SciELO - Scientific Electronic Library Online

 
vol.35 número2Victims of educator-targeted bullying: a qualitative study índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Artigo

Indicadores

Links relacionados

  • Em processo de indexaçãoCitado por Google
  • Em processo de indexaçãoSimilares em Google

Compartilhar


South African Journal of Education

versão On-line ISSN 2076-3433
versão impressa ISSN 0256-0100

S. Afr. j. educ. vol.35 no.2 Pretoria Mai. 2015

http://dx.doi.org/saje.v35n2a1076 

Cyberbullying in South African and American schools: A legal comparative study

 

 

DM Smit

Department of Mercantile Law and the Centre for Labour Law, Faculty of Law, University of the Free State smitdm@ufs.ac.za

 

 


ABSTRACT

Bullying conjures up visions of the traditional schoolyard bully and the subordinate victim. However, bullying is no longer limited to in-person encounter, having come to include cyberbullying, which takes place indirectly over electronic media. In this electronic age, cyber platforms proliferate at an astonishing rate, all attracting the youth in large number, and posing the risk that they may become subject to cyberbullying. Far from being limited to those individual learners being cyberbullied, the effects of this phenomenon extend to the learner collective, the school climate, and also the entire school system, management and education, thus requiring an urgent response. This article first provides a general overview of cyberbullying and its impact on learners, schools and education. This is done through a comparative lens, studying the extent of the phenomenon in both the United States and South Africa. The focus then shifts to the existing legislative frameworks within which the phenomenon is tackled in these respective jurisdictions, particularly the tricky balancing act required between learners' constitutional right to free speech and expression, and the protection of vulnerable learners' right to equality, dignity and privacy. The article concludes by proposing certain possible solutions to the problem.

Keywords: cyberbullying; electronic media; harassment; learners; potential solutions; right to dignity and respect; right to free speech; schools; South Africa; United States


 

 

Introduction and Background

One of the most important social spheres in which children operate is the school environment. The significant influence that educational institutions have on children's psycho-educational development cannot be over-stressed (Burton & Mutongwizo, 2009); the educational institution should therefore not only be a place of learning for the child, but a place of safety, too. Violence in schools is no new phenomenon and presents cause for great concern worldwide - especially in South Africa, where this has claimed the lives of both learners and educators (Burton & Mutongwizo, 2009). Bullying has been shown to have a negative effect on both educators and learners (De Wet, 2011), while the added dimension of anonymity (Hughes & Louw, 2013) typically associated with cyberbullying, leads to increased antisocial behaviour (Hughes & Louw, 2013), which merely serves to "exacerbate" the bullying problem in South African schools (confer (cf.) Mienie, 2013:146).

Bullying in South African schools has recently received media attention, and several media reports on this topic have consequently appeared (Rooi Rose, 2011). Studies on violence in the workplace and on bullying in South Africa are limited (De Wet, 2011:66). Bullying in general leads to feelings of "incompetence, alienation and depression" (Le Roux, Rycroft & Orleyn, 2010:51); in schools, it has been shown that cyberbullying may result in "low self-esteem, family problems, academic problems, school violence, delinquent behaviour and suicidal thoughts" (Goodno, 2011:645). In the United States of America, several teenagers have committed suicide due to cyberbullying (Goodno, 2011:645-647) and "school taunting" (Burnham, Wright & Houser, 2011:7), which led the legislature in various states to seek a uniform definition of cyberbullying, to investigate the prevalence and frequency of cyberbullying in schools. Prevalence rates differ due to numerous factors, such as "sample characteristics, the definitions used", and whether traditional bullying is also measured, according to Kowalski, Giumetti, Schroeder and Lattanner (2014:1108). This is no minor problem: the attempt to demonstrate power and authority over subjects through "anonymous" cyberspace is experienced by as many as "93%" of youth accessing the internet in North America (Law, Shapka, Domene & Gagne, 2012:665). In February 2012, it was even reported that a woman who had been bullied at a young age about her red hair, suffered that same abuse as a 35-year-old, after a childhood picture of her had been posted on Facebook. The online attack became so blistering that she was forced to call the police, saying that at least at school, she was able to see the bullies, but now, the bullies were faceless, hiding behind their keyboards (Faulkner, 2012).

To set the scene for studying the phenomenon, this article first presents a general overview of cyberbully-ing and its characteristics, as well as its effect on learners, schools and education. The focus then shifts to the legal position in respect of cyberbullying in both the United States and South Africa, after which the paper will investigate the way in which cyberbullying could be halted in order to give effect to our constitutional imperatives, and to balance the rights of the various parties in a school environment.

Cyberbullying

Cyberbullying occurs when adolescents use technology deliberately and repeatedly to "bully, harass, hassle and threaten" their peers (Goodno, 2011:641), leaving their victims without any escape, as continuous technological development and increased connectedness are shrinking the world. Victims are therefore traced wherever technology is accessed - not only on the "internet, e-mail or smartphones", but through "cellphones, tablets" and any other way of "sending or retrieving" data or voice messages (Li, 2005:1779). Goodno has argued that battling cyberbullying is one of the most pertinent "challenges facing public schools" in the United States of America (hereinafter 'the USA') (2011:655).

Bullying is primarily defined as encompassing physical acts, such as hitting, kicking or pushing; verbal aggression, such as name-calling and abusive language; or relational aggression, such as spreading rumours or socially excluding peers. Cyberbullying merely takes this phenomenon to the next level. All instances are characterised by a "power imbalance", a clear "intent to inflict harm", and the repeated occurrence of harmful acts (Varjas, Henrich & Meyers, 2009:160). Victims of cyberbullying seem to be at a greater risk of experiencing poor psychosocial adjustment, as many internet users are socially isolated, and incite participation from peers in a cyberworld. Therefore, appropriate preventative and intervention strategies should be developed to ensure the "safety of all students" (Li, 2005:1780).

According to Bauman (2013:249), "[c]yberbullying is possible because of the wide availability of digital technology", and the proliferation of technological innovations will therefore always mean that research and, by implication, legislation, will lag behind. This is not to say that a magnitude of research on cyberbullying, especially in foreign jurisdictions, had not been done in recent years, but that the "very nature" of electronic communication leads to different results (Kowalski et al., 2014: 1074). What does stand firm, however, is that South African society needs to take a firm stand to protect our learners from the negative effects of cyberbullying, such as "depression, pathological technology use, obsessive and addictive technology behaviours" and cyberbullying, specifically (and should South Africa investigate the position in other countries, such as the USA (Kowalski et al., 2014:1074)).

