for cyberbullying of faculty members by students were more similar for men and
women (13% and 16%, respectively), but there was a wider gap between those
who reported being cyberbullied by a faculty colleague (8% of male respondents
and 14% of female respondents). For students, male respondents were more likely
than female students to have been cyberbullied by someone they did not know,
74 Chantal Faucher, Wanda Cassidy, and Margaret Jackson
whereas female students were more likely to report having been cyberbullied by a
friend or acquaintance at the university. For faculty, the vast majority of cyberbul-
lying victims knew the perpetrators (students and/or faculty).
Students experienced cyberbullying in a wide range of formats: social networks,
email, text messages, non-course-related blogs, forums, or chat rooms. Social
networks and text messages were more frequently cited by female respondents,
whereas the non-course-related blogs, forums, or chat rooms were more often
mentioned by male respondents. Male respondents were overrepresented among
those who reported experiencing extensive cyberbullying via email, email photo,
text message, course-related sites, other blogs, forums, or chat rooms, impersona-
tion, and “other” which predominantly consisted of cyberbullying in online gam-
ing. On the other hand, faculty overwhelmingly experienced cyberbullying over
email, with professor-rating sites and course-related sites, blogs, forums, and chat
rooms a distant second and third.
When asked for the reasons for which they had been cyberbullied, students
who knew the reasons generally provided answers such as interpersonal problems,
their physical appearance, or other reasons such as differences of opinions/beliefs,
it was part of an online game, or it was a joke. Males also cited their ethnicity
as a reason for which they were cyberbullied, while female students mentioned
their gender as a primary reason for the cyberbullying they experienced. Female
faculty respondents also cited their gender as a primary reason for which they
became targets of cyberbullying. Other reasons cited by faculty tended to be
related to their work. When they were targeted by students, they felt it was often
due to teaching-related reasons (such as students being unhappy with a grade
they received or some aspect of the course they were taking), or their position
or role at the university. When they were targeted by colleagues, faculty members
primarily cited work-related reasons, such as a professional difference of opinion,
competition between colleagues, professional jealousy, their professional status, or
attempts to establish power and control. Their position or role at the university
was also cited, as was age in some cases.
Approximately 5% of respondents to the student survey admitted to having
cyberbullied someone at the university in the past 12 months. When asked about
their intent, male and female respondents identified insulting as a primary intent,
as well as defaming when the cyberbullying targeted faculty members. Further-
more, some male respondents also identified intents such as humiliating, harassing,
and threatening. Faculty respondents were not asked about whether they had
engaged in cyberbullying, but they were asked about the perceived intent of the
cyberbullying that was directed at them. They reported similar intents to those
cited by students: insulting, demanding, demeaning, belittling, being derogatory,
spreading rumours, harassing, and being rude or vulgar.
In both surveys, female victims were much more likely than male victims to
talk to someone about what they were experiencing, though few students or
faculty reported the cyberbullying to someone at the university. They tended to
Power in the tower 75
prefer telling close friends, family, or partners. Faculty members also told col-
leagues, but they did not tell superiors or others who might help them in an
official capacity.
Also in both surveys, female respondents reported a far wider range and extent
of impacts stemming from their cyberbullying experiences. In all categories of
effects about which they were surveyed, female students and faculty members
were more likely than their male counterparts to acknowledge the effects, includ-
ing mental and physical health issues, impacts on ability to work/study, impacts
on relationships inside and outside the university, desire to remain at the univer-
sity, feeling their emotional security and/or physical safety were threatened, and
thoughts of suicide and self-harm.
Discussion
In line with most studies to date on the cyberbullying of post-secondary students
and/or faculty, the vast majority of those who voluntarily participated in this
study were women. We also note some differences between the experiences with
cyberbullying for male and female study participants, suggesting that an analysis
that takes gender into account is relevant.
Among students, the prevalence of cyberbullying victimization appears to be
generally gender neutral, and no clear gender pattern has emerged in the existing
literature, which contains contradictory findings as to whether female students
are more or less likely to be victims and/or perpetrators (Akbulut & Eristi, 2011;
Blaya, this volume; Dilmaç, 2009; Donner, 2016; Francisco et al., 2015; Schenk &
Fremouw, 2012; Snell & Englander, 2010; Turan et al., 2011; Vance, 2010; Walker
et al., 2011;Yubero et al., 2017; Zalaquett & Chatters, 2014).The different types of
cyberbullying behaviours examined and different cyber-environments frequented
by male and female students may account for some of the variations observed. For
instance, in our study, students had experienced cyberbullying in a wide range of
online settings, and there were significant variations between the online spaces
where female and male respondents had experienced cyberbullying.
For faculty, however, the gender pattern noted in this study more clearly points
to a greater likelihood for female faculty members to be targeted. Such a finding
is in line with existing studies on cyberbullying and other forms of incivility and
harassment in universities (Blizard, 2016; DeSouza, 2010; Hollis, 2012; Knepp,
2012; Lampman, 2012; Sallee & Diaz, 2012). The clearer pattern may also be
partially accounted for by the vast consensus that email was the primary means
through which the cyberbullying targeting faculty members was carried out, with
professor-rating sites and course-related sites also being identified. These forms of
technology may not have as much gender variability in usage as those noted in
relation to the cyberbullying targeting students.
Although victimization is spread between men and women, the reasons for the
targeting of women also point to other disadvantaged groups who may experience
76 Chantal Faucher, Wanda Cassidy, and Margaret Jackson
and remove those barriers. Understand the victims’ needs and follow up to
ensure they are met appropriately.
References
Adams, F. D., & Lawrence, G. L. (2011). Bullying victims:The effects last into college. Ameri-
can Secondary Education, 40(1), 4–13.
Akbulut,Y., & Eristi, B. (2011). Cyberbullying and victimisation among Turkish university
students. Australasian Journal of Educational Technology, 27(7), 1155–1170.
Beran,T. N., Rinaldi, C., Bickham, D. S., & Rich, M. (2012). Evidence for the need to sup-
port adolescents dealing with harassment and cyber-harassment: Prevalence, progres-
sion, and impact. School Psychology International, 33(5), 562–576.
Blaya, C. (this volume). Cyberbullying among university students in France: Prevalence, con-
sequences, coping and intervention strategies. In W. Cassidy, C. Faucher, & M. Jackson
(Eds.), Cyberbullying at university in international contexts (pp. 9–22). Oxford, UK: Routledge.
Blizard, L. M. (2016). Faculty members’ perceived experiences of cyberbullying by stu-
dents at one Canadian university: Impact and recommendations. International Research
in Higher Education, 1(1), 107–124.
Cassidy, W., Jackson, M., & Faucher, C. (2016). Gender differences and cyberbullying
towards faculty members in higher education. In R. Navarro, S.Yubero, & E. Larrañaga
(Eds.), Cyberbullying across the globe: Gender, family, and mental health (pp. 79–98). Basel,
Switzerland: Springer.
Condeza, R., Gallardo, G., & Reyes, P. (this volume). In W. Cassidy, C. Faucher, & M. Jack-
son (Eds.), Cyberbullying at university in international contexts (pp. 36–51). Oxford, UK:
Routledge.
Council of Canadian Academies. (2012). Strengthening Canada’s research capacity: The gender
dimension – The expert panel on women in university research. Ottawa, ON: Council of
Canadian Academies.
Crick, N.,Werner, N., Casas, J., O’Brien, K., Nelson, D., Grotpeter, J., & Markon, K. (1999).
Childhood aggression and gender: A new look at an old problem. In D. Bernstein (Ed.),
Proceedings of the Nebraska symposium on motivation (pp. 75–141). Lincoln, NB: University
of Nebraska Press.
Crooks, H. R. (2016). An intersectional feminist review of the literature on gendered
cyberbullying: Digital girls. Jeunesse:Young People,Texts, Cultures, 8(2), 62–88.
Crosslin, K., & Golman, M. (2014). “Maybe you don’t want to face it” – College students’
perspectives on cyberbullying. Computers in Human Behavior, 41, 14–20.
DeSouza, E. R. (2010). Frequency rates and correlates of contrapower harassment in higher
education. Journal of Interpersonal Violence, 48(11), 1–27.
Dilmaç, B. (2009). Psychological needs as predictor of cyber bullying: A preliminary report
on college students. Educational Sciences:Theory & Practice, 9(3), 1307–1325.
Donner, C. M. (2016).The gender gap and cybercrime: An examination of college students’
online offending. Victims & Offenders, 11(4), 556–577.
Englander, E. K. (2008). Cyberbullying and information exposure: User-generated content in post-
secondary education. In Massachusetts Aggression Research Center (MARC) Publica-
tions, Paper 11.
Faucher, C., Cassidy,W., & Jackson, M. (2015). From the sandbox to the inbox: Comparing
the acts, impacts, and solutions of bullying in K-12, higher education, and the work-
place. Journal of Education and Training Studies, 3(6), 111–125.
78 Chantal Faucher, Wanda Cassidy, and Margaret Jackson
Faucher, C., Jackson, M., & Cassidy, W. (2014). Cyberbullying among university students:
Gendered experiences, impacts, and perspectives. Education Research International, 2014,
1–10.
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal
Violence, 19, 468–483.
Fiske, N. W. (2016). Framing Internet safety: The governance of youth online. Cambridge, MA:
The MIT Press.
Francisco, S. M., Simão, A. M.V., Ferreira, P. C., & Martins, M. J. D. D. (2015). Cyberbullying:
The hidden side of college students. Computers in Human Behavior, 43, 167–182.
Halder, D., & Jaishankar, K. (2009). Cyber socializing and victimization of women. Temida,
5–26.
Hollis, L. P. (2012). Bully in the ivory tower: How aggression and incivility erode American higher
education. Wilmington, DE: Patricia Berkly.
Jackson, M., Cassidy, W., & Brown, K. (2009). “you were born ugly and youl die ugly too”:
Cyber-bullying as relational aggression. In Education, 15(2), part. 1, 68–82.
Knepp, K. A. F. (2012). Understanding student and faculty incivility in higher education.
The Journal of Effective Teaching, 12(1), 33–46.
Lampman, C. (2012). Women faculty at risk: U.S. professors report on their experiences
with student incivility, bullying, aggression, and sexual attention. NASPA Journal About
Women in Higher Education, 5(2), 184–208.
Langos, C., & Giancaspro, M. (this volume). Cyberbullying in the Australian context: The
shades of harm and implications for law and policy. In W. Cassidy, C. Faucher, & M.
Jackson (Eds.), Cyberbullying at university in international contexts (pp. 181–197). Oxford,
UK: Routledge.
Lester, J. (2009). Not your child’s playground: Workplace bullying among community col-
lege faculty. Community College Journal of Research and Practice, 33(5), 444–462.
McKay, R., Arnold, D. H., Fratzl, J., & Thomas, R. (2008). Workplace bullying in academia:
A Canadian study. Employee Responsibility and Rights Journal, 20, 77–100.
Minor, M., Smith, G. S., & Brashen, H. (2013). Cyberbullying in higher education. Journal
of Educational Research and Practice, 3(1), 15–29.
Molluzzo, J. C., & Lawler, J. P. (2012). A study of the perceptions of college students on
cyberbullying. Information Systems Education Journal, 10(4), 84–109.
Navarro, J. N., & Jasinski, J. L. (2013). Why girls? Using Routine Activities Theory to pre-
dict cyberbullying experiences between girls and boys. Women & Criminal Justice, 23(4),
286–303.
Orel, A., Campbell, M., Wozencraft, K., Leong, E., & Kimpton, M. (2017). Exploring uni-
versity students’ coping strategy intentions for cyberbullying. Journal of Interpersonal Vio-
lence, 32(3), 446–462.
Pence, E., & Paymar, M. (1993). Education groups for men who batter:The Duluth Model. New
York: Springer.
Sallee, M., & Diaz, C. (2012). Sexual harassment, racist jokes, and homophobic slurs: When
bullies target identity groups. In J. Lester (Ed.), Workplace bullying in higher education
(pp. 41–59). New York: Routledge.
Schenk, A. M., & Fremouw, W. J. (2012). Prevalence, psychological impact, and coping of
cyberbully victims among college students. Journal of School Violence, 11(1), 21–37.
Shariff, S., & Gouin, R. (2005). Cyber-dilemmas: Gendered hierarchies, free expression and cyber-
safety in schools. Paper presented at Oxford Internet Institute International conference
Safety and Security in a Networked World. Oxford, UK. Retrieved from www.oii.
ox.ac.uk/cyber-safety.
Power in the tower 79
Snell, P. A., & Englander, E. K. (2010). Cyberbullying victimization and behaviors among
girls: Applying research findings in the field. Journal of Social Sciences, 6(4), 510–514.
Statistics Canada. (2017). Family violence in Canada: A statistical profile, 2015. Juristat, 85,
1–77.
Straus, M. A. (2008). Dominance and symmetry in partner violence by male and female
university students in 32 nations. Children and Youth Services Review, 30(3), 252–275.
Taylor, S. (2012). Workplace bullying: Does tenure change anything? The example of a
Midwestern research university. In J. Lester (Ed.), Workplace bullying in higher education
(pp. 23–40). New York: Routledge.
Topcu, Ç., & Erdur-Baker, Ö. (2012). Affective and cognitive empathy as mediators of gen-
der differences in cyber and traditional bullying. School Psychology International, 33(5),
550–561.
Turan, N., Polat, O., Karapirli, M., Uysal, C., & Turan, S. G. (2011). The new violence type
of the era: Cyber bullying among university students – Violence among university stu-
dents. Neurology, Psychiatry and Brain Research, 17, 21–26.
Vance, J. W. (2010). Cyber-harassment in higher education: Online learning environments.
Ed.D. dissertation. Retrieved from University of Southern California Digital Library
(usctheses-m2954).
Walker, C. M., Sockman, B. R., & Koehn, S. (2011). An exploratory study of cyberbullying
with undergraduate university students. TechTrends, 55(2), 31–38.
Wensley, K., & Campbell, M. (2012). Heterosexual and nonheterosexual young university
students’ involvement in traditional and cyber forms of bullying. Cyberpsychology, Behav-
ior, and Social Networking, 15(12), 649–654.
World Health Organization. (2013). Global and regional estimates of violence against women:
Prevalence and health effects of intimate partner violence and non-partner sexual violence. Geneva,
Switzerland: World Health Organization.
Wozencroft, K., Campbell, M., Orel, A., Kimpton, M., & Leong, E. (2015). University
students’ intention to report cyberbullying. Australian Journal of Educational and Develop-
mental Psychology, 15, 1–12.
Wright, M. (2016). Cyber victimization on college campuses: Longitudinal associations
with suicidal ideation, depression, and anxiety. Criminal Justice Review, 41(2), 190–203.
Yamada, S., Cappadocia, M. C., & Pepler, D. (2014). Workplace bullying in graduate psy-
chology programs: Students perspectives of student-supervisor relationships. Training
and Education in Professional Psychology, 8, 58–67.
Yubero, S., Navarro, R., Elche, M., Larrañaga, E., & Ovejero, A. (2017). Cyberbullying vic-
timization in higher education: An exploratory analysis of its association with social and
emotional factors among Spanish students. Computers in Human Behavior, 75, 439–449.
Zalaquett, C. P., & Chatters, S. J. (2014). Cyberbullying in college: Frequency, characteris-
tics, and practical implications. Sage Open, 4(1), 1–8.
Zhang, A. T., Land, L. P. W., & Dick, G. (2010). Key influences of cyberbullying for univer-
sity students. PACIS 2010 Proceedings, Paper 83.
6
CYBERBULLYING WITHIN
WORKING CONTEXTS IAIN COYNE AND SAMUEL FARLEYCYBERBULLYING WITHIN WORKING CONTEXTS
Inherent within this definition are criteria of frequency, duration, and power
imbalance – all three of which differentiate workplace bullying from other related
aggressive acts. Notably, unlike school bullying and general aggression research,
workplace bullying definitions tend not to include intent. Arguments for this
approach include the difficulty in measuring intent (Einarsen, Hoel, Zapf, &
Cooper, 2011) and the possibility that perpetrators may disguise their true inten-
tions to rationalize their behaviour to others (Samnani, 2013). Support exists on
including frequency, duration, and power imbalance within workplace bully-
ing definitions (Zapf & Einarsen, 2001); however, Rayner and Cooper (2006)
argue how persistency allows a perpetrator to rationalize a one-off negative act as
something that is not bullying. Furthermore, Saunders, Huynh, and Goodman-
Delahunty (2007) illustrate differences between academic definitions of bullying
and how the concept is conceptualized by its practitioners.
Whitty and Carr Cyber- “obscene or hate email that threatens or frightens,
(2006, pp. 237– harassment or emails that contain offensive content, such as
238) sexist or racist material . . . this material can be
sent by people . . . (either known or unknown
to the person)”
Weatherbee and Cyberaggression “aggression expressed in a communication
Kelloway (2006, between two or more people using
p. 461) ICTs, wherein at least one person in the
communication aggresses against another in
order to effect harm”
Willard (2007, Flaming “heated, short lived argument that occurs between
p. 5) two or more protagonists”.
Lim and Teo Cyber incivility “communicative behavior exhibited in computer-
(2009, p. 419) mediated interactions that violate workplace
norms of mutual respect”
Zhang and Workplace “instances where an employee is systematically
Leidner (2014, cyberbullying exposed to repeated negative treatment from
p. 2) supervisors, colleagues or subordinates by
electronic forms of contact over a long period of
time, in a situation in which the perpetrator has
more power than the target”
Farley et al. (2016, Workplace “a situation where over time, an individual is
p. 295) cyberbullying repeatedly subjected to perceived negative acts
conducted through technology (e.g. phone,
email, web sites, social media) which are related
to their work context. In this situation the
target of workplace cyberbullying has difficulty
defending him or herself against these actions”
Forssell (2016, Workplace “Negative acts carried out by a group or an
p. 457) cyberbullying individual using digital media.The acts are
carried out repeatedly and over time against
a victim who cannot easily defend him or
herself. Online harassment can be expressed
by offensive or rude text messages, email, or
someone posting unpleasant and offensive
information (picture, videos, or text) on the
Internet”
Vranjes et al. Workplace “all negative behavior stemming from the work
(2017, p. 326) cyberbullying context and occurring through the use of ICTs,
which is either (a) carried out repeatedly and
over a period of time or (b) conducted at least
once but forms an intrusion into someone’s
private life (potentially) exposing it to a wide
online audience.This behavior leaves the target
feeling helpless and unable to defend”
86 Iain Coyne and Samuel Farley
Our contention is that while we acknowledge and agree there are contextual
features to workplace cyberbullying not seen in traditional bullying, these features
do not change the conceptualization of the concept (bullying is still bullying);
rather, they may help to explain why people engage in the behaviour and/or the
extent of impact on the target. This is perhaps best illustrated by discussing the
definitional criteria of frequency, duration, and power imbalance seen in offline
bullying definitions.
Traditionally, the frequency and duration component of bullying refers to
the same person regularly experiencing negative behaviour over a long period
of time. What constitutes repetition in the virtual environment is more ambigu-
ous, especially when considering a single online act, shared in the public domain
that can be viewed repeatedly by a broad audience – which may or may not be
shared by the initial perpetrator. Nevertheless, while not conforming strictly to
original ideas around frequency and duration, the victim will still regularly expe-
rience the behaviour over a prolonged period of time: they could even encounter
the cyberbullying for longer (due to their inability to escape) and more fre-
quently (the viral reach of the act). A second issue relating to repetition is the
co-occurrence of online and offline bullying behaviour. School-based (Sticca,
Ruggieri, Alsaker, & Perren, 2013) and work-related research (Coyne et al.,
2017) has identified relationships between experiencing offline bullying and
cyberbullying. Co-occurrence of both behaviours raises the issue of whether a
respondent is experiencing cyberbullying or whether they are actually facing
regular bullying (which has started to manifest in technological form). In the
latter case, one could claim that the movement across media is indicative of
frequency and duration.
Elements of power imbalance may differ when comparing cyberbullying to
traditional bullying. Cyberbullying victims are potentially in a stronger position,
as they can terminate negative interactions more easily by not responding to mes-
sages (Wolak, Mitchell, & Finkelhor, 2007). However, Heatherington and Coyne
(2014) argue that a victim’s perceived lack of power, rather than the bully’s pos-
session of it, characterizes the power differential in the virtual environment. We
suggest that Vranjes et al.’s (2017) position of cyberbullying being conceptually
different from offline bullying still falls under the remit of power differential –
albeit extending our perception of what power is:
• Due to the spread of technology and the lack of boundaries within online
communication, employees can be subjected to cyberbullying in their own
homes, which may heighten feelings of powerlessness.
• Technological ability by the perpetrator or limited technology ability by the
target can result in victim perceptions of powerlessness, as they are unable to
force a perpetrator to remove abusive material or cannot influence what oth-
ers write about them.
Cyberbullying within working contexts 87
At the beginning of this section, we expressed surprise that similar concerns lev-
elled at traditional workplace bullying seem to permeate the research on work-
place cyberbullying. The debate on what the concept is – and whether it is
different from its online counterpart – perhaps illustrates these concerns clearly.
Ideally, as the research evidence matures, researchers and practitioners will reach
a level of consensus on how to conceptualize this form of interpersonal abusive
behaviour.
only very recently that a specific workplace cyberbullying measure (WCM) has
been developed and validated (Farley et al., 2016), which may provide a metric for
assessing victim and target rates of cyberbullying at work – including universities.
As with traditional bullying, we may see the norm being the use of the WCM,
with an additional self-reported item added, to assess victim rates of cyberbullying
at work.
Paralleling traditional bullying research, evidence to date reveals experiencing
cyberbullying has negative implications for both individuals and organizations.
Cross-sectional investigations have shown relationships between cyberbully-
ing, anxiety, and an intention to leave one’s workplace (Baruch, 2005); general
well-being and fear of future harassment (Ford, 2013); perceived stress and low
optimism (Snyman & Loh, 2015); and mental strain and job dissatisfaction (Far-
ley, Coyne, Sprigg, Axtell, & Subramanian, 2015). University-specific studies
on cyber-incivility have shown correlations with general job stress and burn-
out (Giumetti et al., 2012), as well as on cyberbullying with negative emotion,
mental strain, perceived injustice, and job dissatisfaction (Cassidy, Faucher, &
Jackson, this volume; Coyne et al., 2017). Indeed, in this latter study, the authors
hypothesized that the “unique features” of cyberbullying (espoused earlier) may
result in more severe outcomes when compared to traditional bullying; they also
provide data to show that the strength of relationship between cyberbullying
experience, mental strain, and job dissatisfaction was stronger than for offline
bullying.
Deindividuation
The deindividuation effect of CMC could also help explain cyberbullying.
Computer-mediated communication is often characterized by feelings of ano-
nymity, making people less sensitive to the thoughts and feelings of others, and
causing a disinhibition effect (Siegel, Dubrovsky, Kiesler, & Mcguire, 1986). The
outcome of this effect can be benign or toxic (Suler, 2004), in which case com-
munication becomes harsher and more abusive. Therefore – because people
become absorbed in immediate communication cues, rather than focusing on self
and others (Siegel et al., 1986) – they become submerged into their technology,
leading to a loss of identity and uninhibited behaviour – such as cyberbullying.
The Social Identity model of De-individuation Effects (SIDE) (Spears & Lea,
1994) argues that, in the absence of personal communication cues, individuals shift
their attention away from interpersonal differences to focus on a common group
identity, as characterized by group norms. According to SIDE, new group mem-
bers accept these norms through deindividuation. Research has identified that
norms of CMC are confined to the boundaries of a group – and that groups vary
in the number of requests, reactions, humour, emotion, and personal revelations
they deploy (Postmes, Spears, & Lea, 2000). Group norms have implications when
a newcomer joins a group, as their communication may be perceived as rude or
aggressive (and vice versa), which may spark conflict and lead to cyberbullying.
Taken together, these theories provide a lens for understanding communication
in the virtual environment, and how this communication (or lack of communica-
tion) promotes cyberbullying. In particular, these theories outline how aspects of
online communication differ from face-to-face communication, as well as how these
90 Iain Coyne and Samuel Farley
Dysempowerment theory
Focused on university employee samples in the UK, Coyne et al. (2017) apply
dysempowerment theory (Kane & Montgomery, 1998) to explain how cyberbul-
lying may lead to individual mental strain and job dissatisfaction. Dysempower-
ment theory posits an employee appraises a “polluting” work event as a violation
of his/her dignity (fairness perception), which results in a perception of subjective
stress, leading to negative affect (emotion) and, in turn, disrupts the employee’s
attitudes and behaviour at work. The greater the volume of polluting acts per-
ceived by an employee, the stronger the potential for dysempowerment. There-
fore, dysempowerment theory could explain cyberbullying as a situation in which
a target of workplace cyberbullying may perceive a series of events as a violation
of their dignity (or as something unfair), exhibiting a negative affective response
that impacts on their mental well-being and job attitudes. These results indicate
a mediating effect of negative emotion on the relationship between the experi-
ence of cyberbullying, mental strain, and job dissatisfaction. However, data sug-
gests interpersonal justice and negative affect were two separate routes, through
which cyberbullying may have its own effect: with negative emotion exhibiting a
stronger effect on mental strain than job dissatisfaction, and justice only mediating
the relationship between cyberbullying and job dissatisfaction.
Farley et al. (2015) go one stage further in their theories: combining dys-
empowerment theory with the attributional model of workplace harassment
(Bowling & Beehr, 2006). They suggest that attribution of blame for the “pol-
luting” event of cyberbullying impacts perceptions of violations to one’s dignity
and influence negative emotional responses. Findings indicate negative emotion
mediated the relationship between self-blame for a cyberbullying act and mental
strain, whereas interactional injustice mediated the association between blaming
the perpetrator and job dissatisfaction. Attributions of blame potentially go some
way in explaining the different paths seen in the Coyne et al. study.
Conclusion
The evidence base for offline workplace bullying is extensive. Increasingly, it
becomes more and more robust in terms of its theory-driven nature and meth-
odological approaches. Cyberbullying research within working contexts is limited
by comparison, but it is comforting to know that scholars are increasingly becom-
ing aware of and interested in this concept – as well as notions of how cyberbully-
ing emerges. Concerns to its impact have evolved much earlier on in the lifespan
of a research agenda.
