Study Points
- Back to Course Home
- Participation Instructions
- Review the course material online or in print.
- Complete the course evaluation.
- Review your Transcript to view and print your Certificate of Completion. Your date of completion will be the date (Pacific Time) the course was electronically submitted for credit, with no exceptions. Partial credit is not available.
Study Points
Click on any objective to view test questions.
- Discuss Internet and cell phone usage among different segments of the population.
- Define cyberbullying, cyberharassment, and cyberstalking.
- Identify various online platforms and how they may be used to harass or bully.
- Discuss the prevalence of cyberbullying and harassment among children, adolescents, young adults, and adults.
- Analyze the general profiles of cyberbullying perpetrators and victims, including possible indicators of cyberbullying.
- Utilize theoretical frameworks used to explain cyberbullying.
- Evaluate the health, psychosocial, social, behavioral, and academic impacts of cyberbullying and harassment.
- Identify risky Internet behaviors.
- Apply different prevention, educational, and clinical interventions for cyberbullying.
Among adults, which of the following age-groups is most likely to use the Internet?
Click to ReviewIn order to understand the pervasive social, psychologic, and cultural impact of the Internet on the lives of individuals, it is important to obtain a brief glimpse of Internet and digital technology usage and consumption. According to the U.S. Census, 85.3% of all households in the United States had some sort of Internet subscription in 2018 [41]. Access to broadband Internet has increased over the years, but the adoption rate has leveled off, mainly due to the increasing use of smartphones. In 2021, 77% of households in the U.S. had broadband Internet [6]. In addition, 85% of households that included minor children had an Internet subscription, versus 73% of those without a minor living in the home [7]. In 2021, 93% of American adults use the Internet [6]. Among adults, individuals 18 to 29 years of age are the most likely to utilize the Internet (100%), while adults 65 years of age and older are the least likely (75%) [6]. Among adolescents 13 to 17 years of age, 97% report using the Internet daily, including 46% who indicate they are online "almost constantly" [111]. In addition, 35% of teens say they are connected to some form of social media platform "almost constantly" [111]. There is no doubt that Internet technology has become a ubiquitous part of the American landscape. Although data published in the last several years is among the most current, the Internet landscape changes so rapidly that obtaining accurate data is nearly impossible.
The term "digital divide" refers to
Click to ReviewAlthough the use of the Internet and digital technology is growing and changing rapidly, it is important to remember that there is also the digital divide. The term "digital divide" refers to the social inclusion/exclusion and equality/inequality of Internet access, which is influenced by socioeconomic differences among various groups, including racial/ethnic minorities [16]. Extent of access can be categorized based on three factors: access to the Internet, frequency of Internet use, and scope of Internet use [17]. Socioeconomic status plays a role in each of these factors, as it is necessary to have the economic resources to purchase a computer or digital device, to pay for service, and to allot time to use the Internet recreationally [17]. Although structural factors are key determinants to the digital divide, digital literacy, which is related to level of education, also plays a role [163]. According to 2015 U.S. Census data, the Internet access racial gap has decreased. The percentage of African Americans with Internet access at home increased from 56.9% in 2012 to 64.9% and the proportion of Hispanics who reported home access increased from 58.3% in 2012 to 70.9%; this is compared with 79.3% of whites with home access in 2015 [7]. Data from the Pew Research Center show that 80% of white households have Internet broadband while only 71% and 65% of African American and Hispanic households, respectively, have broadband Internet [6]. This divide does not expand to include Asian Americans, who have greater access to the Internet at home (88.5%) than whites [7]. The growing use of cell phones/smartphones and mobile devices to access the Internet may be responsible for closing this gap. In 2019, ethnic minorities are higher users of smartphones as their only access to the Internet, with 23% of African Americans and 25% of Latinos having only smartphone Internet access, compared with 12% of white users [8]. They also appear to take fuller advantage of their cell phone features compared to white cell phone users [7]. Among those with a household income of $25,000 or less, 11% access the Internet through a smartphone [41]. An estimated 43% of adults who fall in the lower income bracket do not have broadband Internet and 41% do not own a laptop or a desktop computer [202].
