the bully, the bullied, and the not-so-innocent - Dolores RE-4A

the bully, the bullied, and the not-so-innocent bystander
by
Barbara Coloroso
, 2015
Barbara Coloroso © 2002, 2005, 2009, 2015
www.kidsareworthit.com
[email protected]
800.729.1588
permission granted for school and parent use
Brave-hearted
Witness, resister,
defender dislikes
the bullying and
helps or tries to help
the one who is bullied.
Bully/Bullies
Plan and/or
start the bullying
and take
an active part
Henchmen
Take an active part
but do not start
the bullying
The Target
The one who is bullied
Active Supporters
Cheer the bully on
and seek social
or material gain
Potential Defenders
Oppose the bullying and
know they ought to help,
but do not act
Disengaged Onlookers
Passive Supporters
Like the bullying but do
not show open support
An adaptation of
The Bullying Circle
by Dan Olweus, PhD
used with permission
and
not-so-innocent
bystander
From The bully,
Bully,the
Thebullied,
Bullied,
andthe
The
Bystander
15
Barbara Coloroso ©2002, 2005, 2009, 2013
www.kidsareworthit.com kids are worth it! inc.
800.729.1588 fax 303.972.3237
Illustrations by Joey Coloroso
!"# $%&&'
!"# $%&&(#)
!"# $'*!+,)#-
!"##$%&'()*%'$+',##'&-,.%&',+/'&$0%&1 2)*%',3%'4$56
&)*%',3%'&*,##6 &)*%'43$5-7',+/'&)*%'+)7'&)'43$5-76
&)*%',773,(7$8%',+/'&)*%'+)7'&)',773,(7$8%6 &)*%'.).9
"#,3',+/'&)*%'/$&#$:%/'4;',#*)&7'%8%3;4)/;1
D-%')+%'7-$+5'7-,7',##':$/&'=-)',3%'4"##$%/'-,8%'$+
()**)+'$&'7-,7','4"##;')3','4"+(-')> 4"##$%&'-,&
7,35%7%/'7-%*1 W,(-')+%'=,&'&$+5#%/')"7'7)'4%'7-%
)4K%(7')> &()3+< ,+/'7-"&'7-%'3%($.$%+7')> 4"##;$+5<
*%3%#;'4%(,"&%'-%')3'&-%'=,&'/$>>%3%+7'$+'&)*%'=,;1
!;&7,+/%3&',3%'7-%'7-$3/'53)".')> .#,;%3&'$+'7-$&
73,5%/;1 D-%;',3%'7-%'&"..)37$+5'(,&7'=-)',$/
,+/',4%7'7-%'4"##;< 7-3)"5-',(7&')> )*$&&$)+',+/
()**$&&$)+1 D-%;'&7,+/'$/#;'4;')3'#)):',=,;< )3'7-%;
(,+',(7$8%#;'%+()"3,5%'7-%'4"##;')3'K)$+'$+',+/
4%()*%')+%')> ,'4"+(-')> 4"##$%&1 B+K"&7$(%')8%39
#)):%/')3'$5+)3%/'4%()*%&','()+7,5$)+'7-,7'$+>%(7&
%8%+'7-)&%'=-)'7-)"5-7'7-%;'()"#/'7"3+',=,;1
!"##;$+5'$&','()+&($)"&< =$##>"#',+/'/%#$4%3,7%'-)&7$#%
,(7$8$7;< $+7%+/%/'7)'-,3*1
."#/01%-/2+-3#-*/14 5%&&'(,6
?1 @+'$*4,#,+(%')> .)=%3
A1 B+7%+7'7)'-,3*
C1 D-3%,7')> >"37-%3',553%&&$)+
E1 F-%+'4"##;$+5'%&(,#,7%&'"+,4,7%/G7%33)3
!"##;$+5'$&'+)7',4)"7',+5%3< )3'%8%+',4)"7'()+>#$(71 B7H&