Going forward, a number of action points can be offered:
References
Baillien, E., De Cuyper, N., & De Witte, H. (2011). Job autonomy and workload as ante-
cedents of workplace bullying: A two-wave test of Karasek’s Job Demand Control
Model for targets and perpetrators. Journal of Occupational and Organizational Psychology,
84(1), 191–208.
Baruch,Y. (2005). Bullying on the net: Adverse behavior on e-mail and its impact. Informa-
tion & Management, 42(2), 361–371.
Björkqvist, K., Österman, K., & Hjelt-Bäck, M. (1994). Aggression among university
employees. Aggressive Behavior, 20, 173–184.
Bowling, N. A., & Beehr, T. A. (2006). Workplace harassment from the victim’s perspective:
A theoretical model and meta-analysis. Journal of Applied Psychology, 91(5), 998–1012.
Byron, K. (2008). Carrying too heavy a load? The communication and miscommunication
of emotion by email. Academy of Management Review, 33(2), 309–327.
Cassidy,W., Faucher, C., & Jackson, M. (2014).The dark side of the ivory tower: Cyberbul-
lying of university faculty and teaching personnel. Alberta Journal of Educational Research,
60(2), 279–299.
Cassidy,W., Faucher, C., & Jackson, M. (this volume).“You need a thick skin . . .”: Impacts of
cyberbullying in Canadian universities. In W. Cassidy, C. Faucher, & M. Jackson (Eds.),
Cyberbullying at university in international contexts (pp. 112–125). Oxford, UK: Routledge.
Cowie, H., Naylor, P., Rivers, I., Smith, P. K., & Pereira, B. (2002). Measuring workplace
bullying. Agggression and Violent Behavior, 7, 33–51.
Coyne, I. (2011). Bullying in the workplace. In C. P. Monks & I. Coyne (Eds.), Bullying in
Different Contexts (pp. 157–184). Cambridge, UK: Cambridge University Press.
Coyne, I. (2016). Commentary: What universities can learn from workplace bullying
research. In H. Cowie & C. Myers (Eds.), Bullying among university students: Cross-national
perspectives (pp. 203–206). Abingdon, Oxon: Routledge.
Cyberbullying within working contexts 93
Coyne, I., Craig, J., & Chong, P. S.-L. (2004).Workplace bullying in a group context. British
Journal of Guidance & Counselling, 32(3), 301–317.
Coyne, I., Farley, S., Axtell, C., Sprigg, C., Best, L., & Kwok, O. (2017). Understanding the
relationship between experiencing workplace cyberbullying, employee mental strain
and job satisfaction: A dysempowerment approach. The International Journal of Human
Resource Management, 28(7), 945–972.
Coyne, I., Seigne, E., & Randall, P. (2000). Predicting workplace victim status from person-
ality. European Journal of Work and Organizational Psychology, 9(3), 335–349.
Coyne, I., Smith-Lee Chong, P., Seigne, E., & Randall, P. (2003). Self and peer nomina-
tions of bullying: An analysis of incident rates, individual differences, and perceptions of
the working environment. European Journal of Work and Organizational Psychology, 12(3),
209–228.
Crossley, C. (2009). Emotional and behavioral reactions to social undermining: A closer
look at perceived offender motives. Organizational Behavior and Human Decision Processes,
108(1), 14–24.
D’Cruz, P., & Noronha, E. (2013). Navigating the extended reach: Target experiences of
cyberbullying at work. Information and Organization, 23(4), 324–343.
Daft, R. L., Lengel, R. H., & Trevino, L. K. (1987). Message equivocality, media selection,
and manager performance: Implications for information systems. MIS Quarterly, 11(3),
355–366.
Einarsen, S., Hoel, H., Zapf, D., & Cooper, C. L. (2003). The concept of bullying at work:
The European tradition. In S. Einarsen, H. Hoel, D. Zapf, & C. L. Cooper (Eds.), Bul-
lying and emotional abuse in the workplace: International perspectives in research and practice
(pp. 3–30). London: Taylor and Francis.
Einarsen, S., Hoel, H., Zapf, D., & Cooper, C. L. (2011). The concept of bullying and
harassment at work: The European tradition. In S. Einarsen, H. Hoel, D. Zapf, & C. L.
Cooper (Eds.), Bullying and harassment in the workplace: Developments in theory, research and
practice (2nd ed., pp. 3–40). Boca Raton, FL: CRC Press.
Einarsen, S., & Skogstad, A. (1996). Bullying at work: Epidemiological findings in public
and private organizations. European Journal of Work and Organizational Psychology, 5(2),
185–201.
Farley, S., & Coyne, I. (this volume). Intervening against workplace cyberbullying. In W.
Cassidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international con-
texts (pp. 173–177). Oxford, UK: Routledge.
Farley, S., Coyne, I., Axtell, C., & Sprigg, C. (2016). Design, development and validation of
a workplace cyberbullying measure, the WCM. Work & Stress, 30(4), 293–317.
Farley, S., Coyne, I., Sprigg, C., Axtell, C., & Subramanian, G. (2015). Exploring the impact
of workplace cyberbullying on trainee doctors. Medical Education, 49(4), 436–443.
Ford, D. P. (2013). Virtual harassment: Media characteristics’ role in psychological health.
Journal of Managerial Psychology, 28(4), 408–428.
Forssell, R. (2016). Exploring cyberbullying and face-to-face bullying in working life –
Prevalence, targets and expressions. Computers in Human Behavior, 58, 454–460.
Gardner, D., O’Driscoll, M., Cooper-Thomas, H. D., Roche, M., Bentley, T., Catley, B., . . .
Trenberth, L. (2016). Predictors of workplace bullying and cyber-bullying in New Zea-
land. International Journal of Environmental Research and Public Health, 13(5), 448–462.
Giumetti, G. W., McKibben, E. S., Hatfield, A. L., Schroeder, A. N., & Kowalski, R. M.
(2012). Cyber incivility @ work: The new age of interpersonal deviance. Cyberpsychol-
ogy, Behavior, and Social Networking, 15(3), 148–154.
94 Iain Coyne and Samuel Farley
Harvey, M. G., Heames, J. T., Richey, R. G., & Leonard, N. (2006). Bullying: From the
playground to the boardroom. Journal of Leadership & Organizational Studies, 12(4), 1–11.
Hauge, L. J., Skogstad, A., & Einarsen, S. (2007). Relationships between stressful work
environments and bullying: Results of a large representative study. Work & Stress, 21(3),
220–242.
Heatherington,W., & Coyne, I. (2014). Understanding individual experiences of cyberbul-
lying encoutered through work. International Journal of Organizational Theory and Behav-
ior, 17(2), 163–192.
Hershcovis, M. S. (2010). “Incivility, social undermining, bullying . . . oh my !”: A call
to reconcile constructs within workplace aggression research. Journal of Organizational
Behavior, 32, 499–519.
Hoel, H., Cooper, C. L., & Faragher, B. (2001).The experience of bullying in Great Britain:
The impact of organizational status. European Journal of Work and Organizational Psychol-
ogy, 10(4), 443–465.
Hoel, H., Cooper, C. L., & Faragher, B. (2004). Bullying is detrimental to health, but all
bullying behaviours are not necessarily equally damaging. British Journal of Guidance &
Counselling, 32, 367–387.
Hoel, H., Glasø, L., Hetland, J., Cooper, C. L., & Einarsen, S. (2010). Leadership styles as
predictors of self-reported and observed workplace bullying. British Journal of Manage-
ment, 21(2), 453–468.
Kane, K., & Montgomery, K. (1998). A framework for understanding dysempowerment in
organizations. Human Resource Management, 37(34), 263–275.
Kivimaki, M., Elovainio, M., & Vahtera, J. (2000). Workplace bullying and sickness absence
in hospital staff. Occupational and Environmental Medicine, 57(10), 656–660.
Kock, N. (2004). The psychobiological model: Towards a new theory of computer-mediated
communication based on Darwinian evolution. Organization Science, 15(3), 327–348.
Lewis, D. (2004). Bullying at work: The impact of shame among university and college
lecturers. British Journal of Guidance and Counselling, 32(3), 281–299.
Lim, V. K. G., & Teo, T. S. H. (2009). Mind your E-manners: Impact of cyber incivility on
employees’ work attitude and behavior. Information & Management, 46(8), 419–425.
Lutgen-Sandvik, P., Tracy, S. J., & Alberts, J. K. (2007). Burned by bullying in the American
workplace: Prevalence, perception, degree and impact. Journal of Management Studies,
44(6), 837–862.
Nielsen, M. B., Matthiesen, S. B., & Einarsen, S. (2010). The impact of methodological
moderators on prevalence rates of workplace bullying: A meta-analysis. Journal of Occu-
pational and Organizational Psychology, 83(4), 955–979.
Nielsen, M. B., Skogstad, A., Matthiesen, S. B., Glasø, L., Aasland, M. S., Notelaers, G., &
Einarsen, S. (2009). Prevalence of workplace bullying in Norway: Comparisons across
time and estimation methods. European Journal of Work and Organizational Psychology,
18(1), 81–101.
Notelaers, G.,Witte, H. De, & Einarsen, S. (2010). A job characteristics approach to explain
workplace bullying. European Journal of Work and Organizational Psychology, 19(4),
487–504.
Parzefall, M.-R., & Salin, D. M. (2010). Perceptions of and reactions to workplace bullying:
A social exchange perspective. Human Relations, 63(6), 761–780.
Pearson, C., Andersson, L., & Porath, C. (2005). Workplace incivility. In S. Fox & P. E. Spector
(Eds.), Counterproductive work behavior: Investigations of actors and targets (pp. 177–200).
Washington, DC: American Psychological Association.
Cyberbullying within working contexts 95
Postmes, T., Spears, R., & Lea, M. (2000). The formation of group norms in computer-
mediated communication. Human Communication Research, 26, 341–371.
Privitera, C., & Campbell, M. A. (2009). Cyberbullying: The new face of workplace bully-
ing? Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality
on Behavior and Society, 12(4), 395–400.
Rayner, C., & Cooper, C. L. (2006). Workplace bullying. In E. K. Kelloway, J. Barling, &
J. J. Hurrell (Eds.), Handbook of workplace violence (pp. 121–145). Thousand Oaks, CA:
Sage Publications.
Richman, J. A., Rospenda, K. M., Flaherty, J. A., & Freels, S. (2001). Workplace harass-
ment, active coping, and alcohol-related outcomes. Journal of Substance Abuse, 13(3),
347–366.
Salin, D. (2001). Prevalence and forms of bullying among business professionals: A com-
parison of two different strategies for measuring bullying. European Journal of Work and
Organizational Psychology, 10(4), 425–441.
Salin, D. (2003). Ways of explaining workplace bullying: A review of enabling, motivating
and precipitating structures and processes in the work environment. Human Relations,
56(10), 1213–1232.
Samnani, A.-K. (2013). “Is this bullying?” Understanding target and witness reactions. Jour-
nal of Managerial Psychology, 28(3), 290–305.
Saunders, P., Huynh, A., & Goodman-Delahunty, J. (2007). Defining workplace bullying
behaviour professional lay definitions of workplace bullying. International Journal of Law
and Psychiatry, 30(4–5), 340–354.
Siegel, J., Dubrovsky, V., Kiesler, S., & Mcguire, T. (1986). Group processes in computer-
mediated communication. Organizational Behavior and Human Decision Processes, 37,
157–187.
Snyman, R., & Loh, J. (2015). Cyberbullying at work: The mediating role of optimism
between cyberbullying and job outcomes. Computers in Human Behavior, 53, 161–168.
Spears, R., & Lea, M. (1994). Panacea or panoptica? The hidden power in computer-
mediated communication. Communication Research, 21(4), 427–459.
Spratlen, L. (1995). Interpersonal conflict which includes mistreatment in a university
workplace. Violence and Victims, 10(4), 285–297.
Sticca, F., Ruggieri, S., Alsaker, F., & Perren, S. (2013). Longitudinal risk factors for cyber-
bullying in adolescence. Journal of Community and Applied Social Psychology, 23, 52–67.
Strandmark, M. K., & Hallberg, L. R. (2007). The origin of workplace bullying: Experi-
ences from the perspective of bully victims in the public service sector. Journal of Nursing
Management, 15(3), 332–341.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior:The Impact of the
Internet, Multimedia and Virtual Reality on Behavior and Society, 7(3), 321–326.
Tepper, B. J. (2000). Consequences of abusive supervision. The Academy of Management Jour-
nal, 43(2), 178–190.
Vranjes, I., Baillien, E.,Vandebosch, H., Erreygers, S., & De Witte, H. (2017). The dark side
of working online: Towards a definition and an emotion reaction model of workplace
cyberbullying. Computers in Human Behavior, 69, 324–334.
Weatherbee, T. G., & Kelloway, E. K. (2006). A case of cyberdeviancy: CyberAggression in
the workplace. In E. K. Kelloway, J. Barling, & J. J. Hurrell (Eds.), Handbook of workplace
violence (pp. 445–487). Thousand Oaks, CA: Sage Publications.
West, B., Foster, M., Levin, A., Edmison, J., & Robibero, D. (2014). Cyberbullying at work:
In search of effective guidance. Laws, 3(3), 598–617.
96 Iain Coyne and Samuel Farley
Whitty, M., & Carr, A. (2006). New rules in the workplace: Applying object-relations
theory to explain problem internet and email behaviour in the workplace. Computers in
Human Behavior, 22(2), 235–250.
Willard, N. E. (2007). The authority and responsibility of school officials in responding to
cyberbullying. The Journal of Adolescent Health, 41(6), S64–S65.
Wolak, J., Mitchell, K. J., & Finkelhor, D. (2007). Does online harassment constitute bul-
lying? An exploration of online harassment by known peers and online-only contacts.
Journal of Adolescent Health, 41, 851–858.
Zapf, D., & Einarsen, S. (2001). Bullying in the workplace: Recent trends in research and
practice – An introduction. European Journal of Work and Organizational Psychology, 10(4),
369–373.
Zapf, D., & Einarsen, S. (2003). Individual antecedents of bullying. In S. Einarsen, H. Hoel,
D. Zapf, & C. L. Cooper (Eds.), Bullying and emotional abuse in the workplace: International
perspectives in research and practice (pp. 165–184). London: Taylor and Francis.
Zhang, S., & Leidner, D. (2014). Workplace cyberbullying: The antecedents and consequences.
Paper presented at the 20th Americas Conference on Information Systems, Social-
Technical Issues and Social Inclusion Track. Savannah.
PART II
Impacts
7
FROM TRADITIONAL BULLYING
TO CYBERBULLYING ELISA LARRAÑAGA, ET AL.FROM TRADITIONAL BULLYING TO CYBERBULLYING
received “direct personal insults via email or SMS messages.” Only 2.2% indi-
cated that somebody had created a false Facebook or MSN account to steal
their identity; in those cases, this happened with an overall frequency of once
or twice.
Using a sample of 543 college students from Murcia, Caravaca et al. (2016)
found that 62.2% of students reported having been the victim of traditional bul-
lying, and 52.7% reported that they had experienced cyberbullying. Forty point
seven percent of participants had been victims of traditional bullying and cyber-
bullying in the past 12 months. Separating these numbers by category showed that
21.3% experienced traditional bullying only, and 12% were victims of cyberbul-
lying only.
Yubero, Navarro, Elche, Larrañaga, and Ovejero (2017), with a sample of 243
college students from Castilla-La Mancha, followed a more restrictive criterion
to categorize cyberbullying (participants’ scores above 1 standard deviation above
the mean). Nine point eight percent of the surveyed higher education students
reported having been victims of cyberbullying. The most frequently experienced
form of cyberbullying victimization was the online dissemination of lies and
rumours (36%); 9.1% had experienced such instances quite a few or many times
in the past year. The results of this study indicated that cyberbullying victimiza-
tion in higher education was associated with traditional bullying experienced in
primary and secondary school.
or controlling the significant other, for example, by visiting his/her profile on his/
her social network quite frequently and controlling who he/she is with or what
he/she is doing (Burke et al., 2011; Tokunaga, 2010).
Finn (2004) found that between 10% and 15% of higher education students
had been abused by their partners. Other studies also highlighted the fact that an
important proportion of young people who are victims of cyberbullying identify
their partner as the perpetrator, and partners are the people against whom many
perpetrators direct their cyberbullying actions (Alexy, Burgess, Baker, & Smoyak,
2005). At an empirical level, it has been found that those who admit committing
cyber-dating abuse also tend to participate in cyberbullying (Hinduja & Patchin,
2011). For example, Hinduja and Patchin (2011) found that those young people
who perpetrated cyberbullying were three times more likely to engage in abu-
sive cyber-dating behaviour than those who did not perpetrate aggression against
their peers.
Research on cyberbullying among higher education students has started to
analyse the extent to which cyberbullying is perpetrated within the framework of
dating relationships. In 2011, Bennett et al., with 437 college students, reported
that 77% had experienced cyberbullying from their significant other in the last
year. Likewise, the results obtained by Burke et al. (2011), with a sample of 804
undergraduates aged between 18 and 23, showed that half of both female and
male respondents reported the use of communication technology to monitor
partners, either as the perpetrator or victim. Women were significantly more
likely than men to monitor the email accounts of their partners (25% vs. 6%),
and to regard doing so as appropriate behaviour. Crosslin and Golman (2014)
showed that according to 30% of participants, cyberbullying may be used to cre-
ate disagreement or harm romantic relationships by friends, acquaintances, and
ex-significant others.
In Spain, Durán and Martínez-Pecino (2015), with a sample of 336 college
students aged between 18 and 30, analysed abusive behaviour and cyberbullying
in dating relationships. Fifty-seven point two percent of participants stated that
they had been victimized through their cell phones, and 27.4% via the internet,
while 47.6% stated they had abused through cell phones, and 14% via the internet.
Another study (Martínez-Pecino & Durán, 2016), with 219 college students aged
between 18 and 28, 61.4% of whom were women, also reported greater incidence
through cell phones (48.4%) than via the internet (37.5%). This study also shows
the influence of participants’ hostile sexism on cyberbullying against women in
dating relationships. Borrajo, Gámez-Guadix, and Calvete (2015), with a sample
of 656 Spanish young people aged between 18 and 30 years (79.7% of which were
college students), showed that justifying online abuse is associated with direct
online aggression in dating relationships. Myths about love were associated to
a greater extent with online control behaviours (e.g., monitoring social status
changes in social networks and cell phone messages). In their qualitative study
on the basis of individual, in-depth interviews with seven college students (five
104 Elisa Larrañaga et al.
women and two men), Borrajo and Gámez-Guadix (2015) reported that control
behaviours and harassment are the most frequent forms of online abuse within the
framework of dating relationships.
As a consequence of online abuse within romantic relationships, these types
of behaviours can even become normal or cause an end to the relationship
(Borrajo & Gámez-Guadix, 2015). Regardless of the outcome, cyberbullying in a
relationship has a major impact on health because it generates anxiety and depres-
sion in its victims (Bennett et al., 2011; Borrajo & Gámez-Guadix, 2016; Reed,
Tolman, & Safyer, 2015).
Thirteen point six percent of the students had suffered cyberbullying dur-
ing the last month. Three point two percent of the participants reported they
had been a cyberbullying perpetrator. The most common type of cyberbullying
victimization was “made a mean comment about me on the internet” (8.4%),
followed by “sent me a mean email, instant message, or text message” (6.5%), and
“posted something bad about me on the internet” (3.9%). Regarding cyberbully-
ing perpetration, 1.9% had “posted something bad about others on the internet,”
1.3% had “sent a mean email, instant message, or text message to others,” and
another 1.3% “made a mean comment about others on the internet.”
Regarding the suitability of the coping strategies, students reported that social
support was the best strategy (M = 3.89; SD = 1.68), though they ranked in
the first place, “talk to a parent about it” (79%), second, “report it to bullying
phone” (68.5%), and third, “talk to teacher about it” (68.1%). Self-action strategies
reached a mean of 2.68 (SD = 0.85), and 56.4% reported that the victim should
tell the bullies to stop the bullying, while 11.2% of the students thought that the
victims should use retaliation strategies.The ignoring strategies reached a mean of
2.68 (SD = 0.81), with almost 25% of the participants believing that ignoring was
a good strategy to avoid bullying, 12% thinking that victims should stop going to
class, and almost 10% believing that the victim should not do anything.
According to this data, it is necessary to improve the training of teachers and
raise awareness of future educators in order for them to identify cyberbullying and
take action against it in the exercise of their future duties.
et al., 2010; Rodríguez, 2008). For example, Benitez, Berbén, and Fernández
(2006) asked 373 Education students about their knowledge in relation to bully-
ing, and more than 30% did not know how to define bullying. Future educators
need the knowledge and skills required to implement suitable actions to prevent
and curtail bullying and cyberbullying behaviours.
References
Akbulut,Y., & Eristi, B. (2011). Cyberbullying and victimization among Turkish university
students. Australasian Journal of Educational Technology, 27, 1155–1170.
Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking
among college students. Brief Treatment and Crisis Intervention, 5, 279–289. doi:10.1093/
brief-treatment/mhi020
Álvarez-García, D., Rodríguez, C., González-Castro, P., Núñez, J. C., & Álvarez, L. (2010).
The training of pre-service teachers to deal with school violence. Revista de Psicodidác-
tica, 15(1), 35–56.
Aricak, O. T. (2009). Psychiatric symptomatology as a predictor of cyberbullying among
university students. Eurasian Journal of Educational Research, 34, 167–184.
Baldasare, A., Bauman, S., Goldman, L., & Robie, A. (2012). Cyberbullying? Voices of
college students. Technologies in Higher Education, 5, 127–155. doi:10.1108/S2044–
9968(2012)0000005010
Benítez, J. L., Berbén, A. G., & Fernández, M. (2006). El maltrato entre alumnos: cono-
cimientos, percepciones y actitudes de los futuros docentes. Revista de Investigación Edu-
cativa, 24(2), 329–352.
Bennett, D. C., Guran, E. L., Ramos, M. C., & Margolin, G. (2011). College students’
electronic victimization in friendships and dating relationships: Anticipated distress
and associations with risky behaviors. Violence and Victims, 26, 410–429. doi:10.1891/
0886–6708.26.4.410
Borrajo, E., & Gámez-Guadix, M. (2015). Comportamientos, motivos y reacciones asocia-
das a la victimización del abuso online en el noviazgo: un análisis cualitativo. Revista de
Victimología, 2, 73–95.
Borrajo, E., & Gámez-Guadix, M. (2016). Abuso “online” en el noviazgo: relación con
depresión, ansiedad y ajuste diádico. Psicología Conductual, 24(2), 221–235.
Borrajo, E., Gámez-Guadix, M., & Calvete, E. (2015). Justification beliefs of violence,
myths about love and cyber dating abuse. Psicothema, 27, 327–333. doi:10.7334/
psicothema2015.59
Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control
intimate partners: An exploratory study of college undergraduates. Computers in Human
Behavior, 27, 1162–1167. doi:10.1016/j.chb.2010.12.010
Campbell, M. A. (2005). Cyberbullying: An old problem in a new guise? Australian Journal
of Guidance and Counselling, 15(01), 68–76. doi:10.1375/ajgc.15.1.68
Caravaca, F., Falcón, M., Navarro-Zaragoza, J., Luna-Ruiz-Cabello, A. L., Rodriges, O., &
Luna-Maldonado, A. (2016). Prevalence and patterns of traditional bullying victimiza-
tion and cyber-teasing among college population in Spain. BMC Public Health, 16,
176–185. doi:10.1186/s12889-016-2857-8
Cassidy,W., Faucher, C., & Jackson, M. (this volume).“You need a think skin . . .”: Impacts of
cyberbullying in Canadian universities. In W. Cassidy, C. Faucher, & M. Jackson (Eds.),
Cyberbullying at university in international contexts (pp. 112–125). Oxford, UK: Routledge.
108 Elisa Larrañaga et al.
Centers for Disease Control and Prevention (CDC). (2014). Understanding teen dating vio-
lence. Retrieved from www.cdc.gov/violenceprevention/pdf/teen-dating-violence-
factsheet-a.pdf
Crosslin, K., & Golman, M. (2014). “Maybe you don’t want to face it”: College students’
perspectives on cyberbullying. Computers in Human Behavior, 41, 14–20. doi:10.1016/j.
chb.2014.09.007
Dilmac, B. (2009). Psychological needs as a predictor of cyber bullying: A preliminary
report on college students. Educational Sciences:Theory and Practice, 9, 1307–1325.
Doane, A. N. (2011). Testing of a brief internet cyberbullying prevention program in college students.
Doctoral Thesis, Old Dominion University.
Durán, M., & Martínez-Pecino, R. (2015). Ciberacoso mediante teléfono móvil e Internet
en las relaciones de noviazgo entre jóvenes. Comunicar, 22(44), 159–167. doi:10.3916/
C44–2015–17
Eden, S., Heimann, T., & Olenik-Shemesh, D. (2013). Teachers’ perceptions, beliefs and
concerns about cyberbullying. British Journal of Educational Technology, 44(6), 1036–1052.
doi:10.1111/j.1467–8535.2012.01363.x
Elipe, P., Mora-Merchán, J. A., Ortega-Ruiz, R., & Casas, J. A. (2015). Perceived emotional
intelligence as a moderator variable between cybervictimization and its emotional
impact. Frontiers in Psychology, 6, 486. doi:10.3389/fpsyg.2015.00486
Faucher, C., Jackson, M., & Cassidy, W. (2014). Cyberbullying among university students:
Gendered experiences, impacts, and perspectives. Educational Research International,
2014, 1–10. doi:10.1155/2014/698545
Fenaughty, J., & Harré, N. (2013). Factors associated with young people’s successful
resolution of distressing electronic harassment. Computers & Education, 61, 242–250.
doi:10.1016/j.compedu.2012.08.004
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal
Violence, 19, 468–483. doi:10.1177/0886260503262083
González-Ortega, I., Echeburúa, E., & De Corral, P. (2008). Variables significativas en
las relaciones violentas en parejas jóvenes: Una revisión. Psicologia Conductual, 16(2),
207–225.
