Password Management Software for Teens

Posted by Sameer Hinduja on July 30, 2015

password safety appThink about how many times every day you use a password on a phone, computer, social media site, gaming network, or another online account. Passwords are a huge part of our daily lives. Technically, they serve as authentication to identify people as being who they claim to be. Correct authentication is supposed to prevent others from accessing or altering your personal data, so passwords should be kept very secure. Unfortunately, some people put themselves at risk of cyberbullying, identity theft, or other dangers by sharing or exposing their passwords. For instance, we’ve asked hundreds of groups of students if they know any of their friends’ passwords. The majority say ‘yes’ every single time!

I’d chosen to give my Facebook password to one of my “best friends.” She was friends with a girl who I’d been having some bullying problems with. One day my “friend” was at my enemy’s house and decided to get on my Facebook and delete all my pictures. Then they took a picture of this boy that I really liked and put it as my profile picture. They wrote all over my profile so all my friends saw it. It was really stupid, but it hurt me so badly.
~ 15 year-old girl from North Carolina

Maybe you would never share your passwords on purpose. However, you still might reveal them accidentally. A lot of people store and remember their passwords in ways that make it easy for others to find them. One person might leave her passwords on a sticky note next to her computer, or taped under her keyboard. Someone else might save them in a text file or Excel spreadsheet right on his computer’s desktop. Another person might even leave them in a small notebook that she carries around in her backpack or purse, or in the Notes app on her phone. It doesn’t take Sherlock Holmes to notice these sorts of things! And, not only are they easily discoverable, they are also easily lost or deleted.

Even if you’re careful about never putting your passwords in easy-to-find places, and even if you never share them with others, that doesn’t mean they’re completely safe. For example, some websites have security questions that let users retrieve forgotten passwords. If the user answers the questions correctly, he gets an email with a link to reset the password. Common password hint questions include “What is your pet’s name?” or “What is the first car you drove?” I know Justin’s pet’s names, and the first car he drove – and if I can get into his email account, I can consequently access a lot of his other information, too. And that might allow me to change passwords on his other online accounts— simply by having access to his email and knowing a few basic facts about him. Of course, I could also impersonate him, lock him out of his profiles, delete his carefully curated images and posts, or even do something criminal via his account. The possibilities are endless, and this can (and has) happened to many people.

Plus, some individuals tend to use the same password for multiple accounts— school and personal email, Facebook, Twitter, Instagram, Skype, eBay, PayPal, and more. That makes it easy to remember, but it also means that if someone finds out the password to a single account, he can then get into all the other ones, too. As such, it’s wise to have a different password for every site or account you use, and to keep track of all your passwords in a way that’s safe and secure, yet still convenient. We would therefore like to recommend some software solutions that will help you keep a tight leash on your private information. We’ve evaluated each of these password managers, and list out with the pros and cons below. Whichever method you use to keep track of your passwords, just make sure you figure out a solution that doesn’t leave you vulnerable to cyberbullying or other online risks.

LastPass

How convenient would it be to only have to remember one master password that allowed you to safely use all of your favorite apps and sites without having to also remember the unique account information for all of them? LastPass allows you to securely browse the web, and log into all your favorite sites by only having to remember one master password, and the best part is the automatic form fill feature. This allows you to input all your personal information one time, and then it will remember everything for any future use. According to the LastPass website, we should be using passwords that look like “KQo=3oyB>VXG^-6.” With that being said, it is unrealistic for any of us – especially teenagers – to create and use ones like that because of their complexity and difficulty to remember them. LastPass, though, will generate all of these tedious but very secure passwords for all your different accounts, remember them, and populate the appropriate form fields with them at your online account sites. It can also import and use the login and password information you’ve already saved in your web browser.

Furthermore, LastPass provides a great feature called a “secure note” which allows you to keep everything from your social security number to your bank account information to your health insurance details, all sorted out in sections, but allowing you access them in one spot. It even allows you to attach pictures and videos, which is a great way to ensure that your private photos stay private even if someone else obtains access to your phone. LastPass offers different methods of overall security; one of my favorites is a fingerprint feature for unlocking your phone (regardless of its model or version). Other methods of screen unlocking are swiping, patterns, pins, and passwords. It also provides full Web-based access to all of your login and password data (encrypted, of course). LastPass offers a free 14-day trial, and then you have the option to sign up for a $1.00 monthly charge for unlimited premium access. The bottom line is that you can create an account with one password, and LastPass will do the rest. You can access your account on your mobile device, laptop, and desktop computers, as supported platforms include iPhone, Android, Linux, Windows, and Blackberry.

Dashlane

Dashlane is a product which also has the master password, auto form-fill, and digital wallet features like LastPass, but comes with a few notable features. First, it allows you to set an emergency contact who can have access to limited information of your choosing in case of some sort of emergency or death. It also allows you to record all of your online purchases by saving your receipts and any relevant screenshots you might want to include. In addition, Dashlane offers an automated password changer. We all know we are supposed to change our passwords regularly, but very few actually prioritize this task (don’t feel condemned, we understand! J). With the simple press of a button, Dashlane will recognize all your weak passwords and suggest a change. You then have the option to change one or multiple passwords at once. And again, the best part is that they can be convoluted and abstruse, but you don’t have to remember them as that is what the software does for you. Like LastPass, it creates and stores an encrypted backup of all of your login data in the cloud, and allows you to login and see it from any browser.

To increase the security of your account, you can also use two-factor authentication via Google Authenticator. Basically, this adds a layer of protection by validating devices that you seek to login with, and sends you a code via text to your verified smartphone – which you’ll need before you want to access Dashlane on any device. You might think this precautionary measure is overkill – but it is worth the extra ten seconds to receive and type in a code so that just knowing the master password won’t be enough.

Dashlane intuitively walks you through the app on your Android or Apple device, making it very user-friendly. You have unlimited, basic free access to this application and a 30 day premium trial. Dashlane is on the expensive side, but our priority is maximum security. For $39.99 a year for premium membership, you can feel safe when you access your bank account, when you go online shopping, and with their auto-login feature you will save a lot of time! The software even allows you to set an emergency contact, in case of any critical matter. This emergency contact then would have access to limited information of your choosing, should you die or be otherwise incapacitated. Another cool thing is that you can tie multiple pieces of the same type of personal information to one identity. For instance, you might want to have two phone numbers or two email addresses to one – it allows you to do that. Finally, Dashlane lets you keep a history of all your purchases by allowing you to screenshot online transactions and receipts. Dashlane currently supports PC, Mac, Android, and iOS devices.

SplashID

The SplashID password manager is very elegant and user-friendly, and like the others stores your passwords, credit card information, and anything else you can think of inside of “Business” and “Personal” Categories. As silly as it may sound, you can even store size information for clothes, shoes, etc. (right now, I actually have size information in my Notes app for my home’s air conditioning filters, my car’s air filter, the ring sizes of loved ones, and so much more – and could use this app instead!) A downside to this app is the lack of auto-fill. For example, if I created an account with my basic contact information on it (like my first name, last name, address, city, state, zip code), it would not pre-populate the same fields on another site asking for the same information. I’d have to enter all of my details again. Like the aforementioned managers, SplashID offers strong password generation, and all you have to do is remember your master password. You are also provided with one master password hint, in case you forget it.