Defining cyberbullying

There is no single definition for cyberbullying: in South Africa, Belsey defined cyberbullying as "bullying which involves the use of information and communication technologies, such as e-mail, cellphone and text messages, instant messaging, and defamatory online personal polling websites, to support deliberate, repeated and hostile behaviour by an individual or group that is intended to harm others" (in Burton & Mutongwizo, 2009:1). Williams (in Burton & Mutongwizo, 2009:1) have further defined it as "the use of speech that is defamatory, constituting bullying, harassment or discrimination, and the disclosure of personal information that contains offensive, vulgar or derogatory comments", while Varjas et al. (2009:160) describes it as follows: "the newer technolog[ical] phenomenon of cyberbullying has been defined as willful and repeated harm inflicted through the medium of electronic communication tools".i Kowalski et al. (2014) states that cyberbullying is not easily defined, but that, in general, it refers to the use of electronic communication technologies to bully others. It has been found that prevalence rates differ due to this problem, where the "definition used" by researchers will invariably lead to different results (Kowalski et al., 2014:1074).

Here we thus define cyberbullying as constituting rapid, repeated, intentional actions of harassment or aggression, which are specifically prohibited by the enactment of our Constitution.

Characteristics of cyberbullying

Although cyberbullying shares certain characteristics with 'traditional' bullying, with Bauman (2013:251), for instance, referring to an "overlap" between the two, there are also some major differences, with the key ones being "anonymity" (cy-berbullies are often not known to their victims), "disinhibition" (Bauman, 2010:808) (the perpetrators of online bullying are often less inhibited since they are able to avoid face-to-face contact), accessibility (cyberbullying and its effects follow the victims wherever they go), and punitive fear (the additional disincentive to report cyber-violence due to victims' fear of losing control over their electronic media) (Anti-Defamation League, 2009).

Hinduja and Patchin have stated that "cyber-bullying is a growing problem because increasing numbers of kids are using and have completely embraced online interactivity" (2014:3). Judging by the medium through which cyber bullying is perpetrated, one would be tempted to argue that a child can avoid being cyberbullied simply by not logging on electronically. However, this does not hold water: the publishing of defamatory personal material on the internet is extremely difficult to prevent, and, once posted, millions can download it before it is removed, at which time it becomes irrelevant whether the victim was logged on or not. Rather, the specific nature of cyber-bullying poses problems related to the basic rights of learners and educators guaranteed by the Constitution (Republic of South Africa, 1996a). In a contemporary school setting, the right to equality (Republic of South Africa, 1996a, s. 9); the right to human dignity (Republic of South Africa, 1996a, s. 10); the right to freedom and security (Republic of South Africa, 1996a, s. 12c) ("to be free from all forms of violence from either public or private sources"); the right to privacy (Republic of South Africa, 1996a, s. 24a); the right to a safe environment (Republic of South Africa, 1996a, s. 14); and the right to freedom of expression (Republic of South Africa, 1996a, s. 16), should all be balanced.

Prevalence of cyberbullying

Although definitions used by researchers depictcertain commonalities, prevalence figures are dependent on whether cyberbullying is defined in terms of "specificity versus generality." (Kowalski et al., 2014:1074 - for more detail on prevalence rates in different countries and the different definitions, please see tables on pp. 1075-1106 in this article). Although Bauman (2013:251) refers to "mixed research findings" pertaining to age and gender in terms of prevalence, a study done in 2009 (Varjas et al., 2009:162) revealed that 50% of the respondents reported having been a victim of cy-berbullying, while 22% of them had personally perpetrated cyberbullying. Another study, also undertaken in 2009, indicated that 35% of children between the ages of 13 and 17 were the targets of cyberharassment (Goodno, 2011:644). Reports further indicate that 93% of teens are active users of the internet and 75% own a cellphone (Schneider, O'Donnell, Stueve & Coulter, 2012:171). More than 3,2 million are victims of bullying annually. One of the largest studies conducted online in 2008 indicated a prevalence rate of 72%, with youth between the ages of 12 and 17 reporting at least one incident of "cybervictimisation" (Bauman, 2013: 251). A study done in 2011 found that 53% of adolescents aged 12-13 were victims of cyber-bullying (Aftab, 2011, in Kowalski et al., 2014: 1108).

The latest figures from the USA indicate prevalence at between 10%-40%, once again depending on the definition used to depict online aggression (Kowalski et al., 2014:1108). Both Bauman (2013:250) and Kowalski et al. (2014:1074) refer to the "difference" in prevalence rates and ascribes these to the "different definitions" used in research. Kowalski et al. (2014:1074) also sets out the different prevalence rates in different countries, and indicate cyberbullying to be a worldwide problem in schools. A dispute exists in the USA on whether cyberbullying has increased or decreased over the years, but it is asserted as still being a "serious problem confronting youth today" (Kowalski et al., 2014:1108).

The overlap between bullying and cyber-bullying is substantial; with nearly "two thirds" of cyberbullying victims reporting that they were "bullied at school" as well (Schneider et al., 2012:175). An estimated 160,000 children miss school every day out of fear of attack or intimidation by other students. A total of 72% of teens reported at least one incident of bullying online (name calling, insults via instant messaging or social networking sites), but 90% did not report the incident to an adult (Berkshire District Attorney's Office, 2015:1). Taking into account that teenagers' use of cellphones and text messaging has increased from 45% to 75% since 2004; that 72% of teens make use of this message service, and that 22% of teens check their social networking sites more than 10 times per day (Lenhart, Ling, Campbell & Purcell, 2010:1), there is clearly a dire need to address cyberbullying.

In South Africa specifically, a study by the Centre for Justice and Crime Prevention proposed that almost a third of the more "traditional" bullying could be ascribed to cyberbullying (Burton & Mutongwizo, 2009:1). The Centre's study among 1,726 adolescents also found that 46.8% had experienced some form of cyberbullying (Burton & Mutongwizo, 2009:1-2). In addition, in 2011, it was found that 36% of learners in primary and secondary schools had experienced cyberbullying (Davids, 2011; Unisa, Bureau of Market Research,2011).

Clarifying certain cyberbullying terminology and categories

Cyberbullying should firstly be distinguished from cyberstalking, which is the use of electronic communication to follow an individual or groups of individuals with the intent to initiate in person contact, generally through a pattern of threatening or malicious behaviour. As such, cyberstalking could be seen as the more dangerous form of cy-berbullying, in that a real, credible threat of harm exists (National Conference of State Legislatures, 2015). Moreover, although cyberbullying and cyber harassment are terms that are sometimes used interchangeably, the former usually refers to the electronic harassment of minors within a school context. This paper focuses on cyberbullying specifically.

