Barbara Colorosa - Handouts - Complete - Revised

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

the bully, the bullied, and the not-so-innocent bystander

by
Barbara Coloroso

, 2015

Barbara Coloroso © 2002, 2005, 2009, 2015


www.kidsareworthit.com
info.kidsareworthit@gmail.com
800.729.1588
permission granted for school and parent use
Brave-hearted
Witness, resister,
defender dislikes
Bully/Bullies the bullying and
Plan and/or helps or tries to help
start the bullying the one who is bullied.
and take
an active part

Henchmen The Target


Take an active part The one who is bullied
but do not start
the bullying

Active Supporters
Cheer the bully on
and seek social
or material gain Potential Defenders
Oppose the bullying and
know they ought to help,
but do not act

Disengaged Onlookers

Passive Supporters
Like the bullying but do
not show open support

An adaptation of
The Bullying Circle
by Dan Olweus, PhD
used with permission Illustrations by Joey Coloroso

From The bully,


Bully,the
Thebullied,
Bullied,and
andthe not-so-innocent
The Bystander bystander
Barbara Coloroso ©2002, 2005, 2009, 201315
www.kidsareworthit.com kids are worth it! inc.
800.729.1588 fax 303.972.3237
!"# $%&&' !"# $%&&(#) !"# $'*!+,)#- (4 '1%-/@"(&)/(*/$%&&(#)
<1,=!*
?1 M)+H7'*$+$*$0%< 3,7$)+,#$0%< )3'%L.#,$+',=,;'7-%
!"##$%&'()*%'$+',##'&-,.%&',+/'&$0%&1 2)*%',3%'4$56 D-%')+%'7-$+5'7-,7',##':$/&'=-)',3%'4"##$%/'-,8%'$+ !;&7,+/%3&',3%'7-%'7-$3/'53)".')> .#,;%3&'$+'7-$& 4"##;H&'4%-,8$)31
&)*%',3%'&*,##6 &)*%'43$5-7',+/'&)*%'+)7'&)'43$5-76 ()**)+'$&'7-,7','4"##;')3','4"+(-')> 4"##$%&'-,& 73,5%/;1 D-%;',3%'7-%'&"..)37$+5'(,&7'=-)',$/ A1 M)+H7'3"&-'$+'7)'&)#8%'7-%'.3)4#%*'>)3';)"3'(-$#/1
&)*%',773,(7$8%',+/'&)*%'+)7'&)',773,(7$8%6 &)*%'.).9 7,35%7%/'7-%*1 W,(-')+%'=,&'&$+5#%/')"7'7)'4%'7-% ,+/',4%7'7-%'4"##;< 7-3)"5-',(7&')> )*$&&$)+',+/ C1 M)+H7'7%##';)"3'(-$#/'7)',8)$/'7-%'4"##;1
"#,3',+/'&)*%'/$&#$:%/'4;',#*)&7'%8%3;4)/;1 )4K%(7')> &()3+< ,+/'7-"&'7-%'3%($.$%+7')> 4"##;$+5< ()**$&&$)+1 D-%;'&7,+/'$/#;'4;')3'#)):',=,;< )3'7-%; E1 M)+H7'7%##';)"3'(-$#/'7)'>$5-7'4,(:1
*%3%#;'4%(,"&%'-%')3'&-%'=,&'/$>>%3%+7'$+'&)*%'=,;1 (,+',(7$8%#;'%+()"3,5%'7-%'4"##;')3'K)$+'$+',+/ T1 M)+H7'()+>3)+7'7-%'4"##;')3'7-%'4"##;H&'.,3%+7&',#)+%1
!"##;$+5'$&','()+&($)"&< =$##>"#',+/'/%#$4%3,7%'-)&7$#% 4%()*%')+%')> ,'4"+(-')> 4"##$%&1 B+K"&7$(%')8%39 <1=*
,(7$8$7;< $+7%+/%/'7)'-,3*1 ."#/:+-,(,6/7(6,* #)):%/')3'$5+)3%/'4%()*%&','()+7,5$)+'7-,7'$+>%(7& ?1 B'-%,3';)"6 B',*'-%3%'>)3';)"6 B'4%#$%8%';)"6 ;)"