,4)"7'()+7%*.7G,'.)=%3>"#'>%%#$+5')> /$&#$:%'7)=,3/
&)*%)+%'()+&$/%3%/'7)'4%'=)37-#%&&< $+>%3$)3')3
"+/%&%38$+5')> 3%&.%(71 I)+7%*.7'()*%&'=$7-'7-3%%
,..,3%+7'.&;(-)#)5$(,#',/8,+7,5%&'7-,7',##)=':$/&'7)
-,3*')7-%3&'=$7-)"7'>%%#$+5'%*.,7-;< ()*.,&&$)+')3
&-,*%1 D-%&%',3%J
?1 @'&%+&%')> %+7$7#%*%+7G7-%'3$5-7'7)'()+73)#<
/)*$+,7%< &"4K"5,7%< ,+/',4"&%',+)7-%3
-"*,+'4%$+5
A1 @+'$+7)#%3,+(%'7)=,3/'/$>>%3%+(%
C1 @'#$4%37;'7)'%L(#"/%G7)'4,3< $&)#,7%< ,+/'&%53%5,7%'
,'.%3&)+'/%%*%/'+)7'=)37-;')> 3%&.%(7')3'(,3%
7#8#,/7!#9*/!1/7!19/5%&&'(,6
?1 M$&($.#$+%'N$+(#"/$+5'7-%'7-3%%'O&J
3%&7$7"7$)+< 3%&)#"7$)+< 3%()+($#$,7$)+P
A1 I3%,7%')..)37"+$7$%&'7)'Q/)'5))/R
C1 S"37"3%'%*.,7-;
E1 D%,(-'>3$%+/&-$.'&:$##&
T1 I#)&%#;'*)+$7)3'DU'8$%=$+5< 8$/%)'
5,*%&',+/'()*."7%3',(7$8$7$%&
V1 W+5,5%'$+'*)3%'()+&73"(7$8%<
%+7%37,$+$+5< %+%35$0$+5',(7$8$7$%&
X1 D%,(-'=,;&'7)'Q=$##'5))/R
."#/:+-,(,6/7(6,*
?1 2-)=&',+',43".7'#,(:')> $+7%3%&7'$+'&(-))#<
)3'3%>"&%&'7)'5)'7)'&(-))#
A1 D,:%&',+'"+"&",#'3)"7%'7)'&(-))#
C1 2">>%3&'/3).'$+'53,/%&
E1 F$7-/3,=&'>3)*'>,*$#;',+/'&(-))#',(7$8$7$%&
T1 B&'-"+53;',>7%3'&(-))#
V1 27%,#&'*)+%;'>3)*'-)*%
X1 Y,:%&','4%%#$+%'7)'7-%'4,7-3))*'=-%+
,33$8$+5'-)*%
Z1 B&'&,/< &"##%+< ,+53;< )3'&(,3%/',>7%3'3%(%$8$+5','
.-)+%'(,##')3'%*,$#
[1 M)%&'&)*%7-$+5')"7')> (-,3,(7%3
?\1 ],&'7)3+')3'*$&&$+5'(#)7-$+5
??1 ^&%&'/%3)5,7)3;')3'/%*%,+$+5'#,+5",5%'
=-%+'7,#:$+5',4)"7'.%%3&
?A1 27).&'7,#:$+5',4)"7'.%%3&',+/'%8%3;/,;',(7$8$7$%&
?C1 ],&'.-;&$(,#'$+K"3$%&'+)7'()+&$&7%+7'=$7%L.#,+,7$)+
?E1 ],&'&7)*,(-,(-%&< -%,/,(-%&< .,+$(',77,(:&< $&'
"+,4#%'7)'&#%%.< &#%%.&'7))'*"(-< $&'%L-,"&7%/
?T1 _#,;&',#)+%< )3'.3%>%3&'7)'-,+5'=$7-',/"#7&
:"'/;()*/<1,=!/.#&&
?1 D-%;',3%',&-,*%/')> 4%$+5'4"##$%/
A1 D-%;',3%',>3,$/')> 3%7,#$,7$)+
C1 D-%;'/)+H7'7-$+:',+;)+%'(,+'-%#.'7-%*'
E1 D-%;'/)+H7'7-$+:',+;)+%'=$##'-%#.'7-%*
T1 D-%;H8%'4)"5-7'$+7)'7-%'#$%'7-,7'4"##;$+5'$&
,'+%(%&&,3;'.,37')> 53)=$+5'".
V1 D-%;'*$5-7'4%#$%8%'7-,7',/"#7&',3%'.,37')>
7-%'#$%G7-%;'4"##;'7))
X1 D-%;'-,8%'#%,3+%/'7-,7'Q3,77$+5R )+','.%%3'$&'
4,/< +)7'())#
(4 '1%-/@"(&)/(*/$%&&(#)
7!+,)(,6/>9/+,)/79#+3(,6/?%!
!"##;$+5'$&'(-,##%+5%/'=-%+'7-%'*,K)3$7;'&7,+/&'".
,5,$+&7'7-%'(3"%#',(7&')> 7-%'*$+)3$7;1 W&7,4#$&-$+5
+%='+)3*&< %+>)3($+5'.#,;53)"+/'3"#%&< ,+/'$+(3%,&9
$+5'&".%38$&$)+',3%'.)#$(;'/%($&$)+&'7-,7'(,+'-%#.