Hall, W. J. (2016). Initial development and validation of the Bullyharm: The bullying, har-
assment, and aggression receipt measure. Psychology in the Schools, 53(9), 984–1000.
doi:10.1002/pits.21957
Hemphill, S. A., Kotevski, A., Tollit, M., Smith, R., Herrenkohl, T. I., Toumbourou, J. W., &
Catalano, R. F. (2012). Longitudinal predictors of cyber and traditional bullying perpe-
tration in Australian secondary school students. Journal of Adolescent Health, 51(1), 59–65.
doi:10.1016/j.jadohealth.2011.11.019
Hinduja, S., & Patchin, J. W. (2011). Electronic dating violence: A brief for educators and par-
ents. Cyberbullying Research Center. Retrieved from https://cyberbullying.org/
electronic_dating_violence_fact_sheet.pdf
Hoff, D. L., & Mitchell, S. N. (2009). Cyberbullying: Causes, effects, and remedies. Journal of
Educational Administration, 47, 652–665. doi:10.1108/09578230910981107
Jackson, M., Faucher, C., & Cassidy, W. (this volume). What’s policy got to do with it?
The focus on cyberbullying policy at the university level. In W. Cassidy, C. Faucher, &
M. Jackson (Eds.), Cyberbullying at university in international contexts (pp. 198–211).
Oxford, UK: Routledge.
Jang, H., Song, J., & Kim, R. (2014). Does the offline bully-victimization influence cyber-
bullying behavior among youths? Application of general strain theory. Computers in
Human Behavior, 31, 85–93. doi:10.1016/j.chb.2013.10.007
From traditional bullying to cyberbullying 109
Kanayama, K., & Kurihara, S. (this volume). Preventive measures against cyberbullying at
a university in Japan. In W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at
university in international contexts (pp. 168–172). Oxford, UK: Routledge.
Kellerman, I., Margolin, G., Borofsky, L., Baucom, B., & Iturralde, E. (2013). Electronic
aggression among emerging adults: Motivations and contextual factors. Emerging Adult-
hood, 1(4), 293–304. doi:1 0.1177/2167696813490159
König, A., Gollwitzer, M., & Steffgen, G. (2010). Cyberbullying as an act of revenge? Aus-
tralian Journal of Guidance & Counselling, 20(2), 210–224. doi:10.1375/ajgc.20.2.210
Kota, R., Schoohs, S., Benson, M., & Moreno, M. A. (2014). Characterizing cyberbullying
among college students: Hacking, dirty laundry, and mocking. Societies, 4(4), 549–560.
doi:10.3390/soc4040549
Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and cyberstalking
experiences and factors related to victimization of students at a public liberal arts col-
lege. International Journal of Technologies, 1, 74–91. doi:10.4018/jte.2010100106
Langos, C., & Giancaspro, M. (this volume). Cyberbullying in the Australian university
context: The shades of harm and implications for law and policy. In W. Cassidy, C.
Faucher, & M. Jackson (Eds.), Cyberbullying at university in international contexts (pp. 181–
197). Oxford, UK: Routledge.
Larrañaga, E., Yubero, S., & Ovejero, A. (2016). Gender variables and cyberbully-
ing in college students. In R. Navarro, S. Yubero, & E. Larrañaga (Eds.), Cyberbully-
ing across the globe: Gender, family, and mental health (pp. 63–77). Netherlands: Springer.
doi:10.1007/978-3-319-25552-1
Li, Q. (2008). Cyberbullying in schools: An examination of preservice teachers’ perception.
Canadian Journal of Learning and Technology, 34(2). doi:10.21432/T2DK5G
Lindsay, M., & Krysik, J. (2012). Online harassment among college students. Information,
Communication, & Society, 15, 703–719. doi:10.2139/ssrn.1941065
MacDonald, C. D., & Roberts-Pittman, B. (2010). Cyberbullying among college students:
Prevalence and demographic differences. Procedia: Social and behavioral Sciences, 9, 2003–
2009. doi:10.1016/j.sbspro.2010.12.436
Martínez-Pecino, R., & Durán, M. (2016). I love you but I cyberbully you: The role of
hostile sexism. Journal of Interpersonal Violence. doi:10.1177/0886260516645817
Mateus, S., Veiga, A. M., Costa, P., & das Dores, M. J. (2015). Cyberbullying: The hidden
side of college students. Computers in Human Behavior, 43, 167–182. doi:10.1016/j.
chb.2014.10.045
Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment.
Cyberpsychology, Behavior, and Social Networking, 13, 263–268. doi:10.1089/cpb.2009.0221
Molluzzo, J. C., & Lawler, J. P. (2011). A study of the perceptions of college students on
cyberbullying. Information Systems Education Journal, 10(4), 84–109.
National Institutes of Health. (2010). Depression high among youth victims of school cyberbul-
lying: NIH researchers report. Maryland: National Institute of Child Health and Human
Development.
Novick, R. M., & Isaacs, J. (2010). Telling is compelling: The impact of student reports of
bullying on teacher intervention. Educational Psychology, 30(3), 283–296. doi:10.1080/
01443410903573123
Paullet, K., & Pinchot, J. (2014). Behind the screen where today’s bully plays: Perceptions of
college students on cyberbullying. Journal of Information Systems Education, 25(1), 63–69.
Reed, L. A., Tolman, R. M., & Safyer, P. (2015). Too close for comfort: Attachment inse-
curity and electronic intrusion in college students’ dating relationships. Computers in
Human Behavior, 50, 431–438. doi:10.1016/j.chb.2015.03.050
110 Elisa Larrañaga et al.
Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets:
A comparison of associated youth characteristics. Journal of Child Psychology and Psychia-
try, 45(7), 1308–1316. doi:10.1111/j.1469–7610.2004.00328.x
Yilmaz, H. (2010). An examination of preservice teachers’ perception about cyberbul-
lying. Eurasia Journal of Mathematics, Science & Technology Education, 6(4), 263–270.
doi:10.12973/ejmste/75248
Yubero, S., Larrañaga, E., & Navarro, R. (2017). La continuidad del conflicto en la con-
vivencia escolar: medidas de prevención e intervención del acoso. Revista de Paz y
Conflictos, 10(2), 89–116.
Yubero, S., Navarro, R., Elche, M., Larrañaga, E., & Ovejero, A. (2017). Cyberbullying vic-
timization in higher education: An exploratory analysis of its association with social and
emotional factors among Spanish students. Computers in Human Behavior, 75, 439–449.
doi:10.1016/j.chb.2017.05.037
Zacchilli, T. L., & Valerio, C. V. (2011). The knowledge and prevalence of cyberbullying in
a college simple. Journal of Scientific Psychology. Retrieved from www.psyencelab.com/
images/The_Knowledge_and_Prevalence_of_Cyberbullying_in_a_College_Sample.pdf
Zalaquett, C. P., & Chatters, S. J. (2014). Cyberbullying in college: Frequency, characteristic,
and practical implications. Sage Open, 4(1), 1–8. doi:10.1177/2158244014526721
Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse
among teens and how it relates to other forms of teen dating violence. Journal of Youth
and Adolescence, 42(7), 1063–1077. doi:10.1007/s10964-013-9922-8
8
“YOU NEED A THICK SKIN . . .” WANDA CASSIDY, CHANTAL FAUCHER, AND MARGARET JACKSON“YOU NEED A THICK SKIN . . .”
Impacts of cyberbullying at
Canadian universities
Introduction
The impacts on children and youth who have been the targets of cyberbullying
is well documented in the literature. Numerous studies report such impacts as
depression, anxiety, low self-esteem, psychosomatic problems including headaches
and sleep disruptions, decreased academic achievement, strained interpersonal
relationships, withdrawal behaviour, and suicide ideation (Beebe & Robey, 2011;
Cassidy, Faucher, & Jackson, 2013; Cassidy, Jackson, & Brown, 2009; Jackson, Cas-
sidy, & Brown, 2009; Kowalski, Limber, & Agatston, 2012; Marczak & Coyne,
2010; Menesini & Nocentini, 2012; Nocentini et al., 2010; Patchin & Hinduja,
2012; Smith, 2012; Sourander et al., 2010; Tokunaga, 2010; von Marées & Peter-
mann, 2012).
One might assume that only youth in their formative years experience nega-
tive impacts as a result of being cyberbullied, yet it is apparent from studies with
adults in the workplace and at university that the after-effects of being cyberbul-
lied when older are similar. Although fewer studies have been conducted at the
post-secondary level compared to K–12, university students report very similar
impacts: relationship issues, physical and mental health problems, reduced self-
esteem, concentration and academic challenges, decreased motivation, self-blame
and even suicide ideation (Arıcak, 2016; Beran, Rinaldi, Bickham, & Rich, 2012;
Cowie & Myers, 2016; Cowie et al., 2013; Faucher, Jackson, & Cassidy, 2014; Gio-
vazolias & Malikiosi-Loizos, 2016; Kokkinos, Antoniadou, & Markos, 2014; Lar-
rañaga et al., this volume; Rivers, 2016). University faculty members also report
emotional distress, decreased productivity and job satisfaction, absenteeism, avoid-
ance of the bully, and withdrawal behaviour (Blizard, 2016, this volume; Cassidy,
Faucher, & Jackson, 2014; Hollis, 2012;Taylor, 2012;Vaughan, 2012). Like children
“You need a thick skin . . .” 113
and adolescents in school (Cassidy et al., 2009), university students and faculty
members tend to feel powerless to stop the bullying behaviour, further com-
pounding the negative effects (Lampman, 2012; McKay, Arnold, Fratzl, & Thomas,
2008; Minor, Smith, & Brashen, 2013; Taylor, 2012).
The workplace is also a site for bullying behaviour online and in person, with
similar consequences reported by those on the receiving end, as well as by those
who witness the behaviour: increased stress, lower job satisfaction, absenteeism,
reduced productivity, disengagement, mental and physical health impacts, greater
job turnover, and suicide ideation (Coyne & Farley, this volume; Duffy & Sperry,
2014; Keashly, this volume; Lutgen-Sandvik & Tracy, 2012; Sallee & Diaz, 2012).
This chapter adds to the growing body of research examining the impacts
students and faculty members experience as a result of being cyberbullied at the
post-secondary level, including the impact on the wider university culture.
Ability to do work 41 64 73
Wanted to quit 14 30 49
Relationships at University 27 62 49
Relationships outside University 41 19 39
Mental health 42 30 39
Physical health 26 28 29
Feeling unsafe 39 34 46
in the last 12 months,” respondents were asked whether they had experienced
effects related to emotional security and physical safety, ability to do work, desire
to remain at the university, personal relationships inside and outside the university,
physical and mental health issues, suicidal ideation, and feelings of revenge.
Students’ and faculty members’ survey responses to closed, dichotomous ques-
tions were analysed using SPSS and Excel. Open-ended responses and transcribed
interviews were coded using NVivo software as well as hand-coded indepen-
dently and collaboratively by three researchers (the authors), using a grounded
theory process (Merriam & Tisdale, 2016) in order to determine the major themes
and sub-themes based on the frequency and/or strength of the response (Miles &
Huberman, 1994). Since the major themes related to impacts identified in the
qualitative analysis supported the primary impacts identified in the quantitative
analysis of the closed questions (see Table 8.1), this chapter discusses the impacts
using the Table 8.1 categories. The quotations selected as exemplars from the
open-ended responses and interviews are representative of the responses given by
participants for each of the seven identified impact categories.
in other studies (see Faucher et al., 2014, Table 1, p. 3). One does not know if a
larger sample of respondents in our Canadian study would have yielded a similar
percentage of victims.
Students who cyberbullied each other primarily used social networking
sites, text messaging, email, and non-course-related sites, while they targeted
faculty mainly through email, professor-rating sites, and course sites. Faculty
members who were cyberbullied by colleagues received their messages over-
whelmingly from email, so the perpetrators were known to them. Students
who experienced cyberbullying said it was for interpersonal reasons, because
of their physical appearance, gender (females), or ethnicity (males), while per-
petrators said it was because the target upset them, that person bullied them
first, or because “it was fun.”
Faculty members were cyberbullied by students and colleagues primarily for
work-related reasons: because of their position at the university or their teaching,
with female faculty members noting that their gender also played a role. Students
said that they targeted faculty members because the instructor had upset them,
they did not like their teaching style or them as people, and because they sought
to tarnish their reputation. Students’ messages were perceived by faculty members
as insulting, demanding, and demeaning, and included spreading rumours and
harassment. Negative messages from colleagues were described in similar ways,
while also adding attempts to exclude, threaten, and/or humiliate.
This comment was typical: “Email, text messages making comments that I was
incompetent, not accessible, too slow, workload too difficult and the words used
were ‘useless’, ‘lousy,’ and ‘I am reporting you’. Student was not open to feedback.
I felt attacked, humiliated.” This form of cyberbullying behaviour fits with the
literature on student entitlement (Boswell, 2012; Greenberger, Lessard, Chen, &
Farruggia, 2008) and incivility (Chowning & Campbell, 2009; Clark, Werth, &
Ahten, 2012; Kopp & Finney, 2013; Wildermuth & Davis, 2012), where students
believe that they are entitled to certain grades and to be treated in certain ways by
their professors, despite their own behaviour.
Faculty members also discussed being humiliated by colleagues, as noted in this
open-ended response:
[A colleague] gave the wrong time and date for a meeting . . . all other
faculty had different communication. SKYPE arranged many times, but
month after month, the connection would be “lost” on the colleague’s
side, their cell phone turned off, the laptop closed, making it impossible to
reconnect. Then emails and text messages sent that I was not performing
my duties and would be reported for my lack of professional accountabil-
ity. . . . Humiliating is not a strong enough word.
One faculty member who had been cyberbullied by a colleague for two years,
with little done by her superiors to remedy the situation, talked at length in her
interview of the devastating emotional toll it took on her. After a culminating
event where she felt “kicked in the stomach,” and “cried on my direct boss’s desk,”
she went home: “I felt . . . really shaky in myself, really raw, shaky, everything being
magnified. . . . I was irritable, I was super sensitive and defensive . . . the world was
this strange place.”
Ability to do work
Both students and faculty talked about the effect being cyberbullied had on their
ability to do work; for example, “She [a “friend”] spammed my emails and FB
with hateful messages of my body and sexuality. She called me things like ‘whore’
or ‘slut’ and made rumors of me. . . . After my grades went down [I had been an
A/B student] because of stress I was put on academic probation.” Another student
talked about being “disregarded” and “put down” in group emails, which made
the student “angry and upset” and feeling “ganged up on and very distracted
from school and my social life.” A few students also chose to give examples of the
demeaning comments made online by a teacher, for example:
question . . . like I was wasting her time. I felt invalidated. I was afraid to ask
her questions after that. I started skipping classes.
After reading negative comments on the Rate My Professor website, which one
professor labelled as “defamation of character,” she did not “really feel good about
going to that class knowing that someone was hating [her]. . . . It was pretty
depressing and unmotivating.” Being cyberbullied by colleagues was discussed
more often and in greater detail than by students, and with greater impact on their
ability to do their work.
Wanting to quit
While some faculty members expressed concern about losing their job “[since]
I think I have no power to intervene or do something,” others wanted to with-
draw from their responsibilities, particularly when they were targeted by col-
leagues: “I was always on edge . . . like walking on egg shells. . . . I’m quite an open
verbal person. I had to actually . . . physically force myself not to be involved in
staff meetings because I didn’t want to be put down again.”
One of the 14 faculty members being interviewed actually did quit her job and
moved to a different institution.
I mean, they [the university department] just kept having people leaving
and leaving and leaving but there was no a-ha moment, maybe it has to
do . . . [with the situation]. . . . I heard via the grapevine that they were really
angry with me after because I left in the middle of the year . . . but I couldn’t
stand it anymore so I quit . . . and to my knowledge it stayed exactly the
same. I’ve heard via the grapevine that nothing’s changed. . . . I mean it just
has such a detrimental effect . . . you know on a person’s life, on a person’s
home life, on their job satisfaction, I mean the reason that I didn’t leave long
“You need a thick skin . . .” 119
A few faculty members also talked about becoming less vulnerable with students –
“more strict about rules with students and more standoffish in general” – as a way to
protect themselves from negative comments from students.While only a few faculty
members discussed the impact cyberbullying at university had on their friendships
and partners, one discussed at length the impact on her marriage, concluding with:
“I was in a horrible mood and state all the time.”
Students mainly talked about how cyberbullying impacted their friendships, as
indicated by this example: “A student at another university sent me really rude,
hurtful messages. I felt really bad about myself and it really has ruined not just that
friendship but almost all my friendships.To stop it I just removed myself from that
group of friends.”
Over the past week a male student from a seminar class has sent me several
demanding, angry and belittling emails. . . . I feel strongly that such behav-
iour would not occur were I older, and/or male . . . it certainly made me
feel unsafe working in the evening in my office when no other faculty
members are around.
Faculty also talked about being worried that the office staff in their department
may also be a target, if the student, who had been spewing out angry messages,
arrived at the office seeking to find the faculty member.
Reporting
Compounding the impacts that students and faculty were experiencing was the
fact that those who tried to stop the cyberbullying, whether by themselves or
with the help of their superiors, were generally unsuccessful. Approximately two-
thirds of faculty members said they tried to address the problem, but less than half
said that it worked. Students were less likely than faculty to report their situation
to a university authority or counsellor, and more likely to tell a friend.Those who
chose not to report the behaviour said that they remained silent out of fear of
reprisals, because they believed that nothing would change, and/or because they
would be perceived as weak and this would negatively affect their reputation.
Theoretical frameworks
In other publications (Cassidy et al., 2014, 2017; Faucher, Jackson et al., 2014,
2015) we discuss in greater length the theoretical frameworks we use to help
understand the dynamics of cyberbullying at the university. Earlier in this chapter,
we briefly referred to the student entitlement and student incivility literature.
Another literature that is helpful in understanding cyberbullying is contrapower
harassment, where students, who normally have less power than their teachers,
“You need a thick skin . . .” 121
seek to wield power through student evaluations and assessments, and other
course sites, aimed at damaging a professor’s reputation or ability to obtain tenure
or promotion (Bjorklund & Rehling, 2011; Blizard, 2016, this volume; DeSouza,
2011; McKay et al., 2008).
We also draw on the relational aggression literature (Crick & Nelson, 2002;
Jackson et al., 2009), particularly when examining the jockeying of power within
female so-called friendship groups. Of particular import is the power and con-
trol model (Pence & Paymar, 1993), adapted from the domestic violence litera-
ture, where one party seeks to exert power over another through intimidation,
isolation, emotional abuse, blaming, and/or privilege. We see evidence of these
dynamics being played out in the findings we have discussed in this chapter.
the culture of the community is not respectful and so people then just
disengage. I think that’s what happens in the university more often than
not. People aren’t held accountable for the behaviours so other people just
disengage and then issues never get resolved.
References
Arıcak, O. T. (2016). The relationship between mental health and bullying. In H. Cowie &
C.-A. Myers (Eds.), Bullying among university students: Cross-national perspectives
(pp. 76–90). London: Routledge.
Beebe, J. E., & Robey, P. A. (2011).The prevalence and psychological impact of bullying on
adolescents: An application of choice theory and reality therapy. International Journal of
Choice Theory & Reality Therapy, 30(2), 33–44.
Beran,T. N., Rinaldi, C., Bickham, D. S., & Rich, M. (2012). Evidence for the need to sup-
port adolescents dealing with harassment and cyber-harassment: Prevalence, progres-
sion, and impact. School Psychology International, 33(5), 562–576.
Bjorklund,W. L., & Rehling, D. L. (2011). Incivility beyond the classroom. InSight: A Journal
of Scholarly Teaching, 6, 28–36.
Blizard, L. M. (2016). Faculty members’ experiences of cyberbullying by students at one
Canadian university: Impact and recommendations. International Research in Higher Edu-
cation, 1(1), 107–124.
Blizard, L. (this volume). Student-to-faculty targeted cyberbullying: The impact on faculty.
In W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international
contexts (pp. 126–138). Oxford, UK: Routledge.
“You need a thick skin . . .” 123
Boswell, S. S. (2012). “I deserve success”: Academic entitlement attitudes and their rela-
tionships with course self-efficacy, social networking, and demographic variables. Social
Psychology of Education, 15, 353–365.
Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A compre-
hensive review of current international research and its implications and application to
policy and practice. School Psychology International, 34(6), 575–612.
Cassidy,W., Faucher, C., & Jackson, M. (2014).The dark side of the ivory tower: Cyberbul-
lying of university faculty and teaching personnel. Alberta Journal of Educational Research,
60(2), 279–299.
Cassidy, W., Faucher, C., & Jackson, M. (2017). Adversity in university: Cyberbullying and
its impacts on students, faculty and administrators. International Journal of Environmental
Research and Public Health, 14, 888–906.
Cassidy, W., Faucher, C., & Jackson, M. (this volume). Introduction: Context, framework,
and perspective. In W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university
in international contexts (pp. 1–6). Oxford, UK: Routledge.
Cassidy, W., Jackson, M., & Faucher, C. (2015). Gender differences and cyberbullying
towards faculty members in higher education. In R. Navarro, S.Yubero, & E. Larrañaga
(Eds.), Cyberbullying across the globe: Gender, family, and mental health (pp. 79–98). Basel,
Switzerland: Springer.
Cassidy, W., Jackson, M., & Brown, K. (2009). Sticks and stones can break my bones, but
how can pixels hurt me? Students’ experiences with cyber-bullying. School Psychology
International, 30(4), 383–402.
Chowning, K., & Campbell, N. J. (2009). Development and validation of a measure of
academic entitlement: Individual differences in students’ externalized responsibility and
entitled expectations. Journal of Educational Psychology, 101(4), 982–997.
Clark, C. M., Werth, L., & Ahten, S. (2012). Cyber-bullying and incivility in the online
learning environment, Part 1: Addressing faculty and student perceptions. Nurse Educa-
tor, 37(4), 150–156.
Coyne, I., & Farley, S. (this volume). Cyberbullying within working contexts. In W. Cas-
sidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international contexts
(pp. 80–96). Oxford, UK: Routledge.
Cowie, H., Bauman, S., Coyne, I., Myers, C.-A., Pörhölä, M., & Almeida, A. (2013). Cyber-
bullying amongst university students: An emergent cause for concern? In P. K. Smith &
G. Steffgen (Eds.), Cyberbullying through the new media: Findings from an international net-
work (pp. 165–177). London: Psychology Press.
Cowie, H., & Myers, C.-A. (2016). What we know to date about bullying and cyberbul-
lying among university students. In H. Cowie & C.-A. Myers (Eds.), Bullying among
university students: Cross-national perspectives (pp. 3–14). London: Routledge.
Crick, N. R., & Nelson, D. A. (2002). Relational and physical victimization within friend-
ships: Nobody told me there’d be friends like these. Journal of Abnormal Child Psychology,
30(6), 599–607.
Crookston, R. K. (2012). Working with problem faculty: A 6-step guide for department chairs. San
Francisco, CA: Jossey-Bass.
DeSouza, E. R. (2011). Frequency rates and correlates of contrapower harassment in higher
education. Journal of Interpersonal Violence, 26(1), 158–188.
Driver, J. (this volume). Faculty members who are bullies. In W. Cassidy, C. Faucher, & M.
Jackson (Eds.), Cyberbullying at university in international contexts (pp. 212–214). Oxford,
UK: Routledge.
124 Wanda Cassidy, Chantal Faucher, and Margaret Jackson
Duffy, M., & Sperry, L. (2014). Overcoming mobbing: A recovery guide for workplace aggression
and bullying. New York: Oxford University Press.
Faucher, C., Cassidy,W., & Jackson, M. (2015). From the sandbox to the inbox: Comparing
the acts, impacts, and solutions of bullying in K-12, higher education, and the work-
place. Journal of Education and Training Studies, 3(6), 111–125.
Faucher, C., Cassidy, W., & Jackson, M. (this volume). Power in the tower: The gen-
dered nature of cyberbullying among students and faculty at Canadian universities. In
W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international
contexts (pp. 66–79). Oxford, UK: Routledge.
Faucher, C., Jackson, M., & Cassidy, W. (2014). Cyberbullying among university students:
Gendered experiences, impacts, and perspectives. Education Research International,
2014, 1–10.
Faucher, C., Jackson, M., & Cassidy,W. (2015).When on-line exchanges byte: An examina-
tion of the policy environment governing cyberbullying at the university level. Cana-
dian Journal of Higher Education, 45(1), 102–121.
Giovazolias, T., & Malikiosi-Loizos, M. (2016). Bullying at Greek universities: An empiri-
cal study. In H. Cowie & C.-A. Myers (Eds.), Bullying among university students: Cross-
national perspectives (pp. 110–126). London: Routledge.
Greenberger, E., Lessard, J., Chen, C., & Farruggia, S. P. (2008). Self-entitled college stu-
dents: Contributions of personality, parenting, and motivational factors. Journal of Youth
and Adolescence, 37, 1193–1204.
Hollis, L. P. (2012). Bully in the ivory tower: How aggression and incivility erode American higher
education. Wilmington, DE: Patricia Berkly LCC.
Jackson, M., Cassidy, W., & Brown, K. (2009). “you were born ugly and youl die ugly too”:
Cyber-bullying as relational aggression. In Education: Special Issue on Technology and Social
Media, Part 1, 15(2), 68–82.
Jackson, M., Faucher, C., & Cassidy, W. (this volume). What’s policy got to do with it? The
focus on cyberbullying policy at the university level. In W. Cassidy, C. Faucher, & M.
Jackson (Eds.), Cyberbullying at university in international contexts (pp. 198–211). Oxford,
UK: Routledge.
Keashly, L. (this volume). In the e-presence of others: Understanding and developing con-
structive cyber-bystander action. In W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyber-
bullying at university in international contexts (pp. 141–156). Oxford, UK: Routledge.
Kokkinos, C. M., Antoniadou, N., & Markos, A. (2014). Cyber-bullying: An investigation
of the psychological profile of university student participants. Journal of Applied Develop-
mental Psychology, 35, 204–214.
Kopp, J. P., & Finney, S. J. (2013). Linking academic entitlement and student incivility using
latent means modeling. Journal of Experimental Education, 81(3), 322–336.
Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2012). Cyberbullying: Bullying in the digital
age (2nd ed.). Malden, MA: Wiley-Blackwell.
Lampman, C. (2012). Women faculty at risk: U.S. professors report on their experiences
with student incivility, bullying, aggression, and sexual attention. NASPA Journal About
Women in Higher Education, 5(2), 184–208.