?1 2-)=&',+',43".7'#,(:')> $+7%3%&7'$+'&(-))#< %8%+'7-)&%'=-)'7-)"5-7'7-%;'()"#/'7"3+',=,;1 ,3%'+)7',#)+%'$+'7-$&1
."#/01%-/2+-3#-*/14 5%&&'(,6 )3'3%>"&%&'7)'5)'7)'&(-))#
A1 B7'$&'+)7';)"3'>,"#71
?1 @+'$*4,#,+(%')> .)=%3 A1 D,:%&',+'"+"&",#'3)"7%'7)'&(-))# 7!+,)(,6/>9/+,)/79#+3(,6/?%!
C1 D-%3%',3%'7-$+5&';)"'(,+'/)1
A1 B+7%+7'7)'-,3* C1 2">>%3&'/3).'$+'53,/%& !"##;$+5'$&'(-,##%+5%/'=-%+'7-%'*,K)3$7;'&7,+/&'".
E1 O%.)37'7-%'4"##;$+5'7)'&(-))#'.%3&)++%#1
C1 D-3%,7')> >"37-%3',553%&&$)+ E1 F$7-/3,=&'>3)*'>,*$#;',+/'&(-))#',(7$8$7$%& ,5,$+&7'7-%'(3"%#',(7&')> 7-%'*$+)3$7;1 W&7,4#$&-$+5
E1 F-%+'4"##;$+5'%&(,#,7%&'"+,4,7%/G7%33)3 T1 B&'-"+53;',>7%3'&(-))# +%='+)3*&< %+>)3($+5'.#,;53)"+/'3"#%&< ,+/'$+(3%,&9
V1 27%,#&'*)+%;'>3)*'-)*% $+5'&".%38$&$)+',3%'.)#$(;'/%($&$)+&'7-,7'(,+'-%#. "1A/!1/-#91-!
!"##;$+5'$&'+)7',4)"7',+5%3< )3'%8%+',4)"7'()+>#$(71 B7H& X1 Y,:%&','4%%#$+%'7)'7-%'4,7-3))*'=-%+ 3%/"(%'7-%'$+($/%+7&')> 4"##;$+51 2$+(%'*"(-')> 7-% ?1 @33,+5%','*%%7$+5'>)3';)"',+/';)"3'(-$#/'=$7-
,4)"7'()+7%*.7G,'.)=%3>"#'>%%#$+5')> /$&#$:%'7)=,3/ ,33$8$+5'-)*% 4"##;$+5'5)%&')+'Q"+/%3'7-%'3,/,3')> ,/"#7&<R ,'.)7%+7 7-%',..3).3$,7%'.%3&)+',7'7-%'&(-))#1
&)*%)+%'()+&$/%3%/'7)'4%'=)37-#%&&< $+>%3$)3')3 Z1 B&'&,/< &"##%+< ,+53;< )3'&(,3%/',>7%3'3%(%$8$+5',' >)3(%'$&':$/&'7-%*&%#8%&'&-)=$+5'4"##$%&'7-,7'7-%;'=$## A1 !3$+5'7)'7-%'*%%7$+5'7-%'>,(7&'$+'=3$7$+5G7-%
"+/%&%38$+5')> 3%&.%(71 I)+7%*.7'()*%&'=$7-'7-3%% .-)+%'(,##')3'%*,$# +)7'4%'#)):%/'".'7)< +)3'=$##'7-%$3'(3"%#'4%-,8$)3'4% /,7%< 7$*%< .#,(%< :$/&'$+8)#8%/< ,+/'7-%'&.%($>$(&
,..,3%+7'.&;(-)#)5$(,#',/8,+7,5%&'7-,7',##)=':$/&'7) [1 M)%&'&)*%7-$+5')"7')> (-,3,(7%3 ()+/)+%/')3'7)#%3,7%/1 `$/&'+%%/'+)7'4%'4;&7,+/%3&1 )> 7-%'$+($/%+7&G,+/'7-%'$*.,(7'7-%'4"##;$+5'-,&
-,3*')7-%3&'=$7-)"7'>%%#$+5'%*.,7-;< ()*.,&&$)+')3 ?\1 ],&'7)3+')3'*$&&$+5'(#)7-$+5 D-%;'(,+'4%()*%',(7$8%'=$7+%&&%&< &7,+/$+5'".'>)3 -,/')+';)"3'(-$#/',&'=%##',&'=-,7';)"3'(-$#/'-,&
&-,*%1 D-%&%',3%J ??1 ^&%&'/%3)5,7)3;')3'/%*%,+$+5'#,+5",5%' 7-%$3'.%%3&< &.%,:$+5')"7',5,$+&7'$+K"&7$(%&< ,+/'7,:$+5 /)+%'7)'73;'7)'&7).'7-%'4"##;$+5'7-,7'/$/+H7'=)3:1
=-%+'7,#:$+5',4)"7'.%%3& 3%&.)+&$4$#$7;'>)3'=-,7'-,..%+%/',*)+5'7-%*&%#8%&1 C1 F)3:'=$7-';)"3'(-$#/',+/'&(-))#'.%3&)++%#')+',
?1 @'&%+&%')> %+7$7#%*%+7G7-%'3$5-7'7)'()+73)#< ?A1 27).&'7,#:$+5',4)"7'.%%3&',+/'%8%3;/,;',(7$8$7$%& .#,+'7-,7',//3%&&%&'=-,7';)"3'(-$#/'+%%/&'3$5-7
/)*$+,7%< &"4K"5,7%< ,+/',4"&%',+)7-%3 ?C1 ],&'.-;&$(,#'$+K"3$%&'+)7'()+&$&7%+7'=$7- +)='$+')3/%3'7)'>%%#'&,>%< =-,7'&-%'(,+'/)'7)
-"*,+'4%$+5 %L.#,+,7$)+ ,8)$/'4%$+5'4"##$%/',+/'7)'&7,+/'".'7)',+;
