Multidisciplinary Approaches to Research on Bullying in Adolescence

Total Page:16

File Type:pdf, Size:1020Kb

Multidisciplinary Approaches to Research on Bullying in Adolescence Adolescent Res Rev (2017) 2:1–10 DOI 10.1007/s40894-016-0041-0 NARRATIVE REVIEW Multidisciplinary Approaches to Research on Bullying in Adolescence 1 1 2 3 Melissa K. Holt • Jennifer Greif Green • Mina Tsay-Vogel • Joanna Davidson • Claire Brown1 Received: 7 July 2016 / Accepted: 10 September 2016 / Published online: 15 September 2016 Ó Springer International Publishing 2016 Abstract Bullying is a significant public health problem in Keywords Bullying Á Adolescence Á Multidisciplinary the United States that affects youth functioning in multiple domains. Much of the research on bullying to date has focused on children, however, leaving gaps in the literature Introduction with respect to understanding bullying among adolescents. In particular, less is known about how adolescents con- Bullying remains a pressing public health problem in the ceptualize bullying, what predicts and is associated with United States. Increasingly, scholars have considered pre- bullying involvement among adolescents, and how pre- cursors, predictors, and consequences of bullying involve- vention programs might address the unique needs of mid- ment, as well as examined how to bolster the effectiveness dle and high school students. This special issue proposes of bullying prevention programs. Coupled with the research that a multidisciplinary perspective might be particularly attention to bullying in the last few decades, there has been useful in better understanding bullying among adolescents a significant expansion of states with laws mandating K-12 and determining how to design more effective interven- schools address bullying; whereas in 1999 only one state tions and prevention programs for this age-group. The had enacted legislation (Georgia), as of 2015 all 50 states current article introduces the special issue by briefly dis- passed anti-bullying legislation. Despite these efforts from cussing what is known about bullying in adolescence and research and legal perspectives, there remain gaps in considering three disciplines (computer science, big data, researchers’ understanding of bullying. In particular, and virtual communities; media studies; anthropology) that intervention research on bullying among adolescents, in are particularly well situated to move the field forward. contrast to children, remains limited. To date, research on Next, this article reviews teen pregnancy prevention bullying has been conducted primarily in the fields of efforts, as an example of another adolescent public health psychology and education, but it is possible that other concern that has been addressed successfully using a disciplines might offer novel and innovative approaches to multidisciplinary approach. The article concludes with an understanding bullying and effective bullying interven- overview of the three manuscripts that are part of the tions. As such, the purpose of this special issue is to suggest special issue. that one potentially fruitful approach to move research on adolescent bullying forward is to draw from disciplines that have been less central to, or to date not involved in, the discourse around bullying. & Melissa K. Holt In this introductory article, we first provide a brief over- [email protected] view of what is known about why bullying in adolescence 1 School of Education, Boston University, Boston, MA, USA should be a specific focus of research by describing: bullying 2 College of Communication, Boston University, Boston, MA, rates and correlates; the overlap between bullying and other USA victimization exposures that increase among adolescents; 3 Department of Anthropology, Boston University, Boston, and what is known about the effectiveness of bullying pre- MA, USA vention efforts in this age group. We next discuss how 123 2 Adolescent Res Rev (2017) 2:1–10 multidisciplinary perspectives might advance research on psychological, health behaviors, academic) (Copeland et al. bullying in adolescence, with attention to one discipline 2013; Fekkes et al. 2006; Holt et al. 2015; Swearer and (computer science, big data, and virtual communities) that Hymel 2015). However, a handful of researchers have has already provided novel findings on bullying, and to two suggested that bullying victimization might have differ- disciplines (media studies and anthropology) that have the ential effects based on the age at which it occurs potential to shape how we investigate and understand bul- (McDougall and Vaillancourt 2015). For example, Ttofi lying. Third, to illustrate how other public health problems et al. (2011) found that the link between bullying victim- have been successfully addressed through multidisciplinary ization and depression later in life was strongest when the approaches, we