In terms of cyberstalking, crossover refers to stalking that
Click to ReviewIn general, stalking typically involves two or more unwanted contacts. The mechanisms of stalking may be classified into four different categories [19]:
Purely online: Stalking occurs completely online.
Crossover: Stalking takes place solely online for weeks, but it then transitions to offline (e.g., face-to-face contact or postal contact by the perpetrator), though online activities may continue.
Proximal with online: Stalking is initiated offline but evolves to include online contact.
Purely offline: Stalking occurs completely offline.
Which of the following is NOT an example of cyberstalking?
Click to ReviewExamples of cyberstalking include but are not limited to [19,133,204]:
Obtaining information on the Internet about the victim in order to harass or intimidate online or offline
Sending or posting false information or messages about the victim
Impersonating someone online
Posting personal information about the victim online
Sending computer viruses to the victim
Tracking the victim using hidden webcams or global positioning systems (GPS)
Monitoring the victim's Internet and computer use using spyware
Contacting the victim using fake online profiles
Which of the following online mediums is commonly used to bully or harass someone?
Click to ReviewThere are many different forms of online, digital, and electronic mediums that are used to bully or harass someone. The most common mediums include social media sites, e-mail, text, and instant messaging [24,25,136]. In a 2016 nationally representative sample of 4,500 students 12 to 17 years of age, 34% of students indicated that they were a victim of cyberbullying at some point, with 17% of the incidents occurring within the previous 30 days. It was reported that the incident was usually through social media and included mean, hurtful comments or spreading of rumors [18].
In the context of cyberbullying, "griefing" is defined as
Click to ReviewPersons engaged in online gaming may harass other players regarding their performance, extending bullying to other aspects of their online persona or block them from participating in future games [166]. There are several online games (e.g., Fortnite, Minecraft, League of Legends) with an interactive component, allowing players to have discussions and interactions in game. When someone harasses an individual when playing games in the cyber world, this is called "griefing" [100]. In a 2015 study of 2,315 Taiwanese high school students, online game use predicted cyberbullying victimization and perpetration [137]. In a 2019 study, 6% to 21% of participants reported engaging in cyberbullying and 6% to 31% reported being victims of cyberbullying on online gaming platforms in the past six months [166]. In one study, being male and viewing violent content in online games were predictive of being both a victim and a perpetrator of cyberbullying in online game settings [207]. Spending long hours playing online games was also a risk factor of being bullied online but not of bullying others.
"Happy slapping" entails
Click to ReviewThere are many different forms of cyberbullying, but some of the most commonly encountered are [28; 29; 102; 134; 140; 141; 142; 143; 168; 169; 209; 210]:
Flaming: Sending messages that are rude or vulgar in nature about a person via an online group, e-mail, or instant/text message
Outing: Posting or sending content about a person that is sensitive and/or private (also referred to as "doxxing")
Swatting: A form of doxxing whereby the public release of information and reporting false emergencies instigates a law enforcement response (usually to the victim's home)
Exclusion: Deliberately and cruelly excluding someone from an online group
Cyberstalking: Harassment via the Internet involving threats and intimidation
Online harassment: Repeatedly sending offensive messages online
Impersonating: Pretending to be the victim and posting messages or personal photos in a false profile
Denigrating: Sending or posting untrue and cruel statements about a particular person. This can include e-mail or text insults about another peer's physical characteristics, such as looks or weight. Girls are the more frequent target of insults than boys, and the insults often focused on weight (e.g., calling someone a "whale" or "ugly pig") and promiscuity or sexuality (e.g., calling someone a "whore" or "slut").
Masquerading: Posing as someone else for the purpose of sending information via the Internet that makes that individual look bad. Some perpetrators manage to steal victims' passwords in order to access computers or cell phones and pretend to be that person. Adolescents report that it is not difficult to obtain a password, and exchanging password information is often a sign of friendship.
