Security Newswire

New Cyber Bullying Book Offered for Schools

Three faculty members from Western Illinois University's College of Education and Human Services (COEHS) have published a book that offers school administrators guidance when it comes to handling the increasing problem of cyber bullying.

"Responding to Cyber Bullying: An Action Tool for School Leaders" -- by Jill Myers, associate professor, School of Law Enforcement and Justice Administration; Donna McCaw, professor, educational leadership; and Leaunda Hemphill, associate professor, instructional design and technology -- was released in January, and according to its co-authors, provides, among other things, the "top 10 rules" that govern school authority over student cyber expression and practical guides for school administrators.

"Cyber bullying interferes with student learning, prevents students from achieving their individual levels of potential and generates a climate of disrespect and fear that affects bystanders, family members, teachers and administrators," Myers noted. "The recent emergence of cyber bullying situations threatens the educational, as well as the off-campus, experiences of students across the United States. The extent of cyber aggression is now so pervasive that the Centers for Disease Control and Prevention recognize it as the primary emergent health risk, affecting nearly 75 percent of teenagers between the ages of 12 and 17," she added.

Along with the top 10 rules and practical guidelines, the book provides school administrators and school leaders with strategies for documenting aggressive cyber situations; user-friendly legal tests for differentiating "netiquette" violations from First Amendment-protected expressions; and a MATRIX rubric that provides data-driven decision-making guidelines for determining appropriate responses to cyber bullying incidents.

According to Myers, the three WIU COEHS faculty members had a common interest in the topic—each related to her own discipline—which is how their collaboration for the book began. Myers noted that, in 2008, she began researching cyber bullying from the perspective of the First Amendment and has since published journal articles about the topic. Hemphill teaches ethical and legal issues related to technology use in the school to educators, administrators and pre-service teachers, and McCaw and Hemphill ended up working together on the topic through a WIU educational leadership doctoral candidate's dissertation about cyber bullying.

"Our collective research showed that there was a lot of information concerning the extent of the problem, but little to no research on how to address the behavior," Myers explained. "We decided to create a simple straightforward MATRIX that administrators could use to appropriately handle cyber aggressive situations affecting school environments. The MATRIX was modeled after the federal sentencing guidelines. The main thrust of the book concerns the legal framework within which public school administrators must work."

During the research phase of the book, Myers reviewed every cyber aggression-related published and cited court case within the U.S. to determine how it was handled within the legal system. She analyzed these cases against the backdrop of the four Supreme Court cases that address public school censorship of student expressions.

"As a former prosecuting attorney with experience dealing with juvenile offenders, sentencing guidelines and constitutional issues, I researched the court cases and contributed the legal analysis. Leaunda contributed to the collaboration, drawing on her teaching experience and her expertise with technology use and abuse, and she was also heavily involved in describing and defining the emergent methods of technological exploitation. Donna drew on her experience in school administration, counseling and curriculum, as well as her work as a school consultant. Donna was also instrumental in reviewing the research through the eyes of a public school administrator," Myers explained.

With the increase of the cyber bullying phenomenon, Myers said school administrators and leaders may find themselves at a loss as to how to handle the problems and issues it creates in the learning environment. She points out that enforcing cyber bullying policies cannot come at the expense of constitutional free speech, and sanctions must be fair and equitable. Yet the severity of the problem continues to impact students and the school environment, both on and off campus, she noted.

"Every day 160,000 children fail to attend school because they fear bullying. Worse yet, cyber bullying is reportedly a stronger predictor of suicidal thoughts than regular bullying, although all bullying behavior increases suicidal ideation. Cyber bullying victims are almost twice as likely to have attempted suicide as youth who have not experienced cyber bullying," she said. "It is vital that school administrators clearly understand their roles in protecting students from harm while promoting free expression. The challenge is in knowing the difference between protected free speech and inappropriate conduct, and then applying the appropriate data-driven response."

The book is available at

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine February 2015 issue cover

2015 February

In the February 2015 issue of Security Magazine, see what other companies have learned from the massive data breach and what they are doing in the now and in the future. Also, what could adding thermal cameras to your operation do for you? and Mohegan Sun at Pocono Downs prepares for the future with security decisions.
Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.