3%/"(%'7-%'$+($/%+7&')> 4"##;$+51 2$+(%'*"(-')> 7-%
4"##;$+5'5)%&')+'Q"+/%3'7-%'3,/,3')> ,/"#7&<R ,'.)7%+7
>)3(%'$&':$/&'7-%*&%#8%&'&-)=$+5'4"##$%&'7-,7'7-%;'=$##
+)7'4%'#)):%/'".'7)< +)3'=$##'7-%$3'(3"%#'4%-,8$)3'4%
()+/)+%/')3'7)#%3,7%/1 `$/&'+%%/'+)7'4%'4;&7,+/%3&1
D-%;'(,+'4%()*%',(7$8%'=$7+%&&%&< &7,+/$+5'".'>)3
7-%$3'.%%3&< &.%,:$+5')"7',5,$+&7'$+K"&7$(%&< ,+/'7,:$+5
3%&.)+&$4$#$7;'>)3'=-,7'-,..%+%/',*)+5'7-%*&%#8%&1
Text
B##"&73,7$)+&'4;'c)%;'I)#)3)&)'a'A\\A
<1,=!*
?1 M)+H7'*$+$*$0%< 3,7$)+,#$0%< )3'%L.#,$+',=,;'7-%
4"##;H&'4%-,8$)31
A1 M)+H7'3"&-'$+'7)'&)#8%'7-%'.3)4#%*'>)3';)"3'(-$#/1
C1 M)+H7'7%##';)"3'(-$#/'7)',8)$/'7-%'4"##;1
E1 M)+H7'7%##';)"3'(-$#/'7)'>$5-7'4,(:1
T1 M)+H7'()+>3)+7'7-%'4"##;')3'7-%'4"##;H&'.,3%+7&',#)+%1
<1=*
?1 B'-%,3';)"6 B',*'-%3%'>)3';)"6 B'4%#$%8%';)"6 ;)"
,3%'+)7',#)+%'$+'7-$&1
A1 B7'$&'+)7';)"3'>,"#71
C1 D-%3%',3%'7-$+5&';)"'(,+'/)1
E1 O%.)37'7-%'4"##;$+5'7)'&(-))#'.%3&)++%#1
"1A/!1/-#91-!
?1 @33,+5%','*%%7$+5'>)3';)"',+/';)"3'(-$#/'=$77-%',..3).3$,7%'.%3&)+',7'7-%'&(-))#1
A1 !3$+5'7)'7-%'*%%7$+5'7-%'>,(7&'$+'=3$7$+5G7-%
/,7%< 7$*%< .#,(%< :$/&'$+8)#8%/< ,+/'7-%'&.%($>$(&
)> 7-%'$+($/%+7&G,+/'7-%'$*.,(7'7-%'4"##;$+5'-,&
-,/')+';)"3'(-$#/',&'=%##',&'=-,7';)"3'(-$#/'-,&
/)+%'7)'73;'7)'&7).'7-%'4"##;$+5'7-,7'/$/+H7'=)3:1
C1 F)3:'=$7-';)"3'(-$#/',+/'&(-))#'.%3&)++%#')+',
.#,+'7-,7',//3%&&%&'=-,7';)"3'(-$#/'+%%/&'3$5-7
+)='$+')3/%3'7)'>%%#'&,>%< =-,7'&-%'(,+'/)'7)
,8)$/'4%$+5'4"##$%/',+/'7)'&7,+/'".'7)',+;
>"7"3%'4"##;$+5< ,+/'=-)*'&-%'(,+'5)'7)'>)3'-%#.1
E1 d$+/')"7'=-,7'.3)(%/"3%&'7-%'4"##;'=$##'4%'5)$+5
7-3)"5-',+/'=-,7':$+/')> &"..)37'7-%'&(-))#'$&
%L.%(7$+5'>3)*'7-%'.,3%+7&')> 7-%'4"##;1
T1 B> ;)"'>%%#'7-%'.3)4#%*'$&'+)7'4%$+5',/%e",7%#;
,//3%&&%/'4;'7-%'&(-))#< :+)='7-,7';)"'(,+
%L.3%&&';)"3'()+(%3+&',+/'#%7'7-%'7%,(-%3',+/f)3
,/*$+$&73,7)3':+)='7-,7';)"'=$##'7,:%'7-%'+%L7
&7%.'7)'7-%'&(-))#'/$&73$(7'4),3/')>>$(%',+/'$>
+%(%&&,3;G%&.%($,##;'$+'7-%'(,&%&')> &%3$)"&',4"&%
,+/'3,($&7')3'&%L$&7'4"##;$+5G7)'7-%'.)#$(%1
Excerpts from The bully, the bullied, and
*"#$%
%&''+#,)$--.,$**"#$%
%(/*-.,#0<
WL(%3.7&'>3)*'!"#$%
the not-so-innocent%&''()$*
bystander
!,34,3,'I)#)3)&)'a'A\\A , 2015
===1:$/&,3%=)37-$71()*':$/&',3%'=)37-'$7< $+(1
Z\\1XA[1?TZZ'b''>,L'C\C1[XA1?A\E
!#+*(,6B!+%,!(,6
4&(-!(,6B*#D%+&/$%&&'(,6
.#+*(,6
?1 @##)=&'7-%'7%,&%3',+/'.%3&)+'7%,&%/'7)'&=,.'3)#%&1