provide the example of teenage pregnancy victimization occurred in childhood, rather than adoles- prevention and highlight how efforts from a range of disci- cence. Among adolescents, however, bullying is linked to plines have cumulatively and successfully contributed to risk factors that specifically increase among this age group, declines in teenage pregnancy. We close with a brief sum- including sexual risk taking (Holt et al. 2013), substance mary of the origins of the special issue and an overview of the use (Radliff et al. 2012), and suicidality (Holt et al. 2015). included articles. Another study found that high school students classified as having experienced ongoing victimization at baseline had Rates and Correlates lower school attendance 2 years later (Smith et al. 2004). Current US national data indicate that 20 % of all youth have Conceptualization of Bullying in Adolescence been bullied on school property and 15 % have experienced and Relevance of Other Victimization Forms cyberbullying within the past year (CDC 2013). In addition, 8 % of students report being bullied on a daily basis (Robers As youth move from childhood into adolescence, their et al. 2015). However, research on bullying prevalence sug- conceptualizations of bullying changes, and in fact, as gests the importance of attending specifically to the experi- described in more detail in Bellmore et al. (this issue) the ences of adolescents. In particular, there have been consistent term ‘‘bullying’’ itself might feel less relevant for adoles- findings showing that bullying increases throughout elemen- cents (Allen 2015). Qualitative work by Guerra and col- tary school, peaks in middle school, and declines in high leagues (Guerra et al. 2011) highlights, for instance, that school (Espelage and Swearer 2003). For instance, in a while elementary school students conceive of bullying as recently published Institute of Educational Statistics (IES) involving physical altercations or property destruction, report, 37 % of 6th grade students reported bullying victim- adolescents are more likely to attend to components such as ization in contrast to 22 % of 12th grade students (US power imbalance and jealousy. Similarly, adolescents were Department of Education 2015). These developmental trends less likely than children to mention physical aggression suggest a unique opportunity to study both the increase in when asked to define bullying (Vaillancourt et al. 2008). undesirable behaviors, and also a subsequent decrease in the This research suggests that fundamental conceptualizations very same behaviors. Also of note, although findings pre- of the definition of ‘‘bullying’’ might shift over time. sented in this same IES report indicated that rates of cyber- Further, other forms of victimization emerge during bullying did not vary significantly between 6th and 12th grade, adolescence, and these victimization forms are associated cyberbullying is more relevant to and common in the period of in complex ways with bullying involvement. For example, adolescence than in childhood (Kowalski et al. 2014). by high school 10 % of youth have experienced physical Researchers additionally find that the forms of bullying dating violence victimization (Miller et al. 2013). In turn, reported by adolescents differ from those reported by children. research has indicated that youth involved in bullying are In particular, adolescents report increases in indirect and more likely to experience teen dating violence (Debnam relational aggression and decreases in physical aggression et al. 2016; Holt et al. 2007). Given shifts in victimization (Robers et al. 2012). This finding suggests the possibility that experiences among adolescents, with bullying becoming that the behaviors associated with bullying and their conse- less common and other peer-based victimization exposures quences shift over time. Research also finds that gender dif- emerging, scholars have set forth theories on aggression ferences in rates of these forms of aggression are more that address its developmental progression. For instance, pronounced in adolescence than in childhood (Salmivalli and Wolfe et al. (2009) suggest that, for some youth, teasing Kaukiainen 2004), indicating a need for research and practice builds to bullying which in turn leads to dating violence. to further attend to gender roles. Further, bullying related to Similarly, Espelage et al. (2012) proposed the bully-sexual sexual relationships (Pepler et al. 2006) and sexual orientation violence pathway theory, in which it is posited that per- (Birkett et al. 2009) peak during adolescence. petrators of bullying who also use homophobic teasing For youth of all ages, bullying victimization is associ- might later engage as perpetrators of sexual violence. ated with deleterious effects in multiple domains (e.g., Given
Recommended publications
  • What Is 'Workplace Bullying'