Another important distinction is that to be made between so-called 'sexting' and cyber-bullying. These two are regarded as separate phenomena in South Africa, but are often concurrent. While cyberbullying is defined as "acts involving bullying and harassment through the use of electronic devices or technology", sexting is described as a combination of texting and sex, involving the sending of nude or semi-nude photos or videos and/or suggestive messages via mobile texting or instant messaging (Badenhorst, 2011:2). For example, in Springs, Gauteng, a peace order was granted against a 16-year-old girl for allegedly humiliating another 16-year-old girl at her high school on MXit, calling her a "slut" (Badenhorst, 2011:6).

In 2006, seven subcategories of cyberbullying were devised by Smith, Mahdavi, Carvalho and Tippet (2006:1), namely "text message bullying, picture/video clip bullying (via mobile phone cameras), phone call bullying via mobile phones, email bullying, chat-room bullying, bullying through instant messaging and bullying via websites". South African researchers have since added internet gaming and social networking sites such as Face-book and Twitter as ways in which cyber-bullying can be practised. According to Badenhorst (2011), cyberbullying can take the form of harassment (frequently sending cruel or threatening messages to a person's e-mail account or mobile phone); denigration (sending or posting malicious gossip or rumours about, as well as digitally altered photos of, a person to damage reputation or friendships); impersonation or identity theft (posing as another person after breaking into that other person's email account or social networking account); outing (the sharing of secrets or embarrassing information online with others with whom this should not have been shared); cyberstalking (similar to traditional stalking in that it involves a real threat of harm, either through repeated online harassment or stalking); happy-slapping (where people would walk up to others and slap them, with the action being captured by another using a mobile phone camera); and sexting (focusing on the involvement of children or minors, which could in some instances be classified as child pornography).

The impact of cyberbullying on learners, schools and education

At an individual level, it has been shown that cyberbullying leads to "low self-esteem, academic problems, delinquent behaviour" and, last but certainly not least, "suicidal thoughts" and "suicide" in learners (Goodno, 2011:645). Adolescents who contemplated suicide were "twice as likely" to have contemplated such behaviour, due to having experienced cyberbullying (Hinduja & Patchin, 2010:204). Cyberbullying has been described as being more pernicious than traditional bullying, since it allows for the "gradual amplification" of cruel and sadistic behaviour, and may cause an extreme emotional response, for instance a victim taking his or her own life (Belnap, 2011:501). In their study, Adams and Lawrence (2011) found that the negative effects associated with being bullied as a school learner continue into the college years, which would obviously detract from such victims' ability to perform academically.

However, the impact of cyberbullying is not limited to the individual effects suffered by victims, but also shows a ripple effect on learners collectively, creating a general feeling of being unsafe at school. Feinberg and Robey (2008) found that cyberbullying can undermine school climate and interfere with school functioning.

School systems, school leaders and the education sector are equally affected - both directly and indirectly. As articulated by Welker (2010), direct, on-campus cyberbullying disruption during the school day makes it even more complex to maintain school operations, safety and academic achievement. At a more indirect level, principals and other school leaders may find themselves in the awkward position of having to establish their authority over cyberbullying actions that "technically may occur outside of school, but for which the effects on students in school are very real" (Feinberg & Robey, 2008:10). Increasingly, therefore, calls are made for school administrators to also understand and respond to cyberbullying (Mitzner, 2011), and for school leaders to be equipped with a framework against which to assess cy-berbullying and its impact on learners (Magliano, 2013). Feinberg and Robey (2008:10) have stated in no uncertain terms that "school leaders cannot ignore cyberbullying, but rather must understand its legal and psychological ramifications and work with staff members, students and parents to stop it."

It is thus clear that the impact of cyber-bullying on the education sphere extends from the individual learner, to the learner collective, through to the school and education system as a whole, and requires an urgent response.

The Legislative Framework However, considering the rapid pace at which modern technology develops methods to curb this form of bullying struggle to keep up. While learners have the right to free speech and expression in terms of the South African Constitution, cyberbul-lying in a school could also interfere with other fundamental rights entrenched in that same Constitution, including the right to equality, the right to dignity and the right to privacy. Therefore, tackling the issue of cyberbullying in schools requires an enormous balancing act, which begs the question as to how to effectively guarantee and enforce the myriad of rights granted by our Constitution, while still protecting vulnerable learners and educators in a school setting. In an attempt to answer this question, the focus now shifts to the existing legislative frameworks and to the 'balancing act' in both the USA and South Africa, after which possible solutions to the problem will be suggested.

The American perspective

There is currently no federal US law addressing or prohibiting cyberbullying, neither in the workplace, nor in schools. Several US states have therefore resorted to passing their own laws prohibiting bullying and cyberbullying. Cyberbullying concerns first surfaced around 2004, while sexting concerns grabbed the public's attention in 2008 (Willard, 2011:125). The Georgia legislature was the first to codify requirements for school districts to address bullying among learners in public schools (Willard, 2011:124).

In 2010, the Federal Prevention Task Force in the USA was established to investigate the phenomenon of cyberbullying, bullying, sexting and peer aggression, as well as to develop effective prevention and intervention strategies. Clearly, school districts are obligated to protect learners and staff from "harassment and discrimination" once this is brought to the authorities' attention (Hinduja & Patchin, 2011:72-73), but they are equally bound to respect the right to free speech. When it comes to the latter, however, education authorities are still expected to teach learners the boundaries of socially acceptable behaviour (Hinduja & Patchin, 2011:73) and, therefore, to restrict speech that is "highly offensive or highly threatening to others".ii

Neither the legislature nor the courts have been able to give public schools clear guidance on how to manage cyberbullying effectively, and even states having adopted legislation to address bullying, still fail to address cyberbullying in public schools (Goodno, 2011). Lately, the District of Columbia and 45 other states have enacted general anti-bullying laws, mainly with reference to 'offline bullying'. It is noted, though, that the US Federal Government has proposed formal anti-bullying laws, which are currently pending (Goodno, 2011).

Due to the distinct features of cyberbullying, traditional anti-bullying measures are insufficient to address cyberbullying in education, and many states have now resorted to adopting policy to deal with this peril. We do know, however, that even a zero tolerance policy in "isolation" is insufficient to curbing negative behaviours (Hoel, 2013:17, McAndrews, 2001:3-4), wherein it is stated that policies "set in stone" with no flexibility hinder administrators' ability to deal with minor incidents. It is thus clear that an integrated approach is needed. Relevant research on parent and teacher training suggests that positive outcomes often occur when "families and educators" are included in school prevention programmes (Fox, Farrington & Ttofi, 2012:279). Internet predators and cyberbully-ing via social media are major concerns. Children are far more likely to be bullied online (Kite, Gable & Filippelli, 2010), where traditional anti-bullying tactics would be ineffective. Although 43 states require public schools to develop policy regarding bullying, only 18 have model school policies, a mere six expressly prohibit cyberbullying, while 28 states prohibit "electronic harassment", which is likely to encompass most elements of cyber-bullying (Goodno, 2011:654). It is argued that even the "model policies" fail to address school cyber-bullying effectively, and do not guide educators on how to deal with the unique aspects of this phenomenon (Goodno, 2011:654). In June 2008, a federal law was proposed that would have criminalised acts of cyberbullying, but the law was never passed (Olsen, 2008). Therefore, even though there are several laws to assist parties exposed to cyber-bullying, there is no one specific federal act to curb cyberbullying in schools.