A1 B&+H7'$+7%+/%/'7)'-"37'7-%')7-%3'.%3&)+1
C1 Y,$+7,$+&'7-%'4,&$('/$5+$7;')> %8%3;)+%'$+8)#8%/1
E1 _):%&'>"+'$+','#$5-7-%,37%/< (#%8%3< ,+/'4%+$5+'=,;1
T1 B&'*%,+7'7)'5%7'4)7-'.,37$%&'7)'#,"5-1
V1 B&')+#;','&*,##'.,37')> 7-%',(7$8$7$%&'&-,3%/'4;':$/&
=-)'-,8%'&)*%7-$+5'$+'()**)+1
X1 B&'$++)(%+7'$+'*)7$8%1
Z1 B&'/$&()+7$+"%/'=-%+'.%3&)+'7%,&%/'4%()*%&
".&%7')3')4K%(7&'7)'7-%'7%,&$+51
0&(-!(,6
?1 @##)=&',+/'$+8$7%&'4)7-'.%3&)+&'7)'&=,.'3)#%&
=$7-'%,&%1
A1 B&+H7'$+7%+/%/'7)'-"37'7-%')7-%3'.%3&)+G$&',+
%L.3%&&$)+')> /%&$3%1
C1 Y,$+7,$+&'7-%'4,&$('/$5+$7;')> 4)7-'.%3&)+&1
E1 B&'*%,+7'7)'4%'>#,77%3$+5',+/'()*.#$*%+7,3;1
T1 B&',+'$+8$7,7$)+'7)'-,8%'>"+'7)5%7-%3',+/'%+K);
%,(-')7-%3H&'()*.,+;1
V1 B+8$7%/'&%L",#',77%+7$)+1
X1 B&'$+7%+/%/'7)'*,:%'7-%')7-%3'.%3&)+'>%%#'=,+7%/<
,773,(7$8%< ,+/'$+'()+73)#1
Z1 B&'/$&()+7$+"%/'=-%+'7-%'.%3&)+'=-)'$&'4%$+5
>#$37%/'=$7-'4%()*%&'".&%7< )4K%(7&'7)'7-%'>#$37$+5<
)3'$&'+)7'$+7%3%&7%/1
d#$37$+5'-,&'.#,;>"#+%&&',4)"7'$7'7-,7'&%L",#'4"##;$+5
/)%&'+)71 B7'$&'+%8%3'$+7%+/%/'7)'-,3*',+/'$&',+'$+8$9
7,7$)+'>)3'7=)'.%).#%'7)'5%7'7)':+)='%,(-')7-%3'4%79
7%31 @&'=$7-',+;')7-%3'$+8$7,7$)+< $7'(,+'4%',((%.7%/')3
3%K%(7%/G,+/'7-%'.%3&)+'=-)'$+$7$,7%/'7-%'>#$37$+5
-)+)3&'%$7-%3'3%&.)+&%1
.+%,!(,6
?1 B&'4,&%/')+',+'$*4,#,+(%')> .)=%3',+/'$&')+%9
&$/%/J 7-%'4"##;'7,"+7&< 7-%'4"##$%/':$/'$&'7,"+7%/1
A1 B&'$+7%+/%/'7)'-,3*1
C1 B+8)#8%&'-"*$#$,7$+5< (3"%#< /%*%,+$+5< )3
4$5)7%/'()**%+7&'7-$+#;'/$&5"$&%/',&'K):%&1
E1 B+(#"/%&'#,"5-7%3'/$3%(7%/'-* 7-%'7,35%7< +)7'1+*"
7-%'7,35%71
T1 B&'*%,+7'7)'/$*$+$&-'7-%'&%+&%')> &%#>9=)37-')>
7-%'7,35%71
V1 B+/"(%&'>%,3')> >"37-%3'7,"+7$+5')3'(,+'4%',
.3%#"/%'7)'.-;&$(,#'4"##;$+51
X1 B&'&$+$&7%3'$+'*)7$8%1
Z1 I)+7$+"%&'%&.%($,##;'=-%+'7,35%7%/':$/'4%()*%&
/$&73%&&%/')3')4K%(7&'7)'7-%'7,"+71
41%-/C1*!/91A#-4%&
+,!()1!#*/!1/$%&&'(,6
273)+5'&%+&%')> &%#>< 4%$+5','>3$%+/< -,8$+5',7'#%,&7
)+%'5))/'>3$%+/'=-)'$&'7-%3%'>)3';)"'7-3)"5-'7-$(:
,+/'7-$+< ,+/'4%$+5',4#%'7)'&"((%&&>"##;'5%7'$+7)',
53)".G,+/'5%7')"7'=-%+'$7'/)%&'+)7'&%38%';)"'=%##1
7#D%+&/5%&&'(,6
?1 B&'4,&%/')+',+'$*4,#,+(%')> .)=%3',+/'$&')+%9
&$/%/J 7-%'4"##;'&%L",##;'7,"+7&< 7-%'4"##$%/':$/'$&
/%*%,+%/',+/'/%53,/%/1
A1 B&'$+7%+/%/'7)'-,3*',+/'%L.#)$71
C1 B&'$+8,&$8%',+/'$+7%+/%/'7)',&&%37'7-%'&7,7"&')>
7-%'4"##;1
E1 B&'$+7%+/%/'7)'4%'/%53,/$+5',+/'/%*%,+$+51