    ‘The Boy In The Photograph’ ANTI-BULLYING PRESENTATION PERFORMED BY ROB HIGGS ‘The Boy In The Photograph’ is inspired by my own experiences... AM I BEING BULLIED? Several Times On Purpose The ‘Victim State’ FEAR SHAME SELF- BULLYING Strategies To Help Yourself If You Are Ever Bullied… Smash The Silence: Tell Someone & Report It Immediately. Allow Others To Support You. Keep A Diary. Collect Evidence. Build Confidence & Self-Esteem through Personal Challenge. Acknowledge your emotions. It’s OK To Feel Angry or Scared. Release the energy in a therapeutic way: Writing Performing Creating https://www.childline.org.u k/toolbox/art-box/ ‘BANTER’ vs ‘BULLYING’ http://www.telegraph.c o.uk/news/uknews/defe nce/11844639/Army- must-not-lose-banter-in- harassment- crackdown.html ROLEPLAY LOSER YOUR MUM.. UGLY WEIRDO THICK FREAK FAT I DON’T LIKE YOU. Creative Exercise Idea 1: Deflect With Humour Idea 2: Broken Record: “I don’t lose all the time” “Whatever, whatever, whatever” “Clearly not” or “That’s not true” “Thanks!..Thanks!..Thanks!..” “I’m pretty clever actually” “Blah, blah, blah..” “Thanks so much for telling me that.” Idea 3: Direct Question: “Everyone’s a bit weird. It’s a weird world.” “Is this banter or bullying?” “Great banter” “Why are you saying that?” “#Drama” or “#Banter” “What do you mean by that?” “Oh well” or “I don’t need you to like me” Idea 4: Use an ‘I Feel..’ Statement: “My Mum’s great, thanks for asking.” “You can’t talk to me like that.” “I’m just going to write that “You keep saying that…..and it down…and then not care.” makes me feel like…….” Top Tips.
    [Show full text]
  • Harmful Online Communications: the Criminal Offences a Consultation
    Harmful Online Communications: The Criminal Offences A Consultation paper Consultation Paper 248 Law Commission Consultation Paper 248 Harmful Online Communications: The Criminal Offences A Consultation Paper 11 September 2020 I © Crown copyright 2020 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at https://www.lawcom.gov.uk/project/reform-of-the- communications-offences/ II The Law Commission – How we consult About the Law Commission: The Law Commission was set up by section 1 of the Law Commissions Act 1965 for the purpose of promoting the reform of the law. The Law Commissioners are: The Rt Hon Lord Justice Green, Chair, Professor Sarah Green, Professor Nicholas Hopkins, Professor Penney Lewis, and Nicholas Paines QC. The Chief Executive is Phillip Golding. Topic of this consultation: We are consulting on reform of the communications offences (Malicious Communications Act 1988 and Communications Act 2003) in light of developments in online communication. We are also consulting on specific behaviours such as cyberflashing, pile-on harassment, and the glorification of both self-harm and violent crime. Geographical scope: This consultation applies to the law of England and Wales. Duration of the consultation: We invite responses from 11 September 2020 to 18 December 2020. Responses to the consultation may be sent: By email to [email protected] OR By post to Online Communications Team, Law Commission, 1st Floor, Tower, 52 Queen Anne’s Gate, London, SW1H 9AG.
    [Show full text]
  • Active Shooter: Recommendations and Analysis for Risk Mitigation
    . James P. O’Neill . Police Commissioner . John J. Miller . Deputy Commissioner of . Intelligence and . Counterterrorism ACTIVE SHOOTER James R. Waters RECOMMENDATIONS AND ANALYSIS Chief of Counterterrorism FOR RISK MITIGATION 2016 EDITION AS RELEASED BY THE NEW YORK CITY POLICE DEPARTMENT TABLE OF CONTENTS ACKNOWLEDGEMENTS ................................................................................................................2 EXECUTIVE SUMMARY .................................................................................................................3 RECENT TRENDS ........................................................................................................................6 TRAINING & AWARENESS CHALLENGE RESPONSE .................................................................................... 6 THE TARGETING OF LAW ENFORCEMENT & MILITARY PERSONNEL: IMPLICATIONS FOR PRIVATE SECURITY ........ 7 ATTACKERS INSPIRED BY A RANGE OF IDEOLOGIES PROMOTING VIOLENCE ................................................... 8 SOCIAL MEDIA PROVIDES POTENTIAL INDICATORS, SUPPORTS RESPONSE .................................................... 9 THE POPULARITY OF HANDGUNS, RIFLES, AND BODY ARMOR NECESSITATES SPECIALIZED TRAINING .............. 10 BARRICADE AND HOSTAGE-TAKING REMAIN RARE OCCURRENCES IN ACTIVE SHOOTER EVENTS .................... 10 RECOMMENDATIONS ................................................................................................................11 POLICY .........................................................................................................................................