A1 @+'$+7)#%3,+(%'7)=,3/'/$>>%3%+(% ?E1 ],&'&7)*,(-,(-%&< -%,/,(-%&< .,+$(',77,(:&< $&' >"7"3%'4"##;$+5< ,+/'=-)*'&-%'(,+'5)'7)'>)3'-%#.1
C1 @'#$4%37;'7)'%L(#"/%G7)'4,3< $&)#,7%< ,+/'&%53%5,7%' "+,4#%'7)'&#%%.< &#%%.&'7))'*"(-< $&'%L-,"&7%/ E1 d$+/')"7'=-,7'.3)(%/"3%&'7-%'4"##;'=$##'4%'5)$+5
,'.%3&)+'/%%*%/'+)7'=)37-;')> 3%&.%(7')3'(,3% ?T1 _#,;&',#)+%< )3'.3%>%3&'7)'-,+5'=$7-',/"#7& 7-3)"5-',+/'=-,7':$+/')> &"..)37'7-%'&(-))#'$&
%L.%(7$+5'>3)*'7-%'.,3%+7&')> 7-%'4"##;1
7#8#,/7!#9*/!1/7!19/5%&&'(,6 :"'/;()*/<1,=!/.#&&
T1 B> ;)"'>%%#'7-%'.3)4#%*'$&'+)7'4%$+5',/%e",7%#;
?1 M$&($.#$+%'N$+(#"/$+5'7-%'7-3%%'O&J ?1 D-%;',3%',&-,*%/')> 4%$+5'4"##$%/
,//3%&&%/'4;'7-%'&(-))#< :+)='7-,7';)"'(,+
3%&7$7"7$)+< 3%&)#"7$)+< 3%()+($#$,7$)+P A1 D-%;',3%',>3,$/')> 3%7,#$,7$)+
%L.3%&&';)"3'()+(%3+&',+/'#%7'7-%'7%,(-%3',+/f)3
A1 I3%,7%')..)37"+$7$%&'7)'Q/)'5))/R C1 D-%;'/)+H7'7-$+:',+;)+%'(,+'-%#.'7-%*'
,/*$+$&73,7)3':+)='7-,7';)"'=$##'7,:%'7-%'+%L7
C1 S"37"3%'%*.,7-; E1 D-%;'/)+H7'7-$+:',+;)+%'=$##'-%#.'7-%*
&7%.'7)'7-%'&(-))#'/$&73$(7'4),3/')>>$(%',+/'$>
E1 D%,(-'>3$%+/&-$.'&:$##& T1 D-%;H8%'4)"5-7'$+7)'7-%'#$%'7-,7'4"##;$+5'$&
+%(%&&,3;G%&.%($,##;'$+'7-%'(,&%&')> &%3$)"&',4"&%
T1 I#)&%#;'*)+$7)3'DU'8$%=$+5< 8$/%)' ,'+%(%&&,3;'.,37')> 53)=$+5'".
,+/'3,($&7')3'&%L$&7'4"##;$+5G7)'7-%'.)#$(%1
5,*%&',+/'()*."7%3',(7$8$7$%& V1 D-%;'*$5-7'4%#$%8%'7-,7',/"#7&',3%'.,37')>
V1 W+5,5%'$+'*)3%'()+&73"(7$8%< 7-%'#$%G7-%;'4"##;'7)) Text Excerpts from The bully, the bullied, and
%+7%37,$+$+5< %+%35$0$+5',(7$8$7$%& X1 D-%;'-,8%'#%,3+%/'7-,7'Q3,77$+5R )+','.%%3'$&' the not-so-innocent%&''()$*
WL(%3.7&'>3)*'!"#$% *"#$%
bystander%&''+#,)$--.,$**"#$%
%(/*-.,#0<
!,34,3,'I)#)3)&)'a'A\\A , 2015
X1 D%,(-'=,;&'7)'Q=$##'5))/R 4,/< +)7'())#
B##"&73,7$)+&'4;'c)%;'I)#)3)&)'a'A\\A ===1:$/&,3%=)37-$71()*':$/&',3%'=)37-'$7< $+(1
Z\\1XA[1?TZZ'b''>,L'C\C1[XA1?A\E
!#+*(,6B!+%,!(,6 4&(-!(,6B*#D%+&/$%&&'(,6 @+-(,6/*@"11&* ,1!#*
reasons and excuses
.#+*(,6 0&(-!(,6 ?1 g,7-%3'$+>)3*,7$)+',4)"7'4"##;$+5',7'&(-))# The question that begs to be asked: “Why would 81 percent of
/$3%(7#;'>3)*'&7"/%+7&1 the kids who would not instigate bullying be so willing to become
?1 @##)=&'7-%'7%,&%3',+/'.%3&)+'7%,&%/'7)'&=,.'3)#%&1 ?1 @##)=&',+/'$+8$7%&'4)7-'.%3&)+&'7)'&=,.'3)#%& a part of the attack or turn a blind eye to the plight of the targeted
A1 B&+H7'$+7%+/%/'7)'-"37'7-%')7-%3'.%3&)+1 =$7-'%,&%1 A1 W&7,4#$&-'(#%,3'&(-))#=$/%',+/'(#,&&3))*'3"#%& child?” There are a few valid reasons and lots of excuses.
