Skip to main content

2018 | OriginalPaper | Buchkapitel

9. “The Continuum of Harm” Taxonomy of Cyberbullying Mitigation and Prevention

verfasst von : Zahra Ashktorab

Erschienen in: Online Harassment

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, I use the findings from a series of studies that explore cyberbullying to present cyberbullying mitigation solutions for designers of social media and other interactive platforms to consider as they address the bullying, harassment, and other negative content that plagues the Internet. The solutions presented throughout these studies are diverse and consider mitigation at various points of the “Continuum of Harm” of cyberbullying. I consider cyberbullying mitigation solutions through the “Continuum of Harm” framework, which consists of three types of prevention mechanisms: (1) Primary Prevention, in which the cyberbullying incident is prevented before it starts; (2) Secondary Prevention, where the goal is to decrease the problem after it has been identified, and (3) Tertiary Prevention, when intervention occurs after a problem has already caused harm. This chapter discusses the design of technological mechanisms to mitigate cyberbullying through Primary, Secondary, and Tertiary prevention.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
This study was a collaborative project done with Jennifer Golbeck, Eben Haber and Jessica Vitak. It was presented at the 2017 ACM Web Science Conference.
 
2
This study was collaborative project done with Jessica Vitak and was presented at the 2016 ACM CHI Conference on Human Factors in Computing Systems.
 
