Bullying: Understand the Community’s Roles

When bullying or other problematic online or offline behaviors occur in a community, everyone in the community is involved, whether as participants, recipients, or witnesses—and often as some combination of the three. Developing a shared understanding of what bullying is and of the roles we commonly play in these situations can help all community members recognize them and, ultimately, choose roles that lead to the most positive possible outcomes.

Bullying: In any bullying situation, a person or group purposely hurts, threatens, or intimidates another person or group. Online and offline bullying can overlap and may include the following:

Physical bullying, such as poking, pushing, hitting, and kicking; may include visual or audio recording and posting of such actions.

Verbal bullying, such as yelling, teasing, name-calling, insulting, and threatening to harm, whether in person, over the phone, over text, or via the Internet.

Indirect bullying, such as ignoring, excluding, spreading rumors, telling lies, and getting others to hurt someone.

Note: Almost any kind of bullying can be considered cyberbullying if it involves electronic media, as when someone sends or post hurtful, embarrassing, or threatening text or images electronically. The particular challenges of cyberbullying include the following:

  • Endless replicability: The cyberbully has a much wider audience. Through web sites and the forwarding of email messages, the damage can be more far-reaching than most students realize.
  • Constant access: The target of cyberbullying often feels less able to escape the tormentor. The target may also—understandably—feel even more powerless, as they may not even know who the bully is.
  • Anonymity: The cyberbully can remain anonymous or impersonate others, thereby escaping identification.
  • Distance between the bully and consequences: The cyberbully may be much less aware of the consequences of his or her actions.

Bully: A person or group that uses physical, social, intellectual, or psychological power to hurt, threaten, or intimidate another person or group of people.

Victim: The person or group that is the recipient of the bully’s behavior.


Bystander: The person or group that observes or hears about bully’s behavior. There are two subgroups of bystanders:

  1. Active Bystanders support the bully with words, gestures, and actions.
  2. Passive Bystanders support the bully by doing nothing to interrupt the bullying.


Upstander: A person who decides to act to interrupt bullying. Upstanders may directly address the bully or go to tell someone else (such as a teacher). In many ways, this is another word for being socially responsible. For resources on how to support students in being upstanders, see http://www.schoolclimate.org/bullybust/.


Online Shopping & Banking
10 Tips to Safer Shopping
Avoiding Internet Crooks
Bank Online Safely
Benefits of E-books
Identity Theft Rights
Identity Theft Tax Scams
Online Auction Sites
Online Classifieds - Buying
Online Classifieds - Selling
Secure Social Engineering
Digital Family Life
Addictions and ADHD
Betrayal Online
Child Online Privacy
Children & Anorexia
Children & Inappropriate YouTube Videos
Children and Internet Advertising
Children's Photos Online
Cyberbullying Tips
Dating Online Safely
Digital Dating
Digital Literacy
Family Time
Healthy Digital Family Life
High Risk Behaviors
Impact On Children
Internet Gambling
Internet Pornography
Kids & Online Gaming
Kids Posting on YouTube
Kids’ Mobile Apps
Make Money Websites
Online Gaming & Children
Online Quizzes & Surveys
Oversharing Information Online
Protecting from Predators
Read the Fine Print
Respect Online
Risky Behavior
Safe Online Photo Sharing
Safety & Social Networks
Social Networking and Friction
Teaching Privacy
Teen Asking for Validation?
Too Much Time Online
Video Games
PC Security
Argument with a troll
Block Pornography
Bots, Botnets And Zombies
Coupon Safety
Safe Linking & Attachments
Safe URLs
Search & Collected Info
Search vs Research
Secure Websites
What is Antivirus?
What is Phishing?
Getting Started
Beginners Tips
Email Hacking
Identify Theft
Malicious Software
Organize Net News
Sending Email
Strong Passwords
Technology Overload
Cyberbullying & Online Predators
Cyberbullying Help
Cyberincident Response
Family Blogging
Harassed Online
Online Predators
Online Safety
Recognize a Cyberbully
Report Cyberbullying to Police
Report Cyberbullying to Schools
Safety: Pornography
Mobile Security
Cell Phone & Driving
Cell Phone Theft
Mobile Law Enforcement
Mobile Protection
Mobile Sexting
Parents & Cell Phones
Tweets Archived
Ethics & Legal
Cheating & Technology
Cite Sources and Avoid Plagiarism
Download Music & Videos
Facebook Passwords
Internet Addiction
Internet Content Copyrights
Kids & Impersonation
Online Impersonation
Societal Digital Piracy Costs
Managing your Online Reputation
Online Reputation
Protect Your Online Content
Protecting Privacy on Google
Teens & Reputation