Online grooming: An individual targets a minor and gradually gains his/her trust to ultimately prepare him/her for abuse.
Internet polling: Creating and disseminating an online survey with embarrassing or denigrating questions and publishing the results.
Trickery: The perpetrator gains the trust of the victim, who then shares embarrassing information. That information is published online by the perpetrator.
Happy slapping: Publishing a video that displays someone being physically hurt or humiliated.
In a 2018 study, what percentage of adolescents reported having experienced at least one type of cyberbullying?
Click to ReviewEstimates of cyberbullying victimization rates among adolescents range from 3% to 72% [155]. In a survey of Internet users 10 to 17 years of age, 19% indicated that they bullied someone via the Internet or were a victim themselves in the previous year [2]. In a 2007 study, 48.8% of adolescents disclosed being a victim of cyberbullying, with almost one-third having received an abusive text message [36]. On the other hand, 21.4% of adolescents in the study admitted to having bullied someone using technology, typically text messages. Other reported forms of cyberbullying included receiving threatening online messages, having e-mails forwarded to others without consent, having an embarrassing photo posted without consent, or being the target of a malicious rumor that was spread online [37]. Girls are generally more likely to be victims of harassment or abuse online compared to boys (38% vs. 26%). Furthermore, adolescents who use social networking sites are more likely to be victims of cyberbullying compared to those who do not use social networking sites (39% vs. 22%) [37]. Data obtained from ten studies conducted between 2007 and 2016 yielding a sample size of 20,000 youths throughout the United States indicate that 28% have experienced cyberbullying victimization and 16% disclosed to having cyberbullied someone [106]. In a separate 2016 study, 34% of adolescents disclosed being a victim of cyberbullying at some point, with 17% of the incidents occurring within the previous 30 days [18]. In a 2018 survey conducted by the Pew Research Center, 59% of adolescents in the United States reported they had directly experienced at least one type of cyberbullying [172]. Almost one-third stated they had someone spread false rumors about them online. One study found a lifetime prevalence cyberbullying victimization of 9.6% for young adolescents and 1.1% for cyberbullying perpetration [214]. A separate study found higher prevalence rates, with one-fifth of the study sample disclosing to having been a victim, perpetrator, or witness of cyberbullying [215]. Again, the differences in these prevalence rates are due to differences in definitions and measures of cyberbullying.
At what age does the peak frequency of cyberbullying perpetration tend to occur?
Click to ReviewIn studies of children and adolescents 10 to 17 years of age, boys have been found more likely to be perpetrators of cyberbullying [46,51]. Female teen perpetrators tend to spread rumors online, while male adolescent cyberbullies tend to post photos or videos that are hurtful to the victim [116]. Age also seems to be correlated with cyberbullying, as it increases with age to a certain point [52]. The peak frequency in cyberbullying tends to occur between 13 and 15 years of age—spiking in the 8th grade and declining in the 11th grade [30,53]. This seems to be confirmed in a 2023 study that found the prevalence of cyberbullying experiences decreased from middle to late childhood, and then increased again in early adolescence [222]. It appears that younger children are more likely to be bullies in the traditional sense (offline), but older youths are more likely to be bullies online; however, it is not clear what dynamics explain this difference [46,52]. In part, it may be correlated with increased access to the Internet and cell phones with less parental supervision as children age. In addition, having been a victim of cyberbullying is a strong predictor for becoming a perpetrator [181,182,183].
Of the following, who are at an increased risk of becoming victims of cyberbullying or harassment?
Click to ReviewIn general, girls and women tend to be the victims of cyberbullying, especially specific types of bullying. For example, girls are more likely to have had a rumor spread online about them than boys [37].