T1 B&'$+7%+/%/')'%L.3%&&'()+73)#',+/'/)*$+,7$)+1
V1 B&'$+7%+/%/'7)'8$)#,7%'7-%'4)"+/,3$%&')> 7-%'7,35%71
X1 B&'$+7%+/%/'7)'*,:%'7-%')7-%3'.%3&)+'>%%#
3%K%(7%/< "5#;< .)=%3#%&&< )3'"+()*>)37,4#%1
Z1 I)+7$+"%&'%&.%($,##;'=-%+'7,35%7%/':$/'4%()*%&
/$&73%&&%/')3')4K%(7&'7)'7-%'&%L",#'()**%+71
B+'&%L",#'4"##;$+5'7-%3%'$&'+)'$+8$7,7$)+GK"&7',+
,77,(:1 D-%'7,35%7'$&'%*4,33,&&%/< -"*$#$,7%/< ,+/
\
&-,*%/',+/'7%+/&'7)'>%%#'.)=%3#%&&1 B7'$&'+)7'7-%
$+7%+7$)+')> 7-%'4"##;'7)'%+5,5%'$+'-%,#7-;'&%L",#
>#$37,7$)+'=$7-',+)7-%3'.%3&)+G7-%',77,(:'$&'*%,+7'7)
-"371 B> 7-%'7,35%7'.3)7%&7&< -%f&-%'$&')>7%+'#,4%#%/',
Q4$7(-R =-)'$&'".7$5-7',+/'(,+H7'7,:%','K):%1
@+-(,6/*@"11&*
?1 g,7-%3'$+>)3*,7$)+',4)"7'4"##;$+5',7'&(-))#
/$3%(7#;'>3)*'&7"/%+7&1
A1 W&7,4#$&-'(#%,3'&(-))#=$/%',+/'(#,&&3))*'3"#%&
,4)"7'4"##;$+51
C1 D3,$+',##',/"#7&'$+'7-%'&(-))#'7)'3%&.)+/
&%+&$7$8%#;',+/'()+&$&7%+7#;'7)'4"##;$+51
E1 _3)8$/%',/%e",7%',/"#7'&".%38$&$)+< .,37$("#,3#;
$+'#%&&'&73"(7"3%/',3%,&< &"(-',&')+'7-%
.#,;53)"+/',+/'$+'7-%'#"+(-3))*1
T1 B*.3)8%'.,3%+7,#',=,3%+%&&')> ,+/'$+8)#8%*%+7
$+'=)3:$+5')+'7-%'.3)4#%*1
-#EA-(!(,6/!"#/*@-(9!
D-%'4"##;< 7-%'4"##$%/< 7-%'4;&7,+/%3G7-%
$+7%3,(7$)+&'$+8)#8%/'$+'&"(-'3)#%9.#,;$+5< 7-)"5()**)+.#,(%'$+')"3'("#7"3%< ,3%'+)7'-%,#7-;< +)7
+)3*,#< (%37,$+#;'+)7'+%(%&&,3;< ,+/'$+'>,(7',3%
/%8,&7,7$+5'7)'7-%'(-$#/3%+'.#,;$+5'7-%*1 F%',&
.,3%+7&',+/'%/"(,7)3&'(,+'3%=3$7%'7-%'&(3$.7',+/
(3%,7%'>)3')"3'(-$#/3%+',#7%3+,7$8%< -%,#7-$%3'3)#%&'7-,7
3%e"$3%'+)'.3%7%+&%',+/'+)'8$)#%+(%1 F$7-'(,3%',+/
()**$7*%+7< =%'(,+'3%(-,++%#'7-%'4%-,8$)3&')> 7-%
4"##;'$+7)'.)&$7$8%'#%,/%3&-$.',(7$8$7$%&6 ,(:+)=#%/5%
7-%'+)+,553%&&$8%'4%-,8$)3&')> 7-%'4"##$%/'(-$#/',&
&73%+57-&'7-,7'(,+'4%'/%8%#).%/',+/',3%'-)+)3%/6
,+/'73,+&>)3*'7-%'3)#%')> 7-%'4;&7,+/%3'$+7)'7-,7')>
,'=$7+%&&<T&)*%)+%'=$##$+5'7)'&7,+/'".< &.%,:')"7< ,+/
,(7',5,$+&7'$+K"&7$(%1 @'/,"+7$+5'7,&:< 4"7',
+%(%&&,3;')+%1
Excerpts from The bully, the bullied, and
the not-so-innocent bystander
Barbara Coloroso © 2002, 2015
www.kidsareworthit.com
[email protected]
800.729.1588
reasons
,1!#* and excuses
The question that begs to be asked: “Why would 81 percent of
the kids who would not instigate bullying be so willing to become
a part of the attack or turn a blind eye to the plight of the targeted
child?” There are a few valid reasons and lots of excuses.