In light of this lack of a consolidated federal act prohibiting cyberbullying in schools specifically, there is a dire need for a single law to review and ensure that policies adopted by school districts at least have the necessary constitutional "teeth" (Conn, 2010:99) to curb cyberbullying, as the adoption of policy by individual schools seems to be the only proactive measure to take in order to halt cyberbullying. In some jurisdictions, such measures take the form of a ban on the internet and technology-enabling instruments in schools (Conn, 2010:99).

Many authors argue that preventative programmes such as the "Stop Bullying Now" school programme, the "Olweus Bullying Prevention Programme" and the "Let's Get Real" curriculum, could serve as proactive means to stop cyber-bullying and bullying in schools (Sbarbaro & Smith, 2011:150) and to lessen the legal responsibilities incurred by school districts.

The South African perspective

In South Africa, cyberbullying as such is not prohibited by legislation, which seems to be a deficiency in our legal system. South African responses "are fragmented and rely on various pieces of legislation, common-law definitions of criminal offences, and civil law remedies" (Badenhorst, 2011:7). None of them are preventative measures. As cyberbullying is but another form of bullying, which has in turn been established as a form of harassment by the recently promulgated Protection from Harassment Act 17 of 2011 (Republic of South Africa, 2011), learners who fall victim to cyberbullies may in future explore this as a potential avenue for redress, albeit a protection order only, which falls within the realm of an interdict and is not a real punishment or preventative measure.

Should cyberbullying lead to either common-law or statutory crimes, the normal criminal avenues should be followed to institute criminal action. This is however not preferable in a school environment.

In 2005, the Safer Internet Plus programme was adopted, which focused on empowering parents, children and educators with internet safety tools to combat illegal and harmful internet content (European Commission, 2009). Sexual harassment is further managed by the provisions in the Department of Education's 2008 Guidelines for the Prevention and Management of Sexual Violence and Harassment in Public Schools (De Wet, 2013: 22).

Sexting in a South African context could be regarded as child pornography, and could lead to the prosecution of children under the Films and Publications Act 65 of 1996 (Republic of South Africa, 1996b), which could be seen as an unintended consequence of the legislation.

The Electronic Communications and Transactions Act 25 of 2002 (the ECT Act) (Republic of South Africa, 2002) assists in the gathering of information, and affords cyber-inspectors wide-ranging powers of seizure and investigation. Certain provisions of the Criminal Procedure Act 51 of 1977 (Republic of South Africa, 1977), which regulates general seize and seizure warrants, have been incorporated into the ECT Act (Republic of South Africa, 2002, s. 82(3),24), and the two acts are intended to be used in tandem. The Regulation of Interception of Communications-Related Information Act 70 of 2002 (Republic of South Africa, 2003), in turn, allows for the interception of data to prevent serious bodily harm (Republic of South Africa, 2003, s. 7), or to determine the location of a party to a communication in the case of an emergency (Republic of South Africa, 2003, s. 8), or whenever interception is authorised by other acts (Republic of South Africa, 2003, s. 9).

The South African Schools Act 84 of 1996 (Republic of South Africa, 1996c) does not prohibit bullying or cyberbullying, but refers to bullying as "abuse". A Bill of Responsibilities for the Youth of South Africa refers to the obligations of the youth with reference to the constitutional imperative of ensuring the right to freedom and security of the person, and explicitly prohibits bullying: "my responsibilities in ensuring the right to freedom and security of the person [...] the right is upheld by taking responsibility for not hurting, bullying [...] others or allowing others to do so." (Department of Education, Republic of South Africa, 2008:1, own emphasis). Teachers are also required to uphold the Batho Pele principles, which include "courteous behaviour", "open and transparent" dealings with customers, and ensuring "access to information" as per the latest policy on the organisation, roles and responsibilities of education districts (Department of Basic Education, 2012:21). Cyberbullying would naturally undermine these principles.

The Balancing Act between Constitutional Rights and the Protection of our Learners

The American perspective

Cyberbullying in particular raises issues that require a fine balance between protecting the constitutional rights of public-school students, while also allowing for a safe learning environment (Goodno, 2011). The absence of federal legislation in this regard serves as the backdrop to the following discussion, along with the fact that the majority of cyberbullying incidents occur between peers, which implicates schools as the most likely setting in which cyberbullying will occur, as that is where youth mostly interact with their peers (Hinduja & Patchin, 2011).

The balancing act between the rights and obligations afforded by the Constitution and subsequent legislation poses three particular challenges. The first challenge that public schools face in adopting policy is that the First Amendment (the right to free speech) could be infringed. The second is that the right to due process could be challenged, as unconstitutionally vague or overtly broad language could be used in drafting cyberbullying policies. The third challenge lies in how to formulate policy to guide educators on when they may search a student's personal electronic devices without violating the Fourth Amendment (the right to reasonable searches and seizures) (Goodno, 2011). Consistent application of these policies, proper implementation thereof, clear definitions and consequences for misbehaviour, allowing for flexibility and collaboration with all stakeholders in compiling policies, as well as regular review, seem to be required for any policy to be successful (McAndrews, 2001:6).

The onus for controlling cyberbullying rests with many institutions; yet, schools seem to carry the greatest burden, as the negative effects of cy-berbullying can seriously hamper the creation of a safe and healthy environment for the learners for whom schools are ultimately responsible. Schools' reluctance to act is to be expected, because school administrators often fear "civil litigation" under the First Amendment over "regulating speech" or behaviour, and remaining uncertain as to who may intervene and when (Stewart & Fritsch, 2011:81).

It is trite law that the First Amendment right to freedom of speech extends to students in public schools, as was already found in the Tinkeriii judgement 41 years ago (see Mienie, 2013:149151, for more information). This should, however, be balanced with schools' right to have at least "some form of control" over their learners' speech, so as to retain order and control in the learning environment (Goodno, 2011:657). In the absence of a uniform approach by the courts on the extent of control to be afforded to schools, the school firstly has to establish whether it has jurisdiction over speech, and secondly, whether the school, as a matter of substantive law, may regulate speech. With regard to on-campus cyberbullying (by implication), case lawiv dictates that schools indeed have jurisdiction to regulate speech if it originates on school campuses or relates to "school-sanctioned activities" that would be deemed equivalent to being on campus, and refers to instances where the student uses the school's tools of trade, or where the student uses his/her own personal technology while on campus (Goodno, 2011:658). Goodno notes that off-campus speech, however, is much more difficult to regulate (2011:658).