3
Study conducted in collaboration with Jessica Vitak, Kalyani Chada and Linda Steiner.
 
Literatur
Zurück zum Zitat Achenbach TM, McConaughy SH, Howell CT (1987) Child/adolescent behavioral and emotional problems: implications of cross-informant correlations for situational specificity. Psychol Bull 101(2):213CrossRef Achenbach TM, McConaughy SH, Howell CT (1987) Child/adolescent behavioral and emotional problems: implications of cross-informant correlations for situational specificity. Psychol Bull 101(2):213CrossRef
Zurück zum Zitat Amir O, Lobel O (2008) Stumble, predict, nudge: how behavioral economics informs law and policy. Columbia Law Rev 2098–2137 Amir O, Lobel O (2008) Stumble, predict, nudge: how behavioral economics informs law and policy. Columbia Law Rev 2098–2137
Zurück zum Zitat Ashktorab Z, Haber E, Golbeck J, Vitak J (2017) Beyond cyberbullying: self-disclosure, harm and social support on ASKfm. In: Proceedings of the 2017 ACM on web science conference. ACM, pp 3–12 Ashktorab Z, Haber E, Golbeck J, Vitak J (2017) Beyond cyberbullying: self-disclosure, harm and social support on ASKfm. In: Proceedings of the 2017 ACM on web science conference. ACM, pp 3–12
Zurück zum Zitat Ashktorab Z, Kumar S, De S, Golbeck J (2014) iAnon: Leveraging social network big data to mitigate behavioral symptoms of cyberbullying Ashktorab Z, Kumar S, De S, Golbeck J (2014) iAnon: Leveraging social network big data to mitigate behavioral symptoms of cyberbullying
Zurück zum Zitat Ashktorab Z, Vitak J (2016) Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In: Proceedings of the 2016 CHI conference on human factors in computing systems. ACM, pp 3895–3905 Ashktorab Z, Vitak J (2016) Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In: Proceedings of the 2016 CHI conference on human factors in computing systems. ACM, pp 3895–3905
Zurück zum Zitat Barnes SB (2006) A privacy paradox: social networking in the united states. First Monday 11(9) Barnes SB (2006) A privacy paradox: social networking in the united states. First Monday 11(9)
Zurück zum Zitat Bastian M, Hayes M, Vaughan W, Shah S, Skomoroch P, Kim H, Uryasev S, Lloyd C (2014) Linkedin skills: large-scale topic extraction and inference. In: Proceedings of the 8th ACM conference on recommender systems. ACM, pp 1–8 Bastian M, Hayes M, Vaughan W, Shah S, Skomoroch P, Kim H, Uryasev S, Lloyd C (2014) Linkedin skills: large-scale topic extraction and inference. In: Proceedings of the 8th ACM conference on recommender systems. ACM, pp 1–8
Zurück zum Zitat Beale AV, Hall KR (2007) Cyberbullying: what school administrators (and parents) can do. Clear House: J Educ Strateg Issues Ideas 81(1):8–12CrossRef Beale AV, Hall KR (2007) Cyberbullying: what school administrators (and parents) can do. Clear House: J Educ Strateg Issues Ideas 81(1):8–12CrossRef
Zurück zum Zitat Bezdek JC, Keller J, Krisnapuram R, Pal N (2006) Fuzzy models and algorithms for pattern recognition and image processing, vol 4. Springer Science & Business Media Bezdek JC, Keller J, Krisnapuram R, Pal N (2006) Fuzzy models and algorithms for pattern recognition and image processing, vol 4. Springer Science & Business Media
Zurück zum Zitat Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15(5):662–679CrossRef Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15(5):662–679CrossRef
Zurück zum Zitat Campo JV, Bridge J, Ehmann M, Altman S, Lucas A, Birmaher B, Di Lorenzo C, Iyengar S, Brent DA (2004) Recurrent abdominal pain, anxiety, and depression in primary care. Pediatrics 113(4):817–824CrossRef Campo JV, Bridge J, Ehmann M, Altman S, Lucas A, Birmaher B, Di Lorenzo C, Iyengar S, Brent DA (2004) Recurrent abdominal pain, anxiety, and depression in primary care. Pediatrics 113(4):817–824CrossRef
Zurück zum Zitat Charteris J, Gregory S, Masters Y (2014) Snapchat selfies: the case of disappearing data. In: Hegarty B, McDonald J, Loke SK (eds) Rhetoric and reality: critical perspectives on educational technology, pp 389–393 Charteris J, Gregory S, Masters Y (2014) Snapchat selfies: the case of disappearing data. In: Hegarty B, McDonald J, Loke SK (eds) Rhetoric and reality: critical perspectives on educational technology, pp 389–393
