The Response of Social Crime Prevention Police to Cyberbullying Perpetrated by Youth in Rural Areas of South Africa
Abstract
:1. Introduction
2. Literature Review
2.1. Cyberbullying
2.2. Cyberbullying Roles
2.3. Cyberbullies’ Sociometry
2.4. Social Network Analysis (SNA)
2.5. Effects Assessment
2.6. Technological Intervention
2.7. Theory of Planned Behaviour (TPB)
2.8. Social-Ecological System (SES) Theory
2.9. Developmental Systems Theory
2.10. Conceptual Framework
3. Materials and Methods
3.1. Sampling Technique
3.2. Data Collection
3.2.1. Focus Group Discussion
- Have you had a report about cyberbullying brought to you as police or teachers?
- If you were to verify a cyberbullying complaint, how would you be handling that?
- How are cyberbullying complains resolved among learners?
- Is there education or awareness of cyberbullying behaviour in schools or your school?
- Do you think that the learners trust the police or teachers to resolve their cyberbullying problems?
- How are emotional distressed learners helped?
- What can be done to encourage learners to come forward and report cyberbully behaviour?
3.2.2. The Use of the M-BRS with Learners
- A learner was identified as a victim if that learner nominated one or more peers as his/her bullies.
- A learner was identified as a bully if that learner nominated himself/herself or was nominated by one or more peers as a bully.
- A learner was identified as a bully-victim in a similar way as a bully but also nominated one or more peers as bullies or victims.
- An uninvolved learner was identified if that learner did not nominate himself/herself or was not nominated by peers.
3.3. Ethical Issues
3.4. Data Analysis
4. Results
4.1. Analysis of Qualitative Findings
4.1.1. Developmental Factors
4.1.2. Reporting Cyberbullying
4.1.3. Cyberbullying Role Identification
4.1.4. Awareness
4.1.5. Resolving Incidents
4.1.6. Effects Assessment
4.2. Analysis of Quantitative Findings
4.2.1. Cyberbullying Roles
4.2.2. Cyberbullying Effects
4.2.3. Cyberbullying Popularity
5. Discussion
6. Limitations
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Dolev-Cohen, M.; Levkovich, I. Teachers’ responses to face-to-face and cyberbullying of colleagues by others in Israeli schools. Int. J. Sch. Educ. Psychol. 2020, 9, S153–S165. [Google Scholar] [CrossRef]
- Reyneke, M.J.; Jacobs, L. Can legal remedy be used to address bullying and cyberbullying in South African schools? Pol. J. Educ. Stud. 2018, 71, 66–80. [Google Scholar] [CrossRef] [Green Version]
- Juan, A.; Zuze, L.; Hannan, S.; Govender, A.; Reddy, V. Bullies, victims and bully-victims in South African schools: Examining the risk factors. S. Afr. J. Educ. 2018, 38, S1–S10. [Google Scholar] [CrossRef]
- Pittaro, M. Cyberbullying in adolescence: Victimization and adolescence. In Developing Safer Online Environments for Children: Tools and Policies for Combatting Cyber Aggression; Management Association, Ed.; IGI Global: Hershey, PA, USA, 2020; pp. 131–154. [Google Scholar]
- Smit, D.M. Cyberbullying in South African and American schools: A legal comparative study. S. Afr. J. Educ. 2015, 35, 1–11. [Google Scholar] [CrossRef]
- Netshitangani, T. School Managers’ Experiences on Strategies to Reduce School Violence: A South African Urban Schools Perspective. Afr. Renaiss. 2018, 15, 161–180. [Google Scholar] [CrossRef]
- Wang, M.-J.; Yogeeswaran, K.; Andrews, N.P.; Hawi, D.R.; Sibley, C.G. How common is cyberbullying among adults? Exploring gender, ethnic, and age differences in the prevalence of cyberbullying. Cyberpsychol. Behav. Soc. Net. 2019, 22, 736–741. [Google Scholar] [CrossRef] [Green Version]
- Modiba, N.S. Managing self-morality of public secondary school pupils to mitigate learner bullying. Gend. Behavior. 2020, 18, 16651–16662. [Google Scholar]
- Woudstra, M.H.; Janse van Rensburg, E.; Visser, M.; Jordaan, J. Learner-to-teacher bullying as a potential factor influencing teachers’ mental health. S. Afr. J. Educ. 2018, 38, 1–10. [Google Scholar] [CrossRef]
- Statistics South Africa. General Household Survey. Available online: http://www.statssa.gov.za/publications/P0318/P03182019.pdf (accessed on 12 July 2020).