Cyberbully victims also tend to be victims in other areas of their lives, such as traditional bullying. Not surprisingly, victims of cyberbullying tend to use the Internet more and in riskier ways than non-victims [52,184]. A study of 935 adolescents between 12 and 17 years of age found that those with active profiles on social networking sites were more likely to experience online bullying than those without profiles [56]. Similarly, adolescents who are daily users of the Internet and who use social networking sites such Facebook, Twitter, and YouTube are more likely to report having been harassed online [37]. Individuals who used webcams at least once or twice a week or who used message boards most days of the week were 1.75 times and 1.67 times more likely, respectively, to report having been cyberbullied repeatedly in the past year [57].Those who have created online content, such as developing their own blogs, building websites for themselves or for others, uploading photos, or posting to community boards, are more likely to experience online harassment compared to those who do not create their own content [37]. This is not surprising, as motivated perpetrators will seek out contact and other personal information online to be used to harass their victims [56].
A meta-analysis found that victims of cyberbullying tended to be female and to experience high levels of depression, stress, and/or loneliness [160]. They also tend to have low self-esteem, lower levels of empathy, and more anxiety [171]. In addition, they tended to experience other forms of victimization offline, were frequent Internet users, had problem behaviors, lived in a negative family environment, and were less committed to school. A 2020 Chinese study found that cyberbully victims are more often male and younger [185]. They are more likely to experience parental conflict and have higher deviant peer affiliations. In a 2021 study, those at low risk for cyberbully victimization were more likely to be satisfied in school, have high self-esteem and self-control, and have good parental and friendship supports [223].
Which of the following is a sign that a child or adolescent may be the victim or perpetrator of cyberbullying?
Click to ReviewSigns that youths may be victims or perpetrators of bullying on the Internet have been identified. Parents, counselors, and other health professionals should be aware of [78,79,144,188,226]:
Signs of depression or anxiety, particularly when the Internet is not available or is inaccessible for periods of time
Signs of depression or anxiety when e-mails or instant/text messages arrive
Hopelessness or talk of suicide
Avoiding use of the Internet and/or devices, when it was an activity that was previously enjoyed
Academic difficulties or behavioral problems offline (e.g., not being on time at school, dropping grades, relationships suffering)
Withdrawal from friends and family
General aggressive behaviors
Viewing pornographic material on the computer
Sacrificing normally enjoyed offline activities to participate in Internet activities
Attempting to maintain level of secrecy about online activities (e.g., quickly turning computer off when parent is walking by, deleting browsing history, turning monitor screen off when someone walks by)
Is online or uses devices at all hours, including night
Attempting to hide devices or switching screens off quickly when someone walks by
Refusing to talk about what they are doing or who they are engaging with online
Beginning to display behavioral issues at home or at school
According to strain theory, which of the following is NOT considered a possible source of strain?
Click to ReviewStrain theory was introduced by Robert Merton in the early 1930s in his study of wealth. He asserted that whenever a gap or discrepancy between individuals' aspirations and reality exists, frustration will ensue, and individuals will be more likely use illegitimate means to accomplish their goals [58]. In the 1990s, Agnew expanded this theory to apply more broadly to economic aspirations. Agnew argued that people who experience strain are more likely to experience frustration or anger and are then more vulnerable to engaging in criminal or deviant behavior [59]. Sources of strain could stem from three sources: positively valued goals that are not achieved; loss of positively valued stimuli (e.g., loss of a job, loss of a romantic relationship); and presentation of negative stimuli (e.g., history of family violence) [59]. Although social institutions or persons (e.g., parents) can prevent deviant behavior, it is argued that repeated strains could weaken the bonds of these social control mechanisms [119]. It is important to note that strain and deviance are not causal; deviant behavior is a coping mechanism when strain develops [59].
Which of the following characteristics of the Internet may facilitate online disinhibition?
Click to ReviewThe following characteristics of the Internet may facilitate online disinhibition [60]:
Dissociative anonymity: A person can remain relatively anonymous online, with no name or a false name.
