default_cyberbullying

Bullying Law Summary Fact Sheet Updated

We have just updated one of our most popular resources. You can find our latest bullying law fact sheet here. As you can see, all but 2 states now have bullying laws in place or scheduled to take effect in 2012. Most of these (35) include language about electronic forms of bullying while still relatively…

default_cyberbullying

What is the story with IsAnyoneUp.com?

One of the Internet’s latest privacy controversies surrounds the rapidly-growing web site Isanyoneup.com.  The site, which launched in late 2010, is essentially a hybrid of social media and amateur pornography – described by some media outlets as a blog for “Revenge Porn.” The blog features thousands of posts containing extremely explicit photos of naked men…

default_cyberbullying

Cyberbullies Move Beyond the Schoolyard

For those of you who didn’t see, I recently wrote a blog for Huffington Post UK to correspond with the cyberbullying event in London that I was a part of.  Here it is: Teens have been bullying each other for generations. The latest generation, however, has been able to utilize technology to expand their reach…

default_cyberbullying

Cyberbullying Event in London

On Friday, 25th of November, I will be participating in a discussion at Birkbeck’s School of Business, Economics and Informatics at the University of London. (for more information about the event, click here.)  There I will talk about what I have learned about how teens are using technology to cause harm to their peers, along…

default_cyberbullying

Cyberbullying and Substance Use

Much of our work over the last several years has focused on identifying the consequences associated with cyberbullying. We are especially interested in offline behaviors or experiences, as well as links to delinquency and school problems. And we are concerned with the outcomes of both targets and those who engage in cyberbullying. One particular problem…

default_cyberbullying

Education Week Teacher Book Club

One of the first things we learned in our earliest cyberbullying studies was that targets were not telling adults about their experiences. Even today, very few students who are cyberbullied talk with adults about what is going on. The concern we have heard from adolescents time and time again is that they are afraid to…

default_cyberbullying

Pause Before You Post

Technology is great and we know from our research that the vast majority of teens are using it safely and responsibly. But a few are creating problems for themselves or others by what they post online. That’s why we’ve partnered with Jostens to produce a number of useful resources for you to educate yourself or…

default_cyberbullying

Law Enforcement Perspectives on Cyberbullying

Much of our work to teach adults about what teens are doing online is directed toward educators or parents, but increasingly we are working with law enforcement officers – especially those assigned to a school setting (school resource or liaison officers). Like the others, police officers often find themselves in a difficult situation when confronted…

default_cyberbullying

Parents and Cell Phone Rules for Children and Teens

Apart from asking us “how young is too young for Facebook?” Justin and I often work with parents who have other questions about household rules they should have in place related to their child’s use of technology. We first state that parents should provide their kids with access to these devices a little bit earlier…

default_cyberbullying

Parents and Cell Phone Rules for Children and Teens

Apart from asking us “how young is too young for Facebook?” Justin and I often work with parents who have other questions about household rules they should have in place related to their child’s use of technology. We first state that parents should provide their kids with access to these devices a little bit earlier…

default_cyberbullying

Why Confiscating Student Cell Phones Might Be a Bad Idea

We’ve talked in great detail about students bringing their personal electronic devices at school and the complications that may result.  We have also covered standards for searching these devices, and have provided a cell phone search checklist which may help administrators in these situations. In keeping with these discussions, I wanted to take some time…