Zurück zum Zitat Citron DK, Franks MA (2014) Criminalizing revenge porn Citron DK, Franks MA (2014) Criminalizing revenge porn
Zurück zum Zitat Cowie H (2013) Cyberbullying and its impact on young people’s emotional health and well-being. The Psychiatrist 37(5):167–170CrossRef Cowie H (2013) Cyberbullying and its impact on young people’s emotional health and well-being. The Psychiatrist 37(5):167–170CrossRef
Zurück zum Zitat Derényi I, Palla G, Vicsek T (2005) Clique percolation in random networks. Phys Rev Lett 94(16):160202CrossRef Derényi I, Palla G, Vicsek T (2005) Clique percolation in random networks. Phys Rev Lett 94(16):160202CrossRef
Zurück zum Zitat Dinakar K, Jones B, Havasi C, Lieberman H, Picard R (2012) Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans Interact Intell Syst (TiiS) 2(3):18 Dinakar K, Jones B, Havasi C, Lieberman H, Picard R (2012) Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans Interact Intell Syst (TiiS) 2(3):18
Zurück zum Zitat Dinakar K, Reichart R, Lieberman H (2011) Modeling the detection of textual cyberbullying. In: The social mobile web Dinakar K, Reichart R, Lieberman H (2011) Modeling the detection of textual cyberbullying. In: The social mobile web
Zurück zum Zitat Du N, Wu B, Pei X, Wang B, Xu L (2007) Community detection in large-scale social networks. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on web mining and social network analysis. ACM, pp 16–25 Du N, Wu B, Pei X, Wang B, Xu L (2007) Community detection in large-scale social networks. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on web mining and social network analysis. ACM, pp 16–25
Zurück zum Zitat Fiesler C, Young A, Peyton T, Bruckman AS, Gray M, Hancock J, Lutters W (2015) Ethics for studying sociotechnical systems in a big data world. In: CSCW. ACM Fiesler C, Young A, Peyton T, Bruckman AS, Gray M, Hancock J, Lutters W (2015) Ethics for studying sociotechnical systems in a big data world. In: CSCW. ACM
Zurück zum Zitat Gigerenzer G, Todd PM, t. ABC Research Group et al (1999) Simple heuristics that make us smart. Oxford University Press Gigerenzer G, Todd PM, t. ABC Research Group et al (1999) Simple heuristics that make us smart. Oxford University Press
Zurück zum Zitat Gilovich T, Griffin D, Kahneman D (2002) Heuristics and biases: the psychology of intuitive judgment. Cambridge University Press Gilovich T, Griffin D, Kahneman D (2002) Heuristics and biases: the psychology of intuitive judgment. Cambridge University Press
Zurück zum Zitat Grüne-Yanoff T, Hertwig R (2016) Nudge versus boost: how coherent are policy and theory? Minds Mach 26(1–2):149–183CrossRef Grüne-Yanoff T, Hertwig R (2016) Nudge versus boost: how coherent are policy and theory? Minds Mach 26(1–2):149–183CrossRef
Zurück zum Zitat Hausman DM, Welch B (2010) Debate: to nudge or not to nudge. J Polit Philos 18(1):123–136CrossRef Hausman DM, Welch B (2010) Debate: to nudge or not to nudge. J Polit Philos 18(1):123–136CrossRef
Zurück zum Zitat Hinduja S, Patchin JW (2010) Bullying, cyberbullying, and suicide. Arch Suicide Res 14(3):206–221CrossRef Hinduja S, Patchin JW (2010) Bullying, cyberbullying, and suicide. Arch Suicide Res 14(3):206–221CrossRef
Zurück zum Zitat Hinduja S, Patchin JW (2014) Bullying beyond the schoolyard: preventing and responding to cyberbullying. Corwin Press Hinduja S, Patchin JW (2014) Bullying beyond the schoolyard: preventing and responding to cyberbullying. Corwin Press
Zurück zum Zitat Kietzmann JH, Hermkens K, McCarthy IP, Silvestre BS (2011) Social media? get serious! understanding the functional building blocks of social media. Bus Horiz 54(3):241–251CrossRef Kietzmann JH, Hermkens K, McCarthy IP, Silvestre BS (2011) Social media? get serious! understanding the functional building blocks of social media. Bus Horiz 54(3):241–251CrossRef
Zurück zum Zitat Kim YS, Leventhal B (2008) Bullying and suicide. A review. Int J Adolesc Med Health 20(2):133–154CrossRef Kim YS, Leventhal B (2008) Bullying and suicide. A review. Int J Adolesc Med Health 20(2):133–154CrossRef