After installing this product, you have free access to basic protection, or for 19.99 a year you can use their Pro features, which gives you priority customer service 24/7 and the feedback on the latest security threats. Unlike many of the other password managers, SplashID automatically syncs all your information to the Cloud (automatic secure storage accessible through many devices). This app also has a very cool feature that I did not notice while using other password managers: if you are idle for any specified amount of time from your phone, the app automatically logs out. While evaluating the other programs, I definitely became aware that if I did not manually log out, the app remained open and therefore my private information was at risk if I left my phone somewhere. This app is accessible on iOS and Android devices, Blackberry, Windows Phone, webOS, and Palm OS smartphones, and there are also desktop versions for Macs and PCs.

RoboForm

RoboForm is also a solid choice as a password managers as it can help you generate and remember very strong credentials for all of your sites. I personally don’t think that it is as user-friendly, elegant, and visually attractive as SplashID, for instance, but it has all of the necessary features to store your login information and related notes, and you are able to save different identities for different websites. For example, you may have one profile saved with your credit card information for all of the sites at which you make purchases, and another identity for all other sites that do not ask for credit card information. This allows you to provide or automatically input the appropriate information at the proper online destination – not too much, and not too little – by simply selecting an identity. RoboForm – like Dashlane – also allows you to tie multiple pieces of the same type of contact information to a single identity if you wanted to do so (e.g., three street addresses to one profile).

One downside is that there hasn’t been a major feature update in a while, and so it seems the software hasn’t stayed up-to-date with the various changes in web development. For example, it doesn’t properly fill every single pop-up window or JavaScript window that might prompt you for login information. Accepted platforms for RoboForm are Windows, Apple, Android, and Linux – and it syncs across all of your devices. You can use RoboForm for a 30 day free trial and then you have the option to continue your membership for $9.95 for the first year. Cool tip: RoboForm offers free unlimited use for college students and professors!

Norton Identity Safe

Norton products are well-known and respected for their antivirus protection capabilities, and now has this new feature which you can download on your computers and phones for free, and use to securely store all your important personal information in one app. It also warns you of malicious sites that might compromise your identity and seeks to alert you if there are any rogue scripts or elements in place so that you don’t fall prey to “phishing” schemes (where the site seems legitimate but is actually fraudulent). This software is very user-friendly and simple to install and set up. You can import passwords stored in your browsers (but not from other password management applications you may have used in the past). Then, when you input your information in a new site, it does what all of the others do – saves it and subsequently fills in that information when you revisit that site in the future. Norton Identity Safe, like the others, offers syncing to the Cloud, but the software itself does not have a password generator to help you create stronger passwords. In addition, it performed less optimally than Dashlane or LastPass in storing all passwords I typed in, and populating all of the form fields at various sites. This program is available for Windows, Mac, Android, and iOS.

Password Genie

Password Genie provides you with all the basic essentials; auto-filling for forms, browser import, you can have access to your account in up to 5 devices with unlimited users, and if you can’t find a category to save your most important documents, you can add your own. Like all the other apps, you have to create a master password, and as you are creating it Password Genie will let you know how secure your password is and advise you to make it stronger if necessary. It also recognizes whenever you input updated information at various sites, and consequently updates its own database. It also deserves comment that this product does a better job than others on unusual login situations (for instance, my bank has a two-page SiteKey system which it could handle).

Another useful feature if you ever get into a pinch is that Password Genie offers live chat help, and remote viewing and access for the desktop version. The remote viewing and access allows the support agent to access your computer as if they were in front of it themselves to investigate any problem the program might have. The software does not, however, import passwords and content from other management programs (although it does allow you to do so from browsers when you install it). Plus, you can store various kinds of personal information in it – but it does not then take that information and use it to populate form fields on various sites. Rather, it only acts like a glorified vault (and for that purpose, I’d rather just use my Notes app on my phone). Password Genie is now available on Android, Mac, and Window devices. Basic free access is available, and it provides an option to upgrade to a premium version for $11.99 a year.

So – what should you use? Here are my recommendations, in order of preference: LastPass, Dashlane, Roboform, SplashID, Norton Identity Safe, and Password Genie. The top two are the best, in my opinion, because they do everything you’d want them to do and their software versions keeps getting better in meaningful ways (such as adding fingerprint authentication!). LastPass is comprehensive and outstanding in its feature-set and perfect for power-users who want customization and flexibility. Dashlane does pretty much everything LastPass does, but is a bit more attractive and user-friendly (at the cost of flexibility). You should pick one of those.

A final caveat: In addition to using a password manager, don’t forget to change your password regularly. No matter how unusual and hard to guess, it could be compromised without you even knowing it. Sometimes hackers access passwords by finding security holes in databases for popular websites and online stores. Once a cyberbully or hacker has gotten to your password, he might also be able to find your name, email address, and other personal information which could then be used to steal your identity. Sometimes the companies or websites themselves don’t even know that the information has been stolen until weeks or months later. So it’s best to change your password at least once a year. Pick a time of year that will remind you to make the switch. Get in the habit of changing your passwords at the start of each school year, on your birthday, or on some other memorable date. Just make sure you don’t let passwords get stale! As they say, forewarned is forearmed – and using a software-based manager will definitely reduce your vulnerability to victimization, and all of the stress, headaches, and heartache that goes with it. And encourage your students to do so when you see them at the beginning of this school year. It might take a few minutes to set up (like anything worth doing!), and you won’t regret doing it but will regret not heeding this advice.

Image Source: http://www.ecloudtimes.com/wp-content/uploads/2015/01/password-manager-windows-top.png

 

 

 

 

 

 

 

 

 

 

 

Cell Phone Safety: Top Ten Tips for Teens

Posted by Sameer Hinduja on February 16, 2015

By Sameer Hinduja and Justin W. Patchin

This Top Ten List specifies what teenagers need to keep in mind as they use cell phones at home, at school, and in vehicles.

Hinduja, S. & Patchin, J.W. (2015). Cell phone safety: Top ten tips for teens. Cyberbullying Research Center. Retrieved [insert date], from http://www.cyberbullying.us/Top-Ten-Teen-Tips-Cell-Phones.pdf

Download PDF

Technology Use Contract

Posted by Justin W. Patchin on October 8, 2014

By Sameer Hinduja and Justin W. Patchin

Use this Technology Use Contract to establish an open line of communication regarding the child and parent expectations when it comes to using technology.

From: Hinduja, S. & Patchin, J. W. (2015). Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying (2nd Ed.). Thousand Oaks, CA: Sage Publications (978-1483349930).