C1 Y,$+7,$+&'7-%'4,&$('/$5+$7;')> %8%3;)+%'$+8)#8%/1 A1 B&+H7'$+7%+/%/'7)'-"37'7-%')7-%3'.%3&)+G$&',+ ,4)"7'4"##;$+51
The four reasons most often given for not intervening:
E1 _):%&'>"+'$+','#$5-7-%,37%/< (#%8%3< ,+/'4%+$5+'=,;1 %L.3%&&$)+')> /%&$3%1 C1 D3,$+',##',/"#7&'$+'7-%'&(-))#'7)'3%&.)+/ 1. The bystander is afraid of getting hurt.
T1 B&'*%,+7'7)'5%7'4)7-'.,37$%&'7)'#,"5-1 C1 Y,$+7,$+&'7-%'4,&$('/$5+$7;')> 4)7-'.%3&)+&1 &%+&$7$8%#;',+/'()+&$&7%+7#;'7)'4"##;$+51 2. The bystander is afraid of becoming a new target of the bully.
3. The bystander is afraid of doing something that will only make
V1 B&')+#;','&*,##'.,37')> 7-%',(7$8$7$%&'&-,3%/'4;':$/& E1 B&'*%,+7'7)'4%'>#,77%3$+5',+/'()*.#$*%+7,3;1 E1 _3)8$/%',/%e",7%',/"#7'&".%38$&$)+< .,37$("#,3#; the situation worse.
=-)'-,8%'&)*%7-$+5'$+'()**)+1 T1 B&',+'$+8$7,7$)+'7)'-,8%'>"+'7)5%7-%3',+/'%+K); $+'#%&&'&73"(7"3%/',3%,&< &"(-',&')+'7-% 4. The bystander does not know what to do.
X1 B&'$++)(%+7'$+'*)7$8%1 %,(-')7-%3H&'()*.,+;1 .#,;53)"+/',+/'$+'7-%'#"+(-3))*1 As legitimate as they are, these reasons do not shore up the
Z1 B&'/$&()+7$+"%/'=-%+'.%3&)+'7%,&%/'4%()*%& V1 B+8$7%/'&%L",#',77%+7$)+1 T1 B*.3)8%'.,3%+7,#',=,3%+%&&')> ,+/'$+8)#8%*%+7 self-confidence or self-respect that is eroded when a child witnesses
$+'=)3:$+5')+'7-%'.3)4#%*1 a bullying incident and is unable or unwilling to respond effectively
".&%7')3')4K%(7&'7)'7-%'7%,&$+51 X1 B&'$+7%+/%/'7)'*,:%'7-%')7-%3'.%3&)+'>%%#'=,+7%/< to stop the cruelty. All too often these fears and lack of skill can turn
,773,(7$8%< ,+/'$+'()+73)#1 into apathy—a potent friend of contempt. Contempt grows best in
.+%,!(,6
?1 B&'4,&%/')+',+'$*4,#,+(%')> .)=%3',+/'$&')+%9
Z1 B&'/$&()+7$+"%/'=-%+'7-%'.%3&)+'=-)'$&'4%$+5
>#$37%/'=$7-'4%()*%&'".&%7< )4K%(7&'7)'7-%'>#$37$+5<
-#EA-(!(,6/!"#/*@-(9! a climate of indifference.
Bystanders have more excuses than valid reasons for not intervening.
&$/%/J 7-%'4"##;'7,"+7&< 7-%'4"##$%/':$/'$&'7,"+7%/1 )3'$&'+)7'$+7%3%&7%/1 D-%'4"##;< 7-%'4"##$%/< 7-%'4;&7,+/%3G7-% These excuses help poison the social environment, increasing
$+7%3,(7$)+&'$+8)#8%/'$+'&"(-'3)#%9.#,;$+5< 7-)"5- the likelihood that bystanders will side with the bully and eventually
A1 B&'$+7%+/%/'7)'-,3*1 d#$37$+5'-,&'.#,;>"#+%&&',4)"7'$7'7-,7'&%L",#'4"##;$+5 assume the role of bullies themselves. They include but are
C1 B+8)#8%&'-"*$#$,7$+5< (3"%#< /%*%,+$+5< )3 ()**)+.#,(%'$+')"3'("#7"3%< ,3%'+)7'-%,#7-;< +)7 certainly not limited to these nine:
/)%&'+)71 B7'$&'+%8%3'$+7%+/%/'7)'-,3*',+/'$&',+'$+8$9