Only once a school's jurisdiction has been established, can the question be asked as to whether the regulation of speech violated the First Amendment, which zealously guards free speech. Although the fight about the right to free speech does involve competing principles, exceptions could be made to protect the youth.

The South African perspective

The South African Constitution (Republic of South Africa, 1996a) transcends all other legislation passed and becomes the "yardstick" against which to measure the "constitutionality" of promulgated legislation (Van der Merwe, Roos, Pistorius & Eiselen, 2008:23). Two apparently conflicting provisions are found in sections 14 and 32, the principles of which could be applied to the school environment. Section 14 guarantees privacy and the right thereto. However, at the same time, section 32 guarantees the right to access to information, being information held by another person and that is required for the exercise of any rights (Republic of South Africa, 1996a). The question about how to pair the prima facie conflicting wording will of course arise, but since the enactment of the Promotion of Access to Information Act 2 of 2000 (Republic of South Africa, 2000a), clear guidelines have been laid down to ensure minimum infringement.

The constitutional right to privacy includes the rights of persons not to have their homes or property searched, their possessions seized or the privacy of their communication infringed (Republic of South Africa, 1996a, s. 14).The common law should be developed by the court taking into consideration the "spirit, purport and objects of the Bill of Rights," and that fundamental rights in terms of the aforementioned bill (Buys & Cronjé, 2004:173) are not absolute. In terms of section 36 (Republic of South Africa, 1996a), the rights in the Bill of Rights may be limited by means of general application inasfar as this is reasonable and justifiable. This leads to the inference that where the right to privacy and the right to freedom of expression conflict, a balancing act or the weighing of these opposing rights is required.

The Regulation of Interception of Communications and Provisions of Communication-Related Information Act 70 of 2002 (RICA) (Republic of South Africa, 2003), which serves to limit the constitutional right to privacy, has been repealed and replaced by the Interception and Monitoring Prohibition Act 127 of 1992 (Republic of South Africa, 1992). E-mail and text communication may only be intercepted, as a balancing act, by means of existing legislation that serves to "limit the right to privacy" (Buys & Cronjé, 2004:183). Courts favour a restrictive approach, and it is still to be seen whether the legal provisions for interception are wide enough to cater for all types of interception, without written approval from the courts or the generator of the data. In light thereof, the adoption of policy in schools as a proactive measure is proposed.

Hate speech, among others, is prohibited by the Promotion of Equality and Prevention of Unfair Discrimination Act 4 of 2000 (Republic of South Africa, 2000b), while the distribution of hate speech is criminalised by the Films and Publication Act (Republic of South Africa, 1996b, s. 29(1)).

Therefore, the constitutional protection of the right to freedom of expression, as per section 16(1) (Republic of South Africa, 1996a), needs to be balanced with these provisions, particularly since section 16(2) of the Constitution (Republic of South Africa, 1996a) stipulates that protection is not extended to the advocacy of hatred that is based on race, ethnicity, gender or religion, and results in harm. It remains an open question, however, as to how schools would address hate speech that is not based on one of these prohibitions, or whether school children should be exposed to courts of law due to their cyber-actions.

Possible Solutions

At the top of the wish list of possible solutions would be legislation specifically drafted to protect learners against all forms of cyberbullying, thereby giving effect to the protection granted to our youth through the Constitution, namely the guarantee of a safe learning environment; the balancing of freedom of speech with criteria for intervention; the protection of children from internet exploitation; and the balancing of defamation claims with the right to privacy and the rights of end users. However, the true challenge with regard to cyber-bullying does not lie in the application of legislation, but in the actual prevention of cyber-bullying in a school environment, where one would want to limit or prohibit acts that could be construed as leading to civil or criminal action against children.

Secondly, therefore, it is suggested that an "integrated model" from the USA (Couvillon & Ilieva, 2011:99) be replicated locally to ensure that schools utilise "various media" to implement a cyberbullying prevention plan. This is where the value of a legal comparative study lies in the fact that South Africans could borrow from foreign jurisdictions. The Olweus Bullying Prevention Program proposes to be the most researched and best known anti-bullying prevention programme available (Blueprints for Healthy Youth Development, 2015) and ought to be used by not only policy makers, but also by schools in their quest to eradicate cyberbullying. It seems to be of the utmost importance that a whole-school, systems-change programme at different levels be complied, similar to the Olweus Bullying Prevention Program (Blueprints for Healthy Youth Development, 2015) and that social competence among the youth is increased. Positive action should be taken and training lodged through effective service providers, such as Blueprints Positive action, which is a schools' based programme designed to effect climate change, (Blueprints for Healthy Youth Development, 2015) added to by training on increased "respect" and the promotion of alternative thinking strategies, could all be tailormade to curb cyberbul-lying in South African schools (Blueprints for Healthy Youth Development, 2015). It is clear that further research is needed to tender a successful, integrated programme for schools to alleviate cy-berbullying, and South Africa could borrow strategies from the American experience. Although this article is mainly focused on a legal comparative intervention, it is suggested that further research is undertaken to compile an effective solution dealing with cyberbullying in schools and that any anti-cyberbullying solutions should be tailor made for the situations in which South African youth find themselves.

'Safe2Tell' is another avenue to be explored (http://safe2tell.org/resources/for_schools/), as these principles of anonymous reporting and the creation of awareness could easily be adapted to prevent cyberbullying in schools since it also advocates an integrated approach. Safe2Tell® provides young people a way to report any threatening behaviors or activities endangering themselves or someone they know, in a way that keeps them safe and where anonymousness is facilitated (Safe2Tell, n.d.:1). This initiative is a state-funded strategic initiative of the Colorado Department of Law, Office of the Attorney General (Safe2Tell, n.d.:2).

Although the main aim of this article is not to tender a ready-made solution to the problem, but to set the stage for further investigations into a specific solution for the South African youth, cognisance need to be taken of "existing solutions" in other jurisdictions, and ought to have a "sound theoretical basis" (Bauman & Yoon, 2014:253).

This basis should incorporate a clear definition of cyberbullying; a demand for compliance with the internet use policy; clear communication to enforce rules for everyone's safety; embark on a prevalence study; and ought to define specific consequences of cyberbullying. A curriculum for cy-berbullying should be considered and a trustworthy person appointed to whom incidents may be reported. A response procedure should be developed and properly communicated, and extensive training for all three stakeholder groups should be embarked upon.