Larrañaga, E., Yubero, S., Navarro, R., & Ovejero, A. (this volume). From traditional bul-
lying to cyberbullying: Cybervictimization among higher education students. In
W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international
contexts (pp. 99–111). Oxford, UK: Routledge.
Lutgen-Sandvik, P., & Tracy, S. J. (2012). Answering five key questions about workplace
bullying: How communication scholarship provides thought leadership for transform-
ing abuse at work. Management Communication Quarterly, 26, 3–47.
“You need a thick skin . . .” 125
Marczak, M., & Coyne, I. (2010). Cyberbullying at school: Good practice and legal aspects
in the United Kingdom. Australian Journal of Guidance and Counselling, 20, 182–193.
McKay, R., Arnold, D. H., Fratzl, J., & Thomas, R. (2008). Workplace bullying in academia:
A Canadian study. Employee Responsibility and Rights Journal, 20, 77–100.
Menesini, E., & Nocentini, A. (2012). Peer education intervention: Face-to-face versus
online. In A. Costabile & B. A. Spears (Eds.), The impact of technology on relationships in
educational settings (pp. 139–150). New York, NY: Routledge.
Merriam, S. B., & Tisdale, E. J. (2016). Qualitative research: A guide to design and implementation
(4th ed.). San Franscisco, CA: Jossey-Bass.
Miles, B., & Huberman, A. (1994). Qualitative data analysis. Thousand Oaks, CA: Sage
Publications.
Minor, M. A., Smith, G. S., & Brashen, H. (2013). Cyberbullying in higher education. Jour-
nal of Educational Research and Practice, 3(1), 15–29.
Nocentini, A., Calmaestra, J., Schultze-Krumboltz, A., Scheithauer, H., Ortega, R., & Men-
esini, E. (2010). Cyberbullying: Labels, behaviours and definition in three European
countries. Australian Journal of Guidance and Counselling, 20, 129–142.
Patchin, J.W., & Hinduja, S. (2012). Cyberbullying: An update and synthesis of the research.
In J. W. Patchin & S. Hinduja (Eds.), Cyberbullying prevention and response: Expert perspec-
tives (pp. 13–35). New York, NY: Routledge.
Pence, E., & Paymar, M. (1993). Education groups for men who batter:The Duluth Model. New
York: Springer.
Rivers, I. (2016). Homophobic and transphobic bullying in universities. In H. Cowie &
C.-A. Myers (Eds.), Bullying among university students: Cross-national perspectives
(pp. 48–60). London: Routledge.
Sallee, M., & Diaz, C. (2012). Sexual harassment, racist jokes, and homophobic slurs: When
bullies target identity groups. In J. Lester (Ed.), Workplace bullying in higher education
(pp. 41–59). New York: Routledge.
Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., & Koskelainen, M.
(2010). Psychosocial risk factors associated with cyberbullying among adolescents:
A population-based study. Archives of General Psychiatry, 67, 720–728.
Smith, P. K. (2012). Cyberbullying and cyber aggression. In S. R. Jimerson, A. B. Nickerson,
M. J. Mayer, & M. J. Furlong (Eds.), Handbook of school violence and school safety: Interna-
tional research and practice (2nd ed., pp. 93–103). New York: Routledge.
Taylor, S. (2012). Workplace bullying: Does tenure change anything? The example of a
midwestern research university. In J. Lester (Ed.), Workplace bullying in higher education
(pp. 23–40). New York: Routledge.
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis
of research on cyberbullying victimization. Computers in Human Behavior, 26, 277–287.
Vaughan, S. (2012). Ya’makasi or the art of displacement in the corporate world: A target’s
perspective on the impact of workplace bullying. In N.Tehrani (Ed.), Workplace bullying:
Symptoms and solutions (pp. 51–66). London: Routledge.
von Marées, N., & Petermann, F. (2012). Cyberbullying: An increasing challenge for schools.
School Psychology International, 33, 467–476.
Wildermuth, S., & Davis, C. B. (2012). Flaming the faculty: Exploring root causes, con-
sequences, and potential remedies to the problem of instructor-focused uncivil online
student discourse in higher education. In L. A. Wankel & C. Wankel (Eds.), Misbehavior
online in higher education: Cutting-edge technologies in higher education (pp. 379–404). Bing-
ley: Emerald.
9
STUDENT-TO-FACULTY TARGETED
CYBERBULLYING LIDA BLIZARDSTUDENT-TO-FACULTY TARGETED CYBERBULLYING
Lida Blizard
Introduction
This chapter explores the impact that student-to-faculty targeted cyberbul-
lying can have on faculty members. These findings were captured in a mixed-
methods study conducted at one Canadian university in 2012. The study found
that targeted faculty members experienced negative physical, emotional, rela-
tional, and occupational effects in the aftermath of being cyberbullied by students.
The classroom constitutes the workplace: in which faculty members are responsible
to uphold institutional policy, engage students in meaningful learning experi-
ences, and manage tensions that arise in the process.While teaching is a rewarding
experience, student-faculty conflicts are inevitable given that faculty members’
decision-making can have an effect on students’ academic outcomes. While some
students may choose to collaborate with faculty in resolving these differences,
others may retaliate by posting about their teachers online.
Some scholars argue that cyberbullying can be motivated by a perceived
injustice or for simple entertainment (Hinduja & Patchin, 2010; McKay, Arnold,
Fratzl, & Thomas, 2008). In a landmark Canadian court case (Prigden v. Univer-
sity of Calgary, 2012), two undergraduate students were expelled for creating
a Facebook polling site that rewarded peers for posting slanderous comments
about a targeted instructor. Remarkably, whether enticed by peer pressure or
the notoriety of posting harmful remarks (e.g., allegations of incompetence,
defamatory comments), students engaged in the contagion of vengeful activity
for several weeks. Although 10 students were prosecuted and found guilty of
non-academic misconduct, two students appealed to the higher courts arguing
that the university was not exempt from the standards set by the country’s Charter
of Rights and Freedoms. Ultimately, the courts sided with the students, and their
Student-to-faculty targeted cyberbullying 127
Literature
In terms of workplace safety for faculty, at the time of this study, the academic
bullying literature reported that between 18% and 32% of post-secondary faculty
members had been bullied (Keashly & Neuman, 2010; McKay et al., 2008); yet,
minimal research had explored cyberbullying within the tertiary sector (Baldridge,
2008; DeSouza, 2010; Lampman, 2012), with even fewer studies focused on a
student-to-faculty cyberbullying trajectory (Eskey, Taylor, & Eskey, 2014; Minor,
Smith, & Brashen, 2013). Even so, student-faculty cyberbullying research reported
relatively high prevalence rates, ranging between 12% (Faucher, Jackson, & Cas-
sidy, 2014) and 17%, to 45% (Eskey et al., 2014; Minor et al., 2013; Smith, 2007;
Vance, 2010).
The detrimental impact of cyberbullying on targeted individuals has been
well-documented across the workplace bullying, K–12 bullying, and, to some
extent, in the post-secondary face-to-face bullying literature (Beran, Rinaldi,
Bickham, & Rich, 2012; Cassidy, Jackson, & Brown, 2009; Eskey et al., 2014; Na,
Dancy, & Park, 2015; Patchin & Hinduja, 2010; Schenk & Fremouw, 2012; Shariff,
2008). Additionally, on the academic front, studies on faculty-targeted incivil-
ity (Lampman, 2012; Luparell, 2004) and cyberbullying directed toward faculty
members (Blizard, 2014; Clark, Werth, & Ahten, 2012; Eskey et al., 2014; Faucher
et al., 2014; Minor et al., 2013) have exposed the detrimental impact of bullying
on teachers. Yet, despite the harm endured by the target, the literature confirms
that victims (whether adolescents or adults) tend to avoid reporting the incident,
believing either that it will not solve the problem, or else may result in further
retaliation (Agatston, Kowalski, & Limber, 2012; Blizard, 2014). Furthermore,
research conveys that student-faculty conflict can be pervasive – placing students,
faculty members, and the overall learning community at risk of harm (Clark et al.,
2012; Frey Knepp, 2012; Luparell, 2004; Twale & DeLuca, 2008).
Purpose
This study was undertaken to develop a greater understanding of this phenomenon –
that is, evaluating the extent to which student-to-faculty cyberbullying takes
place – including the nature of the experience, the impact on targets, and the sup-
port measures needed to cope with cyberbullying incidents. The importance of
addressing this issue is two-fold: first, in terms of the individual welfare of faculty
members, who may inadvertently be placed at risk while fulfilling their roles; and,
second, in how this may affect the occupational health and safety of the overall
campus community.
128 Lida Blizard
Method
This two-phase mixed-methods study employed online survey and individual
interview methods to capture faculty members’ experiences of cyberbullying
by students. Purposeful convenience sampling was used to survey approximately
1,040 faculty members from within one Canadian university. Both the online
survey and interview questions were adopted, and then modified, from previ-
ously validated research instruments. The online survey included both closed and
open-ended responses.Throughout this study, cyberbullying was defined as an elec-
tronically mediated message(s) perceived by the targeted individual as contain-
ing aggressive, intimidating, derogatory, defamatory, sexist, harassing, or bullying
language (Blizard, 2014).
Results
Study participants
From the 36 survey respondents (3.5% of total surveyed), 22 faculty members
declared having experienced student-to-faculty cyberbullying at least once in
their teaching career, 19 of whom endured at least one “serious” incident that had
a negative effect on them. Four of these respondents (three females, one male)
volunteered to participate in a one-on-one individual audio-taped interview,
which ranged in length from 60 to 90 minutes. Recognizing that interviewees
were taking a risk in disclosing, and potentially reliving, painful memories of their
cyberbullying experiences, great care was taken to provide a safe, comfortable,
supportive environment during the interview process. The recordings were tran-
scribed, member-checked with participants to verify credibility and trustworthi-
ness of the transcript text, then coded using a descriptive coding process (Saldaña,
2009). Pseudonym codes were used to preserve anonymity and confidentiality of
the participants’ information.
Although this study assessed various aspects of faculty members’ cyberbullying
experiences (e.g., message content, prevalence, impact, support needed, recom-
mendations), this discussion focuses on the self-declared impact of cyberbullying
on targeted individuals. Notably, cyberbullied faculty members (n = 22) were
primarily female (68%), over 40 years of age (84%), held Canadian citizenship by
birth (72%), spoke English as their first language (97%), held full-time status, and
had greater than 10 years’ teaching experience within the post-secondary sector.
That targeted instructors were predominantly female converges with prior stud-
ies of cyberbullying and workplace bullying (Cassidy, Faucher, & Jackson, 2014;
Lampman, 2012), post-secondary bullying (Keashly & Neuman, 2010), and post-
secondary cyber-harassment (Vance, 2010). The findings diverge, however, from
studies of student incivility (Alberts, Hazen, & Teobald, 2010; Alexander-Snow,
2004), whereby young, low-rank, non-white faculty members were more likely
to be targeted.
Student-to-faculty targeted cyberbullying 129
Impact of cyberbullying
An anonymous email was sent . . . address line was “fuk (my first and last
names) @yahoo.ca” . . . claiming I marked students too hard . . . threatening
how students would treat me if they found me walking alone down the
street. . . . I was extremely shaken by this email.
(SR 8)
The email messages . . . threatened to call the press, threatened to file a legal
complaint . . . tried to intimidate me into changing the grade . . . to me that
is bullying.
(IP Carol)
This study also found that student aggression can transcend online platforms
and escalate to in-person altercations. For instance, both Andrew and Barbara
were recipients of numerous “angry email messages” that escalated to incidents of
“shouting and berating” them in-person. Whether male or female, the emotional
toll of cyberbullying on targeted faculty members became vividly clear during
the individual interviews. Physical and emotional responses varied among par-
ticipants, and, while most appeared calm at the onset of the interview, some indi-
viduals became more emotional and anxious (e.g., fidgeting, struggling to speak,
tearful) while sharing their stories:
(Crying) I was fine until this interview and now all of those emotions came
back up. . . . I’m reliving it again as I talk about it.
(IP Debbie)
(Crying) . . . one bad comment after so many years of positive feedback had
such an effect on me.
(IP Debbie)
Compelling findings from this study emerged when participants were asked to
identify, from a checklist, the type and duration of negative effects (e.g., physical,
emotional, relational, and occupational) that occurred from their cyberbullying expe-
rience. The study found that one cyberbullying incident can be highly detrimental
to targeted individuals such that some faculty members reported multiple nega-
tive effects (five or more) that persisted from “a few days” to “more than one year”
(e.g., “sleep disturbances”, “felt significantly anxious or distressed”, “felt depressed”,
“increased irritability”, “sudden emotional responses when reminded of the event”,
“had difficulty concentrating”,“stress-related illnesses”,“tried not to think about the
incident”,“avoided making contact with the aggressor”,“afraid to be alone with the
aggressor”). More disturbingly, others experienced greater than nine of the afore-
mentioned negative effects for longer than one year, including thoughts of retaliation
(21%) and thoughts of self-harm (5%).These findings pose concern, since some par-
ticipants would have been experiencing these detrimental effects while attempting
to fulfill their teaching role, as well as the unfavorable consequences for the campus
community should thoughts of retaliation or self-harm be acted upon.
Notably – while this was not a psychological focused study – upon further
review of the literature, similarities were noticed between the study’s findings and
the American Psychiatric Association: Diagnostic and Statistical Manual of Mental Disorders
(DSM-5) criteria for Acute Stress Disorder (ASD) and Post-Traumatic Stress Dis-
order (PTSD). According to the DSM-5 criteria, ASD occurs when an individual
has been directly exposed to a stressful or traumatic experience with a pattern of
symptoms that persist for three days to one month following the event, whereas
symptoms that last beyond one month constitute PTSD (American Psychiatric
Association, 2013). As such, faculty members who reported more than nine nega-
tive effects that persisted for one week to one month may have experienced ASD-
like effects. Likewise, participants who reported multiple negative effects that lasted
longer than one month in the form of: intrusion (e.g., “I couldn’t stop thinking
about it”, “I’m reliving it again as I talk about it”), avoidance (e.g., “I tried not to
think about it”), alterations in mood or cognition (e.g., “I was very bothered by
it”, “I felt threatened . . . shocked”), and arousal (e.g., “I lost sleep over it”), bear
132 Lida Blizard
similarities with the DSM-5 criteria for PTSD. In light of these findings, it is impor-
tant to consider how targeted faculty members, afflicted with such effects, were able
to cope with the experience or interact with students thereafter.
The adverse relational and occupational effects reported in this study are not
new, as similar findings have been reported in former academic and workplace
bullying research (Celep & Konalki, 2013; Lampman, 2012; Lampman, Phelps,
Bancroft, & Beneke, 2009; Luparell, 2004; Lutgen-Sandvik,Tracy, & Alberts, 2007;
McKay et al., 2008; Namie, 2003).
Interview testimonials illuminated the value participants placed on building
a positive, supportive relationship with students to help them succeed. Emo-
tions surfaced (e.g., tears, raised voices, trembling) as interviewees explained how
invested they were in providing feedback to assist students in learning, as well as
how “surprised”, “shocked”, “shattered”, “threatened”, or “defenseless” they felt
upon discovering that they had been cyberbullied:
I meet with the students . . . discuss their marks . . . give constructive feed-
back to prepare them for . . . their upcoming semester. . . .The student wrote
Student-to-faculty targeted cyberbullying 133
that I was the worst teacher they ever had . . . I was lazy. . . . I was shocked . . .
my confidence was shattered.
(IP Debbie)
Just because you have a good thing with a student doesn’t mean they won’t
come back on you. . . . I decided to keep distance. . . . I don’t want to be hurt.
(IP Carol)
Although one interviewee was targeted with very angry email messages from a
student, she was able to put it in perspective of a learning experience for the stu-
dent, while maintaining a distance emotionally:
I received some angry, angry, angry email messages from the student . . .
believing that it is not about me is my survival mechanism . . . students’
attempts to bully are just opportunities for them to learn . . . if they bully
they haven’t learned.
(IP Barbara)
You just can’t tell people about these kinds of incidents . . . you have to be
really careful about who you tell and what you say.
(SR 22)
134 Lida Blizard
Discussion
Limitations
The first limitation of this study pertains to the low response rate (N = 1040)
from the online survey (3.5%, n = 36) and the interviews (.38%, n = 4), which
could be attributed to the narrow 30-day implementation period imposed by
the university, the sensitive subject matter, faculty members’ uncertainty of what
constitutes cyberbullying, or faculty members’ concern with what might be done
with the findings. Yet, while some faculty members may have been wary about
sharing (and potentially reliving) intimate details of their cyberbullying experi-
ence, others chose to participate as an opportunity to effect change:
I realized in reading your research proposal that I too had been a victim of
cyberbullying and that this was a great opportunity to participate.
(IP Carol)
Second, due to the unique focus – a limited number of faculty members at one
institution – the findings are not generalizable across the institution (nor to other
institutions). However, despite the low response rate to the online survey, the
research process was enriched during the interviews by hearing the intimate
details and observing the emotional impact of faculty members’ cyberbullying
experiences. Participants’ testimonials gave voice to the detrimental impact of
student-to-faculty targeted cyberbullying, advancing the literature in this way.
take action may be intertwined with the complexity of detrimental effects being
processed, the level of confidence in pursuing administrative or legal action, and
the trepidation of revisiting painful memories.
The type and duration of detrimental effects reported by study participants
that resemble the DSM-5 criteria for ASD and PTSD suggests that some par-
ticipants may have experienced ASD- and PTSD-like effects in the aftermath of
being cyberbullied. Although the survey instrument was not designed to capture
ASD or PTSD effects – nor pose a question to establish whether ASD or PTSD
symptoms existed prior to the study – these findings warrant further investiga-
tion in future research. Furthermore, it is important to consider how targeted
faculty members process or heal from the aforementioned negative effects, given
the plausibility that left untreated, and with repeated exposure, detrimental effects
may worsen (Namie, 2003). Of equal consideration is the question of how faculty
members who reported symptoms of fear and avoidance toward the aggressor
might interact with students thereafter, especially when under stress. For instance,
the communications literature informs us that teachers who exhibit positive man-
nerisms toward students (e.g., smiling, calmness, warmth) can positively influence
students’ attitudes toward their instructors and the tone of civility within the
classroom (Kearney, Plax, & Wendt-Wasco, 1985; Klebig, Goldonowicz, Mendes,
Neville Miller, & Katt, 2016; Miller, Katt, Brown, & Sivo, 2014).
Student-teacher interactions are further compounded by the element of grading
and the power that faculty have to impact students’ success in both the short and
long term. Knowing that students’ dissatisfaction with grades was a leading precur-
sor to cyberbullying affords the opportunity for faculty to discuss grading practices.
This also connects students with support services upon notice of academic or per-
sonal struggles. When tensions arise, it may be beneficial to acknowledge students’
distress, as well as equipping students with skills to better cope with their stressors.
Based on this study’s findings, it is not surprising that the participants (n = 22)
decided that the top-three priority measures needed to address this issue were:
(1) cyberbullying education for faculty (75%); (2) followed by clearly written,
well-communicated cyberbullying policies (65%) including sanctions to deter
cyberbullying (43%); and (3) support for targeted individuals such as counseling
and focus groups (30%). Cyberbullying education for students was also stressed by
interviewees, to ensure students would be able to recognize and understand the
ramifications of cyberbullying. At the time of this study (2012), the gaps in post-
secondary cyberbullying research, institutional policy, and cyberbullying educa-
tion programs left faculty members to manage cyberbullying incidents on their
own. In the absence of knowledge on how to recognize, prevent, or manage
cyberbullying, targeted individuals were left exposed and vulnerable to harm.The
importance of further research was aptly captured in the following excerpts:
This is really important research . . . needs to get out in the open to assist
faculty members in how to manage it when it happens.
(IP Debbie)
136 Lida Blizard
Your study is long overdue. It will improve this institution and the practice
for faculty for years to come.
(IP Carol)
As a result of the findings from this study, the institution advanced their devel-
opment of cyberbullying policies and procedures, provided education for fac-
ulty members and students (e.g., embedding cyberbullying into curriculum), and
increased support services (e.g., cyberbullying focus groups) to assist targeted indi-
viduals in their pathway to healing. Furthermore, the institution also enhanced
opportunities for students to engage in activities that promote self-care (e.g., yoga,
meditation, mindfulness) designed to optimize students’ resilience and their ability
to cope with academic stressors.
Significance
This study provided a platform for cyberbullied faculty members to give voice,
reflect upon, and be acknowledged for their individual cyberbullying expe-
riences – knowing that their testimonials could generate evidence to effect
change. Consistent with prior bullying and cyberbullying literature, this study
found that cyberbullied faculty members who encountered at least one incident
of bullying via electronic media experienced detrimental physical, emotional,
relational, and occupational effects. With the growing number of cyberbullying
cases that have come before the courts, the proliferation of online platforms to
engage in such behaviors, and the damage that can be inflicted upon targeted
individuals, a greater body of cyberbullying research is needed. Further explora-
tion into the impact on victims, as well as refinements to survey instruments
that capture psychological effects, could illuminate the extent of harm and the
support measures most imperative to healing. Finally, the voice of students in
this trajectory cannot be understated, as this would broaden the scope of under-
standing student-to-faculty targeted cyberbullying for students and faculty
members alike.
References
American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders
(5th ed.). Arlington,VA: American Psychiatric Association.
Alberts, H. C., Hazen, H. D., & Teobald, R. B. (2010). Classroom incivilities: The challenge
of interactions between college students and instructors in the US. Journal of Geography
in Higher Education, 34, 439–462.
Alexander-Snow, M. (2004). Dynamics of gender, ethnicity, and race in understanding
classroom incivility. New Directions for Teaching & Learning, 99, 21–31.
Baldridge, J.V. (2008). Civility, incivility, bullying, and mobbing in academe. In D. J.Twale &
B. M. DeLuca (Eds.), Faculty incivility: The rise of the academic bully culture and what to do
about it (pp. 3–31). San Francisco: Jossey-Bass.
Student-to-faculty targeted cyberbullying 137
Beran, T., Rinaldi, C., Bickham, D., & Rich, M. (2012). Evidence for the need to support
adolescents dealing with harassment and cyber-harassment: Prevalence, progression, and
impact. School Psychology International, 33(5), 562–576.
Blizard, L. M. (2014). Faculty members’ perceived experiences and impact of cyberbullying from
students at a Canadian university: A mixed methods study. Ed.D. Dissertation, Simon Fraser
University, Burnaby, B.C. Retrieved from http://summit.sfu.ca/item/13897
Cassidy,W., Faucher, C., & Jackson, M. (2014).The dark side of the ivory tower: Cyberbul-
lying of university faculty and teaching personnel. Alberta Journal of Educational Research,
60(2), 279–299.
Cassidy, W., Jackson, M., & Brown, K. (2009). Sticks and stones can break my bones, but
how can pixels hurt me? Students’ experiences with cyber-bullying. School Psychology
International, 30, 383–401.
Celep, C., & Konalki, T. (2013). Mobbing experiences of instructors: Causes, results, and
solutions suggestions. Educational Sciences:Theory and Practice, 13(1), 193–199.
Clark, C. M., Werth, L., & Ahten, S. (2012). Cyber-bullying and incivility in the online
learning environment, Part 1: Addressing faculty and student perceptions. Nurse Educa-
tor, 37(4), 150–156.
Daniloff, D. (2009). Cyberbullying goes to college. Bostonia. Boston University. Retrieved
from www.bu.edu/today/2009/cyberbullying-goes-to-college/
DeSouza, E. R. (2010). Frequency rates and correlates of contrapower harassment in higher
education. Journal of Interpersonal Violence, 48(11), 1–27.
Eskey, M.,Taylor, C., & Eskey, M. (2014). Cyberbullying in the online classroom: Faculty as
the targets. Proceedings of TCC Worldwide Online Conference, 17, 30–41.
Faucher, C., Jackson, M., & Cassidy,W. (2014). Cyberbullying among university students: Gen-
dered experiences, impacts, and perspectives. Education Research International, 2014, 1–10.
Frey Knepp, K. A. (2012). Understanding student and faculty incivility in higher education.
The Journal of Effective Teaching, 12(1), 32–45.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide
Research, 14(3), 206–221.
Hoel, H., & Einarsen, S. (2011). Investigating complaints of bullying and harassment. In
S. Einarsen, H. Hoel, D. Zapf, & C. L. Cooper (Eds.), Bullying and harassment in the
workplace: Developments in theory, research, and practice (2nd ed., pp. 341–358). Boca Raton,
FL: CRC Press.
Kearney, P., Plax, T. G., & Wendt-Wasco, N. (1985). Teacher immediacy for affective learn-
ing in divergent classes. Communication Quarterly, 33, 61–74.
Keashly, L., & Neuman, J. (2010). Faculty experience with bullying in higher education.
Administrative Theory & Praxis, 32(1), 48–70.
Klebig, B., Goldonowicz, J., Mendes, E., Neville Miller, A., & Katt, J. (2016). The com-
bined effects of instructor communicative behaviors, instructor credibility, and student
personality traits on civility in the college classroom. Communication Research Reports,
33(2), 152–158.
Lampman, C., Phelps, A., Bancroft, S., & Beneke, M. (2009). Contrapower harassment in
academia: A survey of faculty experience with student incivility, bullying, and sexual
attention. Sex Roles, 60, 331–346.
Lampman, C. (2012). Women faculty at risk: U.S. professors report on their experiences
with student incivility, bullying, aggression, and sexual attention. NASPA Journal About
Women in Higher Education, 5(2), 184–208.
Luparell, S. (2004). Faculty encounters with uncivil nursing students: An overview. Journal
of Professional Nursing, 20, 59–67.
138 Lida Blizard
Lutgen-Sandvik, P., Tracy, S. J., & Alberts, J. K. (2007). Burned by bullying in the American
workplace: Prevalence, perception, degree, and impact. Journal of Management Studies,
44(6), 838–857.
McKay, R., Arnold, D., Fratzl, J., & Thomas, R. (2008). Workplace bullying in academia:
A Canadian study. Employee Responsibility and Human Rights Journal, 20, 77–100.
Miller, A., Katt, J. A., Brown, T., & Sivo, S. A. (2014). The relationship of instructor self-
disclosure, non-verbal immediacy, and credibility to student incivility in the college
classroom. Communication Education, 63, 1–16.
