Karen R. Gresham Counseling Center

Hi Everyone! Welcome to my little corner of the web. If you have anything to share, add, or ask...just add a post to my blog. Have a beautiful day and thanks for visiting me!



:)Karen

Wednesday, July 14, 2010



Here is my link to my RSS feed.

CBP

Here is my Cyberbullying Podcast. Please feel free to listen. The speakers are interviewer-Rachel Gresham and author/speaker-Karen R. Gresham. The information was taken from the following references:


Belsey, Bill. (2004). Cyberbullying website. Retrieved from http://www.cyberbullying.org

Hansel, C., Shields, L., & Trolley, B.C. (2008). School cyber bullying: Description, assessment,
& therapeutic intervention. Journal of Technology in Counseling, 5(1), 1-15. Retrieved
from http://jtc.colstate.edu/Vol5_1/Trolley.htm

National Crime Prevention Council. (2010). Cyberbullying. Retrieved from http://www.ncpc.
org/cyberbullying

Stop Bullying Now. (2005). Cyberbullying. Retrieved from http://www.stopbullyingnow.hrsa.
gov/adults/cyber-bullying.aspx

Thursday, July 1, 2010

Cyberbullying: What it is and how it affects YOU

Check out this SlideShare Presentation:

Cyberbullying video from You Tube

The Secret World of Cyberbullying

Back in the 1980s, a noteworthy country male artist, Charlie Pride, had a song on the radio called, “Burgers, and Fries, and Cherry Pies”. In this song Pride sings of a world where things were simple and life was friendly, happy, and relaxed. This down-to-earth moment in history was the 1950s. Norman Rockwell, a popular artist of the twentieth century, painted depictions of those days. His works of art show a clean-cut image of America that some might say is long gone. Today we have a nation that is filled with hustle and bustle, invention, modern thought, multiculturalism, and technology. Technology, for instance, has driven the communication in our universe to new dimensions. While these improvements are profound movements in the positive direction, some have their drawbacks, as well. One shortcoming of technology is a popular problem among teenagers, cyberbullying.

According to Bill Belsey, President of Bullying.org (2004), “Cyberbullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others” (Contact section). According to an i-SAFE survey of kids in the fourth through the eighth grades, 58% of children say that they have received malicious messages from others while online. Fifty-three percent of these children claim that they have made cruel remarks to others online. Finally, 35% of these same students state that they have even been endangered while on the computer (Hanel, Shields, & Trolley, 2007). These statistics are alarming; clearly, there is a problem. What do these bullies do to create havoc in another’s life?

These intimidators use a number of technologically-driven avenues to torment their victims. By use of email, instant messaging, texts over the cell phone, blogs, discussions inside live chat rooms, and websites (like Facebook or Twitter), the tyrants send unpleasant, offensive, or menacing posts, act as if they are someone else, send confidential information out to others about another person, or purposefully keep someone from participating in an online conversation (Stop Bullying Now, 2005). Some cyberbullies even send humiliating pictures of others, without their knowledge or permission (NCPC, 2010). These oppressors know how to terrorize a teen’s mind.

Bullies over the computer are hard to define. Yet, according to Hanel, Shields, and Trolley (2008), they may be authoritative, controlling, manipulative, and domineering. Some have been bullied themselves. Others think it’s humorous and do it for fun. Still others use scare tactics to alarm their prey. Lastly, a number of these perpetrators don’t even know that what they are doing is wrong. Parents, school officials, and counselors can become suspect of a child when he/she gets upset when it’s time to put up the computer, when the child uses a computer excessively or stops using it altogether, when a kid won’t discuss his/her use of the computer or doesn’t want the adult to monitor the screen, or when the youth has several types of computer accounts. Hanel, Shields, and Trolley (2008) also state that the usual cyberbully gets along well with his/her teachers, but has a personality off campus that appears in opposition to his/her peers (p. 3).

Because of this growing dilemma, schools are starting to get involved. Many schools do not allow this type of behavior and have harsh penalties for it. Computer bullies are being suspended or even expelled for their actions. However, Hanel, Shields, and Trolley (2008) favor trying to help the bully, instead of punishing him/her. They believe that by having a counselor assess the child and inquire about the child’s home life, values, morals, ethics, friends, and overall mental and physical status, the therapist will be able to find the correct motivation to get him/her to change. Possible treatment may include different kinds of cognitive-behavioral therapy, acting out different scenarios, letters of confession and regret, and bibliotherapy (p. 8). In addition, some schools now have a computer policy that both the user and parent must sign, prior to the student being allowed to access it in the classroom. This document serves to inform all stakeholders of what’s acceptable at school and what will not be tolerated (Hanel, Shields, and Trolley, 2008). Finally, it was noted that the counselor can educate the staff and the students about cyberbullying by offering character education assemblies and classroom lessons (Hanel, Shields, and Trolley, 2008).

By sharing information about this new phenomenon, counselors can also discuss what to do if a student becomes another statistic and victim of this type of abuse. Students are requested to not respond to the negative messages, however, they are also asked to save them. By saving them, parents and counselors can go through the internet provider and track the sender. Counselors and parents can investigate to find out who sent the memo. Police can be contacted if a threat has been issued. Lastly, if communication takes place at school, counselors and other administrators can intervene (Stop Bullying Now, 2005).

There are measures that can be taken to prevent cyberbullying from occurring or escalating. Awareness is one proactive stance that was mentioned previously. The counselor is a perfect advocate for educating the school and the community (NCPC, 2010). Bullying.org (2004) does mention some excellent tips on how to keep our youth safe. Teenagers should not reveal any confidential or private information about themselves over the computer. Children are encouraged to think before they send an angry message out to someone. Once the message is sent, one can’t take back what he/she said. Emails from individuals that are not familiar to the user should not be opened. Parents can draw up a contract with their kids. The contract can state that the parents are to be notified if the child is being bullied. In the end, a wise decision is to turn off the computer and find another activity. Anything done in excess is not healthy (An Ounce of Prevention section).

In conclusion, our ever-changing society has many perks and wonderful innovations that help make life even better. Nevertheless, these devices do have a few downsides. Cyberbullying is just one of the disadvantages of our highly technical world. Through my research, however, it looks as though educators, communities, and families are finding practical ways to combat this nuisance. With further investigation and knowledge gained, cyberbullying hopefully will be a trend of the past someday.

References

Belsey, Bill. (2004). Cyberbullying website. Retrieved from http://www.cyberbullying.org

Hansel, C., Shields, L., & Trolley, B.C. (2008). School cyber bullying: Description, assessment,& therapeutic intervention. Journal of Technology in Counseling, 5(1), 1-1 Retrieved from http://jtc.colstate.edu/Vol5_1/Trolley.htm

National Crime Prevention Council. (2010). Cyberbullying. Retrieved from http://www.ncpc.org/cyberbullying

Stop Bullying Now. (2005). Cyberbullying. Retrieved from http://www.stopbullyingnow.hrsa.gov/adults/cyber-bullying.aspx