Invisibility: For the most part, the Internet, and particularly websites, blogs, and other text-based platforms, lends itself to the person's invisibility. In online communication, there is no concern about nonverbal cues and messages sent.
Asynchronicity: People can interact and communicate with each other in non-real time; there is no feedback loop that discourages negative behavior.
Solipsistic introjections: Because there are no immediate social and nonverbal cues online, one assigns a "voice" and "image" to another person. This process may be conscious or unconscious.
Dissociative imagination: It is easier for a person to dissociate online fiction and offline fact.
Minimization of authority: There is often minimal or no sense of who the authority figure is online. If there is an authority figure, his/her presence is minimized by social cues present in face-to-face interaction, such as attire, height, and body language.
In a 2017 report by the National Network to End Domestic Violence, what proportion of abusers used social media and other programs to stalk, harass, and control their victims?
Click to ReviewIn a 2009 study conducted by the Technology Safety Project of the Washington State Coalition Against Domestic Violence, a program designed to educate the community, domestic violence victims, and domestic violence advocates about the role of technology in domestic violence and promoting technology safety, one-quarter of the women had the browser history on their computer monitored, and 23.6% stated that they had received threatening e-mails repeatedly [71]. An additional 18% indicated that someone monitored their e-mails. However, a 2017 report by the National Network to End Domestic Violence notes that abusers often use electronic means to spy or eavesdrop on their victims. These researchers found that 97% of abusers used social media and other programs to stalk, harass, and control their victims, showing the growing use of technology in domestic violence and abuse [70].
The most significant psychologic effects of cyberbullying appear to be
Click to ReviewMany psychosocial effects of cyberbullying have been noted in victims. Youths who experience bullying of any kind often face academic problems, perhaps in part because they are distressed and preoccupied. Teachers will often report that victims' grades drop precipitously, and some will have other academic problems, such as cutting classes, increased detentions, and carrying weapons to school [54,73]. This may be the result of no longer viewing school as a safe place. Poor academic performance and behavioral problems have been found to continue for years after experiences of cyberbullying [150]. Adult victims have reported sleep problems, job dissatisfaction, and health and mental health issues [165]. The most significant psychologic effects appear to be depression and anxiety [233]. Depression is also associated with cyberbullying victimization, with victims reporting increased sadness, anger, and anxiety [74,233]. These negative ramifications appear to apply in many countries and cultures [125]. Situational characteristics (e.g., level of social support, emotional intelligence, coping skills, empathy) can moderate psychosocial consequences [165]. Those with higher levels of interpersonal emotional competence are better able to ameliorate the psychologic distress of cyberbullying better than those with lower levels [195].
Which of the following online behaviors is considered risky?
Click to ReviewParents, adolescents, and children should also be educated about the types of Internet behaviors that are considered risky, including [45; 95; 235]:
Posting a full name on publicly accessible Internet profiles, such as discussion forums, message boards, social media platforms, blogs, and/or chat rooms
Posting contact information (e.g., phone numbers, e-mail addresses, city and state) on the Internet
Posting photos of oneself on the Internet
Posting what is considered a provocative or sexy picture of oneself on the Internet
Sharing passwords, even with close friends
Creating what might be considered a provocative user name or e-mail address
Making one's profile visible to all Internet users
Creating a gender-specific e-mail address
Inviting strangers to one's social networking site
Accepting strangers to one's social networking site
Entering a sex chatroom
Agreeing to meet someone offline after minimal Internet exchanges
Downloading pornographic images from pornographic websites
Talking with a stranger about sensitive topics (e.g., sex, relationships)
Returning an e-mail from a stranger
Posting one's plans on the Internet (e.g., plans for the day or a specific time)
Using a webcam to talk to a stranger on the Internet
Accepting file transfers or links from a stranger
Posting rude or offensive comments
Visiting forbidden and/or pornographic websites
Which of the following steps may parents implement in order to minimize the chance of their child/ren becoming online victims?