Minor, M., Smith, G., & Brashen, H. (2013). Cyberbullying in higher education. Journal of
Educational Research and Practice, 3(1), 15–29.
Na, H., Dancy, B. L., & Park, C. (2015). College student engaging in cyberbullying victimi-
zation: Cognitive appraisals, coping strategies, and psychological adjustments. Archives of
Psychiatric Nursing, 29(3), 155–161.
Namie, G. (2003). The WBI 2003 report on abusive workplaces. Bellingham, WA: Workplace
Bullying Institute.
Neville Miller, A., Katt, J. A., Brown, T., & Sivo, S. A. (2014). The relationship of instructor
self-disclosure, nonverbal immediacy, and credibility to student incivility in the class-
room. Communication Education, 63(1), 1–16.
Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and self-esteem. Journal of School Health,
80(12), 614–620.
Prigden v. University of Calgary. (2012). ABCA 139. Canadian Legal Information Institute.
Retrieved from www.canlii.org/en/ab/abca/doc/2012/2012abca139/2012abca139.
html
Saldaña, J. (2009). The coding manual for qualitative research.Thousand Oaks: Sage Publications.
Schenk, A., & Fremouw, W. (2012). Prevalence, psychological impact, and coping of cyber-
bully victims among college students. Journal of School Violence, 11(1), 21–37.
Shariff, S. (2008). Cyber-bullying: Issues and solutions for the school, the classroom and the home.
Abingdon, UK: Routledge.
Smith, A. (2007, January 19). Cyber-bullying affecting 17% of teachers, poll finds. The
Guardian. Retrieved from www.theguardian.com
Twale, D., & DeLuca, B. (2008). Faculty incivility:The rise of the academic bully culture and what
to do about it. San Francisco, CA: Jossey-Bass.
Vance, J. W. (2010). Cyber-harassment in higher education: Online learning environments.
Ed.D. dissertation. Retrieved from University of Southern California Digital Library
(usctheses-m2954).
PART III
Solutions
10
IN THE E-PRESENCE OF OTHERS LORALEIGH KEASHLYIN THE E-PRESENCE OF OTHERS
Loraleigh Keashly
As this volume illustrates, e-communication has become the latest (and argu-
ably the most virulent) means through which bullying can occur, and academe
is particularly vulnerable. I am interested in faculty experiences with cyberbul-
lying because of a faculty’s central role in the governance and manifestation of
the university’s educational and research missions, as well as its students’ successes
(Keashly & Wajngurt, 2016). Bullying and cyberbullying undermine faculty well-
being and, if left unaddressed, will undermine students, the institution, and higher
education in general (Black, this volume).
In this chapter, I explore the role of bystanders in the context of faculty experi-
ences, with a particular focus on the interactions through e-communication. The
nature of faculty as a self-regulating profession – and the resultant importance
of peer review – draws attention to faculty colleagues as particularly influential
bystanders whose (in)actions have profound implications for specific cyberbully-
ing situations, and the department and university climate more broadly (Keashly &
Neuman, 2010). To that end, I briefly highlight what the research tells us about
faculty experiences with cyberbullying. I then discuss what we know about
bystander behaviour and decision-making, with respect to engaging in these situ-
ations. Within this broader discussion of bystanding, I explore the current think-
ing as to how bystanding occurs and is shaped in the electronic environment:
highlighting what remains the same as in regular bullying, and what unique influ-
ences and opportunities these e-media have for bystanders. I then conclude with
potential action points for universities to consider.
Minney, & Guadagno, 2013). The Pew Research Center (2014) reports that 40%
of adults identify as victims of cyberbullying, with 73% indicating they have wit-
nessed others being cyberbullied. This statistic is compelling from a bystander
intervention perspective, as it shows that what happens is often in the presence
of others and, thus, these people have the opportunity to take action. In work
environments, cyberbullying victimization rates range from 10% to 20%, with
email as the primary medium of harassment (Coyne et al., 2016; Forssell, 2016;
Heatherington & Coyne, 2014; Privitera & Campbell, 2009).
In terms of faculty experience as targets, the prevalence and nature varies by
context and actor. Cassidy, Faucher, and Jackson (2014) found that 17% of fac-
ulty respondents reported experiencing cyberbullying from students (12%) and
colleagues (9%) in the previous 12 months. Email was the primary means of
cyberbullying. Rates of students cyberbullying faculty are higher when the focus
is on online educational environments, wherein e-communication is the primary
means of interaction (Wankel & Wankel, 2012). Specifically, one-third to one-half
of faculty in online educational environments perceive themselves as having been
cyberbullied by students (Eskey & Eskey, 2014; Minor, Smith, & Brashen, 2013;
Vance, 2010). Cyberbullying in online education environments occurs through a
variety of mechanisms, including email, phone calls, and posting in public forums
(such as the course discussion boards).
Websites and social networking apps focused on campus life and permit-
ting anonymous postings, such as RateMyProfessor (Daniloff, 2009) and Yik Yak
(Mahler, 2015), are other e-forums where faculty may be vulnerable to hostility
and cyberbullying from students and others. Beyond campus boundaries, posting
of faculty thoughts and actions (by themselves or by others) to social media sites
such as Facebook, Twitter, and YouTube can result in vigorous discussion and, in
some instances, vicious e-firestorms that can have profound implications for the
faculty member and for the university (Flaherty, 2017). These publicly available
sites are interesting for cyber-bystanding because of the potential for an unlimited
audience, which magnifies impact but also provides an enormous pool of bystand-
ers with the opportunity to engage. These public venues also show the range of
bystander activities: from bystanders who “joined in” with critique, even attacking
and threatening (bullying), to bystanders who challenged these hostile actions and
interpretations, and many who – both online and offline – sent support to the
faculty who were targets.
Faculty also engage in cyberbullying and aggression. Students identify faculty
as engaging in incivility and bullying in online educational environments, primar-
ily through email, class chat, and discussion boards (e.g., Clark, Werth, & Ahten,
2012). Consistent with research on “traditional” faculty bullying (Keashly & Neu-
man, 2013), colleagues are also a source of cyberbullying and aggression, which is
predominantly done through email (Cassidy et al., 2014).
In sum, faculty experience cyberbullying and – more broadly – hostile and
aggressive communication from a variety of actors, in a variety of contexts, and
In the e-presence of others 143
What is bystanding?
A typical definition of a bystander is a person who, although “present” at some
event or situation, does not take part in it (“Bystander”, 2017). Inherent in this
definition is an assumption of passivity, specifically that bystanders do nothing
(i.e., the nonresponsive bystander) (Latané & Darley, 1970). There is also a pre-
sumption that any actions will be pro-social. Those who are present and aware,
however, often engage in a variety of actions: pro-social (helpful) and anti-social
(harming) (Allison & Bussey, 2016), direct and indirect (Dooley, Pyżalski, & Cross,
2009), and through more active or passive engagement. Paull, Omari, and Standen
(2012) articulate 12 constructive and destructive roles that bystanders can play.
Examples of destructive roles include actively joining in or assisting the actor,
passively succumbing by becoming another victim, or abdicating opportunities to
engage. The constructive roles tend to involve active engagement such as inter-
vening, defending or defusing, and the more behind-the-scenes/screens work of
sympathizing and empathizing. While developed in on-site situations, these roles
also manifest in cyber-contexts as well. Thus, to understand bystanding generally,
and cyber-bystanding more specifically, we need to consider all the ways (good
or ill) that bystanders can engage. This consideration helps us to identify ways in
which bystanders might move in more constructive directions.
their work, Latané and Darley developed a five-stage model of bystander decision-
making regarding intervention. The first stage is noticing that something has hap-
pened; the second is assessing whether it is a problem requiring action; the third
is acknowledging responsibility for taking action; the fourth is choosing the action(s);
and the last is taking the action(s). This model has formed the basis of training to
build bystander efficacy in a variety of contexts (Swan, 2015), including univer-
sity campuses – particularly for addressing high-risk and discriminatory student
behaviour (e.g., Ashburn-Nardo, Blanchar, Petersson, Morris, & Goodwin, 2014;
Banyard, 2015; Nelson et al., 2011).While this model and much subsequent work
have focused on face-to-face situations, it is also being examined for the insight
it can provide regarding bystanding in the cyber-context (e.g., Dillon, 2014; Dil-
lon & Bushman, 2015). I use this model as a framework for exploring the nature
of, as well as influences on, cyber-bystanding decision-making and behaviour in
the context of faculty experiences with cyberbullying.
posts and, hence, require action to address. Thus, when the specific behaviours are
viewed as severe and capable of harm, bystanders will view them as problematic
and be more likely to intervene.
The sense of emergency and subsequent need for action is also affected by
the asynchronous nature of much of our media, as media influences our percep-
tion as to the immediacy of an event’s impact. In the case of being copied on an
email, visiting a class discussion board, or viewing a Facebook post, for example,
if the event had occurred sometime earlier, a bystander may be unclear as to
whether – given the length of time – any urgency to respond remains. Further-
more, the delay may make it difficult to discern the specific impact on the victim.
Heatherington and Coyne (2014) argue that asynchrony, in combination with the
reduced social cue nature of e-communication, reduces the transmission of the
emotional reactions of targets. As a result, bystanders may not develop an empa-
thetic response, detect harm, or perceive the injustice required to call for action.
To the extent that the bystander assesses the situation as not requiring action, they
will not engage.
for online environments. For example, actions that are available in the immedi-
ate situation that can also be done below detection offline (high immediate, low
involvement) include changing the topic, asking clarifying questions (e.g., “what
do you mean?”), using nonverbals (emoticons or dislikes, in the case of email and
social media) to communicate disapproval or concern, affirming the target by
highlighting their strengths, or a process observation about the discussion (Nelson
et al., 2011). Involvement could become more direct and visible (high immedi-
ate, high involvement) by telling the actor to stop, invoking group norms (e.g.,
against classroom discussion norms; disruption of free exchange of ideas), letting
the target know they should report conduct, or by stating that the bystander is
reporting the conduct. Actions that are low involvement and after the event (low
immediate) would include not forwarding or sharing the negative image or mes-
sage; advising the target offline to report; advising the person to stay off the media;
getting others involved in the form of active intervention by a chair, program
director, or other colleague; or posting positive messages regarding the target.
Bystander choice of action will be influenced by the goals they have for their
action (i.e., what is it the bystander wants to have happen?). Table 10.1 includes
possible goals or desired outcomes for bystander action.
To illustrate, if the goal is to name an inappropriate behaviour so that it is not
ignored, relevant actions include naming the behaviour directly, invoking group
norms, calling for civility, and confronting the actor – all of which communicate
the unacceptability of the behaviour and affirm the group norms.The goal of pre-
venting or stopping harm can be accomplished in a number of ways. Immediate
and visible action (direct) includes confronting the actor and telling them to
stop, which can be done online (public or private) and offline (public or private).
Regarding faculty experiences of cyberbullying, given that much of it occurs
through email and those involved are known to each other, this makes one-on-one
action more possible. For example, if a colleague shares an email from a student
threatening to go to the chair, the colleague bystander could help reframe this as
an anxiety response on the part of the student. They could explain that it is noth-
ing to fear and, thus, that no response, or else a more tempered response, may be
most appropriate.
Multiple actions are often needed to achieve the bystander’s desired goal(s).
These could occur simultaneously or sequentially. For example, in the situation of
a hostile email from one colleague to another, the bystander may take action and
disrupt the interaction, preventing or reducing harm (e.g., suggest that this is not
the forum for these discussions).They could then follow up with the actor and/or
target regarding what happened, thereby exploring alternative strategies to address
the situation moving forward.
While the desired goals or outcomes for the action help narrow the focus to
particular actions, these actions need to be considered in light of the cost/risk
and benefits for those involved. The virality or immortality of the action is an
important influence. Virality, which is an aspect that makes cyberbullying potent
in terms of its harm and the powerlessness of the target to manage, has impli-
cations for the bystander as well. By being visible/public, the bystander needs
to consider that their response, and they themselves, can be immortalized and
become part of the overall narrative (Dillon, 2014; Dillon & Bushman, 2015).
This carries with it a certain amount of risk, both personally and socially, for the
bystander (Banyard, 2015; Dillon, 2014). Personal risk includes retaliation and
becoming a target themselves. Social risk includes evaluation apprehension (fear
of embarrassment; DeSmet et al., 2016); creating disharmony in relationship with
the actor, target, or others (Brody & Vangelisti, 2016); and the potential stigma of
being associated with a disliked target (Mulder, Pouwelse, Lodewijkx, & Bolman,
2014; Nelson et al., 2011).
Pending the bystander’s risk assessment and their evaluation of their own
capacity to handle possible blowback, they may choose to go ahead with a vis-
ible action and publicly identify themselves. The bystander’s power relative to
the actor and target is influential in this calculus, with higher-power bystanders
assessing less personal and social risk – they are, therefore, more likely to engage
directly (Banyard, 2015). Alternatively, and often more frequently, bystanders may
choose more low-involvement action.This includes going private or one-on-one
with the actor, target, or other bystanders (Dillon, 2014), thereby allowing the
bystander to shield themself from unwanted attention. Such indirect action tends
to be favoured in cyberbullying situations for these reasons (Freis & Gurung,
2013). While appearing “safe”, going behind the scenes or being indirect does
involve risk. Because these actions are not visible, they may appear as inaction
152 Loraleigh Keashly
to others. For example, not forwarding the negative email or image to others is
a way of disrupting the negative action. However, the invisibility and ambiguity
of this action may be perceived as not providing support for the target; the actor
may perceive this “inaction” as consent to continue. For other bystanders who are
seeking cues on how to respond, the lack of visibility (and, thus, the perceived
inaction) may increase their reluctance to engage.
An important analysis for potential bystanders to undertake is the cost of tak-
ing no action (Skarlicki & Kulik, 2004). The potential cost includes the indi-
vidual’s sense of self as a caring person (asking themselves, “would a caring person
choose not to do something?”), their relationship with the target (e.g., sense of
betrayal), the potential for de-sensitization to harmful actions, and contributing
to the development of tolerance for such actions in the e-community and the
on-site community. Inaction is a particular challenge in cyberbullying situations
involving faculty colleagues, when there are connections to both the actor and the
target.The spillover effects of both action and inaction to personal relationships, as
well as to department and university climate, can be profound.
Action steps
What is clear from bullying and cyberbullying research is that these behaviours
occur in the presence of others.The question this chapter sought to answer was the
how and why of cyber-bystanding, considering the decisions an observer makes
along the path to take action. Universities can influence community members’
decisions to take constructive action to address cyberbullying and, more broadly,
bullying incidents, as well. It is critical, however, that whatever policy, education,
and training efforts are undertaken, they be developed with campus members, and
must be grounded in a deep understanding of the character and profile of the
institution and its members. The issue of cyberbullying, bullying, and the actions
taken to address them create opportunities for sustained meaningful engagement
with all campus members. This process of engagement is a living embodiment of
the values of the institution, and, in and of itself, has profound implications for the
development of a university culture and climate that is antithetical to bullying and
cyberbullying (Keashly & Neuman, 2018).
Specific actions are presented using the framework of the bystander interven-
tion model:
• Notice and Assess: Education about what cyberbullying is, the types of
behaviours involved in cyberbullying, how it is different from behaviours
such as constructive critique and debate, and the impact of these interactions
is vital. More broadly, this education needs to be embedded in a value-driven
discussion about what kind of learning and working environment the uni-
versity is committed to, and how actions like cyberbullying contravene those
values. These discussions need to be grounded in a deep appreciation of, and
commitment to, academic freedom.These visions and discussions provide the
normative guidelines for community member behaviour.
• Responsibility: The discussion of normative guidelines should include
articulation of the roles and responsibility of community members in achiev-
ing and maintaining this environment (i.e., the learning and working climate
is jointly determined). This articulation includes members’ responsibility and
duty of care vis-à-vis others, particularly when the actions of others can/may
negatively affect the working and learning environment. Alongside these pol-
icies and codes, there need to be mechanisms that support bystander action
by reducing the risk of retaliation (e.g., secure reporting mechanisms).
154 Loraleigh Keashly
References
Allison, K. R., & Bussey, K. (2016). Cyber-bystanding in context: A review of the literature
on witnesses’ responses to cyberbullying. Children andYouth Services Review, 65, 183–194.
Ashburn-Nardo, L., Blanchar, J. C., Petersson, J., Morris, K. A., & Goodwin, S. A. (2014).
Do you say something when it’s your boss? The role of perpetrator power in prejudice
confrontation. Journal of Social Issues, 70(4), 615–636.
Banyard,V. L. (2015). Toward the next generation of bystander prevention of sexual and relationship
violence: Action coils to engage communities. New York: Springer.
Bastiaensens, S., Vandebosch, H., Poels, K., Van Cleemput, K., DeSmet, A., & De Bour-
deaudhuij, I. (2014). Cyberbullying on social network sites: An experimental study into
bystanders’ behavioural intentions to help the victim or reinforce the bully. Computers
in Human Behaviour, 31, 259–271.
Black, T. (this volume). Designing healthy and supportive campus communities: An exam-
ple from Simon Fraser University. In W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyber-
bullying at university in international contexts (pp. 162–167). Oxford, UK: Routledge.
Bowes-Sperry, L., & O’Leary-Kelly, A. M. (2005). To act or not to act: The dilemma faced
by sexual harassment observers. Academy of Management Review, 30(2), 288–306.
Brody, N., & Vangelisti, A. L. (2016). Bystander intervention in cyberbullying. Communica-
tion Monographs, 83(1), 94–119.
Bystander. (2017). Wiktionary: The free dictionary. Retrieved from https://en.wiktionary.
org/wiki/bystander
Cassidy,W., Faucher, C., & Jackson, M. (2014).The dark side of the Ivory Tower: Cyberbul-
lying of university faculty and teaching personnel. Alberta Journal of Educational Research,
60(2), 279–299.
Christy, S. C. (2010). Working effectively with faculty: Guidebook for higher education staff and
managers. Berkeley, CA: University Resources Press.
Clark, C. M., Werth, L., & Ahten, S. (2012). Cyber-bullying and incivility in the online
learning environment, Part 1: Addressing faculty and student perceptions. Nurse Educa-
tor, 37(4), 150–156.
Coyne, I., Farley, S., Axtell, C., Sprigg, C., Best, L., & Kwok, O. (2016). Understanding the
relationship between experiencing workplace cyberbullying, employee mental strain
and job satisfaction: A dysempowerment approach. The International Journal of Human
Resource Management, 28(7), 945–972.
Daniloff, C. (2009). Cyberbullying goes to college. Bostonia, Spring. Retrieved from www.
bu.edu/bostonia/spring09/bully/
In the e-presence of others 155
D’Cruz, P., & Noronha, E. (2013). Navigating the extended reach: Target experiences of
cyberbullying at work. Information and Organization, 23(4), 324–343.
DeSmet, A., Bastiaensens, S., Van Cleemput, K., Poels, K., Vandebosch, H., Cardon, G., &
De Bourdeaudhuij, I. (2016). Deciding whether to look after them, to like it, or leave it:
A multidimensional analysis of predictors of positive and negative bystander behaviour
in cyberbullying among adolescents. Computers in Human Behaviour, 57, 398–415.
Dillon, K. P. (2014). The unresponsive cyberbystander: A proposed cyberbystander intervention
model of the mediated social forces inhibiting intervention online. Paper presented at the meet-
ing of the Annual National Communication Association, Chicago, IL.
Dillon, K. P., & Bushman, B. J. (2015). Unresponsive or un-noticed? Cyberbystander inter-
vention in an experimental cyberbullying context. Computers in Human Behaviour, 45,
144–150.
Dooley, J. J., Pyżalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying:
A theoretical and conceptual review. Journal of Psychology, 217(4), 182–188.
Eskey, M. T. Sr., & Eskey, M. T. Jr. (2014). Cyberbullying in the online classroom: Faculty as
the targets. In Proceedings of TCC Worldwide Online Conference 2014 (pp. 30–41). Hawaii:
TCC. Retrieved June 27, 2018 from https:www.learntechlib.org/p/149826/
Flaherty, C. (2017, June 26). Old criticisms, new threats. Inside Higher Ed. Retrieved from
www.insidehighered.com/news/2017/06/26/professors-are-often-political-lightning-
rods-now-are-facing-new-threats-over-their
Forssell, R. (2016). Exploring cyberbullying and face-to-face bullying in working life –
Prevalence, targets and expressions. Computers in Human Behaviour, 58, 454–460.
Freis, S. D., & Gurung, R. A. (2013). A Facebook analysis of helping behaviour in online
bullying. Psychology of Popular Media Culture, 2(1), 11–19.
Gahagan, K.,Vaterlaus, J. M., & Frost, L. R. (2016). College student cyberbullying on social
networking sites: Conceptualization, prevalence and perceived bystander responsibility.
Computers in Human Behaviour, 55, 1097–1105.
Heatherington,W., & Coyne, I. (2014). Understanding individual experiences of cyberbul-
lying encountered through work. International Journal of Organization Theory and Behav-
iour, 17(2), 163–192.
Keashly, L., & Neuman, J. H. (2013). Bullying in academia: What does current theorizing
and research tell us? In J. Lester (Ed.), Workplace bullying in higher education (pp. 1–22).
London: Routledge.
Keashly, L., & Neuman, J. H. (2018). Workplace bullying and mobbing in U.S. higher
education. In M. Duffy & D. Yamada (Eds.), Workplace bullying and mobbing in the U.S.
(pp. 507–538). Santa Barbara, CA: Praeger.
Keashly, L., & Wajngurt, C. (2016). Faculty bullying in higher education. Psychology and
Education: An Interdisciplinary Journal, 53(1/2), 79–90.
Latané, B., & Darley, J. M. (1970). The unresponsive bystander:Why doesn’t he help? New York:
Appleton-Century Crofts.
Law, D. M., Shapka, J. D., Domene, J. F., & Gagne, M. H. (2012). Are cyberbullies really bul-
lies? An investigation of reactive and proactive online aggression. Computers in Human
Behaviour, 28, 664–672.
Levine, M., & Crowther, S. (2008). The responsive bystander: How social group member-
ship and group size can encourage as well as inhibit bystander intervention. Journal of
Personality and Social Psychology, 95(6), 1429–1439.
Madan, A. O. (2014). Cyber aggression/cyber bullying and the dark triad: Effect on work-
place behaviour/performance. International Journal of Social, Management, Economics and
Business Engineering, 8(6), 1725–1730.
156 Loraleigh Keashly
Mahler, J. (2015, March 8). Who spewed that abuse? Anonymous Yik Yak app isn’t telling.
New York Times.
Markey, P. M. (2000). Bystander intervention in computer-mediated communication. Com-
puters in Human Behaviour, 16(2), 183–188.
Miceli, M. P., Near, J. P., & Dworkin, T. M. (2013). Whistle-blowing in organizations. London:
Psychology Press.
Minor, M. A., Smith, G. S., & Brashen, H. (2013). Cyberbullying in higher education. Jour-
nal of Educational Research and Practice, 3(1), 15–29.
MIT Ombuds Office. (2004). Active bystander program and mediation@MIT. Retrieved from
http://web.mit.edu/bystanders/strategies/index.html
Mulder, R., Pouwelse, M., Lodewijkx, H., & Bolman, C. (2014). Workplace mobbing and
bystanders’ helping behaviour towards victims: The role of gender, perceived respon-
sibility and anticipated stigma by association. International Journal of Psychology, 49(4),
304–312.
Nelson, J. K., Dunn, K. M., & Paradies, Y. (2011). Bystander anti-racism: A review of the
literature. Analyses of Social Issues and Public Policy, 11(1), 263–284.
O’Reilly, J., Aquino, K., & Skarlicki, D. (2016). The lives of others: Third parties’ responses
to others’ injustice. Journal of Applied Psychology, 101, 171–189.
Paull, M., Omari, M., & Standen, P. (2012). When is a bystander not a bystander? A typol-
ogy of the roles of bystanders in workplace bullying. Asia Pacific Journal of Human
Resources, 50(3), 351–366.
Pew Research Center. (2014, October). Online harassment. Retrieved from www.pewinternet.
org/2014/10/22/online-harassment/
Privitera, C., & Campbell, M. A. (2009). Cyberbullying: The new face of workplace bully-
ing? CyberPsychology & Behaviour, 12(4), 395–400.
Shea,V. (1994). Netiquette. San Francisco, CA: Albion.
Shultz, E., Heilman, R., & Hart, K. J. (2014). Cyber-bullying: An exploration of bystander
behaviour and motivation. Cyberpsychology: Journal of Psychosocial Research on Cyberspace,
8(4) article 3.
Skarlicki, D., & Kulik, C.T. (2004).Third party reactions to employee (mis)treatment: A jus-
tice perspective. Research in Organizational Behaviour, 26, 183–229.
Swan, S. L. (2015). Bystander interventions. Wisconsin Law Review, 2015(6), 975–1047.
Ury, W. (2000). The third side:Why we fight and how we can stop. London: Penguin Books.
Vance, J. W. (2010). Cyber-harassment in higher education: Online learning environments.
Ed.D. dissertation. Retrieved from University of Southern California Digital Library
(usctheses-m2954).
Wankel, L., & Wankel, C. (Eds.). (2012). Cutting-edge technologies in higher education, Volume 5:
Misbehaviour online in higher education. Bingley, UK: Emerald Group Publishing Limited.
White, C. H., & Malkowski, J. (2014). Communicative challenges of bystander interven-
tion: Impact of goals and message design logic on strategies college students use to
intervene in drinking situations. Health Communication, 29(1), 93–104.
Wingate, S. V., Minney, J. A., & Guadagno, R. E. (2013). Sticks and stones may break your
bones, but words will always hurt you: A review of cyberbullying. Social Influence, 8,
87–106.
11
THE FAIRNESS LENS NATALIE SHARPETHE FAIRNESS LENS
Natalie Sharpe
parties to feel like they have been treated fairly. Adopting this fairness lens allows
the ombudsperson to work towards transforming campus culture by addressing
the often-tacit condoning of cyberbullying and, instead, fostering more respectful
online behaviour. Campuses can only begin to cultivate a safer and kinder online
culture when the university administration acknowledges addressing cyberbul-
lying as a priority. Such top-down proposals can be complemented – indeed
magnified – by collaborative initiatives from students, staff, faculty, and student
and staff associations and unions.
sending it, but without any direct intervention taking place with others beyond
the members of the group. On-going restorative practices could have provided an
important learning opportunity about respectful online behaviour.