Download PDF

Anonymous Postings on Confession Pages, Secret, and Whisper

Posted by Sameer Hinduja on April 11, 2014

Confessions Pages, cyberbullying What many adults don’t understand, they freak out about. Especially as it relates to teens. I’m generalizing here, but you know what I mean – we really don’t want the youth we care for to be having secrets, telling secrets, and keeping secrets away from us. Because we don’t fully trust them, either due to past experiences or due to messages from current events and the popular media. Well, in this environment we have seen the increasing popularity and notoriety of online mediums and platforms over which teens (and adults) can anonymously say whatever they want to those around them (see Justin’s post on Yik Yak) or to a larger social grouping. And it’s worth taking some time to discuss these, so that we know fact from fiction and don’t overreact.

To begin, Confessions sites on social media have received some attention in the press over the last year, and here at the Cyberbullying Research Center we continue to regularly hear about the experiences of teens on Facebook- and Twitter-based pages. . Confession pages allow anyone to share personal secrets, rumors, gossip, and anything else they might want others to know about but are hesitant to post publicly or in a way that is tied to their identity. And, of course, everyone who knows about the page (in a community, or school or other organization) can “like” it and thereby can stay in the loop by receiving its updates in their either in their News Feed or via the Twitter account they are following. At this point, they can then participate as a voyeur, or more actively by liking, commenting on, or sharing specific confessions. 

iowa confessions twitter page

 

 

 

 

 

 

 

 

 

 

 

As an example of how it works on, say, Facebook, a user first creates a “Fan” page (meaning, a page that represents a group or brand or entity, instead of a “Profile” page for themselves. Facebook does not require creators of “pages” to reveal their identity. Visitors can then send private messages to the page with specific confessions, and the administrator of the page then posts them publicly to the Wall for all “followers” to see. Another way to keep posts anonymous is to create an email account specifically to receive confessions from others, or set up a form via free online tools such as Google Docs (or Survey Monkey, or even an Ask.fm page). Then, “confessors” can clink on a link, open up the form, share their confession without giving any identifying information, and click “send.”  The person behind it all then receives these anonymous confessions via email, and then can post them for all to see.

Outside of using Facebook or Twitter, other confessional platforms for smartphones have recently gained traction. Secret is a new app that recently came out for iOS (Apple) users only and has been described as an anonymous “community with no names, profiles or photographs.”  When you make a post, it sends it to you and also to a select subset of your friends (i.e., your contacts), and possibly friends of those friends – all of whom (of course) must have the app (or they are not involved at all). The more people like it within the app, the further it will spread. More secrets are shown to a user when they have more friends (based on unique algorithms), with the primary goal being to ensure secrecy and prevent people from finding out who truly said what. According to the creators, “We built Secret for people to be themselves and share anything they’re thinking and feeling with their friends without judgment. We did this by eliminating profile photos and names and by putting the emphasis entirely on the words and images being shared. This way, people are free to express themselves without holding back.”  They also mention that the anonymous nature of Secret allows for people to like, comment, and re-share other people’s posts that may be considered controversial, giving them the freedom to endorse anything without shame.

Similar to Secret is Whisper, which allows users to post anonymous confessions written on different images and is available for Android devices as well. Basically, you are asked to create a username and PIN, upload or select a picture from their vast library, add a custom filter, and then add custom text (whatever you want to whisper to the world). Then, you can decide to share your location, post it with hashtags to enable others to find it, and share it on other social media platforms. People who see it can like it and leave comments just like we’ve grown accustomed to on Facebook and Instagram, and can also share it across other platforms. Oh, and users can private message each other – which I think is an interesting feature which may provide the app with more “stickiness” and frequent usage than other apps. Whisper never knows who you are, doesn’t access your phone’s Contacts, and shows anonymous posts from all over the world (instead of just from your friends).

Anyway, in an effort to prevent bullying and “reduce negative comments,” Secret recently stated that it is “adding features that detect when people’s names are typed into in messages and warn those who would include them to think before they post.”  Relatedly, Whisper’s CEO, Michael Heyward, stated that their app does not allow people to “use anonymity to hurt anyone else.”  In other words, users are not permitted to use proper names in posts (unless they are names of public figures). So, for instance, “Justin Bieber is okay, but Justin from Spanish class is not. Whisper also employs 120 human moderators to comb through posts in real time” (see here for more information).

Anonymous confession posts can vary from sexual fantasies for another student, to a crush on someone, to revealing one’s sexual orientation or another thing that may often be stigmatized or judged. Other posts are cruel and hateful, and clearly represent cyberbullying:

twitter-confession-high-school

 

 

 

 

 

 

 

 

 

 

 

Students do understand the negatives that arise when these sites are embraced within certain populations. One recently stated to the media that “they degrade people and make them feel unnecessarily bad about themselves.”  But even so, confession pages have garnered tremendous popularity in some circles for the same reasons that other novel environments breed cyberbullying. As we know, people are “more likely to speak their mind” online if their “words can’t be traced back to them.”  Furthermore, (and as Justin recently stated) teens are “hungry for an online environment where they can interact and communicate that is outside the prying eyes of parents.”

In terms of solutions, victims should always take the time to report these pages on Facebook or Twitter, as they violate their Terms of Service IF (and only if) what is being posted is harassing or threatening. To encourage this, you should remind teens that reporting a problematic account on Facebook or Twitter simply alerts the site to look into it and respond. It does not “out” the person reporting. To reiterate, when you follow the Report links on pieces of content provided by these companies in their site and app infrastructure, the person about whom you are reporting does not get any type of notification that you are the one who reported on them. While I don’t have any experience yet working with the creators of Secret and Whisper, I hope they will follow in the footsteps of Yik Yak and do what they can to combat harassment, threats, stalking, and hate speech because it is in their best interests to create a user community that flourishes in a healthy and functional way.

Schools which struggle with fallout from confession pages or apps must always remember that they can discipline students for their online expressions if it substantially interferes with the learning environment or infringes upon the rights of another student (to feel safe, comfortable, and supported at school). And while it may be difficult to discern the identity of who posted what, it’s not impossible since every posting has a digital footprint (which we will explain further in a future blog). We’ve fleshed out these clauses in great detail here and here, in case you need a refresher. With specific regard to Secret and Whisper (and current and future apps with similar feature-sets), it’s quite likely they will go the way of previous platforms like JuicyCampus.com and Formspring.me) because most eventually devolve into a “network full of lies and hate.” We just have to continue to educate teens to watch their words even when presented with a prime opportunity to be disrespectful or cruel towards someone else. These opportunities will often be turning points in their lives that dictate how they turn out. As such, taking the narrow road in spite of internal and external pressure to do otherwise is what they need to habituate now, so that it becomes their regular course of action during adulthood.