4$5)7%/'()**%+7&'7-$+#;'/$&5"$&%/',&'K):%&1 +)3*,#< (%37,$+#;'+)7'+%(%&&,3;< ,+/'$+'>,(7',3%
7,7$)+'>)3'7=)'.%).#%'7)'5%7'7)':+)='%,(-')7-%3'4%79 1. The bully is my friend.
E1 B+(#"/%&'#,"5-7%3'/$3%(7%/'-* 7-%'7,35%7< +)7'1+*" /%8,&7,7$+5'7)'7-%'(-$#/3%+'.#,;$+5'7-%*1 F%',& 2. It’s not my problem! This is not my fight!
7%31 @&'=$7-',+;')7-%3'$+8$7,7$)+< $7'(,+'4%',((%.7%/')3
7-%'7,35%71 .,3%+7&',+/'%/"(,7)3&'(,+'3%=3$7%'7-%'&(3$.7',+/ 3. She is not my friend.
3%K%(7%/G,+/'7-%'.%3&)+'=-)'$+$7$,7%/'7-%'>#$37$+5 4. He’s a loser.
T1 B&'*%,+7'7)'/$*$+$&-'7-%'&%+&%')> &%#>9=)37-')> (3%,7%'>)3')"3'(-$#/3%+',#7%3+,7$8%< -%,#7-$%3'3)#%&'7-,7 5. He deserved to be bullied, asked for it, had it coming.
-)+)3&'%$7-%3'3%&.)+&%1
7-%'7,35%71 3%e"$3%'+)'.3%7%+&%',+/'+)'8$)#%+(%1 F$7-'(,3%',+/ 6. Bullying will toughen him up.
7#D%+&/5%&&'(,6 ()**$7*%+7< =%'(,+'3%(-,++%#'7-%'4%-,8$)3&')> 7-% 7. Kids have a deeply embedded code of silence.
V1 B+/"(%&'>%,3')> >"37-%3'7,"+7$+5')3'(,+'4%', 8. It’s better to be in the in-group than to defend the outcasts.
?1 B&'4,&%/')+',+'$*4,#,+(%')> .)=%3',+/'$&')+%9 4"##;'$+7)'.)&$7$8%'#%,/%3&-$.',(7$8$7$%&6 ,(:+)=#%/5% 9. It’s too big a pain in the brain. Added bonus—the headache is gone.
.3%#"/%'7)'.-;&$(,#'4"##;$+51
&$/%/J 7-%'4"##;'&%L",##;'7,"+7&< 7-%'4"##$%/':$/'$& 7-%'+)+,553%&&$8%'4%-,8$)3&')> 7-%'4"##$%/'(-$#/',&
X1 B&'&$+$&7%3'$+'*)7$8%1 Taken together, these reasons and excuses contribute to the erosion
/%*%,+%/',+/'/%53,/%/1 &73%+57-&'7-,7'(,+'4%'/%8%#).%/',+/',3%'-)+)3%/6
Z1 I)+7$+"%&'%&.%($,##;'=-%+'7,35%7%/':$/'4%()*%& of civility in peer group interactions. When civility is diminished,
A1 B&'$+7%+/%/'7)'-,3*',+/'%L.#)$71 ,+/'73,+&>)3*'7-%'3)#%')> 7-%'4;&7,+/%3'$+7)'7-,7')> it is replaced by a false sense of entitlement, an intolerance
/$&73%&&%/')3')4K%(7&'7)'7-%'7,"+71 toward differences, and a liberty to exclude that allow kids to harm
C1 B&'$+8,&$8%',+/'$+7%+/%/'7)',&&%37'7-%'&7,7"&')> ,'=$7+%&&<T&)*%)+%'=$##$+5'7)'&7,+/'".< &.%,:')"7< ,+/ another human being without feeling empathy, sympathy, compassion,
7-%'4"##;1
41%-/C1*!/91A#-4%& E1 B&'$+7%+/%/'7)'4%'/%53,/$+5',+/'/%*%,+$+51
,(7',5,$+&7'$+K"&7$(%1 @'/,"+7$+5'7,&:< 4"7',
+%(%&&,3;')+%1
or shame. This erosion of civility also erodes kids’ ability to
communicate, negotiate, and compromise—three vital skills necessary
for solving problems, resolving conflicts, and reconciling differences
+,!()1!#*/!1/$%&&'(,6 T1 B&'$+7%+/%/')'%L.3%&&'()+73)#',+/'/)*$+,7$)+1
V1 B&'$+7%+/%/'7)'8$)#,7%'7-%'4)"+/,3$%&')> 7-%'7,35%71
peaceably.