Zurück zum Zitat Kim YS, Leventhal BL, Koh Y-J, Boyce WT (2009) Bullying increased suicide risk: prospective study of Korean adolescents. Arch Suicide Res 13(1):15–30CrossRef Kim YS, Leventhal BL, Koh Y-J, Boyce WT (2009) Bullying increased suicide risk: prospective study of Korean adolescents. Arch Suicide Res 13(1):15–30CrossRef
Zurück zum Zitat King H (2016) Facebook’s ‘secret conversations’ mode deletes messages for extra security King H (2016) Facebook’s ‘secret conversations’ mode deletes messages for extra security
Zurück zum Zitat Kosters M, Van der Heijden J (2015) From mechanism to virtue: evaluating nudge theory. Evaluation 21(3):276–291CrossRef Kosters M, Van der Heijden J (2015) From mechanism to virtue: evaluating nudge theory. Evaluation 21(3):276–291CrossRef
Zurück zum Zitat Kwan GCE, Skoric MM (2013) Facebook bullying: an extension of battles in school. Comput Hum Behav 29(1):16–25CrossRef Kwan GCE, Skoric MM (2013) Facebook bullying: an extension of battles in school. Comput Hum Behav 29(1):16–25CrossRef
Zurück zum Zitat Leggett W (2014) The politics of behaviour change: nudge, neoliberalism and the state. Policy Polit 42(1):3–19MathSciNetCrossRef Leggett W (2014) The politics of behaviour change: nudge, neoliberalism and the state. Policy Polit 42(1):3–19MathSciNetCrossRef
Zurück zum Zitat Lenhart A (2007) Cyberbullying. Pew Internet & American Life Project Lenhart A (2007) Cyberbullying. Pew Internet & American Life Project
Zurück zum Zitat McCormick R (2016) Instagram’s anti-abuse comment filter is rolling out now McCormick R (2016) Instagram’s anti-abuse comment filter is rolling out now
Zurück zum Zitat McLaughlin JH (2010) Crime and punishment: teen sexting in context. Penn St L Rev 115:135 McLaughlin JH (2010) Crime and punishment: teen sexting in context. Penn St L Rev 115:135
Zurück zum Zitat Menesini E, Nocentini A, Palladino BE, Frisén A, Berne S, Ortega-Ruiz R, Calmaestra J, Scheithauer H, Schultze-Krumbholz A, Luik P et al (2012) Cyberbullying definition among adolescents: a comparison across six European countries. Cyberpsychol Behav Soc Netw 15(9):455–463CrossRef Menesini E, Nocentini A, Palladino BE, Frisén A, Berne S, Ortega-Ruiz R, Calmaestra J, Scheithauer H, Schultze-Krumbholz A, Luik P et al (2012) Cyberbullying definition among adolescents: a comparison across six European countries. Cyberpsychol Behav Soc Netw 15(9):455–463CrossRef
Zurück zum Zitat Mesch GS (2009) Parental mediation, online activities, and cyberbullying. CyberPsychol Behav 12(4):387–393CrossRef Mesch GS (2009) Parental mediation, online activities, and cyberbullying. CyberPsychol Behav 12(4):387–393CrossRef
Zurück zum Zitat Milvy E (2015) Eavesdropping on the seventh grade instagram show Milvy E (2015) Eavesdropping on the seventh grade instagram show
Zurück zum Zitat Nasehi SM, Sillito J, Maurer F, Burns C (2012) What makes a good code example? a study of programming q&a in stackoverflow. In: 2012 28th IEEE International Conference on Software Maintenance (ICSM). IEEE, pp 25–34 Nasehi SM, Sillito J, Maurer F, Burns C (2012) What makes a good code example? a study of programming q&a in stackoverflow. In: 2012 28th IEEE International Conference on Software Maintenance (ICSM). IEEE, pp 25–34
Zurück zum Zitat Newton C (2017) Twitter begins filtering abusive tweets out of your replies Newton C (2017) Twitter begins filtering abusive tweets out of your replies
Zurück zum Zitat Nissenbaum H (2004) Privacy as contextual integrity. Wash L Rev 79:119 Nissenbaum H (2004) Privacy as contextual integrity. Wash L Rev 79:119
Zurück zum Zitat Nott J et al (2014) Video gaming on the feminist frontlines Nott J et al (2014) Video gaming on the feminist frontlines
Zurück zum Zitat Palla G, Barabási A-L, Vicsek T (2007) Quantifying social group evolution. Nature 446(7136):664–667CrossRef Palla G, Barabási A-L, Vicsek T (2007) Quantifying social group evolution. Nature 446(7136):664–667CrossRef
Zurück zum Zitat Rowley HA, Baluja S, Kanade T (1998) Neural network-based face detection. IEEE Trans Pattern Anal Mach Intell 20(1):23–38CrossRef Rowley HA, Baluja S, Kanade T (1998) Neural network-based face detection. IEEE Trans Pattern Anal Mach Intell 20(1):23–38CrossRef