The second example involves a request from one of the professional faculties
for an intervention to address the targeting of a student with disabilities. Other
students in the faculty had been gossiping about this student on Instagram and
Facebook, leading the latter to feel that his confidentiality had been breached and
his professional reputation tarnished.The incident raised broader concerns for the
faculty because it called into question the effectiveness of its code of ethics, to
which students were required to adhere in their classes and professional clinical
placements. Rather than sanction the perpetrators individually, the faculty decided
to ask the ombudsperson to facilitate educational sessions that would engage the
students in discussions on professionalism and appropriate use of social media. As
the ombudsperson, I worked with the students to review common myths about
personal gossip and its potential impact on their professional lives. For the session,
I designed three classroom case studies based on the following scenarios: (1) a
student breaching a client’s confidentiality on social media; (2) a student making
unprofessional comments about a worker during a clinical placement; and (3)
students gossiping about a classmate with special needs. The students discussed
the harm caused by each of these breaches, as well as more professional alternative
approaches in these situations. Finally, they explored positive options to use social
media for professional connections. As a follow-up to the session, the students,
faculty, and ombudsperson decided to collaborate to create best practices guide-
lines that can offer support in the future.
Action items
While developing protocols and intervening in cases of cyberbullying and other
unfair treatment are important aspects of the ombudsperson’s role, the function
also focuses on prevention through initiatives that actively cultivate healthy online
communication. In our annual report for 2016–2017, the Office of the Student
Ombuds (OSO) at the University of Alberta made the following recommenda-
tion, which has been endorsed by our Senate:
Furthermore, the OSO has developed A Guide to Healthy Social Media Usage,
delivers workshops on best practices in social media usage, and offered a summary
presentation of the guide at a recent Student Advisors’ Conference.
The fairness lens 161
Some additional practical suggestions are outlined as follows (see also Hoover,
2003; Jones & Scott, 2012; UNESCO, 2014; Walker, 2014):
References
Behrens, R. (2017). Being an ombudsman in higher education: A comparative study.Vienna, Aus-
tria: European Network of Ombudsmen in Higher Education.
Crean, F. (2016). The fairness lens in a changing landscape. Retrieved from www.oct.ca//
media/PDF/College%20Conference%202016%20Workshop%20PDF/Series%202/
The%20Fairness%20Lens%20in%20a%20Changing%20Landscape.pdf
Europe: Students call for a global ombudsman. (2009, February 15). University World News,
63 [online edition].
Hollis, L. (2016). Canary in the mine: Ombuds as first alerts for workplace bullying on
campus. Journal of the International Ombudsman Association, 9(1), 23–31.
Hoover, L. (2003). Developing a communication protocol. University of California
David Developing Departmental Protocols, 4(1). Retrieved from www.campus-adr.org/
CMHER/print/hoover4_1.pdf
Jones, J. C., & Scott, S. (2012). Cyberbullying in the university classroom: A multiplicity of
issues. In L. A. Wankel & C. Wankel (Eds.), Misbehavior online in higher education: Cutting-
edge Technologies in Higher Education (Volume 5, pp. 157–182). Bingley, UK: Emerald
Group Publishing Limited.
Ombudsman Saskatchewan. (2016). What is fairness? Retrieved from www.ombudsman.
sk.ca/uploads/document/files/what-is-fairness-feb-2016-en.pdf
UNESCO. (2014). Paris Declaration calls for renewed emphasis on media and information
literacy in the digital age. In Focus. [online article].
Walker, C. (2014). Cyberbullying redefined: An analysis of intent and repetition. Interna-
tional Journal of Education and Social Science, 1(5), 59.
12
DESIGNING HEALTHY AND
SUPPORTIVE CAMPUS
COMMUNITIES TARA BLACKDESIGNING HEALTHY CAMPUS COMMUNITIES
Tara Black
In recent years, there has been a growing movement among Canadian higher
education institutions to enhance students’ and faculty’s state of well-being – since
well-being is unquestionably impacted by the settings in which people learn,
work, and live. The release of the Okanagan Charter: An International Charter for
Health Promoting Universities and Colleges (2015) provides further impetus for uni-
versities to focus on this settings-based approach, calling on higher education
institutions to embed health into all aspects of campus culture: across administra-
tion, operations, and academic mandates. Consistent with that rationale, Simon
Fraser University (SFU)1 has focused on executing forward-thinking, healthy,
campus community efforts. These efforts are worth highlighting, given their
potential links with (and opportunity for the development of) upstream anti-
bullying strategies nationwide.
In first designing healthy and supportive campus communities, the Okanagan
Charter recommends creating supportive environments and generating thriv-
ing communities to promote a culture of well-being. As the Charter points out,
higher education institutions are uniquely positioned to develop and model
thriving communities.They can cultivate an individual’s well-being through their
transformational teaching and learning environments: inspiring students, staff, and
faculty to become healthier and more engaged citizens and leaders. A number of
Canadian institutions, including SFU, have formally adopted the Charter, there-
fore, at the Presidential level.
SFU, specifically, has implemented a whole-campus settings approach and suc-
cessfully created a more healthy and supportive community on site. The Healthy
Campus Community (HCC) initiative at SFU has focused on facilitating collec-
tive, systemic, and innovative action for well-being to improve its campus culture
and environments. This goal has been addressed through action areas, including:
Designing healthy campus communities 163
policies and processes, learning and working environments, physical spaces, and
services. The vision behind the initiative is as follows: “Simon Fraser University is
a healthy campus community where the people, programs, practices, policies and
spaces foster well-being, supporting campus members to thrive and succeed at
SFU and beyond” (SFU Healthy Campus Community, 2014). The HCC initia-
tive is facilitated by SFU’s Health Promotion team and, ultimately, aims to impact
prescribed student and faculty health outcomes, such as: thriving, sense of com-
munity, social connection, resilience, and social, physical, and emotional health.
This has all been, or sought to be, achieved through the settings and systems-
defined approaches.
While no one-size-fits-all intervention can effectively lead to more supportive
campus communities – given the complex nature of higher education institutions –
it is through such comprehensive and innovative projects that real differences
have been shown to be enacted in a system. SFU’s whole-campus emphasis has
catalysed comprehensive action through the engagement of diverse campus
stakeholders outside of traditional health fields, drawing attention to the role that
all departments and faculties have in impacting both individual and community
well-being. Its project engagement has intentionally focused on building relation-
ships and gaining individual and institutional commitment from all levels of the
university (from students up to SFU’s President and executive team). Addition-
ally, in order to develop targeted action on key elements of the campus setting,
strategic partnerships have been established with key campus stakeholders, such as
the Teaching and Learning Centre, Senate and Academic Services, Simon Fraser
Student Society, and Facilities Services.
SFU’s HCC initiative has already resulted in the development of a number of
programs that contribute to a supportive campus culture. The learning environ-
ment, for example, was affected, as it was identified early on by the university as
having a central role in students’ experiences, with a powerful ability to impact
their well-being (either positively or negatively). Two examples of such potential
negative impacts are stress and isolation – and the prevalence of both stress and
isolation in higher education has been increasing among higher education stu-
dents (Robotham & Julian, 2006). In the most recent National College of Health
Assessment Data (ACHA, 2016), 63% of SFU students reported feeling exhausted
(with a national average of 65%), 81% felt overwhelmed by all they had to do
(with the national average at 89%), over 63% reported overwhelming anxiety at
least once in the last 12 months (compared to a national average of 65%), and 64%
felt lonely (vs. the national average of 67%). Therefore, much like other Canadian
universities, SFU does manifest similar issues, although at consistently lower aver-
ages than at a national level.
One source of such stress (anxiety) and isolation can be caused by student,
staff, and faculty experiences with bullying and cyberbullying on campus, both
of which can have similar effects to mental and emotional health (Blizard, 2014;
Cassidy, Faucher, & Jackson, 2014, this volume; Celep & Konalki, 2013; Clark,
164 Tara Black
Werth, & Ahten, 2012; Faucher, Cassidy, & Jackson, 2015; Faucher, Jackson, &
Cassidy, 2014; Hollis, 2012). A way to generate more positive effects, as exem-
plified by SFU, was through the provision of supportive environments. In that
regard, university professors had the opportunity to create supportive classroom
conditions by building a positive, inclusive, and welcoming classroom culture by
establishing a tone of respect. They also contributed to building social connec-
tions among students through team and group-based activities, assignments, and
grading. This learning environment focus evolved through a partnership estab-
lished between SFU’s Health Promotion Team and the Teaching and Learning
Centre, in which professors were involved in the development of the Well-being in
Learning Environments program.The purpose was to engage instructors in creating
supportive learning environments through teaching pedagogy, as well as course
design and delivery.
The program itself embodies principles of participatory action, collaboration,
and asset-based approaches that build on actions and activities (which can create
conditions for well-being). A number of conditions for well-being in learning
environments were identified through a literature review and stakeholder inter-
views, with positive examples, tools, and strategies made available on a website. An
annual event was developed to create a platform for professors to share strategies
and learn from each other’s examples.
In addition to increasing awareness and capacity amongst professors, there have
also been efforts to engage staff through dialogue sessions about how they, in
their various capacities, can contribute to a culture of well-being on campus. For
instance, the staff student advisors participated in a session that drew attention to
the opportunity they have to create positive, supportive, and respectful environ-
ments, and to impact the emotional wellness of the students with whom they
interact. Students have also been integrally involved in all aspects of SFU’s Healthy
Campus Community initiative, and a Student Health Advisory Committee has
been working to engage students and student leaders across campus to consider
their role in creating a healthier, collaborative community.
A consideration of health in all policies has been established in the health
promotion field as a key action area (de Leeuw, Clavier, & Breton, 2014); how-
ever, few examples exist as to how this strategy can be applied in the context
of higher education. SFU’s Health Promotion team formed a partnership with
the Associate Registrar, engaging stakeholders, in a collaborative process, to
develop a tool by which universities could apply a well-being lens to policy
development and review. The tool, Well-being through SFU Policies & Procedures:
A Guide for Action, provides a framework that intentionally considers how poli-
cies and procedures impact campus well-being when reviewing or creating
new policies and procedures. Overarching principles were established, suggest-
ing that all aspects of these policies and procedures should embody a culture
of respect and support. Guidelines, such as ensuring the tone and content of
Designing healthy campus communities 165
the university’s guidelines are positive, supportive, and respectful, and using
inclusive language when writing such documents, are examples of how such a
culture may be fostered.
The guide also recommends that the application of policies and procedures
should set a positive, respectful, and supportive tone within a learning environ-
ment (as opposed to being punitive). This application should be seen as an exten-
sion of students’ formal education, using discussions with students as teachable
moments that contribute to their learning and development.
Despite this positive outreach, there remain many opportunities at SFU to con-
tinue to increase institutional will and action, as based on whole-campus meth-
ods. It is promising that SFU, however, among other institutions, is beginning to
take notice and prioritize Healthy Campus Community efforts. Although more
institutions are taking action, published studies are still sparse. To date, minimal
focus has been spent on evaluating the impact of bullying/cyberbullying on cam-
pus culture/wellness specifically; instead, attention has been given more substan-
tially to overall campus community wellness, wherein “it is widely accepted that
health and well-being are essential elements for effective learning” (El Ansari &
Stock, 2010, p. 2). Campus communities thrive when attention is paid to the well-
being of their students, instructors, staff, and others in a healthy campus culture –
what has been missed is that, as a result, bullying/cyberbullying decreases as well
(Cassidy et al., 2014; Clark et al., 2012; DeSouza, 2010; Faucher et al., 2014, 2015;
Hinduja & Patchin, 2012; Hollis, 2012; Knepp, 2012).
There is still a lot to be learned about systemic and settings approaches to health
and well-being in higher education. While one can appreciate that the results of
settings approaches are often long-term and challenging to measure (given the
complex nature of higher education institutions), at SFU specifically, there are
further opportunities for students to engage with these issues. For example, on
the SFU Healthy Campus Community website, there are materials and resources
which address such matters. Some of these include: the healthy university commu-
nity; the rationale for well-being in learning communities (Dhaliwal & Stanton,
2014); overcoming university stress and academic pressures; well-being through
policies and procedures; and a video, “Designing Healthy Campus Communities:
Enhancing Student Well-being & Academic Success.” In addition, on the SFU
Safety and Risk Services website, other personal safety guides and workshops of
relevance to wellness are listed for students, faculty, and staff alike to access (SFU
Safety & Risk Services, n.d.).
In conclusion, it has been shown that there is a connection to be made
between healthy campus community efforts that aim to create supportive, con-
nected, thriving people and communities – in that they create a culture of campus
wellness – and the prevention of bullying/cyberbullying. This link presents an
opportunity for shared learning and collaboration for campus anti-bullying and
healthy campus community strategies and action.
166 Tara Black
Note
1 For context, Simon Fraser University is a comprehensive university with 30,000 stu-
dents, 6,500 staff and faculty, and three campuses, located in British Columbia, Canada.
References
American College Health Association – National College Health Assessment II (ACHA-
NACHA II). (2016). Canadian Reference Group: Executive Summary [online]. Retrieved
from http://www.acha-ncha.org/docs/ncha-ii%20spring%202016%20canadian%20
reference%20group%20executive%20summary.pdf
Blizard, L. M. (2014). Faculty members’ perceived experiences and impact of cyberbullying from
students at a Canadian university: A mixed methods study. Ed.D. dissertation, Simon Fraser
University: Burnaby, BC.
Cassidy,W., Faucher, C., & Jackson, M. (2014).The dark side of the ivory tower: Cyberbul-
lying of university faculty and teaching personnel. Alberta Journal of Educational Research,
60(2), 279–299.
Cassidy,W., Faucher, C., & Jackson, M. (this volume).“You need a thick skin . . .”: Impacts of
cyberbullying in Canadian universities. In W. Cassidy, C. Faucher, & M. Jackson (Eds.),
Cyberbullying at university in international contexts (pp. 112–125). Oxford, UK: Routledge.
Celep, C., & Konalki, T. (2013). Mobbing experiences of instructors: Causes, results, and
solutions suggestions. Educational Sciences:Theory & Practice, 13(1), 193–199.
Clark, C. M., Werth, L., & Ahten, S. (2012). Cyber-bullying and incivility in the online
learning environment, Part 1: Addressing faculty and student perceptions. Nurse Educa-
tor, 37(4), 150–156.
Dhaliwal, R., & Stanton, A. (2014). SFU health promotion: Well-being in learning environments
rationale. Burnaby, BC: Simon Fraser University [online].
de Leeuw, E., Clavier, C., & Breton, E. (2014). Health policy – Why research it and how:
Health political science. Health Research Policy and Systems, 12(1), 55–64.
Designing Healthy Campus Communities: Enhancing Student Well-being and Academic Success.
(2013). Canadian Mental Health Association, BC Division, & SFU Health Promotion: BC
Healthy Minds/Healthy Campuses. Burnaby, BC: Simon Fraser University [online].
DeSouza, E. R. (2010). Frequency rates and correlates of contrapower harassment in higher
education. Journal of Interpersonal Violence, 48(11), 1–27.
El Ansari, W., & Stock, C. (2010). Is the health and wellbeing of university students asso-
ciated with their academic performance? Cross sectional findings from the United
Kingdom. International Journal of Environmental Research and Public Health, 7(2), 509–527.
Faucher, C., Cassidy,W., & Jackson, M. (2015). From the sandbox to the inbox: Comparing
the acts, impacts, and solutions of bullying in K-12, higher education, and the work-
place. Journal of Education and Training Studies, 3(6), 111–125.
Faucher, C., Jackson, M., & Cassidy,W. (2014). Cyberbullying among university students: Gen-
dered experiences, impacts, and perspectives. Education Research International, 2014, 1–10.
Hinduja, S., & Patchin, J. W. (2012). School climate 2.0: Preventing cyberbullying and sexting one
classroom at a time. Thousand Oaks, CA: Corwin Press.
Hollis, L. P. (2012). Bully in the ivory tower: How aggression and incivility erode American higher
education. Wilmington, DE: Patricia Berkly.
Knepp, K. A. F. (2012). Understanding student and faculty incivility in higher education.
The Journal of Effective Teaching, 12(1), 33–46.
Designing healthy campus communities 167
Okanagan Charter: An international charter for health promoting universities and colleges.
(2015). International Conference on Health Promoting Universities & Colleges. Kelowna, BC
[online].
Robotham, D., & Julian, C. (2006). Stress & the higher education student: A critical review.
Journal of Further Higher Education, 30(2), 107–117.
SFU Healthy Campus Community. (n.d.). Well-being through SFU policies & procedures:
A guide for action. Burnaby, BC: Simon Fraser University [online].
SFU Healthy Campus Community. (2014). SFU vision for a healthy community. Burnaby, BC:
Simon Fraser University [online].
SFU Safety & Risk Services. (n.d.). Personal safety guides. Burnaby, BC: Simon Fraser Uni-
versity [online].
13
PREVENTIVE MEASURES AGAINST
CYBERBULLYING AT A UNIVERSITY
IN JAPAN KENICHI KANAYAMA AND SHINJI KURIHARAPREVENTIVE MEASURES AT A UNIVERSITY IN JAPAN
Screening test
Every year, all undergraduate and graduate students participate in the UPI, a
mental health screening test for university students, developed by the University
170 Kenichi Kanayama and Shinji Kurihara
of Tokyo and the University of Kyoto. This mandatory system helps University
A keep track of its students’ mental health status from matriculation to gradua-
tion. The test screens for general mental illnesses, depressive states, and suicide
ideation/intentions.
Question 1. What would happen if you spread messages on social media such as
“Ms. B works at a brothel” or “C was caught shoplifting”?
Answer:You could be accused of the crime of defamation (libel); up to three years
of imprisonment or a fine of up to 500,000 JPY.
Question 2. What would happen if you posted “D is annoying” or “E is disgust-
ing” on a group chat with other students in your seminar?
Answer: You could be accused of the crime of insult; up to 30 days of detention
or a fine of up to 10,000 JPY.
This course informs students that posting such abusive comments online can sub-
ject them to criminal responsibility.We believe that these educational efforts deter
students from posting similar abusive comments, thereby reducing cyberbullying
and cybercrime.
faculty and non-faculty lecturers. Procedures such as the following are discussed:
when a student receives an abusive post online, he or she will be asked by a coun-
sellor to take a screenshot of the image.The counsellor then presents a photocopy
of this saved image to the cyber police as a piece of evidence, so that the police
may investigate further, or perhaps take the case to trial. Student feedback follow-
ing the class reinforces the deterrence factor, as noted by this student: “By trying
out what I learned from the class, I was able to stop cyberbullying.”
References
Kanayama, K. (2014).Yōshiengakusei taishō no piasapōto kenshū puroguramukaihatsu no
tameno kisotekikenkyū [Basic research for developing peer support training program
for students with mental health support needs]. Japanese Annals of Peer Support, 11, 1–10.
172 Kenichi Kanayama and Shinji Kurihara
were observed despite the fact that the program did not contain any specific
cyberbullying elements.
In Finland, the KiVa program has also reported success in reducing cyberbul-
lying (Williford et al., 2013). KiVa aims to reduce bullying by promoting empa-
thy, self-efficacy, and anti-bullying attitudes in bystanders. The program involves
universal actions (primary intervention): classroom lessons that raise awareness of
bullying and promote empathy. These are combined with indicated actions (sec-
ondary intervention): guidance on how to react to bullying cases, including peer
support for the victim and discussions with bystanders on how to support the tar-
get. Evaluation showed that there was significantly less cyber-victimization among
an intervention group who received KiVa training compared to a control group
(Williford et al., 2013). Specific aspects of the training may have been respon-
sible for this effect, including lessons on respect during cyber-communication
and computer-simulated scenarios of cyberbullying events.
Organizational researchers have not yet evaluated secondary interventions on
resources that help employees cope when faced with traditional workplace bul-
lying (Hershcovis et al., 2015). However, theoretical frameworks which specify
the development of workplace bullying and detrimental computer-mediated
communication have both emphasized conflict escalation as an antecedent factor
(Friedman & Currall, 2003; Zapf & Gross, 2001). It has been suggested, therefore,
that conflict de-escalation could be a valuable skill that allows employees to cope
with negative acts before they develop into protracted conflicts (Branch, Ram-
say, & Barker, 2013). A component of conflict de-escalation training could involve
guidance on informal resolution strategies, as studies have reported that victims
may be cautious about reporting through official channels, often preferring to
cope informally using their own resources and support networks (D’Cruz &
Noronha, 2010; Zapf & Gross, 2001). Yet, the responsibility to resolve conflicts
should not lie solely with victims. A recent study exploring leadership behaviour
after bullying events suggested that managers could also benefit from conflict
management training (Woodrow & Guest, 2017).
At present, we are not aware of tertiary interventions that have been evalu-
ated using quantitative methods. Mediation is often cited as a potential method
for addressing traditional workplace bullying (Saam, 2010), although its efficacy
is not yet fully understood. Slonje, Smith, and Frisen (2013) state that an impor-
tant component of youth bullying programs involves helping the bully to under-
stand the consequences of their actions. The authors comment that if this is true,
then helping cyberbullies realize the extent of their actions is particularly impor-
tant, as they appear less remorseful than traditional bullying perpetrators (Slonje,
Smith, & Frisen, 2012). Thus, mediation for workplace cyberbullying cases may
promote understanding and remorse. Counselling for victims is another method
that falls under the bracket of tertiary interventions. Online modes of counsel-
ling are used in employee assistance programs and, intuitively, these methods may
176 Samuel Farley and Iain Coyne
provide an outlet for cyberbullying victims. One question is whether they can
provide the same level of support as face-to-face counselling, however? Yet, meta-
analytic evidence suggests little difference in the latter’s effectiveness (Barak, Hen,
Boniel-Nissim, & Shapira, 2008).
At the start of the chapter, we asked what universities could do to limit the
risks of workplace cyberbullying. Given the lack of dedicated research on work-
place cyberbullying intervention methods, we sought to provide the best avail-
able evidence on methods from related disciplines, providing university employees
with an idea of what might work. The most compelling research to date has
evaluated primary interventions, which is perhaps unsurprising given their focus
on prevention. Policies and legislation are two factors that were outside the scope
of this chapter, but they should nonetheless inform intervention efforts alongside
the practitioner’s own expertise, the views of those affected by cyberbullying and
knowledge from the local context. If the local context is the university, practi-
tioners should seek to understand the nature and source of the cyberbullying,
as this context may enable a particular form of behaviour such as abuse towards
academics via social media. In summary, further empirical research is needed to
develop and evaluate cyberbullying interventions within the university context;
yet, we hope the ideas presented in this chapter provide an initial starting point
for researchers and practitioners to evaluate and implement cyberbullying policies
at the university level.
References
Barak, A., Hen, L., Boniel-Nissim, M., & Shapira, N. A. (2008). A comprehensive review
and a meta-analysis of the effectiveness of internet-based psychotherapeutic interven-
tions. Journal of Technology in Human Services, 26(2–4), 109–160.
Branch, S., Ramsay, S., & Barker, M. (2013).Workplace bullying, mobbing and general har-
assment: A review. International Journal of Management Reviews, 15(3), 280–299.
Briner, R. B. (2012). Developing evidence-based occupational health psychology. In J.
Houdmont, S. Leka, & R. R. Sinclair (Eds.), Contemporary occupational health psychology
(pp. 36–56). Chichester, UK: Wiley-Blackwell.
Briner, R. B., Denyer, D., & Rousseau, D. M. (2009). Evidence-based management: Con-
cept cleanup time? The Academy of Management Perspectives, 23(4), 19–32.
Coyne, I., & Farley, S. (this volume). Cyberbullying within working contexts. In W. Cas-
sidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international contexts
(pp. 80–96). Oxford, UK: Routledge.
D’Cruz, P., & Noronha, E. (2010). Protecting my interests: HRM and targets’ coping with
workplace bullying. The Qualitative Report, 15, 507–534.
Friedman, R. A., & Currall, S. C. (2003). Conflict escalation: Dispute exacerbating elements
of e-mail communication. Human Relations, 56(11), 1325–1347.
Gradinger, P., Yanagida, T., Strohmeier, D., & Spiel, C. (2016). Effectiveness and sustain-
ability of the ViSC social competence program to prevent cyberbullying and cyber-
victimization: Class and individual level moderators. Aggressive Behavior, 42(2), 181–193.
Intervening against workplace cyberbullying 177
Hershcovis, S. M., Reich, T. C., & Niven, K. (2015). Workplace bullying: Causes, consequences,
and intervention strategies. SIOP White Paper Series, Society for Industrial and Organiza-
tional Psychology, UK, London.
Hodgins, M., MacCurtain, S., & Mannix-McNamara, P. (2014). Workplace bullying and
incivility: A systematic review of interventions. International Journal of Workplace Health
Management, 7(1), 54–72.
Leiter, M. P., Day, A., Gilin-Oore, D., & Laschinger, H. K. (2012). Getting better and stay-
ing better: Assessing civility, incivility, distress, and job attitudes one year after a civility
intervention. Journal of Occupational Health Psychology, 17(4), 425–434.
Leiter, M. P., Laschinger, H. K., Day, A., & Oore, D. (2011). The impact of civility interven-
tions on employee social behavior, distress, and attitudes. Journal of Applied Psychology,
96(6), 1258–1274.
Park, Y., Fritz, C., & Jex, S. M. (2015). Daily cyber incivility and distress: The moderating
roles of resources at work and home. Journal of Management, 16(4), 457–467.
Saam, N. J. (2010). Interventions in workplace bullying: A multilevel approach. European
Journal of Work and Organizational Psychology, 19(1), 51–75.
Slonje, R., Smith, P. K., & Frisén, A. (2012). Processes of cyberbullying, and feelings of
remorse by bullies: A pilot study. European Journal of Developmental Psychology, 9, 244–259.
Slonje, R., Smith, P. K., & Frisén, A. (2013). The nature of cyberbullying, and strategies for
prevention. Computers in Human Behavior, 29(1), 26–32.
Woodrow, C., & Guest, D. E. (2017). Leadership and approaches to the management
of workplace bullying. European Journal of Work and Organizational Psychology, 26(2),
221–233.