Cooperation between schools, parents and the community should be initiated, and they should be informed of the resources available. Research has shown that ongoing discussions about internet safety between learners and parents, caregivers and teachers have reduced "unhealthy social choices" on the internet (Hinduja & Patchin, 2008:151). Students should be engaged as collaborators along with teachers, and student peer-to-peer or school-wide activities should be encouraged. Continuous monitoring of cyberbullying should be initiated, as this will not be a one-off programme. Policies should take cognisance of "personality differences" and "jealousy" as some of the frequently furnished reasons for bullying (De Wet, 2011:74), and proposed interventions for primary and high schools should be differentiated, as the literature shows an "increase in cyberbullying from primary to high school" (Slovak & Singer, 2011:14).

Thirdly, "filtering options for end users" (Buys & Cronjé, 2004:220) are proposed as a technological tool. "Client-side filters, content-limited internet service providers and server-side filters" can all block access to undesirable material (Buys & Cronjé, 2004:220). Computer software is available to parents to "install on home-based computers" (Hinduja & Patchin, 2008:151), but "over-blocking and under-blocking" remain a problem, and therefore, these types of software have thus far failed to curb cyberbullying. Self-regulation by internet service providers and filtering technologies for non-end users are costly, and are not a sufficient mechanism to prohibit bullying behaviour by children.

Even though no amount of proactive measures will "completely" eliminate bullying, Duncan (2011:2352) argues that "restorative practices" can go a long way towards addressing the negative effects of bullying, which is why the adoption of specifically drafted school policies is proposed as a fourth solution. The proper communication of such policies and ready access to easy-to-understand content are imperative, as is the training of staff and learners in adopting a 'zero tolerance' approach. Only after policy has been adopted, could internal disciplinary action be taken against learners and educators in the absence of specific legislation, provided that the acts do not amount to criminal actions. In this regard, the United Kingdom has developed school anti-bullying resources - such as primary and secondary anti-bullying resource packs, including anti-bullying DVDs, booklets, specially designed 'feeling cards', posters, tip sheets and anti-bullying contact sheets (Action-work, 2012) - which could be customised for the local context to help curb cyberbullying. Local high schools have also started to address cyberbullying on their websites, which is encouraged as a preven-tative tool (Fairmont High School, 2015).

In the fifth instance, it is suggested that the Childline Prevention and Training Education Manual (Childline South Africa, 2006) also be expanded to include cyberbullying, as a tool to educate parents, caregivers and children. As some authors have noted (Hinduja & Patchin, 2008:151), research has shown that some individuals are more susceptible to online bullying, and policies should raise awareness among those groups of their particular vulnerability to cyberbullying. Available custom made packs or toolkits as referred to are readily available on the internet, and different toolkits for different ages are proposed (http://stopcyberbullying.org).

Finally, ex post facto harassment cases could be prosecuted via the new Protection from Harassment Act (Republic of South Africa, 2011), and civil and criminal action could always be instituted, where the seriousness of the offence might warrant it.

 

Conclusion

Young people, especially learners, inflict harm on one another in cyberspace, which could lead to the suffering of significant "personal damage" by learners (Willard, 2011:125) as well as have far-reaching implications for "school climate" and culture, "day-to-day school operations", as well as the skills with which teachers and school leaders should be equipped in future. It is thus imperative for school leaders, along with "parents, learners, teachers" and the rest of the education sphere, to address this peril and proactively manage this phenomenon. As far back as 2005 (Li, 2005:1778), it was mentioned that educators, researchers, administrators and authorities should take action against cyberbullying in schools. Where proactive measures fail, ex post facto remedies should be employed. It seems that the development of policies prohibiting cyberbullying, along with their proper communication, is of the utmost importance to give effect to the constitutional imperative to guarantee our children an education in a safe environment.

Allowing learners to express themselves through online communication undoubtedly has its merits, but where the content "crosses the line" between harmless and hurtful (Lane, 2011:1811), schools should be equipped to protect victims against emotional harm and educational disruption, to protect the constitutional rights of our learners, and to ensure a safe school environment. Ultimately, the onus of responsibility is not solely placed on the shoulders of parents and guardians. Attenuating the problem of cyber-bullying will necessarily involve contributions from multiple stakeholders, including "counsellors, school teachers, administrators and law enforcement" (Hinduja & Patchin, 2008:151).

Therefore, it is imperative for South African authorities and schools to pay heed to the lessons learnt from the United States in their formulation of state law to address ex post facto cyberbullying, the adoption of policies as a preventative measure, and the drafting of action documents to facilitate internal disciplinary action.

 

Notes

i. Verbatim quotation was edited for the publication.

ii. Bethel School District No. 403 v. Fraser, 478 U.S. 675, 106 S.Ct. 3159, 92 L.Ed.2d 549 (1986).

iii. Tinker v. Desmoines Independent Community School District, 393 U.S. 503, 506 (1969).

iv. Hazelwood Sch. Dist. V Kuhlmeier, 484 U.S. 260, 270 (1988); Bethel School District No. 403 v. Fraser, 478 U.S. 675, 106 S.Ct. 3159, 92 L.Ed.2d 549 (1986)

 

References

Actionwork 2012. Anti-Bullying Resources. Available at http://actionwork.com/bullyingresources.html. Accessed 23 February 2012.         [ Links ]

Adams FD & Lawrence GJ 2011. Bullying victims: The effects last into college. American Secondary Education, 40(1):4-13.         [ Links ]

Anti-Defamation League (ADL) 2009. Bullying/Cyberbullying Prevention Law: Model Statute and Advocacy Toolkit. Available at http://www.adl.org/civil_rights/Anti-Bullying%20Law%20Toolkit_2009.pdf. Accessed 7 March 2012.         [ Links ]

Badenhorst C 2011. Legal responses to cyberbullying and sexting in South Africa. Centre for Justice and Crime Prevention (CJCP) Issue Paper, August (10):1-20. Available at http://cjcp.skinthecat.co.za/articlesPDF/32/Issue%20Paper%2010-1.pdf. Accessed 13 March 2015.         [ Links ]

Bauman S 2010. Cyberbullying in a rural intermediate school: An exploratory study. Journal of Early Adolescence, 30(6):803-833.         [ Links ]

Bauman S 2013. Cyberbullying: What does research tell us? Theory Into Practice, 52(4):249-256.         [ Links ]

Bauman S & Yoon J 2014. This Issue: Theories of Bullying and Cyberbullying. Theory into Practice, 53(4):253-256. doi:10.1080/00405 841.2014.947215        [ Links ]

Belnap A 2011. Tinker at a breaking point: Why the specter of cyberbullying cannot excuse impermis sible public school regulation of off-campus student speech. Brigham Young University Law Review, 2:501-533.         [ Links ]