273)+5'&%+&%')> &%#>< 4%$+5','>3$%+/< -,8$+5',7'#%,&7 X1 B&'$+7%+/%/'7)'*,:%'7-%')7-%3'.%3&)+'>%%#


)+%'5))/'>3$%+/'=-)'$&'7-%3%'>)3';)"'7-3)"5-'7-$(: 3%K%(7%/< "5#;< .)=%3#%&&< )3'"+()*>)37,4#%1
,+/'7-$+< ,+/'4%$+5',4#%'7)'&"((%&&>"##;'5%7'$+7)', Z1 I)+7$+"%&'%&.%($,##;'=-%+'7,35%7%/':$/'4%()*%& Excerpts from The bully, the bullied, and
53)".G,+/'5%7')"7'=-%+'$7'/)%&'+)7'&%38%';)"'=%##1 /$&73%&&%/')3')4K%(7&'7)'7-%'&%L",#'()**%+71 the not-so-innocent bystander
Barbara Coloroso © 2002, 2015
B+'&%L",#'4"##;$+5'7-%3%'$&'+)'$+8$7,7$)+GK"&7',+
www.kidsareworthit.com
,77,(:1 D-%'7,35%7'$&'%*4,33,&&%/< -"*$#$,7%/< ,+/ info.kidsareworthit@gmail.com
\
&-,*%/',+/'7%+/&'7)'>%%#'.)=%3#%&&1 B7'$&'+)7'7-% 800.729.1588 B##"&73,7$)+&'4;'c)%;'I)#)3)&)'a'A\\A
$+7%+7$)+')> 7-%'4"##;'7)'%+5,5%'$+'-%,#7-;'&%L",# WL(%3.7&'>3)*'!"#$%%&''()$**"#$%
%&''+#,)$--.,$**"#$%
%(/*-.,#0<
>#$37,7$)+'=$7-',+)7-%3'.%3&)+G7-%',77,(:'$&'*%,+7'7) !,34,3,'I)#)3)&)'a'A\\A
-"371 B> 7-%'7,35%7'.3)7%&7&< -%f&-%'$&')>7%+'#,4%#%/', ===1:$/&,3%=)37-$71()*':$/&',3%'=)37-'$7< $+(1
Q4$7(-R =-)'$&'".7$5-7',+/'(,+H7'7,:%','K):%1 Z\\1XA[1?TZZ'b''>,L'C\C1[XA1?A\E
The Net Neighborhood Ways and Means
of Cell Phone Bullying
Children are doubling up on their
media exposure—watching TV Many models of today’s cell phones
while plugged in to the Internet, are actually powerful, miniature,
text messaging while listening to handheld multimedia computers
music—and packing as much as that kids can use to talk to one
8.5 hours of media exposure into another, chat via IM, send text
6.5 hours a day, seven days a messages with still and video
week. Kids are plugged in, turned images, chat online, surf the Internet,
on, and tuned out for the equivalent ©Joey Coloroso 2007 download songs, and watch TV.
of a forty-five-hour workweek,
every week. Cyberbullies Bullies use any and all of the
following to target their peers:
Media technology has the power Bullies are using high tech tools to
to help define reality for our kids; threaten, stalk, ridicule, humiliate, • Abusive, insulting, or threatening
it also has tremendous influence on taunt, and spread rumors about voice messages.
who our kids become and what their targets. The characteristics of • Abusive, insulting, or threatening
kind of world they inhabit. bullying—imbalance of power, the text messages.
intent to harm, the threat of further • Silent calls.
Connecting to the Internet is like aggression, and the creation of • Stolen identity--sending text
opening the door to a new--and terror—are magnified with the user message through a Website using
vast—city. of electronic technologies. the name and phone number of the
• Some parents look at the ugly and target in order to get the target into
absolutely scary stuff out there and Faceless and nameless electronic trouble, spread a rumor, or tempt
refuse to let the Internet be a part transmissions make it easy for others to retaliate against an
of their family life at all. bullies to torment their targets unsuspecting target.
• Some parents are so ill-informed anywhere and at any time. • Numerous calls or text messages
and have so little desire to be to a cell phone in order to run up a
computer literate that they allow Bullies are: large phone bill for the target.
their children to roam any and all 1. emboldened by apparent • Photo-bullying—using cell phones
streets, back alleys, and freeways anonymity afforded them in to take compromising or humiliating
of the Internet. cyberspace pictures or videos of the target,
• Some parents who know how 2. removed from the immediate sending those pictures or videos to
ignorant they are, make an effort to reaction of the target, everyone in their address books and
learn at least as much as their young 3. far often not held posting these pictures for perpetuity
children know, and more—especially accountable for their actions. on file-sharing service (such as
about Net safety and Net etiquette. Kazaa) for anyone to download or
They realize the Net is here to stay, Faceless and nameless electronic view.
and that teaching children to use it transmissions make it easy for excerpts from the bully, the bullied, and
to their advantage, to get the most bullies to torment their targets excerpts