    [Show full text]
  • Dr Philip Zimbardo the Bystander Effect BR
    Requirement: All students in every school, must receive this annual training. Best Practices: This training is formatted to be one 45-minute classroom lesson. If desired, the lesson can be extended by using the Optional Expansion Lessons. Trainer instructions: Throughout this Script, instructions for the facilitator will be in italics. Those items to be spoken or asked will not be. Before you begin, familiarize yourself with the content and ensure the course technology is works for you. You may choose to play the lesson independently by downloading the PowerPoint and video from Canvas Files section. Discussions: Ask the discussion questions in whichever format is most appropriate to your setting and the students’ developmental level. Options include: Raise your hand to share; find a classmate to ask; write down your thoughts about; quick - turn to a partner and share. Booster Lesson: It is recommended you use the Booster Lesson 1-2 weeks following this training module. Optional expansion lessons are also encouraged and can be found in the Additional Resources Canvas page. • For grades 6-8: Go to the Be the 1 Toolkit and use the Grades 6-8, Lesson 1: Where We Stand and its Extension Activity role play with the 4 Intervention Strategies on slide #27. • For grades 9-12: Go to the Be the 1 Toolkit and use the Grades 9-12, Lesson 3: How can I Be the 1 to intervene with bullying? Make sure to review and include the 4 Intervention Strategies on slide #27. Source: Thank you to Bystander Revolution for the generous sharing of their excellent resources.
    [Show full text]
  • Sharing Information on Progress Report UNITED NATIONS
    Sharing Information on Progress Report 2014-2016 UNITED NATIONS Principles for Responsible Management Education (PRME) This is our Sharing Information on Progress (SIP) Report on the Implementation of the Principles for Responsible Management Education 2 | IVEY UN PRME SHARING INFORMATION ON PROGRESS REPORT Letter from Robert Kennedy, Dean of the Ivey Business School Ivey is proud to be a founding member and PRME champion. These roles reflect our deep-seated commitment to responsible leadership which has defined our business school for almost a century. As Canada’s first business school, first MBA and first PhD program, Ivey has a track record of first moves that respond to the forward-looking aspirations of real-world leaders. Ivey has a distinctive teaching pedagogy that documents and celebrates best practices, dedicated research centers and institutes, and innovative programming that brings to the fore the cross-sectoral solutions organizations can offer to the grand challenges of our time from climate change to persistent poverty and inequality to the refugee crisis. Our goal is to continuously champion what is possible for leaders, businesses and markets by helping the leaders we coach rethink the boundaries between business and society. Ivey students unlimit their potential, create positive social change, and actively model responsible approaches to future organizing. Ivey’s innovative approaches of integrating business and society continue to attract the best students, teachers and researchers. Responsible leadership is a shared goal and a mandatory part of every student’s formation, and every single member of the Ivey faculty embraces at least one of the PRME goals in their research, teaching and service.
    [Show full text]
  • White Caller Crime: Racialized Police Communication and Existing While Black
    Michigan Journal of Race and Law Volume 24 2019 White Caller Crime: Racialized Police Communication and Existing While Black Chan Tov McNamarah Cornell Law School Follow this and additional works at: https://repository.law.umich.edu/mjrl Part of the Civil Rights and Discrimination Commons, Law and Race Commons, Law and Society Commons, and the Law Enforcement and Corrections Commons Recommended Citation Chan T. McNamarah, White Caller Crime: Racialized Police Communication and Existing While Black, 24 MICH. J. RACE & L. 335 (2019). Available at: https://repository.law.umich.edu/mjrl/vol24/iss2/5 This Article is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Journal of Race and Law by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. WHITE CALLER CRIME: RACIALIZED POLICE COMMUNICATION AND EXISTING WHILE BLACK Chan Tov McNamarah Over the past year, reports to the police about Black persons engaged in innocuous behaviors have bombarded the American consciousness. What do we make of them? And, equally important, what are the consequences of such reports? This Article is the first to argue that the recent spike in calls to the police against Black persons who are simply existing must be understood as a systematic phenomenon which it dubs racialized police communication. The label captures two related practices. First, racially motivated police reporting—calls, complaints, or reports made when Black persons are engaged in behavior that would not have been read as suspicious, or otherwise worthy of police involvement had they been White.