Berkshire District Attorney's Office 2015. Bullying and Cyberbullying. Available at http://www.mass.gov/berkshireda/crime-awareness-and-prevention/bullying-and-cyberbullying/bullying.html. Accessed 6 April 2015.         [ Links ]

Blueprints for Healthy Youth Development 2015. Olweus Bullying Prevention Program. Available at http://www.blueprintsprograms.com/factSheet.php?pid=17ba0791499db908433b80f37c5fbc89b870084b. Accessed 30 April 2015.         [ Links ]

Burnham JJ, Wright VH, House RA 2011. Cyberbullying: Emergent Concerns for Adolescents and Challenges for School Counselors. Journal of School Counseling, 9(15)..ERIC Number: EJ933181.         [ Links ]

Burton P & Mutongwizo T 2009. Inescapable violence: Cyberbullying and electronic violence against young people in South Africa. Centre for Justice and Crime Prevention (CJCP) Issue Paper, 8:1-12. Available at http://cyberbullying.ezipezi.com/downloads/IssuePaper8-InescapableViolence-CyberAggression.pdf. Accessed 14 March 2015.         [ Links ]

Buys R & Cronjé F 2004. Cyberlaw @ SA II: The Law of the Internet in South Africa. Pretoria: Van Schaik Publishers.         [ Links ]

Childline South Africa 2006. Prevention & TrainingEducation Manual. Available at http://www.childlinesa.org.za/content/view/20/32/. Accessed 1 March 2012.         [ Links ]

Conn K 2010. Cyberbullying and other student technology misuses in K-12 American schools: the legal landmines. Widener Law Review, 16(1):89-100.         [ Links ]

Couvillon MA & Ilieva V 2011. Recommended practices: A review of schoolwide preventative programs and strategies on cyberbullying. Preventing School Failure: Alternative Education for Children and Youth, 55(2):96-101. doi: 10.1080/1045988X.2011.539461        [ Links ]

Davids N 2011. Children preyed on online. Times LIVE, 12 May. Available at http://www.timeslive.co.za/scitech/2011/05/12/children-preyed-on-online. Accessed 14 March 2015.         [ Links ]

Department of Basic Education 2012. The policy on the organisation roles and responsibilities of education districts: Call for comments. Notice 180 of 2012. Government Gazette, 35107, 5 March. Available at http://pmg-assets.s3-website-eu-west-1.amazonaws.com/doc/2012/120509education-organisationroles.pdf. Accessed 14 March 2015.         [ Links ]

Department of Education, Republic of South Africa 2008. A bill of responsibilities for the youth of South Africa. Available at http://www.greenworks.co.za/Bill_of_Responsabilities.pdf. Accessed 14 March 2012.         [ Links ]

De Wet A 2013. 'Father to sue education department over rape' - civil remedies for sexual violence and harassment in public schools. Child Abuse Research in South Africa, 14(1):22-35.         [ Links ]

De Wet C 2011. The professional lives of teacher victims of workplace bullying: A narrative analysis. Perspectives in Education, 29(4):66-77.         [ Links ]

Duncan S 2011. Workplace bullying and the role restorative practices can play in preventing and addressing the problem. Industrial Law Journal, 32:23312366.         [ Links ]

European Commission 2009. Safer internet programme 2005-2008 (safer internet plus). Available at. http://europa.eu/legislation_summaries/informationsociety/internet/l24190b_en.htm. Accessed 19 February 2012.         [ Links ]

Fairmont High School 2015. Use of Cellphones, Electronic Devices and Social Media Policy. Available at http://www.fairmont.co.za/info/school-policies/754/2014-policy-on-the-use-of-cellphones-electronic-devices-social-media.html. Accessed 11 April 2015.         [ Links ]

Faulkner K 2012. Bullied on Facebook for ginger hair. ioL, 22 February. Available at http://www.iol.co.za/scitech/technology/internet/bullied-on-facebook-for-ginger-hair-1.1240379. Accessed 7 March 2012.         [ Links ]

Feinberg T & Robey N 2008. Cyberbullying. Principal Leadership, 9(1):10-14.         [ Links ]

Fox BH, Farrington DP & Ttofi MM 2012. Successful Bullying Prevention Programs: Influence of Research Design, Implementation Features, and Program Components. International Journal of Conflict and Violence, 6(2):273-283.         [ Links ]

Goodno NH 2011. How public schools can constitution ally halt cyberbullying: A model cyberbullying policy that considers first amendment, due process, and fourth amendment challenges. The Wake Forest Law Review, 46:641-700. Available at http://wakeforestlawreview.com/wp-con-tent/uploads/2014/10/Goodno_LawReview_11.11.pdf. Accessed 17 March 2015.         [ Links ]

Hinduja S & Patchin JW 2008. Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2):129- 156. doi: 10.1080/01639620701457816        [ Links ]

Hinduja S & Patchin JW 2010. Bullying, cyberbullying and suicide. Archives of Suicide Research, 14(3):206-221. doi: 10.1080/13811118.2010.494133        [ Links ]

Hinduja S & Patchin JW 2011. Cyberbullying: A review of the legal issues facing educators. Preventing School Failure: Alternative Education for Children and Youth, 55(2):71-78. doi: 10.1080/1045988X.2011.539433        [ Links ]

Hinduja S & Patchin JW 2014. Cyberbullying: Identification, prevention, & response. Cyberbullying Research Center. Available at http://cyberbullying.us/Cyberbullying_Identification_Prevention_Response.pdf. Accessed 13 April 2015.         [ Links ]

Hoel H 2013. Workplace Bullying in United Kingdom. JILT International Labour Forum on Workplace Bullying and Harassment. Available at http://www.jil.go.jp/event/ro_forum/20130228/resume/uk.pdf. Accessed 18 March 2015.         [ Links ]

Hughes M & Louw J 2013. Playing games: The salience of social cues and group norms in eliciting aggressive behaviour. South African Journal of Psychology, 43(2):252-262. doi: 10.1177/0081246313482629        [ Links ]

Kite SL, Gable R & Filippelli L 2010. Assessing middle school students' knowledge of conduct and consequences and their behaviors regarding the use of social networking sites. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, 83(5):158-163. doi: 10.1080/00098650903505365        [ Links ]

Kowalski RM, Giumetti GW, Schroeder AN & Lattanner MR 2014. Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4):1073- 1137. http://psycnet.apa.org/doi/10.1037/a0035618        [ Links ]

Lane DK 2011. Taking the lead on cyberbullying: Why schools can and should protect students online. Iowa Law Review, 96(5):1791-1811.         [ Links ]

