Home' Independence : Independence Vol 31 No 2 Nov 2006 Contents 4 ensure that all family mobile phones are
switched off from the agreed late evening time
to early morning, and have the phones in your
possession (not in the child's room)
4 develop a protocol that your child has no
access to the internet from the agreed late
evening time until early morning. This may
mean placing the computer, or other
devices, in family rooms rather than a
4 check the cost of your child maintaining their
mobile telephone accounts
4 develop a relationship of trust with your child
on these and other matters
4 seek help from other parents or school staff
if you are unsure of your child's
Useful websites for
This is a site established by the Australian
Government in 1999. It has Advice and Resources
for Parents and Teachers. Different age groups are
targeted with separate articles on Cyber Bullying,
Cyber Stalking, Instant Messaging, Chatting
Online and other areas of interest.
This has excellent information on matters like
4 Online Safety: Guidelines for Kids
4 Confronting the Cyber Bully
4 Keeping Kids Safe on the Internet:
4 Keeping Kids Safe on the Internet:
4 Cyber Brats: Bullies who taunt their peers
with the click of a Mouse
This site, and affiliated sites
and www.staysafe.org are a wonderful hands-
on resource to so many aspects of Cyber Bullying.
Highly recommended is a set of 10 "Kid's Rules for
Online Safety" (www.safekids.com/kidsrules.
htm) and a six point "Parents Pledge" as well,
that can be used as a Family Contract for Online
Safety (see www.safekids.com/contract.htm).
Mobile (cell) phone safety, Chat Room safety
and Printable Resources for Schools, Parents and
Others are included on this Safekids website. It is
a real mine of information.
Dr Anne Bamford is Director of Visual Arts
and senior lecturer in interactive media at
the University of Technology Sydney. In a
paper presented to the 2004 Pastoral Care
conference, she identifies the following
most common forms of cyber-bullying
encountered in her research.
4 Anonymity is the placement of comments
in a chat forum or other location that cannot
be directly attributed to a specific person.
Anonymity can include the use of pseudonyms.
Pseudonyms (or aliases) involve the
adoption of alternative names with the aim to
mask identity. These names may be fabricated
or they could use another student's name.
If the adoption of a particular pseudonym is
used consistently over a period of time, this
is an alias. Masquerading is an elaborate
form of pseudonym when the perpetrator
masquerades as the victim or someone else.
Frequently, the exchange of passwords is
considered evidence of true 'friendship' among
teenagers. Such exchange allows a perpetrator
to gain access to the victim's account on
a system and pose as victim in his or her
personal web page, profile, blog, or through
some form of communication.
Masquerading is also common on mobile
phones where a friend's phone will be used to
send a harassing message, making it appear
as if it has been sent by another individual.
4 Flaming is a heated argument, frequently
including offensive or vulgar language, that
occur in public communication environments,
such as discussion boards or groups, chat, or
newsgroups. Flamers may use capital letters
and a range of visual images and symbols to
add emotional intensity and anger to their
messages. The emoticon for flaming/flamers is
~~:-[. Flamers may also be described as trolls.
4 Harassment includes offensive messages
directed at an individual or group. Techniques
of harassment include bombardment,
repetition and timing of messages. Denigration
may also be used as a form of harassment,
especially where groups may publicly post
a number of messages aimed at causing
harm to a particular individual or group. One
particularly intrusive form of harassment
is cyberstalking where threats of harm,
intimidation and/or offensive comments
are sent through personal communication
channels. Frequently with cyberstalking there
is a threat, or at least a belief, that the virtual
could become real stalking.
4 Outing is the public display, posting, or
forwarding of personal communication
or images, especially communication that
contains sensitive personal information or
images that are sexual in nature. Increasingly,
images taken using mobile phone cameras
and mobile phone text messages are used as
part of outing bullying. Reading the saved text
messages on other's phones can also be part
of the outing process.
4 Exclusion is the process of designating who
is a member of the 'in-group' and who is
an 'outcast.' In some cases, this is done by
who has a mobile phone and who has not.
Students, particularly girls, will also omit
certain other girls from email lists, chat room
conversations and so on.
social issues DIGEST
The many forms of cyber-bullying Dr Anne Bamford
Links Archive Independence Vol 31 No 1 May 2006 Independence Vol 32 No 1 May 2007 Navigation Previous Page Next Page