Cyberbullying and the Middle School Adolescent: Educator Perceptions

Total Page:16

File Type:pdf, Size:1020Kb

Cyberbullying and the Middle School Adolescent: Educator Perceptions View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Digital Commons @ Gardner-Webb University Gardner-Webb University Digital Commons @ Gardner-Webb University Education Dissertations and Projects School of Education 2019 Cyberbullying and the Middle School Adolescent: Educator Perceptions Kalani Crognal LaFrancis Follow this and additional works at: https://digitalcommons.gardner-webb.edu/education_etd Part of the Education Commons CYBERBULLYING AND THE MIDDLE SCHOOL ADOLESCENT: EDUCATOR PERCEPTIONS By Kalani Crognal LaFrancis A Dissertation Submitted to the Gardner-Webb University School of Education in Partial Fulfillment of the Requirements for the Degree of Doctor of Education Gardner-Webb University 2019 Approval Page This dissertation was submitted by Kalani Crognal LaFrancis under the direction of the persons listed below. It was submitted to the Gardner-Webb University School of Education and approved in partial fulfillment of the requirements for the degree of Doctor of Education at Gardner-Webb University. __________________________________ ________________________ Jennifer Putnam, Ed.D. Date Committee Chair _________________________________ ________________________ Stephen Laws, Ed.D. Date Committee Member _________________________________ ________________________ Amanda Ruppe, Ed.D. Date Committee Member _________________________________ ________________________ Prince Bull, Ph.D. Date Dean of the School of Education ii Dedication In memory of my Momma; she believed I could do anything. I did it, Momma! In honor of Thomas Simon, John Stephen, and Anna Elaine; may my work serve as a remembrance of the significance of lifelong learning while ensuring you that with perseverance you can accomplish anything your heart desires. Thank you for allowing me to take this journey, and for always understanding the seemingly endless days of “homework.” All that I do has been, and will always be, for you. I love you barrels and barrels piled high to the sky. But they that wait upon the Lord shall renew their strength. ~Isaiah 40:31. iii Acknowledgements “If you want to go fast, go alone. If you want to go far, go together.” – African Proverb. Many people served a role in this study; all were significant. My team of readers, if not for you, I would not be here: Malia Brown, Dr. Amber Halliburton, Brenda Hewes, Katie Johnson, Dr. Kenya Kilgore, Amy Harris, Diane Reeves, Melanie Sherrill, and Sherrie Vassy. Y’all are some amazing people who I call friends! Dr. Putnam, having not yet laid eyes on me, you believed in me; for that I am eternally grateful. You are the epitome of all that an educator should be. Committee Member Extraordinaire Dr. Laws, thank you for being a team player; you are an amazing professor and an even better person. Committee Member/Amazing Assistant Principal, Dr. Ruppe, thank you for the tough love, you are such an asset to our school. Dr. Brown, thank you for giving me a chance to prove myself. Thank you to my past advisors: Dr. Jane King, Dr. Steven Bingham, and Dr. Shirley Sealy. My data guru extraordinaire Coach Ward, thank you for your selflessness in helping this ELA person to discern statistical analysis on a higher level. This accomplishment would not have been possible without your expertise. Amazing teacher and fellow Thespian, Brenda Hewes, I think fondly of you and your red pen. Melanie, my dearest friend, I adore you; thank you for being “my person”; I love you Mel! You’re next! “This process is not about intellectual ability; it is more about perseverance and sheer determination” (Dr. John Balls). Before January 2008, this accomplishment would have never materialized. I am thankful for the little Freudian slip that kept me on track and to Dr. Howard Gardner for discovering multiple intelligences. A 30% chance is enough. #icandohardthings iv Abstract CYBERBULLYING AND THE MIDDLE SCHOOL ADOLESCENT: EDUCATOR PERCEPTIONS. LaFrancis, Kalani Crognal, 2019: Dissertation, Gardner-Webb University Victimization and perpetration of cyberbullying are ongoing threats to school systems across the United States. Cyberbullying is a vast problem for adolescents, due to constant access and availability of technology via the online environment. This mixed methods study was based on the theoretical framework of Bandura’s (1989) theory. This study investigated the perceptions of middle school educators concerning cyberbullying via educator surveys, focus groups, and interviews to gather mixed methods data. This study took place in four middle schools in upstate South Carolina within District X. One hundred three educator participants took the survey, 12 educators participated in focus groups, and eight educators were interviewed. The purpose of this study was to examine the perceptions of middle school educators regarding cyberbullying, build on previous literature, and add related knowledge to current research. Results showed that educators are aware and extremely concerned about cyberbullying at the middle school level. Educators perceived parental awareness, parental involvement, and parental monitoring could directly impact cyberbullying. Additionally, educators saw a need to educate students, parents, and teachers to impact cyberbullying. A future study that examines parent perceptions with regard to student monitoring would be beneficial as well as a larger sample size. Keywords: cyberbullying, educators, perception, middle school, adolescents v Table of Contents Page Chapter 1: Introduction ........................................................................................................1 Statement of the Research Problem .........................................................................3 Theoretical Framework ............................................................................................7 Purpose Statement ..................................................................................................12 Research Questions ................................................................................................13 Demographics ........................................................................................................13 Definition of Significant Terms .............................................................................15 Researcher’s Role ..................................................................................................16 Summary ................................................................................................................17 Chapter 2: Review of Related Literature ...........................................................................19 Introduction ............................................................................................................19 Literature Search Procedures .................................................................................19 Overview of Problem .............................................................................................20 Characteristics and Development of Adolescents..................................................23 Traditional Bullying ...............................................................................................28 Historical Overview ...............................................................................................33 Cyberbullying ........................................................................................................35 Types of Cyberbullying .........................................................................................39 Law ........................................................................................................................47 Current Research ....................................................................................................52 Summary ................................................................................................................54 Chapter 3: Methodology ....................................................................................................55 Introduction ............................................................................................................55 Restatement of the Purpose of the Study ...............................................................55 Research Questions ................................................................................................56 Research Design.....................................................................................................57 Participants and Setting..........................................................................................59 Ethical Considerations ...........................................................................................63 Research Procedures ..............................................................................................65 Instrumentation ......................................................................................................65 Data Analysis .........................................................................................................76 Delimitations and Limitations ................................................................................79 Summary ................................................................................................................80 Chapter 4: Results ..............................................................................................................81 Introduction ............................................................................................................81
Recommended publications
  • Silenced by Free Speech: How Cyberabuse Affects Debate and Democracy
    Silenced by Free Speech: How cyberabuse affects debate and democracy Chapter in: Rethinking Cybercrime, Palgrave Macmillan. In press, publication date January 2017 Editors: Tim Owen, Wayne Noble, Faye Speed The early days of the internet promised much. Posting online seemed to offer a freedom from expectation and prejudice. In the words of the New Yorker cartoon, on the internet, nobody knows you’re a dog. We believed nobody knew your gender, age or race either. Your beauty or lack of it was of no account, your mind was disembodied, pure spirit, freed from the hidebound judgements of society. You could remove the mask you wear every day, revealing your true nature online to other disembodied spirits in a way that you never could to your family or colleagues. Perhaps you would find a new community to live in online, a community that thinks and feels as you do. Or instead of revealing yourself, you could create a new self. You could play with your identity more easily than playing with your hair colour, you could have a whole wardrobe of new selves if you want them. The internet offered freedom from the space constraints and word counts of newspapers, as well as from their gatekeepers, political stances and editorial guidelines. Here, anyone could be their own publisher for free, and could be heard all over the world without having their opinions edited down to fit a hole at the bottom of a column or a gap in a 90-second feature. You can’t fill the internet, so you could say everything you always wanted to say, as many times as you like.