Zurück zum Zitat Santella A, Agrawala M, DeCarlo D, Salesin D, Cohen M (2006) Gaze-based interaction for semi-automatic photo cropping. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 771–780 Santella A, Agrawala M, DeCarlo D, Salesin D, Cohen M (2006) Gaze-based interaction for semi-automatic photo cropping. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 771–780
Zurück zum Zitat Sas C, Whittaker S (2013) Design for forgetting: disposing of digital possessions after a breakup. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 1823–1832 Sas C, Whittaker S (2013) Design for forgetting: disposing of digital possessions after a breakup. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 1823–1832
Zurück zum Zitat Schön DA (1983) The reflective practitioner: how professionals think in action, vol 5126. Basic Books Schön DA (1983) The reflective practitioner: how professionals think in action, vol 5126. Basic Books
Zurück zum Zitat Sourander A, Klomek AB, Ikonen M, Lindroos J, Luntamo T, Koskelainen M, Ristkari T, Helenius H (2010) Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. Arch Gen Psychiatry 67(7):720–728CrossRef Sourander A, Klomek AB, Ikonen M, Lindroos J, Luntamo T, Koskelainen M, Ristkari T, Helenius H (2010) Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. Arch Gen Psychiatry 67(7):720–728CrossRef
Zurück zum Zitat Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness
Zurück zum Zitat Thaler RH, Sunstein CR (2003) Libertarian paternalism. Am Econ Rev 93(2):175–179CrossRef Thaler RH, Sunstein CR (2003) Libertarian paternalism. Am Econ Rev 93(2):175–179CrossRef
Zurück zum Zitat Vitak J, Chadha K, Steiner L, Ashktorab Z (2017) Identifying women’s experiences with and strategies for mitigating negative effects of online harassment. In: Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. ACM, pp 1231–1245 Vitak J, Chadha K, Steiner L, Ashktorab Z (2017) Identifying women’s experiences with and strategies for mitigating negative effects of online harassment. In: Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. ACM, pp 1231–1245
Zurück zum Zitat Wilkinson TM (2013) Nudging and manipulation. Polit Stud 61(2):341–355CrossRef Wilkinson TM (2013) Nudging and manipulation. Polit Stud 61(2):341–355CrossRef
Zurück zum Zitat Willard N (2007) Educator’s guide to cyberbullying and cyberthreats. Center for safe and responsible use of the Internet Willard N (2007) Educator’s guide to cyberbullying and cyberthreats. Center for safe and responsible use of the Internet
Zurück zum Zitat Wolfe DA, Jaffe PG (1999) Emerging strategies in the prevention of domestic violence. In: The future of children, pp 133–144 Wolfe DA, Jaffe PG (1999) Emerging strategies in the prevention of domestic violence. In: The future of children, pp 133–144
Zurück zum Zitat Xu B, Chang P, Welker CL, Bazarova NN, Cosley D (2016) Automatic archiving versus default deletion: what snapchat tells us about ephemerality in design. In: Proceedings of the 19th ACM conference on computer-supported cooperative work and social computing. ACM, pp 1662–1675 Xu B, Chang P, Welker CL, Bazarova NN, Cosley D (2016) Automatic archiving versus default deletion: what snapchat tells us about ephemerality in design. In: Proceedings of the 19th ACM conference on computer-supported cooperative work and social computing. ACM, pp 1662–1675
Zurück zum Zitat Young D (2014) Now you see it, now you don’t... or do you?: Snapchat’s deceptive promotion of vanishing messages violates federal trade commission regulations, 30 j. marshall j. info. tech. & privacy l. 827 (2014). John Marshall J Inf Technol Priv Law 30(4):6 Young D (2014) Now you see it, now you don’t... or do you?: Snapchat’s deceptive promotion of vanishing messages violates federal trade commission regulations, 30 j. marshall j. info. tech. & privacy l. 827 (2014). John Marshall J Inf Technol Priv Law 30(4):6
Metadaten
Titel
“The Continuum of Harm” Taxonomy of Cyberbullying Mitigation and Prevention
verfasst von
Zahra Ashktorab
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-78583-7_9

Neuer Inhalt