    [Show full text]
  • Jokela School Shooting on 7 November 2007
    MINISTRY OF JUSTICE, FINLAND PUBLICATION 2009:1 Jokela School Shooting on 7 November 2007 Report of the Investigation Commission PUBLICATION 2009:1 Jokela School Shooting on 7 November 2007 Report of the Investigation Commission ISSN 1458-6444 ISBN 978-952-466-803-3 (nid.) ISBN 978-952-466-804-0 (PDF) Ministry of Justice, Finland Helsinki 2009 DESCRIPTION M I N I S T R Y OF J U S T I C E Date of publication Finland 26 February 2009 Authors Type of publication Publication of the Ministry of Justice Investigation Commission of the Jokela school shooting Assigned by Chairman Tuulikki Petäjäniemi, LL.M. Council of State Secretary, Chief Accident Investigator Kai Valonen Date when body appointed 6 November 2008 Name of the publication Jokela School Shooting on 7 November 2007 – Report of the Investigation Commission (Translation of the original Finnish report) Parts of publication Description of the event and background information, general information on the Jokela events, the work of the media, analysis and conclusions, measures taken and safety recommendations Abstract On 7 November 2007 a bloody deed took place in Jokela where a senior high school student shot eight persons and himself in a school centre. The reasons for the school shooting were multifarious and complex, and the shooting constituted a deliberate criminal act showing the methodical nature that constitutes an essential element of murder. The marginalization of the perpetrator was of a special kind, the result of several contributory factors. The family, upbringing and the school community but also society as a whole, nowadays including the Internet environment, are in a prime position for preventing marginalization.
    [Show full text]
  • Complete Dissertation
    VU Research Portal School shootings Pfeifer, B. 2017 document version Publisher's PDF, also known as Version of record Link to publication in VU Research Portal citation for published version (APA) Pfeifer, B. (2017). School shootings: Existential concerns and implicit religion. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. E-mail address: [email protected] Download date: 01. Oct. 2021 Part one: Background of this study and overview of theoretical approaches of school shooting 1 2 1 About this research Since the middle of the 20th century, more than 160 school shootings have occurred worldwide, with several hundreds of victims killed and many others wounded. Many people wonder why and how these tragedies can happen. Many speculate, but what do we really know about these tragic incidents? Answers to these questions are urgently needed because they can inform prevention and response policies.
    [Show full text]
  • Stories in Action: the Cultural Influences of School Shootings On
    This article was downloaded by: [84.215.202.88] On: 03 May 2014, At: 01:21 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Critical Studies on Terrorism Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/rter20 Stories in action: the cultural influences of school shootings on the terrorist attacks in Norway Sveinung Sandberga, Atte Oksanenb, Lars Erik Berntzenc & Tomi Kiilakoskid a Department of Criminology and Sociology of Law, University of Oslo, Oslo, Norway b National Research Institute of Legal Policy, Helsinki, Finland c Department of Political and Social Sciences, European University Institute, Firenze, Italy d Finnish Youth Research Network, Helsinki, Finland Published online: 30 Apr 2014. To cite this article: Sveinung Sandberg, Atte Oksanen, Lars Erik Berntzen & Tomi Kiilakoski (2014): Stories in action: the cultural influences of school shootings on the terrorist attacks in Norway, Critical Studies on Terrorism, DOI: 10.1080/17539153.2014.906984 To link to this article: http://dx.doi.org/10.1080/17539153.2014.906984 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis.