Williford, A., Elledge, L. C., Boulton, A. J., DePaolis, K. J., Little, T. D., & Salmivalli, C.
(2013). Effects of the KiVa antibullying program on cyberbullying and cybervictimiza-
tion frequency among Finnish youth. Journal of Clinical Child & Adolescent Psychology,
42, 820–833.
Zapf, D., & Gross, C. (2001). Conflict escalation and coping with workplace bullying:
A replication and extension. European Journal of Work and Organizational Psychology,
10(4), 497–522.
PART IV
Policy
15
CYBERBULLYING IN THE
AUSTRALIAN UNIVERSITY
CONTEXT COLETTE LANGOS AND MARK GIANCASPROCYBERBULLYING IN THE AUSTRALIAN UNIVERSITY CONTEXT
Introduction
Bullying is not a phenomenon limited by age. Although there has been an empha-
sis on exploring the concept in relation to school-aged children (Cross et al.,
2009; Olweus, 1978), studies examining adult bullying in the workplace inform
us that such conduct transcends the context of youth (House of Representatives
Standing Committee on Education and Employment, Parliament of Australia,
2012; Leymann, 1990). Cyberbullying, too, does not abate when students gradu-
ate from high school (Phippen, 2011; Privitera & Campbell, 2009). While less
research has focused on cyberbullying in the post-secondary education context,
preliminary findings from studies conducted in various countries indicate that it
occurs within colleges and universities, as well (Faucher, Jackson, & Cassidy, 2014).
Research examining the incidence of cyberbullying in an Australian university
context is in its infancy, however, and – as such – published studies are not gener-
alizable.They do, however, provide us with useful “prevalence snapshots”, suggest-
ing that a significant percentage of students studying at Australian universities are
exposed to the conduct. A 2010 study surveying 134 students of the University of
New South Wales reported that 62% of respondents experienced cyberbullying
in the past year, and that 40% of respondents had personally cyberbullied oth-
ers (Zhang, Land, & Dick, 2010). In 2012, a study surveying 528 undergraduate
students from an Australian university reported that 11.6% of participants had
been victims of cyberbullying in the preceding 12 months (Wensley & Campbell,
2012). Lack of a uniform definition, standardized measurement techniques, and
variance in survey design make it difficult to determine the prevalence of cyber-
bullying accurately; yet, with 1.4 million students studying at Australian universi-
ties nationwide (Norton, 2016), it would be useful to gain greater clarity on the
rate of incidence by way of future research.
182 Colette Langos and Mark Giancaspro
Part 1 of this chapter explains the research method employed in examining these
questions and the results obtained. Furthermore, the authors make several sug-
gestions to explain the somewhat paradoxical findings. Part II considers how the
findings may impact law and policy reform, and the authors make a series of
recommendations in that regard, as well.
Part I. Method
Participants
Participants self-selected to complete an online survey.This survey was distributed
through a research panel provider to an enlisted group of student volunteers: ran-
domly selected from a sample of its registered members, as drawn from various
Cyberbullying in the Australian university context 183
Measures
The authors formulated a 22-item questionnaire consisting of closed-ended ques-
tions. The survey provided participants with a description of cyberbullying1 and
a list of various cyberbullying behaviours before respondents were asked prelimi-
nary questions relating to age, gender, and frequency of victimization. The next
part of the survey required respondents to indicate whether they have experi-
enced any of the 10 different cyberbullying behaviours listed (Table 15.2) and
then to rate, on a Likert scale (scale range of 1 to 5, with 1 being not harmful to
5 being the most serious harm), the level of harm they actually experienced as a
result of exposure. Information describing each level of harm on the Likert scale
was provided.2 Participants were then asked to consider the same list of cyberbul-
lying behaviours and to rate, on a Likert scale, the level of harm (scale range of
1 to 5, with 1 being not harmful to 5 being the most severe harm), they think
would be associated with each of the behaviours. The final part of the survey
asked respondents about their awareness and understanding of criminal laws, as
well as university policies governing cyberbullying.
Results
Frequency of cyberbullying
Table 15.1 reflects how often respondents were cyberbullied after turning 18 years
of age.
How often have you been cyberbullied since turning 18 years of age? Responses
Criminal law
Most respondents were not aware of any criminal laws regulating cyberbullying
(61.8%). Of those who were aware (38.2%), most were aware that both state and
federal laws may regulate instances of cyberbullying. However, half indicated that
they were confused about precisely which cyberbullying behaviours were con-
sidered “criminal” behaviour. Of the 213 respondents, an overwhelming majority
(n = 204) indicated that lawmakers should do more to educate people about laws
that apply to instances of cyberbullying. The majority of respondents (n = 180)
indicated that there should be one specific cyberbullying offence which gov-
erns serious instances of cyberbullying, instead of various laws regulating different
kinds of cyberbullying behaviours.
University policy
The majority of participants (57.1%) had no knowledge of a behaviour code
or university policy that addresses cyberbullying. Of those who knew of such
a policy (n = 92), most indicated that the cyberbullying policy was effective.
TABLE 15.2 The Shades of Harm Associated With Cyberbullying
(Continued)
186 Colette Langos and Mark Giancaspro
TABLE 15.2 (Continued)
General discussion
Empirical studies examining the implications of cyberbullying provide us with
a growing evidence base that exposure can be potentially devastating: that vic-
timization may result in an array of negative health implications for its targets
(Faucher et al., 2014). Responses from participants in this survey echo this con-
clusion, with 95.3% indicating that they consider cyberbullying to be a serious
issue. Additionally, in line with scholarship in this field, it was found that almost
86% of respondents were targets of cyberbullying before turning 18. This dem-
onstrates that cyberbullying continues across multiple educational contexts and
fields; it does not cease once students leave high school. Moreover, victimization
prior to turning 18 may be a determinant of participants’ recognition of cyberbul-
lying as being a serious issue.
Cyberbullying in the Australian university context 187
Frequency of victimization
Most respondents indicated that they experienced cyberbullying “once or
twice” or “a few times” (Table 15.1). However, 14 (or 6.6%) of the 213 respond-
ents were victimized on a “monthly” or “weekly or more frequent” basis. This
percentage is higher than findings published to date (MacDonald & Roberts-
Pittman, 2010) – yet, further cross-cultural research is required to provide us
with a more comprehensive understanding as to whether this higher frequency
of victimization is unique to the Australian post-secondary context or also per-
sists in other contexts.
The disparity in our findings on harm experienced and perceived harm may be
explained on a number of bases. First, it is possible that human error is to blame.
Respondents may have misunderstood the survey items. However, the authors
consider this unlikely for two reasons: (1) the questions were worded clearly and
unambiguously, and there appears to be very little scope for misinterpretation; and
(2) the marked inverse trend in survey responses in regards to harm based on lived
experience and perceived harm associated with each cyberbullying behaviour. No
notable outliers were identified. There is, therefore, nothing suggestive of error in
the interpretation of the scoring scale.
Cyberbullying in the Australian university context 189
Second, the study may have been affected by the social desirability bias: the
tendency of respondents to self-report questionnaires to give socially approved
answers about oneself (Weiten, 2016, p. 50). The bias is particularly prevalent
when a questionnaire canvasses sensitive issues (Weiten, 2016, p. 50). Cyberbully-
ing and its associated harms are certainly sensitive issues, and so respondents may
have sought to answer in a manner which made them appear more “resilient”.
This theory is plausible, although not appropriately convincing, given that the
likelihood of socially desirable responding decreases in proportion to the level of
anonymity offered (Randall & Fernandes, 1991, p. 813). The online survey in this
study was entirely anonymous and administered electronically, such that there was
no “human” interaction whatsoever.
It is also of note that there were many more participants who responded to the
question asking them to rate the level of harm they perceived would be associ-
ated with exposure to each form of cyberbullying vs. respondents who identified
as victims having actually experienced any of the listed behaviours. It is possible
that those respondents who had not experienced a particular form of cyberbul-
lying overestimated the impact of victimization, therefore skewing the responses
to that factor.
Criminal law
There is no single body of criminal law governing the whole of Australia (Findlay,
Odgers, & Yeo, 2009, p. 7). Australian states and territories are responsible for their
own criminal laws. The Commonwealth government may enact federal criminal
legislation pursuant to the powers vested in it by virtue of the Commonwealth
Constitution (Australian Constitution s 51).
At present, there is no specific cyberbullying offence. Rather, a complex matrix
of state and federal laws criminalize cyberbullying behaviours as they fall within
the scope of existing offences (Langos, 2014). For example, non-consensual dis-
tribution of visual content may be regulated by state “filming offences” (Part 5A
Summary Offences Act 1953 (SA)). Equally threatening content may be governed
by state offences, such as “unlawful threats” (s 19 Criminal Law Consolidations
Act 1935 (SA)), “assault” (s 20 Criminal Law Consolidations Act 1935 (SA)), or
190 Colette Langos and Mark Giancaspro
“stalking” (s 19AA Criminal Law Consolidations Act 1935 (SA)). Federal law, too,
may regulate cyberbullying (Australian Constitution s 51(v)). The provision that
has the greatest relevance, so capturing a broad range of cyberbullying behaviours,
governs “harassing, menacing, or offensive” material transmitted electronically
(s 414.17 Criminal Code Act 1995 (Cth)).
Community education
Interestingly, most of the respondents were not aware of any criminal laws regu-
lating cyberbullying. Of those respondents who were aware of existing cyberbul-
lying laws, half indicated that they were confused about which cyberbullying
behaviours amount to criminal conduct. Of the 213 respondents, 204 indicated
that lawmakers should do more to educate people about the laws that apply to
instances of cyberbullying. This finding suggests that community education sur-
rounding the relationship between cyberbullying and criminal law is warranted.
University policy
The present study also provides an informative basis for cyberbullying policy
development in the post-secondary education context.
Recommendations
This pioneering research is the first Australian study to explore whether all
cyberbullying behaviours are equally harmful. Furthermore, it explores whether
university students have knowledge of existing criminal laws which govern cyber-
bullying, and whether lawmakers ought to implement strategies aimed at better
educating the community as to those laws.
Given the scarcity of empirical data surrounding the shades of harm associated
with particular forms of cyberbullying, data from this study has the potential to
influence law reform in this area. It provides decision-makers with a preliminary
evidence base. Based on these discussions, it would be opportune for lawmakers
to consider:
The data also provide us with useful information surrounding university students’
awareness of institutional policies that prohibit cyberbullying, whether such poli-
cies may act as an effective deterrent, and whether implementation of an anony-
mous online reporting system could encourage reporting by victims, perpetrators,
and bystanders. To that end, post-secondary institutions would be prudent to
consider:
Limitations
These findings must be considered in light of the limitations of the study.Although
the sample of survey participants was drawn randomly from a research panel pro-
vider whose membership base comprised university students Australia-wide, data
are not generalizable based on the sample size. Further research drawing upon a
larger sample is required to provide a more comprehensive data set. Given the lack
of Australian research examining the prevalence of cyberbullying in this context,
Cyberbullying in the Australian university context 195
Acknowledgements
The authors would like to acknowledge the Law Foundation of South Australia
for providing the authors with funding support for this exploratory study.
Notes
1 Cyberbullying was described as “bullying that takes place using electronic technology
such as cell phones, computers, and tablets as well as communication tools including
social media sites, text messages, chat and websites”.
2 A rating of ‘1’ indicates that the behaviour was not harmful. A rating of ‘2’ indicates that
the behaviour resulted in minimal harm (emotional reactions you felt were not long
lasting such as momentary fear, grief, anger). A rating of ‘3’ indicates that the behaviour
resulted in some emotional harm (anger, anxiety, fear, grief, humiliation for some time (a
few weeks)). A rating of ‘4’ indicates that the behaviour resulted in harm (either emo-
tional harm where you felt negative emotions such as anger, anxiety, fear, grief, humilia-
tion for some time (a few months); or where you were physically harmed). A rating of ‘5’
indicates that the behaviour resulted in significant harm (either emotional harm where
you felt ongoing negative emotions such as anger, anxiety, fear, grief, humiliation; or
where you self-harmed as a result of the behaviour).
3 Note, as the harm scale defined a rating of level 1 as ‘not harmful’ and level 2 as ‘minimal
harm’ akin to fleeting emotional reactions, harm associated with these levels is construed
as negligible.
References
Campbell, M. (2015). Policies and procedures to address bullying at Australian universi-
ties. In H. Cowie & C. A. Myers (Eds.), Bullying among university students: Cross-national
perspectives (pp. 157–171). London: Routledge.
Cowie, H., Bauman, S., Myers, C.-A., Porhola, M., & Almeida, A. (2013). Cyberbullying
amongst university students: An emergent cause for concern? In P. K. Smith & G. Stef-
fgen (Eds.), Cyberbullying through the new media: Findings from an international network
(pp. 165–177). East Sussex: Psychology Press.
Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L., Thomas, L., & Data Anal-
ysis Australia. (2009). Australian Covert Bullying Prevalence Study. Joondalup, Australia:
Child Health Promotion Research Centre, Edith Cowan University.
Cunningham, C. E., Chen, Y., Vaillancourt, T., Rimas, H., Deal, K., Cunningham, L. J., &
Ratcliffe, J. (2015). Modeling the anti-cyberbullying preferences of university students:
Adaptive choice-based conjoint analysis. Aggressive Behavior, 41(4), 369–385.
Faucher, C., Cassidy,W., Jackson, M.,Waterhouse,T., & MacDonald, L. (2014). Cyberbullying
at Canadian universities: Linking research, policy and practice. Parameters of the Issue: Work-
ing Paper 1. Simon Fraser University.
Faucher, C., Jackson, M., & Cassidy,W. (2014). Cyberbullying among university students: Gen-
dered experiences, impacts and perspectives. Education Research International, 2014, 1–10.
196 Colette Langos and Mark Giancaspro
Findlay, M., Odgers, S., & Yeo, S. (2009). Australian criminal justice (4th ed.). South Mel-
bourne: Oxford University Press.
Hatzenbuehler, M. L., Schwab-Reese, L., Ranapurwala, S. I., Hertz, M. F., & Ramirez, M.
R. (2015). Associations between antibullying policies and bullying in 25 states. JAMA
Pediatrics, 169(10), e15241.
House of Representatives Standing Committee on Education and Employment, Parlia-
ment of Australia. (2012). Workplace bullying:We just want it to stop. Canberra: Parliament
of Australia.
Jackson, M., Faucher, C., & Cassidy, W. (this volume). What’s policy got to do with it? The
focus on cyberbullying policy at the university level. In W. Cassidy, C. Faucher, & M.
Jackson (Eds.), Cyberbullying at university in international contexts (pp. 198–211). Oxford,
UK: Routledge.
Kenworthy, A. (2010). One goal, one community: Moving beyond bullying and empower-
ing for life. Bond University Centre for Applied Research in Learning, Engagement,
Andragogy and Pedagogy. Retrieved from https://bond.edu.au/intl/news/44434/
one-goal-one-community-moving-beyond-bullying-and-empowering-life
Langos, C. (2013). Cyberbullying, associated harm and the criminal law. Doctoral thesis, Univer-
sity of South Australia. Retrieved from http://arrow.unisa.edu.au:8081/1959.8/151636
Langos, C. (2014). Regulating cyberbullying: A South Australian perspective. Flinders Law
Journal, 16(1), 73–109.
Langos, C. (2015). Cyberbullying:The shades of harm. Psychiatry, Psychology and Law, 22(1),
106–124.
Leymann, H. (1990). Mobbing and psychological terror at workplaces. Violence and Victims,
5, 119–126.
MacDonald, C., & Roberts-Pittman, B. (2010). Cyberbullying among college students:
Prevalence and demographic differences. Procedia Social and Behavioral Sciences, 9,
2002–2009.
Marsh, L., McGee, R., Hemphill, S. A., & Williams, S. (2011). Content analysis of school
anti-bullying policies: A comparison between New Zealand and Victoria. Health Promo-
tion Journal of Australia, 22(3), 172–177.
Menesini, E., Nocentini, A., & Calussi, P. (2011). The measurement of cyberbullying:
Dimensional structure and relative item severity and discrimination. Cyberpsychology,
Behavior and Social Networking, 14(5), 267–274.
Minor, M. A., Smith, G. S., & Brashen, H. (2013). Cyberbullying in higher education. Jour-
nal of Educational Research and Practice, 3(1), 15–29.
Nocentini, A., Juan, C., Schultze-Krumbholz, A., Scheithauer, H., Ortega, R., & Menesini,
E. (2010). Cyberbullying: Labels, behaviours and definition in three European coun-
tries. Australian Journal of Guidance & Counselling, 20(2), 129–142.
Norton, A. (2016). Mapping Australian higher education.Victoria, Australia: Grattan Institute.
Olweus, D. (1978). Aggression in schools: Bullies and whipping boys. Washington, DC: Hemi-
sphere Publishing.
Ortega, R., Elipe, P., Mora-Merchan, J. A., Genta, M. L., Brighi, A., Smith, P. K., . . . &
Tippett, N. (2012). The emotional impact of bullying and cyberbullying on victims:
A European cross-national study. Aggressive Behavior, 38, 342–356.
Phippen, A. (2011). The online abuse of professionals-research report from the UK safer internet
centre. Plymouth: University of Plymouth.
Privitera, C., & Campbell, M. (2009). Cyberbullying: The new face of workplace bullying?
CyberPsychology and Behavior, 12(4), 395–400.
Cyberbullying in the Australian university context 197
Randall, D., & Fernandes, M. F. (1991).The social desirability bias in ethics research. Journal
of Business Ethics, 10, 805–817.
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandina-
vian Journal of Psychology, 49, 147–154.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyber-
bullying: Its nature and impact in secondary school pupils. Journal of Child Psychology
and Psychiatry, 49(4), 376–385.
Weiten, W. (2016). Psychology:Themes and variations (10th ed.). Boston: Cengage Learning.
Wensley, K., & Campbell, M. (2012). Heterosexual and non-heterosexual young university
students’ involvement in traditional and cyber forms of bullying. Cyberpsychology, Behav-
ior and Social Networking, 15(12), 649–654.
Wierzbicka, A. (2003). Cross-cultural pragmatics: The semantics of human interaction. Berlin:
Mouton de Gruyter.
Zhang, A., Land, A., & Dick, G. (2010, July). Key influences of cyberbullying for university stu-
dents. Paper presented at the Pacific Asia Conference on Information Systems, Taipei,
Taiwan.
16
WHAT’S POLICY GOT
TO DO WITH IT? MARGARET JACKSON, CHANTAL FAUCHER, AND WANDA CASSIDYWHAT’S POLICY GOT TO DO WITH IT?
cyberbullying behaviours (Faucher, Jackson, & Cassidy, 2015). Even so, authors
continue to support the consideration of these factors in developing appropri-
ate cyberbullying policy at the university level; in fact, cultural differences have
been thought important to include as well (Kanetsuna, Aoyama, & Toda, this
volume). Finally, there are also concerns expressed about the need to address
inherent power imbalances, an especially troubling factor often at play with uni-
versity-level cyberbullying.
Pescitelli (this volume) makes an argument in her chapter on LGBTQ post-
secondary students and cyberbullying that is consistent with a rights-based anal-
ysis. She indicates there is a need for administrators to consider both gender
and sexuality when drafting policies and procedures related to online activities
(see also Faucher, Cassidy, & Jackson, this volume). Along with that, there is also
the need to pay attention to possible discrimination/possible homophobia and
transphobia when creating policy. Since LGBTQ individuals have been shown
to experience cyberbullying and harassment more seriously than non-LGBTQ
youth, their needs should be addressed. For example, in one study by Cooper and
Blumfeld (2012), as cited by Pescitelli, LGBTQ youth were shown to experience
much higher levels of depression, and suicidal thoughts and attempts were also
higher than for non-LGBTQ individuals. Therefore, their associated needs are
higher with respect to responses and support. Finally, more generally, there is a
need for sensitivity to overall diversity as well (see also Blizard, this volume).
Overall, then, there are strong arguments made for a rights-based frame to the
policies (Faucher et al., 2015) because of the nature and impacts of cyberbullying
behaviour. In addition, Campbell (2016) argues that all forms of bullying should
be included under the policy frame: physical, verbal, relational, and cyberbullying
(p. 163). In her article entitled, “Human Rights for the Digital Age,” Mathiesen
(2014) argues that there should even be a Declaration of Digital Rights. She sug-
gests that one can use the concept of human rights to provide an ethical frame-
work since ethics are “the well-founded standards of right from wrong” (pp. 2–3),
thus forming moral rights. Furthermore, moral rights can be used as a standard
against which “legal rights can be evaluated or demanded” (p. 3). She states that
“we have human rights because they are needed to protect us from certain kinds
of threat; for example, violence [. . .]” (p. 8).
Mathiesen continues by citing Cohen (1993) that humans also have “a fun-
damental interest in being able to communicate with one another . . . without
the right to access such communications, the right to express oneself is mean-
ingless” (p. 10).
Therefore, here again is an occasion in which different values/different rights
tend to compete: the right to be protected from violence (or from harm) and
the right to freedom of expression, in keeping with Charter rights. The policy’s
role, through legal interpretation, is to determine the balance between the com-
peting values.
What’s policy got to do with it? 201
appropriate one to take place near the beginning of an individual’s arrival at the
university (Jackson, 2015).
A comparison of some of the descriptor findings from examining actual poli-
cies from our Canadian study can be made with a similar study conducted in
Australia by Campbell in 2016. She did an examination of website policies for
universities with the largest enrolments in each state with respect to their listed
bullying policies. She referenced the work of Smith and colleagues (2008) as
being the first researchers to analyse the content of school anti-bullying policies.
They employed four primary categories: the definition of bullying behaviour;
reporting/responding to bullying incidents; recording/reporting/responding to
bullying incidents; and strategies for preventing bullying.
Only seven of the Australian universities’ policies which were examined men-
tioned bullying specifically. For some of the universities the anti-bullying policy
was prominent, clearly set out, and in one place. But for a majority, any mention of
student-to-student bullying was hard to find, which the author argued indicated
a lack of commitment to “real” prevention and intervention of bullying among
the students.
As well, also in Australia, Langos and Giancaspro (this volume) undertook a
pilot study using a survey with randomly selected university students. Two of the
questions enquired first about the students’ understanding of existing criminal law
regulating cyberbullying and, second, about their awareness of university policies
governing cyberbullying. Similar to our Canadian study findings, a majority of
students were unaware of the existence of such university policies. Most were
also unaware of any criminal laws regulating cyberbullying and, in fact, for those
who were aware, there was confusion about which cyberbullying behaviours were
criminal. In that regard, one recommendation emerging from the survey was that
there should be one specific criminal offence of cyberbullying, which clearly
defines the serious behaviours covered. It was also noted that not all cyberbully-
ing behaviours are equally harmful. Along with that discussion, it was suggested
that criminalization was to be seen as only one tool for proactive management of
the behaviour.
On the other hand, the argument found for the perceived efficacy of cyber-
bullying policies came from the students who were aware of existing policies,
and they felt they were successful in that policy directly addressing cyberbullying
would be an effective deterrent. And there is empirical evidence for this per-
ception, argue Langos and Giancaspro, which emerges from several studies. The
recommendation here is that, especially in light of the potential harms of cyber-
bullying behaviour, specific policies should definitely be developed.
Similarly, it is also argued that one value of having policies specific to anti-
bullying itself is they can formalize an institution’s social norms and can be used
to modify behaviour through the influence of sanctions and punishments as well
(Campbell, 2016). The ultimate aim (the policy intent) here is to reduce bullying
at the institutional level.
What’s policy got to do with it? 205
Similarly, the value of civility has been mentioned (Keashly, this volume). In the
U.S. chapter, Keashly argues that civility is needed not only specific to a particular
cyberbullying situation between the victim (target) and the offender, but for the
entire campus community more broadly, such that even a bystander will see the
need to act civilly and responsibly within that setting. It is also a value that can
be “operationalized” when actually developing policy, practice, and procedure as,
for example, is appropriate when working collaboratively among all stakeholders
(Sharpe, this volume). A related value to civility is cyber-kindness, with the ethic
of kindness encouraging moral good behaviour for the whole university learning
environment/community (Beck & Cassidy, 2009).
Mentioning practice brings to the fore the next steps to be taken after develop-
ing the values-based policy, and that is the need to develop protocols and legislative
206 Margaret Jackson, Chantal Faucher, and Wanda Cassidy
frameworks (Larrañaga et al., this volume) that are derived from the policy and its
intent, and assist in securing that intent. As well, university community members
need to have clear ideas about what actions are not only possible in response to
the behaviour but are also supported (Keashly, this volume).
Associated with the value of defining the behaviour, Campbell (2016) indi-
cates that one of the first steps toward prevention of bullying behaviour is the
articulation of policy, which actually describes the unacceptable behaviours and
the values that they offend, such as equity and the safety and security of the learn-
ing environment. Interestingly, few of the policies we examined dealt with the
issue of prevention (less than one-quarter), but the Université de Montréal harass-
ment policy is one example where prevention is made a priority.
Once a clear cyberbullying policy has been developed for a university (ideally
with input from institutional administrators, as well as other key stakeholders, such
as students, staff, and faculty), another important consideration noted by a number
of authors (Faucher et al., 2015; Jones & Scott, 2012) is the importance of having
those same individuals become aware not only of its existence but also of how
to apply it. If the policy is disseminated to those in the institution, they become
knowledgeable about the unacceptable behaviours and learn of the values the
university upholds. If there is no policy, Campbell (2016) argues, it is difficult to
establish the mandate of protection of those bullied and to implement change in
the organization.
In our study in which university administrators were interviewed, one noted
the importance of relevant policies that are also accessible to students and staff,
and for immediate supervisors (such as Deans) to effectively address the problems
when they first surface, so that the issues do not fester and become even more
widespread (Driver, this volume; Cassidy et al., 2017). In order to be truly acces-
sible, there is also the need to provide information on how to navigate the vari-
ous possible sites in the university for submission of complaints and for receiving
support (Driver, this volume). Interestingly, specific to actions to be taken, some
policies we examined provided great detail about the complaint procedure and
the steps to be taken by various involved parties, including possible sanctions,
whereas others did not.