Law DM, Shapka JD, Domene JF & Gagne MH 2012. Are cyberbullies really bullies? An investigation of reactive and proactive online aggression. Computers in Human Behavior, 28(2):664-672. http://dx.doi.org/10.1016/j.chb.2011.11.013        [ Links ]

Lenhart A, Ling R, Campbell S & Purcell K 2010. Teens and mobile phones. Available at http://pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx. Accessed 12 February 2012.         [ Links ]

Le Roux R, Rycroft A & Orleyn T 2010. Harassment in the workplace: Law, policies and processes. Durban: LexisNexis.         [ Links ]

Li Q 2005. New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23(4):1777-1791. http://dx.doi.org/10.1016/j.chb.2005.10.005        [ Links ]

Magliano SJ 2013. Student perceptions regarding the effects of cyberbullying in a middle school. Ed.D. dissertation. Chester, PA: Widener University.         [ Links ]

McAndrews T 2001. Zero tolerance policies. ERIC Clearinghouse on Educational Management, 146:1-7. ED451579. Available at http://files.eric.ed.gov/fulltext/ED451579.pdf. Accessed 20 March 2015.         [ Links ]

Mienie CA 2013. Managing cyberbullying in schools: lessons learnt from American and Australian law. Southern African Public Law, 28(1):146-161.         [ Links ]

Mitzner KD 2011. Perceptions of cyberbullying from secondary school administrators in Texas. PhD dissertation. Texas, USA: Texas A&M University. Available at http://hdl.handle.net/1969-1/ETD-TAMU-2011-12-10317. Accessed 18 August 2014.         [ Links ]

National Conference of State Legislatures (NCSL) 2015. State cyberstalking and cyberharassment laws. Available at http://www.ncsl.org/research/telecommunications-and-information-technology/cyberstalking-and-cyberharassment-laws.aspx?utm_campaign=Listly&utm_medium=li st&utm_source=listly. Accessed 11 April 2015.         [ Links ]

Olsen S 2008. A rallying cry against cyberbullying. CNET, 7 June. Available at http://news.cnet.com/8301-10784_3-9962375-7.html. Accessed 22 February 2012.         [ Links ]

Republic of South Africa 1977. Criminal Procedure Act (Act no. 51 of 1977). Government Gazette, 5654 (Notice No. 748). Pretoria: Government Printer.         [ Links ]

Republic of South Africa 1992. Interception and Monitoring Prohibition Act No. 127 of1992. Pretoria: Government Printer.         [ Links ]

Republic of South Africa 1996a. Constitution of the Republic of South Africa (Act No. 108 of 1996). Pretoria: Government Printer.         [ Links ]

Republic of South Africa 1996b. Films and Publications Act No. 65 of1996. Pretoria: Government Printer.         [ Links ]

Republic of South Africa 1996c. South African Schools Act, 1996 (Act No 84 of 1996). Pretoria: Government Printer.         [ Links ]

Republic of South Africa 2000a. Promotion of Access to Information Act 2, 2000 (Act No. 2 of 2000). Pretoria: Government Printer.         [ Links ]

Republic of South Africa 2000b. Promotion of Equality and Prevention of Unfair Discrimination Act 4 of 2000. Pretoria: Government Printer.         [ Links ]

Republic of South Africa 2002. Electronic Communications and Transactions Act, 2002 (Act No. 25 of 2002). Pretoria: Government Printer.         [ Links ]

Republic of South Africa 2003. No 70 of 2002: Regulation of Interception of Communications and Provision of Communication-related information Act, 2002. Government Gazette, Vol. 451(No. 24286), 22 January. Pretoria: Government Printers. Available at http://www.saflii.org/za/legis/num_act/roiocapocia2002943.pdf. Accessed 22 March 2015.         [ Links ]

Republic of South Africa 2011. No. 17 of 2011: Protection from Harassment Act, 2010. Government Gazette, Vol. 558 (No. 34818), 5 December. Pretoria: Government Printer. Available at http://www.justice.gov.za/legislation/acts/2011-017.pdf. Accessed 24 March 2015.         [ Links ]

Rooi Rose 2011. As Juffrou geboelie, November.         [ Links ]

Safe2Tell n.d. Who we are. Available at http://safe2tell.org/who-we-are/. Accessed 30 April 2015        [ Links ]

Sbarbaro V & Smith TME 2011. An exploratory study of bullying and cyberbullying behaviors among economically/educationally disadvantaged middle school students. American Journal of Health Studies, 26(3):139-151.         [ Links ]

Schneider SK, O'Donnell L, Stueve A & Coulter RW 2012. Cyberbullying, school bullying, and psychological distress: a regional census of high school students. American Journal of Public Health, 102(1):171-177.         [ Links ]

Slovak K & Singer JB 2011. School social workers' perceptions of cyberbullying. Children and Schools, 33(1):5-16. doi: 10.1093/cs/33.1.5        [ Links ]

Smith P, Mahdavi J, Carvalho M & Tippet N 2006. An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. A report to the anti-bullying alliance. London: Unit for School and Family Studies, Goldsmiths College, University of London. Available at http://webarchive.nationalarchives.gov.uk/20130401151715/ http://www.education.gov.uk/publications/eOrderingDownload/RBX03-06.pdf. Accessed 24 March 2015.         [ Links ]

Stewart DM & Fritsch EJ 2011. School and law enforcement efforts to combat cyberbullying. Preventing School Failure: Alternative Education for Children and Youth, 55(2):79-87. doi: 10.1080/1045988X.2011.539440        [ Links ]

Unisa, Bureau of Market Research 2011. Age-inappropriate viewing and online victimisation among South African youth. Available at http://www.unisa.ac.za/contents/faculties/ems/docs/FINAL_2011_05406.pdf. Accessed 17 July 2013.         [ Links ]

Van der Merwe D, Roos A, Pistorius T & Eiselen S 2008. Information and Communications Technology Law. Durban: LexisNexis.         [ Links ]

Varjas K, Henrich CC & Meyers J 2009. Urban middle school students' perceptions of bullying, cyberbul-lying, and school safety. Journal of School Violence, 8(2):159-176. doi: 10.1080/15388220802074165        [ Links ]

Welker HS 2010. Principal perspectives on social networking and the disruptive effects of cyberbully-ing. PhD dissertation. Minneapolis, MN: Walden University. Available at http://www.waldenu.edu/--/media/Files/WAL/about/dr-heidi-stevenson-welker-dissertation-approved.pdf. Accessed 29 March 2015.         [ Links ]

Willard N 2011. School response to cyberbullying and sexting: The legal challenges. Brigham Young University Education and Law Journal, 1:75-125.         [ Links ]

Creative Commons License Todo o conteúdo deste periódico, exceto onde está identificado, está licenciado sob uma Licença Creative Commons