The four reasons most often given for not intervening:
1. The bystander is afraid of getting hurt.
2. The bystander is afraid of becoming a new target of the bully.
3. The bystander is afraid of doing something that will only make
the situation worse.
4. The bystander does not know what to do.
As legitimate as they are, these reasons do not shore up the
self-confidence or self-respect that is eroded when a child witnesses
a bullying incident and is unable or unwilling to respond effectively
to stop the cruelty. All too often these fears and lack of skill can turn
into apathy—a potent friend of contempt. Contempt grows best in
a climate of indifference.
Bystanders have more excuses than valid reasons for not intervening.
These excuses help poison the social environment, increasing
the likelihood that bystanders will side with the bully and eventually
assume the role of bullies themselves. They include but are
certainly not limited to these nine:
1. The bully is my friend.
2. It’s not my problem! This is not my fight!
3. She is not my friend.
4. He’s a loser.
5. He deserved to be bullied, asked for it, had it coming.
6. Bullying will toughen him up.
7. Kids have a deeply embedded code of silence.
8. It’s better to be in the in-group than to defend the outcasts.
9. It’s too big a pain in the brain. Added bonus—the headache is gone.
Taken together, these reasons and excuses contribute to the erosion
of civility in peer group interactions. When civility is diminished,
it is replaced by a false sense of entitlement, an intolerance
toward differences, and a liberty to exclude that allow kids to harm
another human being without feeling empathy, sympathy, compassion,
or shame. This erosion of civility also erodes kids’ ability to
communicate, negotiate, and compromise—three vital skills necessary
for solving problems, resolving conflicts, and reconciling differences
peaceably.
B##"&73,7$)+&'4;'c)%;'I)#)3)&)'a'A\\A
%&''()$**"#$%
%&''+#,)$--.,$**"#$%
%(/*-.,#0<
WL(%3.7&'>3)*'!"#$%
!,34,3,'I)#)3)&)'a'A\\A
===1:$/&,3%=)37-$71()*':$/&',3%'=)37-'$7< $+(1
Z\\1XA[1?TZZ'b''>,L'C\C1[XA1?A\E
The Net Neighborhood
Children are doubling up on their
media exposure—watching TV
while plugged in to the Internet,
text messaging while listening to
music—and packing as much as
8.5 hours of media exposure into
6.5 hours a day, seven days a
week. Kids are plugged in, turned
on, and tuned out for the equivalent
of a forty-five-hour workweek,
every week.
Media technology has the power
to help define reality for our kids;
it also has tremendous influence on
who our kids become and what
kind of world they inhabit.
Ways and Means
of Cell Phone Bullying
©Joey Coloroso 2007
Cyberbullies
Bullies are using high tech tools to
threaten, stalk, ridicule, humiliate,
taunt, and spread rumors about
their targets. The characteristics of
bullying—imbalance of power, the
intent to harm, the threat of further
aggression, and the creation of
terror—are magnified with the user
of electronic technologies.
Connecting to the Internet is like
opening the door to a new--and
vast—city.
• Some parents look at the ugly and
absolutely scary stuff out there and Faceless and nameless electronic
transmissions make it easy for
refuse to let the Internet be a part
bullies to torment their targets
of their family life at all.
anywhere and at any time.
• Some parents are so ill-informed
and have so little desire to be
Bullies are:
computer literate that they allow
1. emboldened by apparent
their children to roam any and all
anonymity afforded them in
streets, back alleys, and freeways
cyberspace
of the Internet.
2. removed from the immediate
• Some parents who know how
reaction of the target,
ignorant they are, make an effort to
3. far often not held
learn at least as much as their young
accountable for their actions.
children know, and more—especially
about Net safety and Net etiquette.
They realize the Net is here to stay, Faceless and nameless electronic
transmissions make it easy for
and that teaching children to use it
bullies to torment their targets
to their advantage, to get the most
out of it, and to be safe requires the anywhere and at anytime, with
same tools that other communication apparent anonymity, distributing of
irretrievable messages worldwide.
and relationship skills require.
Many models of today’s cell phones
are actually powerful, miniature,
handheld multimedia computers
that kids can use to talk to one
another, chat via IM, send text
messages with still and video
images, chat online, surf the Internet,
download songs, and watch TV.
Bullies use any and all of the
following to target their peers:
• Abusive, insulting, or threatening
voice messages.
• Abusive, insulting, or threatening
text messages.
• Silent calls.
• Stolen identity--sending text
message through a Website using
the name and phone number of the
target in order to get the target into
trouble, spread a rumor, or tempt
others to retaliate against an
unsuspecting target.
• Numerous calls or text messages
to a cell phone in order to run up a
large phone bill for the target.