As Larrañaga et al. (this volume) point out, education and training is needed
in that regard. Others have commented on this by saying that not only greater
awareness and accessibility but also education and information are needed about
cyberbullying and available support services (Blaya, this volume; Langos & Gian-
caspro, this volume; Keashly, this volume).
With respect to the last point about support services, it must be stressed that
having policies to prohibit cyberbullying are clearly not enough in and of them-
selves; these must be supplemented by effective support (e.g., referral to coun-
selling services) and, as mentioned earlier, enforcement measures and sanctions
(e.g., internal retribution for perpetrator, referral to law enforcement) (Langos &
Giancaspro, this volume).
What’s policy got to do with it? 207
In the chapter by Faucher et al. (this volume), the authors suggest a comple-
mentary set of recommendations: to develop, implement, communicate, enforce,
and review university policies that speak to the issue of cyberbullying.They argue
that the campus should be held responsible for upholding standards of conduct
(including online conduct) that support the well-being of all community mem-
bers and promote an engaging learning environment. Within educational institu-
tions, policy also can establish the direction for the management of change within
the institution. Policy at this level is also more proximal to actual institutional
operations.
In addition, more research is needed. As Blizard puts it, more research is needed
to actually inform policy development (Blizard, this volume). This is consistent
with the Chilean argument (Condeza, Gallardo, & Reyes, this volume) that evi-
dence could promote the development of policies and new practices with proac-
tive approaches at both the university and state levels, to reduce the effects and
impacts of cyberbullying (see also Myers & Cowie, 2017; Walker, Sockman, &
Koehn, 2011).
Specific to the Chilean context, another educational value of policy, it is argued,
is for the (Chilean) government to consider the existence of specific policies and
protocols in this area as a requisite for university accreditations, thus stimulating
the institutional attention to and awareness of the students’ well-being (which
includes social relationships) across the country.
Finally, Cassidy and Jackson (2005), in referencing Farrington (2001), discuss
the critical need to evaluate the effectiveness of policies in order to determine if
they are actually achieving their policy intent and not undermining other relevant
policies and systems already in place. In Australia, in the university study (Camp-
bell, 2016), there was no mention of evaluation of policies; however, most policies
had a review date. However, in an earlier article, Campbell (2005) emphasized that
policies must be in force on a continual basis in order for them to be effective.
Brown et al. (2006), in referencing Lewiston and Sutton (2001), also caution that,
in order to be effective, the policies need to be locally informed in the making of
meaning in practice with reference to their own jurisdictional culture.
Overall, the evaluation component of such policies appears to remain less
focused upon in many of the studies reported in this volume. It is often dif-
ficult to know how to evaluate such policies, given the often-confounding
cause-and-effect challenges, but indicators should be developed. However, it must
be acknowledged that another reason for the lack of evaluation of the policies
may also be the lack of available funding to do so.
Discussion
While policy exists at a “higher” governmental level (e.g., Canada’s Charter of
Rights and Freedoms), even with legislation aimed at cyberbullying specifically,
that clearly targets misconduct and harmful behaviours, policy at the institutional
208 Margaret Jackson, Chantal Faucher, and Wanda Cassidy
Notes
1 Nova Scotia’s Cyber-Safety Act was struck down as being unconstitutional in Decem-
ber 2015. Bill 27, the Intimate Images and Cyber-Protection Act, is a new bill which was
brought forward in October 2017 with the intent of replacing the previous act.
2 R. v. Spencer, by the Supreme Court of Canada (2014); Crouch v. Snell, by the Supreme
Court of Nova Scotia (2015); and R. v. Elliott, by the Ontario Court of Justice (2016).
3 But the need for self-care at the individual level is also emphasized (see Blizard, this
volume).
References
Beck, K., & Cassidy,W. (2009). Embedding the ethic of care in school policies and practices.
In K. Riele (Ed.), Making schools different: Alternative approaches to educating young people
(pp. 50–64). Thousand Oaks, CA: Sage Publications.
Black, T. (this volume). Designing healthy and supportive campus communities: An
example from Simon Fraser University. In W. Cassidy, C. Faucher, & M. Jackson
(Eds.), Cyberbullying at university in international contexts (pp. 162–167). Oxford, UK:
Routledge.
Blaya, C. (this volume). Cyberbullying among university students in France: Prevalence,
consequences, coping and interventions strategies. In W. Cassidy, C. Faucher, & M. Jack-
son (Eds.), Cyberbullying at university in international contexts (pp. 9–22). Oxford, UK:
Routledge.
What’s policy got to do with it? 209
Jackson, M. (2015). Roadmap for the university: How can policy serve as a solution? Paper pre-
sented at the Justice, Law, and Ethics in Education M.Ed. cohort mini-symposium on
Bullying, Cyberbullying, and Harassment at the University, Simon Fraser University,
Surrey, BC.
Jones, J. C., & Scott, S. (2012). Cyberbullying in the university classroom: A multiplicity of
issues. In C. Wankel & L. Wankel (Eds.), Misbehavior online in higher education (pp. 157–
182). Bingley, UK: Emerald Group Publishing Limited.
Kanetsuna, T., Aoyama, I., & Toda, Y. (this volume). Relationships among university stu-
dents/faculty and cyberbullying in Japan. In W. Cassidy, C. Faucher, & M. Jackson (Eds.),
Cyberbullying at university in international contexts (pp. 23–35). Oxford, UK: Routledge.
Keashly, L. (this volume). In the e-presence of others: Understanding and developing con-
structive cyberbystander action. In W. Cassidy, C. Faucher, & M. Jackson (Eds.), Cyber-
bullying at university in international contexts (pp. 141–156). Oxford, UK: Routledge.
Langos, C., & Giancaspro, M. (this volume). Cyberbullying in the Australian univer-
sity context: The shades of harm and implications for law and policy. In W. Cassidy,
C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international contexts
(pp. 181–197). Oxford, UK: Routledge.
Larrañaga, E.,Yubero, S., Navarro, R., & Ovejero, A. (this volume). From traditional bully-
ing to cyberbullying: Cybervictimization among higher education students. In W. Cas-
sidy, C. Faucher, & M. Jackson (Eds.), Cyberbullying at university in international contexts
(pp. 99–111). Oxford, UK: Routledge.
Mathiesen, K. (2014). Human rights in the digital age. Journal of Mass Media Ethics, 29(1),
2–18.
Myers, C.-A., & Cowie, H. (2017). Bullying at university: The social and legal contexts
of cyberbullying among university students. Journal of Cross-Cultural Psychology, 48(8),
1172–1182.
Pescitelli, A. (this volume). MySpace or yours? An exploratory study of homophobic and
transphobic cyberbullying of post-secondary students. In W. Cassidy, C. Faucher, & M.
Jackson (Eds.), Cyberbullying at university in international contexts (pp. 52–65). Oxford,
UK: Routledge.
PREVNet (2018). Policy & legislation (BC): Resources for educators: Promoting relation-
ships & eliminating violence network. Retrieved from www.prevnet.ca/resources/
policy-and-legislation/british-columbia/for-educators
Sharpe, N. (this volume). A university ombudsperson’s perspective using a fairness lens to
build a kinder online campus culture. In W. Cassidy, C. Faucher, & M. Jackson (Eds.),
Cyberbullying at university in international contexts (pp. 157–161). Oxford, UK: Routledge.
Walker, C. M., Sockman, B. R., & Koehn, S. (2011). An exploratory study of cyberbullying
with undergraduate university students. Tech Trends, 55(2), 1–38.
Young, H., Campbell, M., Spears, B., Butler, D., Cross, D., & Slee, P. (2016). Cyberbullying
and the role of law in Australian schools: Views of senior officials. Australian, Journal of
Education, 60(1), 86–101.
Safe and Caring School Communities Policy, BC Ministry of Education (in force, 2005;
revised 2017).
School Act [RSBC 1996], Chapter 412, BC Ministry of Education (in force, 1996).
The Provincial Standards for Codes of Conduct Ministerial, School Act, sections 85(1.1)
168 (2) (s.1) (in force, 2007; amended, 2012).
Pridgen v. University of Calgary, ABCA 139 (2012).
R. v. Spencer, SCC 43 (2014).
Crouch v. Snell, NSSC 340 (2015).
R. v. Elliott, ONCJ 35 (2016).
17
FACULTY MEMBERS WHO
ARE BULLIES JON DRIVERFACULTY MEMBERS WHO ARE BULLIES
Jon Driver
1 Nip the problem in the bud. Whenever a bully acts up, tell them they are out of
line. This is particularly important when faculty members bully administra-
tive staff or students. Make it very clear where they have crossed a line, and
explain that such behaviour will not be tolerated. Document the warning.
2 Don’t play the email game. The rest of the world may have moved on to other
forms of social media, but (at least in 2017) email still forms the platform
Faculty members who are bullies 213
Dov Schafer
During undergrad, I took a sociolinguistics course. In this class, the teacher would
often solicit feedback, stories, and comments. It was a small class of about 17
students. Early on, I emerged as one of the more active participants in discussion.
Perhaps I was speaking too often; I must admit I have a clear propensity toward
over-contribution. Someone in the class felt that I was negatively affecting their
ability to learn, but rather than confronting me about it or going to the profes-
sor, they took it upon themselves to cyberbully me. They created a fake Face-
book profile and made a page called “Shut Up Dov” and posted a long, scathing
criticism of me. They made it look like a few other students had liked the page.
I stopped attending class since it was past the withdrawal date.
I caved to the pressure of anonymous criticism because I did not want to
have to sit in a class wondering who hated me enough to make a fake Facebook
account and a special page to “let [me] know that everyone hates [me] and wants
[me] to shut up”. That emotional decision earned me a failing grade, 34%. Prior
to graduation, I approached the Dean to get the class removed in light of the
cyberbullying, but they were not understanding. I ended up taking the class again
in my final semester, with a significantly improved grade, just so I could explain
the first grade away in future graduate admissions applications. The net effect of
the bullying was a drastic reduction in my GPA during that term, loss of honours
standing that year, and the time/money to take that course over again. It was a
costly incident.
Cyberbullying is not just for kids; research indicates that adults often have
to deal with forms of bullying/cyberbullying in the workplace and institutional
settings (Faucher, Jackson, & Cassidy, 2015). Jackson, Faucher, and Cassidy (this
volume) draw attention to the notion of power imbalance in cyberbullying; they
note that this is an especially pressing concern at the university level. My own
216 Dov Schafer
Making people feel like the internet is a public space, rather than a private
one, is essential to reducing this sort of behaviour. Along with design features that
allow user reporting, I think technologies that actively eliminate anonymity may
reduce bullying. One potential solution could be using the power of distributed
ledger technology. Essentially, cryptocurrencies are shared digital books which are
used to track transactions by recording public records of each trade. This technol-
ogy can also be used to digitally fingerprint online activity. Some cryptocurrency
companies, such as Self-Key and Dock, are already using cryptocurrency (distrib-
uted ledgers) that are tied to identity data in order to transmit user information
across social networks. It seems reasonable to assume that a lack of systemic ano-
nymity in online interaction would reduce the likelihood that potential bullies
would feel emboldened to act maliciously when speaking online to both peers
and strangers.
In this chapter I gave two personal examples of cyberbullying: one clear exam-
ple of student-to-student bullying at the post-secondary level using Facebook
and one example of stranger-to-stranger incivility that occurred, ironically, while
I was writing this chapter. Both examples show cyberbullying as an asymmetrical
power struggle; a sneak attack from bully to target designed to make the bully feel
better about themselves at the cost of the target in an anonymous setting with
little to no risk for the attacker. I feel that an increased focus on software inter-
face design features that eliminate the anonymity of online behaviour can begin
eroding the confidence of would-be bullies. When we feel like we are in public,
we tend to act in a more outwardly civil way. Fewer crimes of opportunity are
committed in plain sight than in the sheltering darkness.
References
Blizzard Entertainment. (2018). Hearthstone: Heroes of warcraft [online game]. Retrieved
from http://battle.net/hearthstone/
Faucher, C., Jackson, M., & Cassidy,W. (2015).When on-line exchanges byte: An examina-
tion of the policy environment governing cyberbullying at the university level. Cana-
dian Journal of Higher Education, 45(1), 102–121.
Jackson, M., Faucher, C., & Cassidy, W. (this volume). What’s policy got to do with it? The
focus on cyberbullying policy at the university level. In W. Cassidy, C. Faucher, & M.
Jackson (Eds.), Cyberbullying at university in international contexts (pp. 198–211). Oxford,
UK: Routledge.
Myers, C. A., & Cowie, H. (2017). Bullying at university: The social and legal contexts
of cyberbullying among university students. Journal of Cross-Cultural Psychology, 48(8),
1172–1182.
REFLECTIONS AND CONCLUSIONS WANDA CASSIDY, CHANTAL FAUCHER, AND MARGARET JACKSONREFLECTIONS AND CONCLUSIONS
Student-to-student cyberbullying
Although the studies described in this book use different instruments, employ
slightly different definitions of cyberbullying, and use different methods to exam-
ine the phenomenon, the results of these studies indicate that cyberbullying
among university students who participated in the studies is occurring at rates
varying from 3% (Japan) to 46% (Chile). Since cyberbullying occurs through the
venues that students regularly access, it is no surprise to see hurtful messages and
unwanted pictures posted on Facebook, YouTube, Instagram, Skype, Snapchat,
WhatsApp, chat rooms, gaming sites, email, text messaging, etc. (Chapters 1–8,
15 and 18). Cyberbullying among students who know each other appears to be
more common than cyberbullying from strangers. This fits with those authors
Reflections and conclusions 219
Cyberbullying of faculty
There are fewer studies examining student-to-faculty and faculty-to-faculty
cyberbullying. The authors of Chapters 2, 5, 6, 8, and 9 examine these relation-
ships, using such theoretical constructs as contra-power harassment – where one
group, such as students who normally have less power, change the power imbal-
ance through nefarious actions such as ruining a professor’s reputation on rating
sites or writing negative evaluations. The literature on academic entitlement and
on classroom incivility may also factor into students’ aggressive behaviour towards
their professors, as described in Chapters 5, 8, and 9. Indeed, the reasons students
give for cyberbullying faculty primarily relate to the professor’s teaching style, the
courses they teach, and their grading practices. Students primarily rely on email,
online course sites, and professor rating sites to cyberbully their professors.
Faculty members who cyberbully each other, especially those who are in posi-
tions of leadership in the academy, may also be seeking greater power and control,
lending support to the Power and Control theoretical model discussed by the
authors of Chapters 5 and 8. Coyne and Farley (Chapter 6) also identify power
imbalance, along with frequency and duration, as characteristics that differentiate
workplace cyberbullying from other related aggressive acts.
220 Wanda Cassidy, Chantal Faucher, and Margaret Jackson
The studies reported in this book indicate that between 15% and 52% of
faculty members who participated in the studies report being cyberbullied by
students, with one study (Chapter 8) reporting that 12% of participating faculty
were cyberbullied by colleagues, primarily over email and by those known to
them. Although fewer studies have been conducted on workplace cyberbully-
ing compared to workplace bullying, Coyne and Farley refer to three university
workplace studies in the UK, which show a cyberbullying frequency rate among
faculty of between 13.6% and 20.8%.
Gender issues
Gender appears to be a factor in cyberbullying at post-secondary, although the
impact is inconsistent across studies. While females tend to participate in greater
numbers in surveys and interviews (see Chapters 1, 3, 5, 8, 9, and 15), and report
more serious impacts compared to males (Chapter 8), different patterns emerge. In
some studies, females are targeted more often, particularly by friends, while males
are targeted more by strangers and in online communities. In Blaya’s study (Chap-
ter 1), male students declared greater involvement as perpetrators and as victim/
authors, but in the study discussed by Faucher, Cassidy, and Jackson (Chapter 5),
female and male students were perpetrators in relatively equal numbers.
As noted by Jackson, Faucher, and Cassidy (Chapter 16), gender must also be a
factor considered in creating policy at the post-secondary level to address cyber-
bullying. Policy is needed which is equality-based, in terms of considering power
imbalances, in order to develop equitable solutions for both male and female
university members.
Solutions
Many of the authors of the chapters in this volume stress the importance of
education and dialogue across university stakeholder groups, de-naturalizing
the acceptance of aggressive actions among students, developing clearly stated
and communicated policies, establishing better reporting options – including
anonymous reporting, providing greater support for victims, and focusing on
relationship-building, as pathways towards solutions.
The section of the book titled “Solutions” brings together chapters specifically
geared to solutions that are being tried in institutions. Keashly (Chapter 10) dis-
cusses the importance of developing constructive cyber-bystander action since it
is often bystanders who, if empowered, can intervene to prevent negative actions,
to provide needed support to victims, and/or to change the culture of an insti-
tution. Farley and Coyne (Chapter 14) consider the value of evidence-based
practices, which might include training staff in such programs as CREW (civil-
ity, respect, and engagement at work), and conflict de-escalation. Kanayama and
Kurihara (Chapter 13) discuss specific ways that universities in Japan are address-
ing cyberbullying, by empowering peers to teach each other, requiring students
to enrol in seminars on internet morality and criminal behaviour, screening all
incoming first-year undergraduates for mental health issues, and providing access
to counsellors and health practitioners once a problem is identified.
The two remaining chapters in this section are written by practitioners, each
with a wealth of experience fostering more positive campus cultures. Sharpe,
222 Wanda Cassidy, Chantal Faucher, and Margaret Jackson
Policy issues
Adherence to equality-based policy principles should assist in meeting that
requirement. Those foundational principles can guide the development and
implementation of appropriate solutions to cyberbullying problems seen on cam-
puses cross-jurisdictionally.Without the policy component, the policy intents and
their associated values, such as civility and wellness, are not clarified for the insti-
tutional members. It was argued in Jackson, Faucher, and Cassidy (Chapter 16)
that in instances of cyberbullying, the balance between conflicting values, such as
freedom of expression and safety of person, is set by policy. In the absence of those
values and that balance, prevention and intervention programs may flounder and
be directionless because they were not initially grounded in the policy balance
and intent. Again, this is true cross-jurisdictionally.
Both chapters by Jackson, Faucher, and Cassidy (Chapter 16) and Langos
and Giancaspro (Chapter 15) also identify the importance of higher-level docu-
ments such as, for example, the Canadian Charter of Rights and Freedoms, and
other overarching legislation that articulates the rights and values of a society, and
which institutional policies should reflect and reinforce. Rights such as freedom
of expression and security of person need to be considered and balanced at the
institutional level as well as in the society at large. Langos and Giancaspro’s study
demonstrates students’ lack of knowledge about online behaviour that is consid-
ered criminal, as well as ignorance of university policies related to cyberbullying,
Reflections and conclusions 223
if they do exist. Both chapters stress the importance not only of clearly communi-
cated policy that is understood but also policy that is supported by other services,
such as counselling and safety measures, to ensure that the well-being and security
of the university is encouraged and sustained.
Finally, Driver, University Provost at the time of writing (Chapter 17), notes
that policy without action is insufficient; that administrators must take effective
and decisive action when they learn that faculty members are being cyberbullied.
Graduate student Schafer zeroes in on cyberbullies who hide behind the wall
of anonymity, while noting new technological advances that soon may be used
to identify all internet users by their unique digital fingerprint, thus exposing
anonymous cyberbullies and reducing their negative behaviour. Different kinds of
policies and procedures may well be needed to address the latter advances.
Concluding comments
We undertook this book as a way to bring together cyberbullying scholars and
practitioners from various geographic locations – North and South America,
Europe, the United Kingdom, Asia, and Australia – to share what each has learned
from their respective research and practice about the problem of cyberbullying on
university campuses and to recommend ways to take action. It is our hope that
this book will encourage research-based, creative approaches to the prevention
and intervention of cyberbullying at the post-secondary level, locally and globally.
References
Cassidy, W., Jackson, M., Brown, K. (2009). Sticks and stones can break my bones, but how
can pixels hurt me? Students experiences with cyber-bullying. School Psychology Inter-
national, 30(4), 383–402.
Noddings, N. (1992). The challenge to care in schools. New York, NY: Teachers College Press.
Noddings, N. (2002). Educating moral people: A caring alternative to character education. New
York, NY: Teachers College Press.
INDEX
accessibility 57, 102, 117, 130, 143, 146, Austria, cyberbullying at secondary schools
192 – 193, 200, 206, 208 174 – 175
acute social withdrawal 31 – 32
aggression: common forms of 12; Bulletin Board System (BBS) 26
consequences of 19; in dating bullying: interventions for 18; relationships
relationships 102 – 105; definition of between cyberbullying and 28 – 30,
11; by faculty 142; gender differences 32 – 33, 86 – 87, 99 – 100
69, 121, 219; interventions for bystanders: assessment of situation/
45 – 46; LGBT students 53; online behaviour 145 – 147; awareness of
victimization and 29, 33, 36, 116; situation/behaviour 144 – 145; decision
in-person altercations 130; workplace for action 149 – 152; definition of 143;
cyberbullying 82, 84, 87 intervention model 143 – 144, 153 – 154;
anonymity: cyberbullying in the responsibility for action 147 – 148; taking
sheltering darkness of 215 – 217; action 152 – 153
deviant online behaviour and 27 – 28;
moral disengagement and 28, 59 – 60; Canada, gendered nature of cyberbullying
perceived online 26 – 27; workplace among students/faculty at universities:
cyberbullying 87 background 66 – 69; current study
anxiety 30 – 31 72 – 77; intervention 76 – 77; prevention
Australia, cyberbullying at universities: 76 – 77
background 181; community education Canada, impacts of cyberbullying at
190; consequences of 184; criminal laws universities: ability to do work 117 – 118;
184, 189 – 190; current study 182 – 189; background 112 – 113; designing healthy
cyberbullying as a single offence and supportive campus communities
190; frequency of victimization 187; 162 – 165; dichotomous survey responses
harm experienced vs. perceived harm 115 – 116; extent 114 – 115; feeling
187 – 188; limitation of study 194 – 195; unsafe emotionally and physically
measures of study 183; method of study 120; intervention 121 – 122; mental
182 – 183; recommendations 194; results and physical health 119; open-ended
of study 183 – 189; shades of harm and interview responses 116 – 120;
associated with 187, 190 – 191; university overarching finding of negative affect
policy 184 – 186, 191 – 193 116 – 117; prevention 121 – 122; rationale
226 Index
114 – 115; on relationships inside and 157 – 161; perpetrators of 83; prevalence
outside the university 119; reporting of 100 – 101, 141 – 143; prevention
120; study and method 113 – 114; 105 – 107; psychological theories of
theoretical frameworks 120 – 121; on 90 – 91; redress 220 – 221; relationships
university culture as a whole 121; venues between bullying and 28 – 30, 32 – 33,
114 – 115; wanting to quit 118 – 119 39, 86 – 87, 99 – 100; risk perception
Canadian Charter of Rights and Freedoms of 30 – 31; in sheltering darkness of
199 anonymity 215 – 217; solutions 221 – 222;
Chile, cyberbullying among university student-to-faculty 219 – 220; student-to-
students: background 36 – 47; current faculty targeted 115 – 118, 126 – 136, 142;
study 40 – 48; experiences as witness types of victimization in post-secondary
43 – 44; experiences of victims education 9, 38 – 39; of women and girls
41 – 43; general conceptions about 45; 70; workplace 71 – 72, 80 – 92
inequality and transformations in higher cyberbullying policy: anonymous online
education 37 – 38; intervention 46 – 48; reporting system 192 – 193; Australian
from perspective of offenders 44 – 45; university policy 191 – 193; awareness
prevention 46 – 48 of 192; educating students and staff
civility, respect, and engagement at work 192 – 193; foundations 198 – 204; issues
(CREW) 174 222 – 223; versus law 201; perceived
codes of conduct 153, 159, 161, 184, efficacy of 192; recommendations
191 – 192, 202 – 203 205 – 208; rights and intersecting
computer-mediated communication factors in 199 – 200; types of 202 – 204;
(CMC) 27, 89 – 90, 175 university counselling services 193
contrapower harassment 70 – 71, 219 cyberviolence 10
coping potential 30 – 31
coping strategies 16 – 17, 105 dating relationships 102 – 104
counselling services 169 – 170, 175, 193 deindividuation effect 89 – 90
criminal laws 184, 189 – 190 deviant online behaviour 27 – 28
cyberbullying: among students/faculty Duluth model 70
in Canada 66 – 77; among students/ dysempowerment theory 90
faculty in Japan 23 – 33, 218; among
university students in France 9 – 20; emotion reaction model 90 – 91
anxiety concerning 30 – 31; areas for evaluations 25, 27, 71, 121, 129 – 130, 151,
future research 223 – 224; at Australian 173 – 175, 207, 219
universities 181 – 195; in Austrian evidence-based practice (EBP) approach
secondary schools 174 – 175; behaviours 173
in higher education students from
teacher education programs 104 – 105; Facebook 15, 38, 41 – 43, 55, 56, 57, 101,
bystanders 143 – 154; consequences 116, 120, 126, 142, 147, 159 – 160, 198,
of 14 – 16, 39, 88, 101 – 102, 112 – 120; 215, 217, 218
coping potential concerning 30 – 31; faculty bullies 212 – 214
coping strategies 16 – 17, 105; correlates fairness 158 – 159
in college students 101 – 102; within Finland, interventions against workplace
dating relationships 102 – 104; definition cyberbullying 175
of 38 – 39; experiences at a Chilean France, cyberbullying among university
University 36 – 48, 218; gender students: consequences 14 – 16;
differences 12, 19, 39, 67 – 77, 115, 220; consequences and coping strategies
impacts 220 – 221; impacts at Canadian 16; coping strategies 16 – 17; impact on
universities 112 – 122; intervention academic achievement 15 – 16; impact
105 – 107; of LGBTQ students 52 – 63, on socio-emotional well-being and on
219; nature of 141 – 143; need for thick social relationships 14 – 15; intervention
skin 122; ombudsperson’s perspective 17 – 19; prevalence 12; reasons explaining
on building a kinder online culture victimization and perpetration
Index 227
cyberbullying in universities 105 – 107; physical and emotional impact 129 – 132;
approaches to tackling cyberbullying purpose of study 127; relational and
in workplace 91 – 92; challenges at occupational effects 132 – 133; results
university level in France 17 – 19; of study 128 – 134; significance of study
ombudsperson’s perspective on building 136; study participants 128 – 129
a kinder online culture 157 – 161 substantive fairness 158