Outside of the cyberbullying issues, though, it’s important to discuss some of the positives of these environments when considering these environments. Not doing so is neglectful because the use of technology is always a double-edged sword. A DV High Confessions page administrator has commented that although Confession pages “stirred up drama,” they were a “great way for students to voice their thoughts and feelings,” because “these days, there’s a crazy amount of stress that just comes with being a teenager and in high school alone, so being anonymous makes it easier for people to express themselves.”  And so it brings teens together to vent, commiserate, and find common ground in each other’s experiences, which reminds them that they are not alone and that their situation (as painful as it may be) is survivable.

amherst confession 1

 

 

 

amherst confession 2

 

 

 

 

 

 

 

cypress confession 3

 

 

 

 

 

fremont confession 4

 

 

 

 

 

 

fremont confession 4 response

 

 

 

 
 

 

 

 

 

 

 

 

 

whisper saved life

 

 

 

 

 

 

 

 

 

 

It doesn’t happen every single time, but it does happen a lot: teens are not sociopaths, and have good hearts, and do take the time to reach out and extend kindness towards one another in this way. And it clearly matters and makes a difference. Perhaps similar to your own personal experiences growing up, I remember clearly how difficult adolescence was, and how at times I felt like the tornado of emotions and stress and insecurities and pain and pressure that swirled around me was going to swallow me whole. And I did have a couple of online pen-pals at that time to whom I felt free to pour out my heart and vulnerabilities in ways I would simply not feel comfortable expressing to my parents, or a school counselor, or even a friend in real life because words typed with my fingers flowed easily while words spoken from my mouth fumbled and sputtered and tripped on themselves as I tried to convey how I felt. And those people were kind to me. Having this outlet and connection helped me so much, just like it is helping so many teens right now. And that is the story with pretty much every technology.

I remain incredibly aware of, and sensitive to, the potential for cyberbullying with these pages and apps, but never want to dismiss an app outright until we have had time for its possibly positive uses to surface. As youth-serving adults, we need to constantly support positive, healthy, and healing self-expression online and offline, but still set and hold to a hard line on expressions that harm others. Education, awareness, reminders, consequences, empathy-building, and conflict resolution skills continue to be most important in combatting harassing and threatening speech made via technology or in the real world. Who knows how long Secret and Whisper and Confession pages on Facebook and Twitter will attract attention. And even when they lose their luster, there will always be other apps and even networks (e.g., Tor) that provide anonymous communications and functionality to users. As such, I’d rather we focus our efforts on building an ethical and character-based foundation for decision-making within our youth. This way, they ideally do the right thing irrespective of whether everyone is watching them or no one knows who they are.

Image sources:

http://www.thirdparent.com/wp-content/uploads/2014/02/twitter-confession-high-school.png
https://www.facebook.com/Amhersthighconfessions
https://www.facebook.com/confesshs
https://www.facebook.com/pages/Fremont-High-School-Confessions/425401247544037
http://www.economist.com/blogs/schumpeter/2014/03/anonymous-social-networking

 

Yik Yak

Posted by Justin W. Patchin on March 7, 2014

(Please see my December 2014 follow-up blog on Yik Yak here after reading this entry…)

yikyakThere is a new cell phone application that is gaining notoriety at the speed of light among some groups of teens (as well as their teachers and parents). In essence, Yik Yak is pretty much a location-based anonymous Twitter feed. The free app allows users to post anonymous comments that can be viewed by anyone who is within 5 miles of the person who posted it. Or at least the 500 who are the closest. When installing the app, the user gets a warning message stating that the app contains mature material and is therefore only appropriate for users 17 and older. But that hasn’t stopped high school students in some cities from signing up in droves.

One can easily see the attraction for students in using this app: they can post nameless comments that others in their immediate vicinity can see. As such, it is perfectly tailored for a school environment. Often the comments are mundane observations for their classmates about what is going on around them. But they could include harassing messages, answers to tests, sexually explicit comments, hate speech, or bomb threats. Schools in Chicago and elsewhere have sent letters home to parents, educating them about the app, and imploring them to see to it that it is removed from their child’s phone. I appreciate the steps these principals are taking to inform parents, but wonder whether the effort will really result in fewer students using it.

Alternative to Facebook?

Teens are hungry for an online environment where they can interact and communicate that is outside the prying eyes of parents. Facebook is still by far the most popular social media environment for teens, but they don’t seem to visit the site as frequently, or for as long, as they once did. One reason for that is the fact that most parents (and grandparents and aunts and uncles and teachers) are on Facebook and can therefore see much of what teens are posting. So they are looking for an alternative place to hang out and communicate without adults looking over their virtual shoulders. Yik Yak has apparently served that purpose for some.

We were first alerted to the app a couple of weeks ago when we received a report through our website encouraging us to investigate it: “The amount of hateful comments is basically every other comment. It is too much to even report. Cyberbullying is already a huge problem today and the last thing we need is an anonymous app that allows one to do that. Soon Facebook, twitter, and other social medias will be the least of our worries when it comes to cyberbullying and suicide.”

We get these kinds of reports frequently and often the new app that is mentioned disappears before it can gain national attention. Something was different with this app. In just the last week or so, quite a few people have contacted us with questions about how to protect themselves and their schools from its potential wrath. Because cell phone apps and online environments are constantly changing, however, we suggest that, instead of focusing on banning a specific site or particular piece of technology, parents and educators should work to instill good values in their children and students so that they choose not to use them in ways that cause harm. Attacking particular applications to stop cyberbullying is a lot like trying to win a decent prize at the carnival by playing that whack-a-mole game. The odds are stacked against you. The target always shifts.

It’s Probably Not As Bad As We Think

Before getting too worked up about this latest “threat,” it is important that we keep some perspective. First of all, Yik Yak’s reach is still extremely small with only a couple hundred thousand users (compared to over 30 million on another popular and fear-inducing app: Snapchat). Second, we know from more than a decade’s worth of research that most teens are not misusing technology or mistreating others while online. Snapchat, for example gained infamy about a year ago as the “sexting app” because the images taken and sent using the app seemed to disappear after 10 seconds. Most teens realize that even though the image may no longer be visible on the 5-inch screen in front of them, it doesn’t mean it is really completely gone (despite implicit promises from the app itself). The vast majority of teens use Snapchat to send goofy, yet mostly harmless, selfie pictures to their friends and even though some will misuse it, they are in the minority.

The same is likely true for new apps like Yik Yak. Sure, the anonymous nature of the posts may embolden users to let down their guard and post things they normally wouldn’t say in a face-to-face interaction. But again, most teens are savvy enough at this point to realize that eventually it could come back around to them. In fact, there was already at least one example of a student being arrested for what was posted on the app. Moreover, unlike some sites and apps, it seems that the creators of Yik Yak are being responsive to the concerns of adults. According to the Chicago Tribune, company officials have agreed to disable the app in the Chicago area while schools attempt to get a handle on the significant problems created by it.

Time will tell whether Yik Yak will really catch on among teens (or the adults who were its original intended audience). One thing is for certain: this won’t be the last time we hear about an app that is creating problems among students in schools.

Unplug for a While!

Posted by Sameer Hinduja on February 6, 2014

tweet after exiting building
Many of us have become so dependent on technology, we don’t know what to do with ourselves without our favorite devices.  It’s almost sad (for me, at least) to consider how we don’t know what to do with ourselves if we can’t take out our phone at any moment to check our Instagram feed, or Twitter followers, or Facebook notifications.  And how we really need people to be reaching out to us and so we are constantly texting and Snapchatting to keep from feeling alone. And how all of this has become deeply tied into our emotional and psychological well-being – how we feel about ourselves and our worth and our importance to others.