Click to ReviewWith this in mind, there are safety tips parents may implement in order to minimize the chances of online victimization of their child or children [78]:
Place the computer in an area where there is a lot of traffic to prevent youths from being completely isolated, minimizing their ability to freely explore on the Internet.
Specify where laptops, smart phones, and tablets may be used.
Implement a schedule for Internet use.
Encourage computer and Internet use when a responsible adult is present.
Use screensavers of important people to prevent the person using the computer from falling into a trance-like state.
Social self-efficacy, a key skill in avoiding and preventing cyberbullying, is defined as
Click to ReviewImparting social skills, such as fostering empathy and self-efficacy, is also an important theme in cyberbullying prevention [200]. Educators, parents, and practitioners often assume that adolescents and young adults understand and know how to extend empathy and fairness, but this is not always the case. These individuals may benefit from education on how to respond to cyberbullying in a non-aggressive, empathetic, and thoughtful manner [200]. Adolescents who intervened or who were merely bystanders in cyberbullying situations score high on empathic levels, but adolescents who score high on social self-efficacy are more likely to intervene compared to those who scored low on social self-efficacy, who were more likely to engage in passive bystanding behaviors [87]. Social self-efficacy is defined as one's perception of oneself and perceived competence in navigating social situations and being assertive and proactive in interpersonal relationships. In other words, regardless of adolescents' ability to empathize with victims, perceived ability to do something effective predicts whether they will intervene. Furthermore, adolescents benefit from training in how to help friends or what steps to take to intervene as a bystander [237]. Thus, adolescents who score low on self-efficacy may not necessarily know what they can do to help, may be afraid of retaliation, or may be afraid of doing the wrong thing and exacerbating the situation [87]. Therefore, adolescents should be taught assertiveness skills for a variety of situations in order to minimize the pressure to conform to group norms. For example, prevention programs that emphasize peer support, peer mediation, and peer mentoring might be beneficial [87]. For example, researchers who conducted a recent study with Turkish adolescents found that those adolescents who were less empathic were more at risk for engaging in cyberbullying. Their study results demonstrated that the combined effect of affective (i.e., experiencing someone else's feelings) and cognitive (i.e., taking another's perspective) empathy played a vital role in influencing adolescents' participation in cyberbullying. In an experimental study that used a cognitive-behavioral model for empathy training, at two-month follow-up, adolescents who participated in the training maintained increased empathy levels and had reduced cyberbullying perpetration and victimization experiences [238]. Consequently, some experts recommend empathy training in an attempt to reduce participation in cyberbullying [125]. Teaching both affective empathy ("My friend's negative feelings as a result of experiencing cyberbullying do affect me.") as well as cognitive empathy ("I can understand why my friend who experienced cyberbullying is upset.)" is vital [125].
In cases of identified cyberbullying, victims may benefit from crisis intervention and counseling. The first stage of crisis intervention involves
Click to ReviewThe first stage involves assessing the client's level of danger. Depending upon the type of cyberbullying the victim experienced, the victim's level of distress may vary. Determine the severity of the distress and if the victim is at risk of hurting himself/herself. Equally important is assessing the victim's risk of being hurt by the perpetrator.
When the immediate stress from the cyberbullying crisis has stabilized, it is important to
Click to ReviewFinally, it is essential to follow-up with the victim. When the immediate stress from the crisis has stabilized, reinforce proactive techniques used by the victim to promote adaptation and coping [91]. It is important to reassure victims that fear is a normal response and the fear and anxiety experienced might last for a while, which is normal. Fear can be used in a positive manner to serve as a protective mechanism, ultimately empowering victims to be more proactive in taking online safety precautions [90]. When instances of cyberbullying occur, it is recommended that it is documented fully [129].
- Back to Course Home
- Participation Instructions
- Review the course material online or in print.
- Complete the course evaluation.
- Review your Transcript to view and print your Certificate of Completion. Your date of completion will be the date (Pacific Time) the course was electronically submitted for credit, with no exceptions. Partial credit is not available.