- Panumaporn, J.; Hongsanguansri, S.; Atsariyasing, W.; Kiatrungrit, K. Bystanders’ behaviours and associated factors in cyberbullying. Gen. Psychiatry 2020, 33, e100187. [Google Scholar] [CrossRef]
- Kyobe, M.; Mimbi, L.; Nembandona, P.; Mtshazi, S. Mobile bullying among rural South African students: Examining the applicability of existing theories. Afr. J. Inf. Syst. 2018, 10, 85–104. [Google Scholar]
- Kowalski, R.M.; Limber, S.P.; McCord, A. A developmental approach to cyberbullying: Prevalence and protective factors. Aggress. Violent Behav. 2019, 45, 20–32. [Google Scholar] [CrossRef]
- Jafarkarimi, H.; Saadatdoost, R.; Tze Hiang Sim, A.L.E.X.; Mei, J.H. Determinant factors of cyberbullying: An application of theory of planned behavior. J. Theor. Appl. Inf. Technol. 2017, 95, 6472–6482. [Google Scholar] [CrossRef]
- Shariff, S. Cyber-Bullying: Issues and Solutions for the School, the Classroom and the Home; Routledge: New York, NY, USA, 2008. [Google Scholar] [CrossRef]
- South African Government Gazette. Cybercrimes Act No. 19 of 2020. Available online: https://www.gov.za/sites/default/files/gcis_document/202106/44651gon324.pdf (accessed on 20 April 2021).
- Ioannou, A.; Blackburn, J.; Stringhini, G.; De Cristofaro, E.; Kourtellis, N.; Sirivianos, M. From risk factors to detection and intervention: A practical proposal for future work on cyberbullying. Behav. Inf. Technol. 2018, 37, 258–266. [Google Scholar] [CrossRef]
- Chan, N.N.; Ahrumugam, P.; Scheithauer, H.; Schultze-Krumbholz, A.; Ooi, P.B. A hermeneutic phenomenological study of students’ and school counsellors’ “lived experiences” of cyberbullying and bullying. Comput. Educ. 2020, 146, 103755. [Google Scholar] [CrossRef]
- Kyobe, M.; Lusinga, S. Factors in Reporting Mobile Victimization in South African Schools. In Bullying Prevention and Intervention at School; Gordon, J., Ed.; Springer: Cham, Switzerland, 2018; pp. 119–137. [Google Scholar] [CrossRef]
- Gaci, M.; Vonèche Cardia, I.; Gillet, D. Privacy-Aware Digital Mediation Tools for Improving Adolescent Mental Well-being: Application to School Bullying. In Proceedings of the 13th International Conference on Advances in Computer-Human Interactions, Valencia, Spain, 21–25 November 2021; Mauri, J.L., Ed.; DigitalWorld: Valencia, Spain, 2020; pp. 548–564. [Google Scholar]
- Cuesta Medina, L.; Hennig Manzuoli, C.; Duque, L.A.; Malfasi, S. Cyberbullying: Tackling the silent enemy. Int. J. Incl. Educ. 2020, 24, 936–947. [Google Scholar] [CrossRef]
- Smith, P.K.; Bauman, S.; Wong, D. Challenges and opportunities of anti-bullying intervention programs. Int. J. Environ. Res. Public Health 2019, 16, 1810. [Google Scholar] [CrossRef] [Green Version]
- Kao, H.T.; Yan, S.; Huang, D.; Bartley, N.; Hosseinmardi, H.; Ferrara, E. Understanding Cyberbullying on Instagram and Ask. fm via Social Role Detection. In Proceedings of the World Wide Web Conference 2019; Companion Proceedings, San Francisco, CA, USA, 13–17 May 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 183–188. [Google Scholar] [CrossRef]
- Samara, M.; Burbidge, V.; El Asam, A.; Foody, M.; Smith, P.K.; Morsi, H. Bullying and cyberbullying: Their legal status and use in psychological assessment. Int. J. Environ. Res. Public Health 2017, 14, 1449. [Google Scholar] [CrossRef] [Green Version]
- Phillips, V.I.; Cornell, D.G. Identifying victims of bullying: Use of counselor interviews to confirm peer nominations. Prof. Sch. Couns. 2012, 15, 123–131. [Google Scholar] [CrossRef]