the from the bully,
not-so-innocent the bullied, and the
bystander
bystander,
by Barbara Coloroso
Barbara Coloroso © 2015 © 2005
out of it, and to be safe requires the anywhere and at anytime, with www.kidsareworthit.com
www.kidsareworthit.com
same tools that other communication apparent anonymity, distributing of kids are worth it! inc. 800.729.1588
info.kidsareworthit@gmail.com
and relationship skills require. irretrievable messages worldwide. fax 303.972.1204 p.o. box 621108
800.729.1588 T
Littleton, Colorado 80162
Internet Gaming • Closely monitor your child’s TV How to Respond
viewing, video game playing,
Games played on gaming devices computer activities, and music. The situation is often made worse
such as Sony PlayStation 2 Network • Engage in more constructive, by responding to the cyberbully,
or Xbox Live allow players from entertaining, and energizing whether that response is passive,
around the world to play together or activities. aggressive, or assertive.
in competition with one another. • Teach your child to “will good.”
Cyber bullies who frequent gaming SCBT (Stop, Copy, Block, and
communities taunt, threaten, lock The discipline involved is a Tell a trusted adult.)
targets out of the game, or hack into constructive and compassionate
their target’s account. response to cyberbullying that takes • Stop. Don’t respond.
into consideration the intent, the • Copy. Make copies of all messages
Not all Internet games are violent, severity of the cyberbullying, and and pictures, and save cell phone
but those that are, greatly impact the the restorative steps needed to help text and voice messages.
bully, the bullied, and the bystander. the cyberbully to take on a more • Block or filter communications
Not only do these games normalize prosocial role in the face-to-face through IM contact list or email.
violence and make it routine, they encounters with peers and in the • Tell a trusted adult.
set up other people as adversaries, virtual neighborhood.
prey, or targets; they may even help If the cyberbullying is threatening
create neural pathways that connect Helping the Cyberbullied or vicious you may need to do the
violence with pleasure and rewards, following as well:
rather than fright, sadness, and Being targeted in cyberspace can • Change email address, account,
sympathy. have devastating and sometimes username, phone number and/or
deadly consequences. SIM (subscriber identity module)
Stopping Cyberbullying for cell phone users.
• The warning signs that kids exhibit • File a detailed complaint with the
Whether the cyberbullying is done when being cyberbullied are similar school.
via the cell phone or any other to those exhibited if they are bullied • File a complaint with the Website,
electronic tool—or combination of in any other way, but the spiral down Internet service provider, or cell
tools—the response should begin into depression, illness, and phone company.
with the loss of privileges related to academic failure is usually • Contact the police if the
the use of those tools. The following accelerated when cyberbullying is cyberbullying appears to be
steps are the same used to hold involved. criminal.
any bully accountable for any form • Cyberbullying can and does • Contact an attorney. It is possible
of bullying: happen anytime and anywhere—no to seek financial damages from the
escape. cyberbully and his or her parents.
• Intervene immediately with • All of the reasons for not telling
discipline utilizing the three Rs: about being the target of low-tech Bystanders
restitution, resolution, and bullying are the same for
reconciliation. cyberbullying. They can be willing or unwitting
• Create opportunities to “do good.” • Added fear that if targets report accomplices to cyberbullies. Bullies
• Nurture empathy and sympathy. being cyberbullied, their parents can use bystanders to do
• Teach friendship skills—assertive, will take away their cell phones and “cyberbullying by proxy.”
respectful, and peaceful ways to restrict their computer access.
relate to others.
From Bystander to Witness Three P’s: must be educated not only about the
Policies, Procedures, and dangers of low-tech and high-tech