    [Show full text]
  • Shooting for Fame: Spectacular Youth, Web 2.0 Dystopia, and the Celebrity Anarchy of Generation Mash-Up
    Fairfield University DigitalCommons@Fairfield Communication Faculty Publications Communication Department 2010 Shooting for fame: Spectacular youth, web 2.0 dystopia, and the celebrity anarchy of generation mash-up Michael Serazio Fairfield University, [email protected] Follow this and additional works at: https://digitalcommons.fairfield.edu/communications-facultypubs Copyright 2010 Wiley-Blackwell. This is a pre-print of an article accepted for publication in Communication, Culture, & Critique (3, 3, 2010). The definitive version is available at www3.interscience.wiley.com. Repository Citation Serazio, Michael, "Shooting for fame: Spectacular youth, web 2.0 dystopia, and the celebrity anarchy of generation mash-up" (2010). Communication Faculty Publications. 13. https://digitalcommons.fairfield.edu/communications-facultypubs/13 Published Citation Serazio, Michael. 2010. Shooting for fame: Spectacular youth, web 2.0 dystopia, and the celebrity anarchy of generation mash-up. Communication, Culture, & Critique 3 (3) 416-434. This item has been accepted for inclusion in DigitalCommons@Fairfield by an authorized administrator of DigitalCommons@Fairfield. It is brought to you by DigitalCommons@Fairfield with permission from the rights- holder(s) and is protected by copyright and/or related rights. You are free to use this item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses, you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/or on the work itself. For more information, please contact [email protected]. Running Head: SHOOTING Shooting for Fame: Deleted: Notorious Spectacular Youth, Web 2.0 Dystopia, and the Celebrity Anarchy of Generation Mash-Up Shooting 1 Abstract In this essay, I analyze the emergent phenomenon of infamous youth shooters at the Deleted: , contemporary intersection of technology and celebrity.
    [Show full text]
  • Think B4U Post
    1 Table of Contents . Before You Begin . Acknowledgements . Program Overview & Multi-Tiered Systems of Support . Research Based Lesson Structure . Best Practices Implementation Plan . Peer-to-Peer (P2P) Component . Revolving Library . Lesson Plans 1. Subject Area #1: “Your Post Can Haunt Your Future” 2. Subject Area # 2: “If You Don’t Want Everyone To See, Don’t Let Anyone See It” 3. Subject Area # 3: “Don’t Be Over-Exposed Online” 4. Subject Area # 4: “Your Post May Be Used Against You” and “What Effects Are Your Posts Having?” 5. Subject Area # 5: “If You Wouldn’t Say It To Someone’s Face, Don’t Say It Online” . Internet Safety Programs & Resources; Sources & Citations . Appendix A. Digital Citizenship Week B. Event Flyer C. Logo & Posters D. Morning Announcements & Videos E. Parent Letter F. Parent Training G. Program Overview Flyer H. Staff Training I. Student Kick-Off Assembly J. Revolving Library Directions Before You Begin When you teach digital citizenship to your students, you help create a positive school culture supported by safe and responsible technology usage. Implementing the Think B4U Post Internet Safety Program empowers students, parents and staff to ensure children learn how to navigate the digital world safely by appreciating the responsibility they hold for their choices and actions while going online, using cell phones or other digital media. Think B4U Post’s goal of changing attitudes and behaviors surrounding online behaviors is accomplished by pairing marketing campaign messaging with student involvement and social and emotional learning (SEL) enriched lesson plans. As you develop your school’s Think B4U Post Internet Safety Program implementation plan, please keep in mind the time allocated as well as the fidelity of implementation will largely determine your success.
    [Show full text]
  • Adapting IIED As a Solution to Doxing by Reshaping Intent
    COMMENTS “Do(x) You Really Want to Hurt Me?”: Adapting IIED as a Solution to Doxing by Reshaping Intent Victoria McIntyre* I. INTRODUCTION ................................................................................. 111 II. WHAT IS DOXING? ............................................................................ 113 A. Swatting: A Dangerous Offshoot of Doxing ................... 115 B. The Victims ...................................................................... 115 III. GAPS IN THE LAW ............................................................................. 118 A. Criminal Law Penalties .................................................... 119 B. Issues with Law Enforcement and Prosecutors ................ 123 C. Tort Law Remedies .......................................................... 125 IV. A LEGAL SOLUTION: EXPANSION OF INTENTIONAL INFLICTION OF EMOTIONAL DISTRESS ............................................. 126 A. A History of IIED ............................................................. 126 B. The First Amendment ....................................................... 128 C. How IIED Must Change ................................................... 131 V. CONCLUSION .................................................................................... 133 I. INTRODUCTION Picture this: a woman goes on a date with a man she meets on OkCupid.1 The first date goes well, and they begin seeing each other more frequently. She is a video game developer, and he is a computer programmer. The relationship does not last
    [Show full text]