Some are realizing that this dependence on nonstop online connectivity may be unhealthy for them, and may be compromising certain areas of their lives – such as their ability to study and focus on a singular task for a long period of time (instead of constantly multitasking), or their ability to convey our thoughts eloquently in our writings and essays, or the quality of our real-world friendships and relationships which often need more than quick 140-character messages to develop and deepen and thrive.  And maybe this dependence on technology makes them more likely to respond spontaneously and emotionally to something that happens in their lives – which can lead to problem behaviors online like cyberbullying.

So, to prove a point, some people are making the choice to unplug for a while – just to see what life could be like.  We are sure you know of some of your friends or peers who have deactivated Facebook for a week or a month (or longer!) because they were sick of reading about other people’s lives instead of actually and fully living their own.  We’ve heard of others who are deleting SnapChat for a season it has become a tremendous time-suck for them.  We like hearing stories like this, not because social media is bad but because acting and interacting in the real world is better!

Maybe you could give up your favorite social networking app for some time.  Maybe you could turn your phone to Airplane mode for a few hours every day, just to allow yourself a clear mind.  And maybe you could take notes and see how your life is different, and then share what you learned with the rest of your school, either in person or over the announcements, or in the school newspaper, or through any other medium.

Maybe you’ll say it was really, really hard to feel connected to others without your phone.  But maybe you’ll say it freed you up to be more present and involved with your younger brother or sister, or girlfriend, or husband, or parents – which led to a better situation at home.  Maybe you’ll say it allowed you to finish a class paper or a work project in a lot shorter time than usual simply because you didn’t have any distractions.  Maybe you’ll say it freed you up to do something you’ve really been meaning to do but never found the time!  Maybe you’ll say that it allowed you to reevaluate why you post the things that you post, and how you realize that many of us do a lot of things online to get others to like us and want to know us more.  Maybe you’ll say that it kept you from getting caught up in a bunch of nonsense and drama that people are talking about but really doesn’t matter at all. The goal is to mix it up a little, and challenge the status quo – especially in your own life.  And hopefully it’ll encourage others to do the same!  Let us know of your successes and struggles with this if you decide to tackle it – we want to hear from you!

Smartphone Apps and Bullying

Posted by Sameer Hinduja on November 5, 2012

I’ve been chatting with Canadian cyberbullying educator and speaker Lissa Albert about various apps for cell phones and their potential for misuse, and it has been one fascinating conversation.  As such, she volunteered to write up a summary for our blog – which really paints a comprehensive picture as to what is available out there for potential cyberbullies.  Please let us and her know your thoughts based on your experiences and observations!  Note: We have decided not to directly hyperlink to each problematic app so as not to give them more traffic and accessibility than already exists.  Here we go.

 

We all know that cyberbullying takes place using technology-driven communication tools. Smartphones allow for access to social media platforms as well as texting, and provide a host of benefits to their users in the realms of communication, education, ecommerce, and entertainment. However, some misbehaviors are also enabled through these devices.  But with smartphones, in addition to being able to access the Internet, email and social media platforms such as Twitter, Instagram, Pinterest, and Facebook, there are downloadable applications – known as “apps” – which are user-friendly mechanisms to enable easy interaction with the site from the device. The apps market has soared with every incarnation of smartphone, and the Apple store boasts over 600,000 different apps. Apps are created by both phone manufacturers and by independent developers. There are yearly conferences for app developers, much online collaboration, and exponential growth in this industry.  Some apps are freeand some run from $0.99 to $4.99.

 

Besides Facebook and Twitter apps, other popular social networking platforms – such as Formspring and the seemingly innocuous Club Penguin – have apps readily available for smartphones. These apps allow the user to connect directly to the service without having to go into the browser, and have therefore made it easier to engage in wrongdoing.  With these possibilities, it is not surprising that someone would either invent new apps, or find a use for existing apps to facilitate various forms of cyberbullying. Below are some examples of how smartphones are actually, and actively, contributing to online cruelty.

 

Ugly Meter has gained a lot of popularity. After being mentioned on the radio show of a popular “shock jock” who found it amusing, this app began selling and has, to date, been downloaded over 5,000,000 times. The way it works is to scan a photo and using facial contours and patterns, allowing it to then rate  the subject on the “ugly scale” of 1-100. While the developers of the app stress it is only a game, it has many experts concerned that it will be used to lower the self-esteem of already-insecure kids.  Inexplicably, many mainstream talk-show personalities (Anderson Cooper, for one) have mentioned and demonstrated the app without mentioning its potential for hurtful uses.  This, by the way, is very discouraging because Anderson has always been such a strong anti-bullying advocate.

 

Enemy Graph is an app that allows the user to take Facebook friends and add them to a list of their enemies.  As soon as a user has declared someone an enemy, that declaration appears on their profile, visible to everyone. (“John has declared Jane his enemy”)  It also gives the user the ability to declare one “Archenemy”. The developers defend its use, primarily stating that it is used to separate those “friends” on one’s list who have differences with the user, instead of the “likes” or similarities users share. They claim the app was created to “explore social dissonance on Facebook.”

 

In a test of the app, trending “enemies” listed included “Farmville” (a game-simulation as maligned as it is lauded), Justin Bieber, and various politicians and media personalities. However, it gave statistics at the top of the page, which declared the user’s number of enemies as well as how many have listed him/her as their enemy. These “enemies” are culled from the user’s member list, and this is where the danger comes into play. A disagreement or falling out between friends can easily lead them to list one or both as enemies, and with youth, we have seen that become a fast-spreading sentiment that can lead to isolation, ostracizing, and further ridicule/humiliation.

 

The developers do not think this will result in cyberbullying; in an interview, Dean Terry believes it will simply lead to conversation. However, it is more likelythat cyberbullying would almost naturally arise from use of this app, and the developers seem to defend it when they state: “In a way we are misusing the word “enemy” just as much as Facebook and others have misused “friend”.

 

If this app were used the way the developers picture it (fun, social, used only to list the “things” users dislike), there would be no risk. But as with any tool, it has both positive and negative potential. when tools make it easier.  Denise Restauri, in an article for Forbes magazine, states: “EnemyGraph gives bullies and people with a sick sense of humor a great way to bully and attack.”

 

To be sure, this seems an  an understatement – the app can lead to tragic consequences such as depression and suicide. No chances can be taken, and there is currently a movement by psychologist Dr. Barbara Lavi to try to get Facebook to remove the app.

 

Bully Block is promoted as a way for targets to block, report, and record the bully in action. There is a feature to block intrusions from those one feels is bullying them (by having the bully get a busy signal, or pre-recorded message). But it also employs an audio recorder – billed as a “stealth recorder to capture bullies in action”. This app secretly records the bully (ostensibly) and with one touch of a button, forwards the audio as an email or text message to authorities (again, ostensibly). A third feature captures what the developer calls “inappropriate texts, pics or videos” via text message or email. It is intended for teens to forward these to their parents or authorities. It is also intended for employees to forward those types of missives to their HR departments.