• Photo-bullying—using cell phones
to take compromising or humiliating
pictures or videos of the target,
sending those pictures or videos to
everyone in their address books and
posting these pictures for perpetuity
on file-sharing service (such as
Kazaa) for anyone to download or
view.
excerpts from the bully, the bullied, and
excerpts
from the bully,
the bullied, and the
the
not-so-innocent
bystander
bystander,
Barbara Coloroso
by
Barbara Coloroso
© 2015 © 2005
www.kidsareworthit.com
www.kidsareworthit.com
kids are worth it! inc. 800.729.1588
[email protected]
fax 303.972.1204 p.o. box 621108
800.729.1588
T
Littleton, Colorado 80162
Internet Gaming
• Closely monitor your child’s TV
viewing, video game playing,
Games played on gaming devices
computer activities, and music.
such as Sony PlayStation 2 Network • Engage in more constructive,
or Xbox Live allow players from
entertaining, and energizing
around the world to play together or activities.
in competition with one another.
• Teach your child to “will good.”
Cyber bullies who frequent gaming
communities taunt, threaten, lock
The discipline involved is a
targets out of the game, or hack into constructive and compassionate
their target’s account.
response to cyberbullying that takes
into consideration the intent, the
Not all Internet games are violent,
severity of the cyberbullying, and
but those that are, greatly impact the the restorative steps needed to help
bully, the bullied, and the bystander. the cyberbully to take on a more
Not only do these games normalize prosocial role in the face-to-face
violence and make it routine, they
encounters with peers and in the
set up other people as adversaries,
virtual neighborhood.
prey, or targets; they may even help
create neural pathways that connect
Helping the Cyberbullied
violence with pleasure and rewards,
rather than fright, sadness, and
Being targeted in cyberspace can
sympathy.
have devastating and sometimes
deadly consequences.
Stopping Cyberbullying
• The warning signs that kids exhibit
Whether the cyberbullying is done
when being cyberbullied are similar
via the cell phone or any other
to those exhibited if they are bullied
electronic tool—or combination of in any other way, but the spiral down
tools—the response should begin
into depression, illness, and
with the loss of privileges related to academic failure is usually
the use of those tools. The following accelerated when cyberbullying is
steps are the same used to hold
involved.
any bully accountable for any form • Cyberbullying can and does
of bullying:
happen anytime and anywhere—no
escape.
• Intervene immediately with
• All of the reasons for not telling
discipline utilizing the three Rs:
about being the target of low-tech
restitution, resolution, and
bullying are the same for
reconciliation.
cyberbullying.
• Create opportunities to “do good.” • Added fear that if targets report
• Nurture empathy and sympathy.
being cyberbullied, their parents
• Teach friendship skills—assertive, will take away their cell phones and
respectful, and peaceful ways to
restrict their computer access.
relate to others.
How to Respond
The situation is often made worse
by responding to the cyberbully,
whether that response is passive,
aggressive, or assertive.
SCBT (Stop, Copy, Block, and
Tell a trusted adult.)
• Stop. Don’t respond.
• Copy. Make copies of all messages
and pictures, and save cell phone
text and voice messages.
• Block or filter communications
through IM contact list or email.
• Tell a trusted adult.
If the cyberbullying is threatening
or vicious you may need to do the
following as well:
• Change email address, account,
username, phone number and/or
SIM (subscriber identity module)
for cell phone users.
• File a detailed complaint with the
school.
• File a complaint with the Website,
Internet service provider, or cell
phone company.
• Contact the police if the
cyberbullying appears to be
criminal.
• Contact an attorney. It is possible
to seek financial damages from the
cyberbully and his or her parents.
Bystanders
They can be willing or unwitting
accomplices to cyberbullies. Bullies
can use bystanders to do
“cyberbullying by proxy.”
From Bystander to Witness
It is never easy to stand up to a bully
or defend a target. But just as there
are ways to act courageously in the
real world, there are ways to stand
up, speak out, and defend a target in
the cyberworld.
Tactics
• Don’t contribute to a blog or Webpoll that denigrates or humiliates a
target. Sign off or click “end.”
• Don’t forward or copy-and-paste
derogatory, harmful, or hurtful emails, text messages, or pictures to
another site.
• Save, copy, and print out such
examples of cyberbullying and give
them to the target so he or she can
be aware of what is happening.
Sharing such information in a caring
and supportive way will help the
target feel less isolated and alone.
• Tell a caring adult you trust who
will keep your identity confidential,
who will act to support the target,
and who will make sure the
cyberbully is held to account.
• Tell the cyberbully that you are not
comfortable getting involved in the
cyberbullying.
Three P’s:
Policies, Procedures, and
Programs
Even though most cyberbullying
occurs outside of school, it
negatively impacts students and the
school environment. It has already
led to violence—including murder
and suicide—in schools throughout
the world.
If your school already has an
antibullying policy, procedures in
place for the bully, the bullied, and
bystanders, and programs that help
break the cycle of violence and
create a more caring, inclusive
environment, it is important that an
electronic component be added to
all three P’s:
must be educated not only about the
dangers of low-tech and high-tech
bullying, but also about the world
of high tech in general as both an
environment and a tool for
socializing that the younger
generation has fully embraced.