    [Show full text]
  • Civility, Safety & Interaction Online
    Civility, Safety & Interaction Online February 2020 1 Study Methodology Adults 18-74, Teens 13-17 The 2019 report is based on the views of 12,520 14-minute Web survey adults and teens questioned across 25 countries Interviews conducted May 1-31, 2019 Argentina 502 Belgium 501 Brazil 502 Canada 500 Chile 503 Colombia 502 France 502 Germany 501 Hungary 500 India 502 Indonesia 501 Ireland 500 Italy 500 Malaysia 500 Mexico 500 Netherlands 504 Peru 500 Poland 500 Russia 500 Singapore 500 South Africa 500 Turkey 500 United Kingdom 500 Countries in Bold United States 500 new in 2019 Vietnam 500 2 42,000+ Interviews since 2016 25 Countries 21 Online Risks 2019 22 Countries 21 Online Risks 2018 23 Countries 2017 20 Online Risks 14 Countries 17 Online Risks 2016 3 3 Key Research Questions Core Trends New questions Digital Civility Index Current & future state of digital civility Sources of online risk Consumer’s aspirations for digital civility Pain caused by online risks Topics that generate uncivil behavior Consequences & Actions taken The number of times a risk has occurred Know where to find help 4 The Rising Tide of Incivility Pessimism and Hope The Digital Civility Index increased 4-points to 70%. About half of the twenty-five country DCI scores rose significantly, with fifteen countries registering their worst DCI since the study began in 2016. Many countries in the study have seen a rise of populist movements or politicians who employ incendiary rhetoric, fueling confrontational discourse that extends into the online world. Nearly four in ten adults said politics was at the center of rude, uncivil or abusive interactions online.
    [Show full text]
  • Oregon Senate Passes Anti-Doxing Legislation
    OREGON SENATE DEMOCRATS Salem, Oregon Oregon State Legislature PRESS RELEASE June 7, 2021 CONTACT: Amanda Kraus, 503-986-1074 [email protected] Oregon Senate Passes Anti-Doxing Legislation SALEM – The Oregon Senate passed House Bill 3047 today, a bill to provide a civil remedy to a person who has experienced “doxing.” Doxing is a general term used to describe a situation in which someone deliberately shares another individual’s private information on the internet with an intent to incite harassment. “Throughout the past year we’ve seen a renewed effort of individuals and communities making their voices heard to call out racist systems and improve police accountability,” said Senator James I. Manning Jr. (D-Eugene), who carried House Bill 3047. “We have also seen the astounding efforts of our local journalists on the ground – sometimes in precarious situations to provide thorough reporting on these events, even during a public health crisis.” “Unfortunately, we have also seen people exercising hate and harassment against those with different views. Publishing a person’s private information online implicitly encourages hate and harassment against those individuals. It’s happened to my colleagues in the Legislature, it’s happened to teachers exercising their right as independent individuals to peacefully assemble and it affects safety as well as a person’s ability to earn a living,” added Senator Manning. “Doxing is a tool used to hurt. House Bill 3047 will ensure those who choose to cause that hurt know they can be held accountable and will give tools to victims of this bullying tool to seek financial remedy.” The bill allows an individual to sue for damages when someone deliberately releases a person’s private information online, such as work address or personal email, with the intent to incite harassment if their information is released without consent, and sharing that information results or could result in stalking, harassment, or injury.
    [Show full text]
  • Sexual Harassment and Bullying Prevention Policy
    Sexual Harassment and Bullying Prevention Policy Purpose: The Sacramento Gay Men’s Chorus (SGMC) is committed to providing an environment that is safe and welcoming, and free from all forms of conduct that can be considered discriminatory, intimidating, or disruptive to Chorus functions, including behavior defined as sexual harassment or bullying. General Policy: During SGMC functions, Chorus singing members, non-singing members, volunteers, employees, vendors, contractors, and Board members (all of which are included hereafter in the term “members”) shall maintain safe, enjoyable and welcoming spaces by showing respect in their actions and words. Outside of SGMC functions, members shall interact with each other in ways that will preserve a safe, enjoyable, and welcoming space at SGMC functions. When making public statements about SGMC, members shall express themselves in ways that represent the organization as a safe, enjoyable, and welcoming space. SGMC recognizes that the culture of LGBTQIA+ people includes awareness and acceptance of sexual expression, gender identity, and social and political activism that is different than traditional “heteronormative” culture. Thus, during interactions between SGMC members, or when engaging the public on behalf of SGMC, topics of conversation, humor, and expressions of camaraderie may include sexual and political overtones that reflect the culture, rather than being an attempt to harass or bully someone. SGMC expects that members will interact with each other, but only to the degree that all parties in an interaction are comfortable. During SGMC functions, members support each other musically, and participate in conversation, expressions of friendship, joking, physical touch, and other signs of camaraderie. Outside of SGMC functions, SGMC neither promotes nor limits interactions between members, but will intervene in the context of a chorus function if those interactions affect the environment of a SGMC function.