 

The inherent problem in this app is that it has the strong potential to be misused. It is not a huge leap of the imagination to think that a savvy bully would download this app in order to use the recorder to capture compromising audio of his/her victim, or use the forwarding feature to engage in  online bullying or even sexting behavior.

 

It can never be assumed that any tool will be used precisely as intended, and that is a primary concern with such apps that allow for surreptitious photography capture, audio recording, or one-touch forwarding of material.

 

As an aside, apps that claim to prevent bullying are not as effective as taking action in the situation. As Internet Safety expert Nancy Willard has stated often, teaching kids to swim is a lot more effective than putting up fences around swimming pools. Just as filters don’t prevent users from accessing certain websites, apps don’t effectively prevent cyberbullying. Teaching youth, as well as adults, to understand and embrace a respectful digital society is a lot more effective than entrusting safety and well-being to an app. Why resort to an electronic application to do what people can do more effectively, and more potently? Smartphone apps have their place, but should never replace the interaction people have enjoyed for centuries.

 

There is more. Secret Camera bills itself as a camera to take photos of “friends and pets” with no shutter sound or visible thumbnail. Devil Camera does the same. Using the front-facing camera, users can take photos of people behind them and with no thumbnail or displayed capture on the screen, the subjects have no idea they have just been photographed.

 

In researching these apps, I found a forum user asking for such an app, saying he wanted it to take “amusing pics on the bus”. At best, this is an invasion of privacy. At worst, it is blatant cyberbullying. A respondent provided links to a camera app (TubeCrush) as well as a site where those types of photos can be posted. He says, “It was designed it to be perfect for …people wanting to play pranks on their friends, but it’s also great for taking shots in museums and galleries, or for street photography which relies on candid images. (All perfectly legal so don’t worry)!” The various apps found ostensibly promote the user’s safety while capturing video or photos; as such, those prone to cyberbullying behavior will see it as their protection while harming others with furtive photography. The fact that this poster felt it necessary to add a disclaimer of legality shows that there even s/he is aware of the more deceptive uses of the app.

 

Some other types of apps are worthy of mention.  These are listed below.

 

Anonymous Texting There are a number of apps available for Android as well as iPhone platforms that allow the user to send text messages anonymously or with randomized numbers that mask their identity. There is at least one website that acts as a web-based anonymous texting app. There are even websites to instruct users how to send anonymous texts, with the disclaimer:  “Please don’t use this information to stalk, harass or threaten anyone.” The problem is that no disclaimer will deter someone intent upon doing just that. And as technology evolves, cyberbullies are coming up with more inventive and insidious ways to harass their victims.

 

Demeaning, insulting, pranking apps A search for apps using the keyword “insult” yielded an alarming number of various apps, most free to download, that not only provide insults but the platform to deliver them. For example, there is an insult generator that allows the user to have their cell phone “say” the insult aloud, or text it to someone. There is now a “re-text” button on this app which allows the user to send newly generated insults to the most recent recipient, which could lead to a barrage of insults to one identified victim. As well, there were apps that manipulated  available digital photos to ridicule the subject. Under category headings “lifestyle” and “entertainment”, the apps are readily available to anyone seeking vicious comments or graphics to hurt the feelings of another person.

 

Overall, though most users participate on social media sites in responsible and procial ways, these apps do provide  opportunities for those so inclined to cyberbully others. Facebook used to have an app called “Honesty Box” – which encouraged its members to tell others what they thought without being identified. Not only did it encourage negative messages, many of them were filled with inappropriate sexual notes. The app was shut down in 2008, but replaced with one called “Everyword”. Signing in with Facebook or Twitter, users submit one word to other users, to describe that person. There is a box at the bottom of the dialogue box to be checked if the submission is to be made anonymously. It is still an active app, though it took a search to find it as it is not overtly publicized on either social media platform. It also has the potential to encourage a devastating deluge of humiliation and abuse.

 

It is obvious that as smartphones and social media apps continue to evolve, the means and methods to inflict harm online will remain. How do we combat it? How do we stop misuse of apps or the development of those with the potential to cause harm? Speak up. Speak out. Inform developers that their apps are objectionable with regard to how they are either blatantly or more furtively enabling hateful and humiliating behaviors. Inform people talking about the app, or using it, that they are contributing to a culture tolerant or even supportive of cyberbullying . Write blog entries, articles, media personalities utilizing or publicizing the apps, and emphatically point out that we must be very sensitive to the ways in which certain smartphone apps can wreak emotional and psychological havoc in the lives of others.

Teens and Technology, School District Policy Issues, 2012-2013

Posted by Sameer Hinduja on September 7, 2012

With the beginning of the school year upon us again, I thought it might be valuable to review a very important topic. One of the most important steps a district can take to help protect their students and protect themselves from legal liability is to have a clear and comprehensive policy regarding bullying and harassment, technology, and their intersection: cyberbullying.

Almost every state requires districts to have a comprehensive policy in place, and generally involve one (or more) of the following elements:

1. requirement to add “cyberbullying” or “electronic bullying” to current anti-bullying policies;
2. provision of specific graduated consequences and remedial actions for cyberbullying;
3. provision to allow administrators to take reasonable action when off-campus actions have affected on-campus order;
4. requirement to develop new investigative, reporting and disciplinary procedures in cyberbullying cases;
5. Mandate that schools create and implement prevention programming (such as Internet safety, ethics, etiquette training and curricula).

In our award-winning book Bullying Beyond the Schoolyard, we fleshed out what we believe are the most important components of an effective school cyberbullying policy. This stemmed from our research into what schools were currently doing, and what was working, and what was not. Apart from the aforementioned elements, we believe that tying bullying/cyberbullying prevention/response to a more holistic initiative to improve school climate will be most promising. Let’s explain further the elements that should comprise these policies, so you can make sure your school has solid footing before you deal with any incidents this year.

First, it is important that the policy clearly defines the behaviors it seeks to proscribe. The more specific the policy is, the more likely it will withstand legal challenges. As William Shepherd, a Statewide Prosecutor in Florida’s Office of the Attorney General cautions, however, “The law or policy should be specific, but behavior changes over time, so you must have the ability to grow with the times.”

Also, we list below several forms of bullying that should be clearly delineated in your policy. Generally speaking, any communication that has been perceived by a student as unwanted, vulgar, obscene, sexually explicit, demeaning, belittling, defaming in nature, or is otherwise disruptive to a student’s ability to learn and a school’s ability to educate its students in a safe environment, or causes a reasonable person to suffer substantial emotional distress or fear of bodily injury, should be subject to discipline.

Forms of Bullying

Bullying can occur by one individual or a group of individuals, can be direct or indirect, and can take the following forms:

A. “Physical bullying” – demonstrations of aggression by pushing, kicking, hitting, gesturing, or otherwise invading the physical space of another person in an unwelcome manner. It also includes the unwanted tampering with or destruction of another person’s property.

B. “Verbal bullying” – demonstrations of aggression through insults, teasing, cursing, threatening, or otherwise expressing unkind words toward another person.

C. “Relational bullying” – demonstrations of aggression through exclusion, rejection, and isolation to damage a person’s position and relationship within a social group.