Decoding the Code
Kids use shorthand to quickly send
text messages to one another. It is
important to know the lingo. A few
common codes used:
• HHOJ: Ha, ha, only joking (or JJ:
just joking). Both are used to absolve
cyberbullies of any responsibility for
their taunts.
• LOL: Laughing out loud.
• BRB: Be right back.
Want over
to goshoulder.
private?
• WTGP:
POS:
Parent
Text
• Policies must include a sanction
• 9: Parent in the room.
against cyberbullying as well as
• YRDM: You are dead meat.
other kinds of bullying. Students
• YBS: You’ll be sorry.
and parents need to be informed that • ASL: Age/sex/location.
cyberbullying will not be tolerated. • LMIRL: Let’s meet in real life.
• Procedures for restorative justice
• F2F: Face to face.
must be tailored to the unique
• SOHF: Sense of humor failure.
problems and possible solutions
• RUITD: Are you in the Dark?
required to repair the damage done
Check out
out Websites
websites such
through cyberbullying—especially Check
such as:
as
www.netlingo.com
the very public and potentially
www.netlingo.com.
www.commonsensemedia.org
permanent aspect of it.
www.StopCyberbullying.org
Kids have to trust that telling an
• Programs must address what
•Ask
your kids to teach you a few of
adult will make a positive difference. cyberbullying is; how it impacts
the
shortcuts on the cell phone. It is
www.EndRevenge.Porn.org
www.EndRevengePorn.org
Once they have shared information students; what students are to do if important
that you know and make
www.RedHoodProject.com
with you, talk with them about what they are targeted or if they are aware the effort to keep up with the lingo
• Askkids
yourare
kids
to teach you a few of
they can do and what you are going of another student being targeted;
your
using.
the
shortcuts
on
the cell phone. It is
to do.
and ways to use cyberspace in a
important
youtheknow
and
the
excerpts
from that
the bully,
bullied,
andmake
the
creative, constructive, and
bystander,
Barbara
Coloroso
©the
2005
effort
to
keep
up
with
lingo
your
If your child begs you not to get
responsible manner.
www.kidsareworthit.com
kidsareare
using.
involved, hear them out, and then
kids
worth
it! inc. 800.729.1588
303.972.1204 p.o. box 621108
share your concerns about possible What is needed is a comprehensive fax
excerptsColorado
from the80162
bully, the bullied, and
Littleton,
consequences of not acting and the school-led/community-based
the not-so-innocent bystander
by Barbara Coloroso © 2015
possible actions you both can take. approach. The adult community
www.kidsareworthit.com
[email protected]
800.729.1588
Three P’s
for a school-led/community based approach
Anti-bullying Policy: Must be clearly articulated, consistently enforced, and broadly
communicated. It should include a clear definition of what bullying is, the types of
bullying, and the overlays that often increase the cruelty and impact of the bullying.
Sample: Bullying is a conscious, willful, deliberate activity intended to harm where the
perpetrator(s) get pleasure from the targeted child’s pain/and or misery. It can be verbal,
physical, and/or relational; have as it’s overlay race, ethnicity, religion, gender (including
sexual orientation), physical, or mental ability; includes all forms of hazing and
cyberbullying. It can be and often is continuous and repeated over time, but does not
have to be. Once is enough to constitute bullying.
Include in the policy a statement of responsibility of those who witness the bullying to
seek to stop it by intervening, helping the targeted student escape, and/or telling a caring
adult.
Anti-bullying Procedures: Clearly outline the consequences for the bully—and any
henchmen or other bystanders who played an active supporting role in the bullying.
These procedures should include discipline measures that will be taken to hold the
students accountable for their actions. (I recommend some form of restorative justice, i.e.
Restitution, Resolution, and if possible, an attempt at Reconciliation at the targeted
student’s behest.) Procedures for restorative justice are tailored to the unique problems
and possible solutions to repair the damage done. It is helpful to incorporate into the plan
the six other ways to reform the perpetrator(s). Parent are notified of the bullying and
asked to take measures at home that will help in the restorative justice process.
Clearly outline what measures will be taken to keep the targeted student safe at school,
give him or her tools to stand up to the perpetrators, and support to keep the targeted
student from succumbing to the bullying. Identify a person or persons to whom the
student can safely report any further bullying incidences. Notify parent(s) of incident and
school’s plan. Give parent(s) the method to use to report any further targeting of their
child. (see how to report)
Programs: Develop programs that back up and reinforce the policy as well as help to
create a safe, caring, and welcoming environment for all students.
It is the school culture and social environment that these policies, procedures, and
programs create as well as reflect. We can rewrite the script and create for our youth
alternative, healthier roles that require no pretense or violence. We can rechannel the
behaviors of the youth who bully into positive leadership activities; acknowledge the
non-aggressive behaviors of a youth who is bullied as strengths that can be developed and
are honored; and transform the role of the bystander into that of witness, resister, and
defender. A daunting but necessary task.
Barbara Coloroso © 2002, 2005, 2009, 2015