    [Show full text]
  • The Rules of #Metoo
    University of Chicago Legal Forum Volume 2019 Article 3 2019 The Rules of #MeToo Jessica A. Clarke Follow this and additional works at: https://chicagounbound.uchicago.edu/uclf Part of the Law Commons Recommended Citation Clarke, Jessica A. (2019) "The Rules of #MeToo," University of Chicago Legal Forum: Vol. 2019 , Article 3. Available at: https://chicagounbound.uchicago.edu/uclf/vol2019/iss1/3 This Article is brought to you for free and open access by Chicago Unbound. It has been accepted for inclusion in University of Chicago Legal Forum by an authorized editor of Chicago Unbound. For more information, please contact [email protected]. The Rules of #MeToo Jessica A. Clarke† ABSTRACT Two revelations are central to the meaning of the #MeToo movement. First, sexual harassment and assault are ubiquitous. And second, traditional legal procedures have failed to redress these problems. In the absence of effective formal legal pro- cedures, a set of ad hoc processes have emerged for managing claims of sexual har- assment and assault against persons in high-level positions in business, media, and government. This Article sketches out the features of this informal process, in which journalists expose misconduct and employers, voters, audiences, consumers, or professional organizations are called upon to remove the accused from a position of power. Although this process exists largely in the shadow of the law, it has at- tracted criticisms in a legal register. President Trump tapped into a vein of popular backlash against the #MeToo movement in arguing that it is “a very scary time for young men in America” because “somebody could accuse you of something and you’re automatically guilty.” Yet this is not an apt characterization of #MeToo’s paradigm cases.
    [Show full text]
  • Crafting Online Harassment and Abuse Reporting Policies
    crafting online harassment and abuse reporting policies Amanda Levendowski Internet Law & Policy Foundry Fellow Data & Society Databite December 17, 2015 1 CRAFTING HARP what’s the problem? 2 CRAFTING HARP “We suck at dealing with abuse and trolls on the platform and we’ve sucked at it for years. It’s no secret and the rest of the world talks about it every day. We lose core user after core user by not addressing simple trolling issues that they face every day.” - Dick Costolo, CEO of Twitter 3 CRAFTING HARP 40% 4 CRAFTING HARP According to a 2014 survey, over 40% of online adults report being targets one or more types of harassment: called offensive names 7% purposefully embarassed 8% 27% stalked 6% 8% sexually harassed 22% physically threatened sustained harassment Maeve Duggan, Online Harassment, PEW Research Internet Project (Oct. 22, 2014), http://www.pewinternet.org/2014/10/22/online-harassment/ 5 CRAFTING HARP WHO 6 CRAFTING HARP There may be a correlation between the types of people who engage in harassment and where that behavior is likely to occur: co-worker 7% former partner 10% family 12% friend 23% acquaintance 24% unknown 26% stranger 38% 7 CRAFTING HARP WHERE 8 CRAFTING HARP There may be a correlation between the types of people who engage in harassment and where that behavior is likely to occur: online dating site 6% co-worker 7% forum 10% former partner 10% family 12% email 16% friend 23% online gaming 16% acquaintance 24% the comments 22% unknown 26% stranger 38% social media 66% 9 platform permeability matrix CRAFTING
    [Show full text]
  • MIAMI UNIVERSITY the Graduate School
    MIAMI UNIVERSITY The Graduate School Certificate for Approving the Dissertation We hereby approve the Dissertation of Bridget Christine Gelms Candidate for the Degree Doctor of Philosophy ______________________________________ Dr. Jason Palmeri, Director ______________________________________ Dr. Tim Lockridge, Reader ______________________________________ Dr. Michele Simmons, Reader ______________________________________ Dr. Lisa Weems, Graduate School Representative ABSTRACT VOLATILE VISIBILITY: THE EFFECTS OF ONLINE HARASSMENT ON FEMINIST CIRCULATION AND PUBLIC DISCOURSE by Bridget C. Gelms As our digital environments—in their inhabitants, communities, and cultures—have evolved, harassment, unfortunately, has become the status quo on the internet (Duggan, 2014 & 2017; Jane, 2014b). Harassment is an issue that disproportionately affects women, particularly women of color (Citron, 2014; Mantilla, 2015), LGBTQIA+ women (Herring et al., 2002; Warzel, 2016), and women who engage in social justice, civil rights, and feminist discourses (Cole, 2015; Davies, 2015; Jane, 2014a). Whitney Phillips (2015) notes that it’s politically significant to pay attention to issues of online harassment because this kind of invective calls “attention to dominant cultural mores” (p. 7). Keeping our finger on the pulse of such attitudes is imperative to understand who is excluded from digital publics and how these exclusions perpetuate racism and sexism to “preserve the internet as a space free of politics and thus free of challenge to white masculine heterosexual hegemony” (Higgin, 2013, n.p.). While rhetoric and writing as a field has a long history of examining myriad exclusionary practices that occur in public discourses, we still have much work to do in understanding how online harassment, particularly that which is gendered, manifests in digital publics and to what rhetorical effect.