D. “Cyberbullying” – the intentional and repeated harm of others through the use of computers, cell phones, and other electronic devices.

Cyberbullying can result in discipline whether it occurs on or off campus, irrespective of whether it involves an electronic device at school, at home, or at a third-party location, and if it results in a substantial disruption of the school learning environment as defined in this policy.

It is also important to remember that many districts already have policies in place that prohibit various forms of harassment, including harassment based on race or sex. Any behavior that constitutes sexual harassment, for example, should be handled under those provisions, irrespective of whether the behavior is also considered bullying or cyberbullying.

With regard to penalties, any student found to be participating in, contributing to, and/or encouraging acts of cyberbullying and/or harassment towards another student or staff member must be disciplined. Your policy must identify what specific actions will be taken. To determine the severity of the harassment or discrimination, the following may be considered: how the misconduct affected one or more student’s education; the type, frequency, and duration of the misconduct; the number of persons involved; the subject(s) of harassment or discrimination; the situation in which the incident occurred; and other related incidents at the school. Any cyberbullying that has been perceived as a criminal act, such as a threat to one’s personal or physical safety, will be subject to discipline and result in the notification of law enforcement.

Discipline can include a number of different actions. These can include:

• Parental contact
• Behavioral contracts
• Loss of privileges (either in-school or extracurricular)
• Conferences with students, parents, teachers, or administrative staff
• Interventions by school guidance personnel
• School service work or student work detail
• Removal of student from class
• Loss of bus privileges (parents are thus responsible for transportation)
• In-school alternative assignments or intervention programs
• Detentions (before, during, after school, or on Saturday)
• Restitution
• Restorative Justice
• Assignment to alternative program in lieu of suspension days
• Suspension – removal of student from school for up to 10 days
• Assignment to an alternative educational facility
• Expulsion – removal of student from school for remainder of year plus one additional year

We’ve discussed before that it is critical to link specific behaviors with specific disciplinary outcomes so that students know exactly what may happen if they are caught engaging in cyberbullying behaviors. Don’t be afraid to think creatively about alternative sanctions instead of relying on detention or suspension. For example, cyberbullies could be required (based on the grievance) to research and write an essay on the negative affects of cyberbullying. They could also be required to write a formal apology to the aggrieved party or parties. Disciplinary outcomes should be considered and carried out on a case-by-case basis.

We really think that you should be as specific as possible in your policy – make sure you cover harassment and cheating and disrupting the class environment by texting or Facebooking, and talk about threats and explicit pictures and pornography laws and police intervention. Clearly outline the consequences for prohibited behaviors. Get students and parents in on this discussion. Schools will have problems as the school community gets used to these changes, but hopefully the problems will be few and far between and will get better with time.

Students will learn appropriate behaviors and these should—in time—become the norm if a positive school climate is prioritized and established. For example, ten years ago, cell phones were much more of a problem in our college classrooms than they are now. University students, at least in our experience as professors, have gotten better at cell phone etiquette and are not letting the devices distract from learning. Sure, a phone occasionally will go off in class, but usually the student is apologetic and immediately acknowledges the faux pas. Of course middle and high school students are different from those in a university, but we are optimistic that we can work through the same challenges at the secondary school level.

After a policy is created or revised, the school community needs to be educated about it. Students should be informed about the circumstances under which their personal portable electronic devices can be confiscated and searched. They should also be reminded that anything they do on a school-owned device is subject to review and appropriate discipline. This should be explained to students and parents, possibly through assemblies, orientations, community meetings, and messaging strategies (voice mails, memorandums, etc.). Be intentional about conveying these messages, and don’t just assume they know your policy! As a student recently told us:

“I think it’s a good idea that all schools include in their handbook definitions of the types of bullying and sexting as well as the consequences and/ or disciplinary actions, but then perhaps kids should be quizzed on this every school year. Call me an airhead, but I never read the school’s student handbook until my family moved to Florida my junior year of high school. I remember I got in trouble the first day of school because I clearly did not read the dress code part of the student handbook. My old school handed out agendas and handbooks at the beginning of the school year, but no one ever read them. Those things would just get stuffed at the bottom of our lockers. If all schools enforced something as simple as reading the student handbook and made sure students understand what they’re reading, then I think they would be a step closer to educating kids that they can get help if they’re being bullied.
—Anonymous student from Florida

We’ll talk more about policy and school climate in our next blog, so look for that next week!

New Teen Sexting Study

Posted by Justin W. Patchin on July 9, 2012

There is a new study on teen sexting that has been published (online at least) in the journal Archives of Pediatrics and Adolescent Medicine that is receiving tons of media attention. Most research that is published in academic journals is largely ignored by the media and the public, but for some reason this article has generated some interest. To be sure, articles and books that include the word “sex” in the title are likely to draw more attention. (See our new book, entitled “School Climate 2.0: Preventing Cyberbullying and SEXting One Classroom at a Time!”)

The headline that is most commonly pulled from this particular study seems to be that about 28% of the students who responded to the researcher’s survey said that they had “sent a naked picture of themselves through text or e-mail.” This figure is a lot higher than most previously published research. For example, in School Climate 2.0 we reviewed 5 previous studies and our own preliminary research on teen sexting (see also our brief Sexting Fact Sheet). Across these surveys, the percent of students who reported sending a “sext” ranged from 2.5% to 19%. Much of these differences in rates can likely be attributed to the different ways the studies were set up. The National Campaign to Prevent Teen and Unplanned Pregnancy (2008) reported that 19% of teens had sent a “sexually suggestive picture or video.” Sexually suggestive is quite different than “naked.” Moreover, the National Campaign sample included teens who ranged in age from 13 to 19. By contrast, our sample, which found that 8% of teens had sent a “naked or semi-naked image” of themselves to others, included middle and high school students between the ages of 11 and 18. Consistent with intuition, our analysis also showed that older teens were more likely to participate in sexting and therefore by including 18 and 19 year-olds, as the National Campaign Study did, we would expect the numbers to be higher. A study sponsored by MTV and the Associated Press that recorded the second highest prevalence rate (10%) also included much older respondents (up to age 24) than the other studies.

The new study targeted 10th and 11th graders from 7 high schools in Texas and included students between the ages of 14 and 19. It is unclear from the article if students were randomly selected to participate, meaning the sample would be somewhat representative of all students in 10th and 11th grade from these schools, or if they were chosen deliberately or haphazardly. Knowing more about the broader characteristics of the population of students at the schools would help us in better interpreting the results.

Specifically, the Texas study found that 27.8% of the students had sent a sext. Digging more deeply into the results, we can see that more White/non-Hispanic youth reported that they had sent a sext than other racial groups, and like in our study, older students were involved at higher rates. Almost half (45%) of the 18 and 19 year old students had sent a sext, though this is a tenuous finding as there were only 31 students in the sample who were those ages.

