Author Archive

BULLYING AND GANGS-THE SIMILARITIES ARE UNDENIABLE

Posted on December 1st, 2016 by Dr Jean Healey

 

BULLYING MAY BE EVIDENT IN THE SET UP OF GANGS OF STUDENTS IN SCHOOLS. Teachers may be confronted with apparently benign ‘ groups ‘ of students yet feel or believe they are anything but benign in their intentions. Teachers feel that the students are a ‘ gang’ intent on harmful and disruptive behaviour, but how to define and approach the issue? It is helpful to understand the differences and recognise bullying as a gang activity.

Students who engage in gang behaviour in schools generally  defend their activities as ‘just being friends’ and ‘just doing stuff together’. Amazingly, these same arguments have been presented in courts of law to defend the illegal and intimidating activities of outlaw bikie gangs in Australia, who declare they are just friends out together for company!

‘ . ….. we really need to interrogate the issue
of youth gangs. Are they just friendship groups of kids hanging
out mainly in public spaces who occasionally engage in criminal
or anti -social behaviour? (Are they) gangs in the sense that they
have membership rituals, hierarchal structure of power and
patterns of systematic criminal activities?   ‘ ‘Collins et al. (2000)

For the purposes of this discussion, the relevant factors are the
differences in the legitimacy and intent of the ‘group’ as they impact on the running
of the school or on the community. Teachers, parents and community members
must be prepared to reject and report disruptive groups whose aggressive and
threatening behaviour and illegitimate activities clearly identify them as a ‘gang‘.
We cannot be distracted by cries of ‘unfair’ from groups whose intentions are
clearly harmful. In particular, gangs of bullies who roam together with the sole
intention of attacking others can quite legitimately be identified as such and called
to account.

Groups who are harmless in intention and actions can be legitimately regarded as friendship groups. ‘ Gangs’ on the other hand have a clearly questionable intent and often clearly damaging regime of activity. They need to be addressed as such and disbaanded.

ALEX WILDMAN COMPENSATION

Posted on March 21st, 2012 by Dr Jean Healey

bullying has serious impact

Alex Wildman was found dead by his mother in the garage of their home in Lismore, NSW in 2008. He had taken his own life at just 14 years of age. Alex had been bullied by a number of his peers for months at his school with verbal and physical abuse, online social network site postings and text messages. He was frequently bashed and excluded by other students. His last bashing was filmed on a mobile phone but the school  refused to act and deleted the images without informing police.

This week the Wildman family received compensation from the NSW Department of school education after a protracted court battle for justice for their son. See the report by Paul Bibby in the Sydney Morning Herald March 17th 2012

http://www.smh.com.au/nsw/bullied-teens-family-get-payout-over-death-20120316-1vajd.html#ixzz1pKXCaXqP

 