    [Show full text]
  • Doxxing, Swatting and the New Trends in Online Harassment 22 April 2015, by Andrew Quodling
    Doxxing, swatting and the new trends in online harassment 22 April 2015, by Andrew Quodling citizens about "swatting" (see below) since 2008. It has become common to see articles about how these attacks have affected politicians (both Republican and Democrat in the US), celebrities, journalists, businesses, video game streamers and public servants. What is doxxing? Doxxing – named for "documents" or "docs" – is the act of release of someone's personal and/or When the SWAT team bursts into your bedroom, it’s not identifiable information without their consent. This only unpleasant but potentially deadly. Credit: Jason can include things like their full legal name, social Eppink/Flickr, CC BY security numbers, home or work addresses and contact information. There's no set format for a "dox"; the doxxer simply Imagine this: there's a knock at your door. "Pizza publishes whatever information they've managed to delivery!" It's the fifth time in the last hour that turn up in their searches. Sometimes this even you've had to say to a delivery-person: "No, I really includes the names and details of their target's didn't order anything." That's irritating. family or close friends. Half an hour later, there's another noise at the As a tactic of harassment, doxxing serves two door. This time it's forced open as your house is purposes: it intimidates the people targeted by stormed by the heavily armed and aggressive invading and disrupting their expectations of special response unit of your local police force. privacy; and it provides an avenue for the They're responding to a tip off that warned them of perpetuation of that person's harassment by a hostage situation at your address.
    [Show full text]
  • What Is Cyberbullying?
    Cyberbullying Contents 1. What Is Cyberbullying 2. The Dangers Of Cyberbullying 3. How Is Cyberbullying Different From Regular Bullying 4. How To Tell If Your Child Is Being Cyberbullied 5. How To Tell If Your Child Is Cyberbullying Someone Else 6. Why Do Children Cyberbully 7. What To Do If Your Child Is Cyberbullying 8. What To Do If Your Child Is Being Cyberbullied 9. Parents Top 10 Questions About Cyberbullying 10. Statistics Of Cyberbullying 2015 Page 2 www.keepchildrensafeonline.com 1. What Is Cyberbullying? The definition of Cyberbullying is ‘the use of electronic communication to bully a person, typically by sending 1 messages of an intimidating or threatening nature’. As the definition suggests, Cyberbullying can take many forms. Just about any type of electronic communication can be used to bully or intimidate somebody, whether it’s via texting, email, instant messengers, chat rooms, multiplayer games and so forth. Here is a list of some (but by no means all) of the possible sources of Cyberbullying: • Texting • Phone Calls • Social Media • Chatrooms • Forums • Messaging & Photo Apps like WhatsApp and Snapchat • Online Multiplayer 1 Oxford English Dictionary Page 3 www.keepchildrensafeonline.com Of course, it can be tricky to know what is and isn’t Cyberbullying, as sometimes children say mean things to each other online, but one wouldn’t consider it any more than childish name-calling. The key distinction to make is that Cyberbullying is generally characterised by repeatedly causing harm, whether that is through repeated incidents or a single malicious incident that has lasting repercussions. Some examples of Cyberbullying include: Cyberstalking Cyberstalking is where somebody ‘stalks’ the victim online, usually sending multiple messages or just making it clear that they are watching the victim’s online life.