It is never easy to stand up to a bully Programs bullying, but also about the world
or defend a target. But just as there of high tech in general as both an
are ways to act courageously in the Even though most cyberbullying environment and a tool for
real world, there are ways to stand occurs outside of school, it socializing that the younger
up, speak out, and defend a target in negatively impacts students and the generation has fully embraced.
the cyberworld. school environment. It has already
led to violence—including murder Decoding the Code
Tactics and suicide—in schools throughout
the world. Kids use shorthand to quickly send
• Don’t contribute to a blog or Web- text messages to one another. It is
poll that denigrates or humiliates a If your school already has an important to know the lingo. A few
target. Sign off or click “end.” antibullying policy, procedures in common codes used:
• Don’t forward or copy-and-paste place for the bully, the bullied, and
derogatory, harmful, or hurtful e- bystanders, and programs that help• HHOJ: Ha, ha, only joking (or JJ:
mails, text messages, or pictures to break the cycle of violence and just joking). Both are used to absolve
another site. create a more caring, inclusive cyberbullies of any responsibility for
• Save, copy, and print out such environment, it is important that an
their taunts.
examples of cyberbullying and give electronic component be added to • LOL: Laughing out loud.
them to the target so he or she can all three P’s: • BRB: Be right back.
be aware of what is happening. • WTGP:
POS:
Text Want over
Parent to goshoulder.
private?
Sharing such information in a caring • Policies must include a sanction • 9: Parent in the room.
and supportive way will help the against cyberbullying as well as • YRDM: You are dead meat.
target feel less isolated and alone. other kinds of bullying. Students • YBS: You’ll be sorry.
• Tell a caring adult you trust who and parents need to be informed that • ASL: Age/sex/location.
will keep your identity confidential, cyberbullying will not be tolerated. • LMIRL: Let’s meet in real life.
who will act to support the target, • Procedures for restorative justice • F2F: Face to face.
and who will make sure the must be tailored to the unique • SOHF: Sense of humor failure.
cyberbully is held to account. problems and possible solutions • RUITD: Are you in the Dark?
• Tell the cyberbully that you are not required to repair the damage done
comfortable getting involved in the Check out
through cyberbullying—especially Check out Websites
websites such such as:as
cyberbullying. the very public and potentially www.netlingo.com
www.netlingo.com.
permanent aspect of it. www.commonsensemedia.org
Kids have to trust that telling an • Programs must address what www.StopCyberbullying.org
•Ask your kids to teach you a few of
adult will make a positive difference. cyberbullying is; how it impacts www.EndRevengePorn.org
www.EndRevenge.Porn.org
the shortcuts on the cell phone. It is
www.RedHoodProject.com
Once they have shared information students; what students are to do if important that you know and make
with you, talk with them about what they are targeted or if they are aware the effort to keep up with the lingo
they can do and what you are going of another student being targeted; • Askkids
your yourare kids to teach you a few of
using.
to do. and ways to use cyberspace in a the shortcuts on the cell phone. It is
creative, constructive, and important
excerpts from that youtheknow
the bully, and
bullied, andmake
the the
bystander,
effort toBarbara
keep up Coloroso
with©the2005
lingo your
If your child begs you not to get responsible manner. www.kidsareworthit.com
involved, hear them out, and then kidsareare
kids using.
worth it! inc. 800.729.1588
share your concerns about possible What is needed is a comprehensive fax 303.972.1204 p.o. box 621108
excerpts from the80162
bully, the bullied, and
Littleton, Colorado
consequences of not acting and the school-led/community-based the not-so-innocent bystander
possible actions you both can take. approach. The adult community by Barbara Coloroso © 2015
www.kidsareworthit.com
info.kidsareworthit@gmail.com
800.729.1588

You might also like