CYBERBULLYING – DEFINITIONS AND IMPACT

Posted on February 28th, 2012 by Dr Jean Healey

CYBERBULLYING –DEFINITIONS AND IMPACT
Cyberbullying is a relatively new form of abuse which has developed in light of the social networking revolution which allows access to and communication with a broad range of individuals and their private lives. The impact of the abuse is well-documented and the consequences have been devastating for an increasing number of individuals to date. Bullying has been shown to have the same impact as other forms of childhood abuse
(See Peer abuse as a legislated child protection issue for schools.)
1327-7634 VOL 10, NO 1, 2005, PP. 59-71
AUSTRALIA & NEW ZEALAND JOURNAL OF LAW & EDUCATION
Young people have adopted social networking by ‘proxy’ as a replacement or supplement to social networking in person. To adults, teachers, parents and the community this is something of a concern. It was recently suggested that soon we will no longer need the local ‘park’ for young people to hang out together-they can now do it without leaving their home or bedroom and the company of their computer. Alarm bells must be sounded if this is the extent of social interaction for a young person, but as a means of meeting and communicating with others of similar age and interests, it may complement the real world of relationships. Gennaro and Dutton (2007) express concern for the social development of young people engaged in isolating internet usage, and suggest the activity may exacerbate anti-social behaviours.
Lenhart et al.(2010), state that in the USA, 73% of young people 12-17 used internet social networking sites in 2009 and this represents an increase from 58% in 2007. They also state that 82% of young people 14-17 and 55% of younger adolescents have a social networking profile page. Australia is a global leader in the use of SMS text messaging and mobile phones are the most common medium used here for cyber-bullying. (Dooley, et al. 2009)
Definitions of cyberbullying are closely linked to current definitions of other forms of bullying.Each refers to ongoing, repeated, deliberately harmful comments and statements which demean and offend the target individual. Both types of bullying represent abuse, not conflict as is often suggested. Indeed dealing with bullying as a matter of ‘conflict ‘ between two individuals denies the target of the bullying their due protections. It is interesting to note that in all the current literature no definition of either bullying or cyberbullying refers to conflict.Cyberbullying can become an extreme form of abusive behaviour having a serious and often permanent impact on the recipient individual.
DEFINITIONS
Cyber-bullying is defined by Hinduja and Patchin (2010) as:
wilful and repeated harm inflicted through the use of computers, cell phones (mobiles) and other electronic devices’
They add further that cyber-bullying refers to:
‘incidents where adolescents use technology,….to harass, threaten, humiliate or otherwise hassle peers’.
Dooley, et al. (2009) simply refer to cyber-bullying with reference to traditional definitions and add that it constitutes,
‘bullying in an electronic medium or via technology’
The similarity to other forms of peer abuse is obvious, however the major defining feature is the involvement of technology to frighten and abuse others. Other key components of the accepted definitions of bullying or peer abuse, are probably also relevant to cyber-bullying. These include intentional harm, repetition and power differences. (Healey 2011). Some analysts however, question this. Belsy (2004) omits reference to power differences in the definition he provided:
‘the use of information and communication technologies to support deliberate, repeated and hostile behaviour by an individual or group, intended to harm another’
This may indicate that the power differential is seen as negligible when the abuse is distant and impersonal. Also the social power status of the abuser may be less than that of the victim, but the anonymity and reach of the technology as a weapon for abuse invests the socially less-powerful individual with a greater degree of control and power than they usually receive. This is a new dimension in peer abuse or bullying which requires further scrutiny.
Further the criteria for ‘repeated’ abuse changes with the internet environment. If the image or message is posted only once, but the recipients and viewers are numerous, is this the same as repeated bullying? (Cross, et al., 2009). Kowalski, Limber & Agaston (2008) notes that the methodologies are varied and therefore impact may differ. Young people can use their personal profiles to vilify others, list people they don’t like and denigrate others; they can assume virtual personalities or use online game and chat rooms to spread rumours, exclude individuals and disseminate abuse and private information. To some extent the limits of the usual definitions of peer abuse become apparent with further analysis.
There are a number of salient factors which differentiate cyber-bullying from others forms of abuse, including the fact that the abuse can be undertaken anonymously. The bully can screen their identity by using anonymous email identities, pseudonyms and other internet veils. At least when bullying occurs in a social environment, the victim and others are witness to the abuse and may well initiate intervention. In some ways the internet facilitates the abuse but also changes the dynamics. The bully cannot see the immediate response of the victim, but may hear from others how upset they are. This style of secretive, sneaky abuse, which relieves the abuser of the immediate responsibility for upsetting the victim, suits the covert bully.
It is a major focus for educators and parents to provide the information necessary for young people to be protected, to be encouraged to be vigilant and to take responsibility for their postings. However, it is true to say that many teachers and parents do not feel they are as computer – and online – savvy as the young people they are trying to protect. For this reason, general messages about self-protective behaviours need to be reinforced beyond the computer, and the acceptance of responsibility in all phases of life and behaviour needs to be encouraged. This includes developing an awareness of the types of predatory behaviour that can eventuate from casual meetings online, and of course is relevant to the discussion about bullying in cyberspace.
For further discussion of cyber bullying see: www.bullywatch.com.au
Dr. Jean Healey has extensively researched many aspects of bullying. You can download a FREE e-book here about cyberbullying. and find resources and information to assist in managing bullying. © Dr. Jean Healey, All rights reserved worldwide.