    [Show full text]
  • Field Hockey Glossary All Terms General Terms Slang Terms
    Field Hockey Field Hockey Glossary All Terms General Terms Slang Terms A B C D E F G H I J K L M N O P Q R S T U V W X Y Z # 16 - Another name for a "16-yard hit," a free hit for the defense at 16 yards from the end line. 16-yard hit - A free hit for the defense that comes 16 yards from its goal after an opposing player hits the ball over the end line or commits a foul within the shooting circle. 25-yard area - The area enclosed by and including: The line that runs across the field 25 yards (23 meters) from each backline, the relevant part of the sideline, and the backline. A Add-ten - A delay-of-game foul called by the referee. The result of the call is the referee giving the fouled team a free hit with the ball placed ten yards closer to the goal it is attacking. Advantage - A call made by the referee to continue a game after a foul has been committed if the fouled team gains an advantage. Aerial - A pass across the field where the ball is lifted into the air over the players’ heads with a scooping or flicking motion. Artificial turf - A synthetic material used for the field of play in place of grass. Assist - The pass or last two passes made that lead to the scoring of a goal. Attack - The team that is trying to score a goal. Attacker - A player who is trying to score a goal.
    [Show full text]
  • The Ripple Effect Covid-19 and the Epidemic of Online Abuse
    THE RIPPLE EFFECT COVID-19 AND THE EPIDEMIC OF ONLINE ABUSE September 2020 Table of Contents EXECUTIVE SUMMARY Executive summary 5 Glossary 13 INTRODUCTION Introduction 14 FINDINGS About the respondents 19 Respondents’ experiences of online abuse during COVID-19 20 Intersectionality 22 Platforms, perpetrators and patterns of online abuse 23 Impacts of online abuse on respondents 27 Behavioural change and self-censorship online 28 Reporting 31 Abuse in the virtual workplace 34 TESTIMONIALS Testimonials 36 CONCLUSIONS & RECOMMENDATIONS Conclusions 36 Recommendations for employers 40 Recommendations for the government 40 Recommendations for tech companies 42 Recommendations for civil society 43 Appendix 44 2 Suggested Citation: The Ripple Effect: COVID-19 and the Epidemic of Online Abuse by Glitch UK and End Violence Against Women Coalition under a creative commons lisence. You are free to: Share — copy and redistribute the material in any medium icensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original. No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits. This report was design in Adobe InDesign and Illustrator by Visualst. 2 Please note that this report includes statistics, and personal accounts, of online abuse and discrimination which some readers may find triggering.
    [Show full text]
  • Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing
    Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing Peter Snyder Periwinkle Doerfler University of Illinois at Chicago New York University Chicago, IL Brooklyn, NY psnyde2@uic:edu pid207@nyu:edu Chris Kanich Damon McCoy University of Illinois at Chicago New York University Chicago, IL Brooklyn, NY ckanich@uic:edu mccoy@nyu:edu ABSTRACT KEYWORDS Doxing is online abuse where a malicious party harms another Doxing, Identity Theft, Online Abuse by releasing identifying or sensitive information. Motivations for ACM Reference Format: doxing include personal, competitive, and political reasons, and Peter Snyder, Periwinkle Doerfler, Chris Kanich, and Damon McCoy. 2017. web users of all ages, genders and internet experience have been Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing. targeted. Existing research on doxing is primarily qualitative. This In Proceedings of IMC ’17. ACM, New York, NY, USA, 13 pages. work improves our understanding of doxing by being the first to https://doi:org/10:1145/3131365:3131385 take a quantitative approach. We do so by designing and deploying a tool which can detect dox files and measure the frequency, content, targets, and effects of doxing on popular dox-posting sites. 1 INTRODUCTION This work analyzes over 1.7 million text files posted to paste- Doxing is an attack where a victim’s private information is released bin.com, 4chan.org and 8ch.net, sites frequently used to publicly online [33]. While unsophisticated at a technical level, share doxes online, over a combined period of approximately thir- this type of attack can cause substantial harm to its victims. These teen weeks.
    [Show full text]