The authors intentionally limited their inquiry to naked pictures and did not include semi-naked images or explicit text. This makes their high prevalence finding even more surprising. So why does this study differ so much from the other available research? Different methodologies between this and the other studies, as discussed above, is probably the most likely cause (different ways of sampling, asking questions, etc.). But it could also be that teens in Texas, or at least the 7 schools targeted in this study, are participating in sexting at a higher rate than the country as a whole. According to the Centers for Disease Control and Prevention, Texas high school students are slightly more sexually active than the United States as a whole (37.7% compared to 34.2% had sexual intercourse in the previous 3 months), but this alone can’t explain the dramatic difference.

Clearly more research is necessary – at the local, state, and national level. Moreover, qualitative work can perhaps uncover in more detail why teens engage in sexting, and attempt to learn if they understand the potential consequences of the behavior. For example, Jessica Ringrose from the University of London and her colleagues recently released a report that presents the perspectives of 35 students based on an in-depth investigation that included focus groups, individual interviews, and consultations with teachers and other school staff. I was introduced to Jessica’s work when I met her last fall when we both participated in a conference at the University of London. The report describes, among other things, that teens are often pressured, subtly or overtly, into participating in sexting: “Much of young people’s talk, therefore, reflects an experience that is pressurized yet voluntary – they choose to participate but they cannot choose to say ‘no’.” The desire to fit in and be well-liked within one’s peer group results in some teens doing things that they know they shouldn’t. With this in mind, some of the variation in reporting across studies might be explained by teens under-reporting behaviors they know are wrong, or in other cases even over-reporting behaviors they think are social acceptable (see my recent blog on social norming and peer influences here).

In short, we need to continue to work to better understand why teens sext as well as evaluate efforts to prevent them from doing it in the first place. Scaring them with the threat of formal prosecution and severe criminal sanctions undoubtedly will not stop all youth from experimenting with these behaviors (just like it doesn’t stop them from using drugs or participating in other delinquent behaviors – see the work of Raymond Paternoster, and others). Instead, we all need to work to create family, school, and community cultures where sexting, cyberbullying, and other inappropriate behaviors online and off are not tolerated and simply “not what we do.” Behaviors are influenced to a much greater extent by positive relationships (that is, we behave in accordance with the people we care about), and to the extent we develop valued connections in various domains, we will have the power to shape teen behaviors for the better.

School Climate 2.0: Preventing Cyberbullying and Sexting One Classroom at a Time

Posted by Justin W. Patchin on April 26, 2012

We’ve been discussing the importance of school climate as it relates to bullying and cyberbullying quite a bit on this blog (see here  and here for examples). Well, we just published a whole book on the topic! School Climate 2.0: Preventing Cyberbullying and Sexting is now in print and available from the publisher, on Amazon, or many other online bookstores. This is the first book on the topic of cyberbullying and sexting that focuses primarily on what can be done to prevent the behaviors from happening in the first place. We argue that “educators who establish a nurturing and caring classroom and school climate will make great strides in preventing a whole host of problematic behaviors, both at school and online.” The book provides concrete examples of how to do just that.

 

Here is an excerpt from the Preface:

 

This book seeks to explain and promote the importance of school climate in preventing teen technology misuse. Most of books and articles in print today simply describe the nature of cyberbullying or sexting (e.g., what it looks like, how much of it is occurring, and among whom). While this is an important first step, we seek to meaningfully build on the knowledge base and more explicitly connect the high-tech behaviors of teens to the school environment.

 

Much of what you will read is based on information we have learned through our decade-long exploration of the ways teens are using and misusing technology. We have completed seven formal independent studies involving over 12,000 students from over 80 middle and high schools from different regions of the United States. To guide the discussion, this book specifically features information from our most recent study, a random sample of over 4,400 middle and high school students (11 to 18 years old) from one of the largest school districts in the United States. Surveys were administered to students in 2010, and the information gathered represents some of the most recent and comprehensive data on these topics. We will also refer to the work of many others who have labored to better understand how adolescents use, misuse, and abuse these technologies.

 

In addition to the quantitative data collected, we have also informally spoken to thousands of teens, parents, educators, law enforcement officers, and countless other adults who work directly with youth. Our observations are essentially a reflection of their experiences. During these interactions, we have been fortunate to learn from those on the front lines about what they are dealing with, what is working, and what problems they are running into. The stories we hear are largely consistent with the data we and others have collected that will be presented throughout this text. We also receive numerous emails and phone calls on a weekly basis from educators, mental health professionals, parents, and other youth-serving adults looking for help with specific issues. These conversations help us to understand and consider the problem from a variety of angles and perspectives. All of the stories included in this book are real. In some cases the language has been modified slightly to fix spelling and grammar mistakes and improve readability, but the overall messages have not been changed.

 

In Chapter 1 we begin the discussion by focusing on the intersection of teens and technology and how the inseparability of adolescents from their high-tech devices affects, and is influenced by, what is going on at school. In Chapter 2, we outline the characteristics of a positive school climate along with some of the beneficial outcomes associated with such an environment.

 

In Chapter 3 we detail the nature of bullying in the 21st century. In many ways the bullying of today is very similar to the way it was when we were growing up. But technology has enabled would-be bullies to extend their reach, resulting in many significant challenges for educators, parents, and others who are working to resolve relationship problems. Cyberbullying, which we define as willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices, typically refers to incidents in which students threaten, humiliate, or otherwise hassle their peers through malicious text messages, web pages, or postings on Facebook or YouTube. It is clear that peer harassment that occurs on school grounds is a significant threat to a positive school climate. That said, online bullying also disrupts the ability of students to feel safe and secure at school. The vast majority of the time, targets of cyberbullying know the person doing the bullying (85 percent of the time in our research), and most of the time the bully is someone from their school. If students regularly post hurtful, embarrassing, or threatening messages to a fellow classmate’s Facebook page, for example, it unquestionably affects that student’s ability to feel comfortable, free, and safe to focus on learning at school.

 

Chapter 4 describes sexting, which we define as the sending or receiving of sexually explicit or sexually suggestive nude or seminude images or video that generally occurs via cell phone (although it can also occur via the Web). Some have described this problem in dismissive ways, calling it this generation’s way of “flirting” or characterizing it as a safer way to experiment sexually and come to terms with one’s own sexuality. While this may be true in part, engaging in sexting can lead to some significant social and legal consequences. We begin to tie everything together in Chapter 5, where we explicitly link school climate to online misbehaviors. Here again we argue that schools with better climates will see fewer cyberbullying, sexting, or other online problems among students. Ancillary benefits for educators who harness the power of a positive climate at school may include better attendance, higher school achievement, and more cooperative attitudes across the student body and among staff. A school with a positive climate is definitely more enjoyable to work and learn in, and can therefore lead to many other beneficial outcomes for students and staff alike. The remaining chapters of the book focus on providing you with strategies to establish and maintain a positive climate (Chapter 6) through peer mentoring and social norming (Chapter 7), assessment (Chapter 8), and appropriate response strategies (Chapter 9).

 

You can learn more about the book, including a full table of contents and reviews from folks who have read it, on our companion website, www.schoolclimate20.com. You can also like us on Facebook, and follow us on twitter. Let us know what you think!