- Yang, A.; Li, X.; Salmivalli, C. Maladjustment of bully-victims: Validation with three identification methods. Educ. Psychol. 2016, 36, 1390–1407. [Google Scholar] [CrossRef]
- De Wet, C. Victims of educator-targeted bullying: A qualitative study. S. Afr. J. Educ. 2010, 30, 189–201. [Google Scholar] [CrossRef]
- Swartz, J.R.; Carranza, A.F.; Knodt, A.R. Amygdala activity to angry and fearful faces relates to bullying and victimization in adolescents. Soc. Cogn. Affect. Neurosci. 2019, 14, 1027–1035. [Google Scholar] [CrossRef] [PubMed]
- Marin, A.; Wellman, B. Social network analysis: An introduction. In The SAGE Handbook of Social Network Analysis; Scott, J., Carrington, P.J., Eds.; Sage: Los Angeles, LA, USA, 2011; pp. 11–25. [Google Scholar]
- Coie, J.D.; Dodge, K.A.; Coppotelli, H. Dimensions and types of social status: A cross-age perspective. Dev. Psychol. 1982, 18, 557–570. [Google Scholar] [CrossRef]
- Rytioja, M.; Lappalainen, K.; Savolainen, H. Behavioral and emotional strengths of sociometrically popular, rejected, controversial, neglected, and average children. Eur. J. Spec. Needs Educ. 2019, 34, 557–571. [Google Scholar] [CrossRef]
- Sentse, M.; Kretschmer, T.; Salmivalli, C. The longitudinal interplay between bullying, victimization, and social status: Age-related and gender differences. Soc. Dev. 2015, 24, 659–677. [Google Scholar] [CrossRef]
- Sijtsema, J.J.; Lindenberg, S.M.; Ojanen, T.J.; Salmivalli, C. Direct aggression and the balance between status and affection goals in adolescence. J. Youth Adolesc. 2020, 49, 1481–1491. [Google Scholar] [CrossRef] [Green Version]
- Volk, A.A.; Veenstra, R.; Espelage, D.L. So you want to study bullying? Recommendations to enhance the validity, transparency, and compatibility of bullying research. Aggress. Violence Behav. 2017, 36, 34–43. [Google Scholar] [CrossRef]
- Huitsing, G.; Veenstra, R. Bullying in classrooms: Participant roles from a social network perspective. Aggress. Behav. 2012, 38, 494–509. [Google Scholar] [CrossRef]
- Smith, P.K. School-based interventions to address bullying. Eest. Haridusteaduste Ajak. 2016, 4, 142–164. [Google Scholar] [CrossRef] [Green Version]
- Chen, P.; Xie, H.; Maslov, S.; Redner, S. Finding scientific gems with Google’s PageRank algorithm. J. Informetr. 2007, 1, 8–15. [Google Scholar] [CrossRef] [Green Version]
- Souma, W.; Jibu, M. Progress of studies of citations and PageRank. In Scientometrics; Jibu, M., Yoshiyuki, Y., Eds.; IntechOpen: London, UK, 2018; pp. 213–231. [Google Scholar]
- Leung, B.P.; Silberling, J. Using sociograms to identify social status in the classroom. Calif. Sch. Psychol. 2006, 11, 57–61. [Google Scholar] [CrossRef]
- Begeer, S.; Fink, E.; van der Meijede, S.; Goossens, F.; Olthop, T. Bullying-related behavior in a mainstream high school versus a high school for autism: Self-report and peer-report. Autism 2015, 20, 562–571. [Google Scholar] [CrossRef]
- Brown Urban, J.; Osgood, N.; Okamoto, J.; Mabry, P.; Hassmillier Lich, K. Developmental systems science: Extending developmental science with systems science methodologies. In Handbook of Developmental Systems Theory and Methodology; Molenaar, P., Lerner, R.M., Newell, K.M., Eds.; The Guilford Press: New York, NY, USA, 2014; pp. 95–127. [Google Scholar]
- Bullying Prevention Advisory Group. Bullying prevention and response: A guide for Schools (2015). Available online: https://www.education.govt.nz/assets/Documents/School/Bullying-prevention/MOEBullyingGuide2015Web.pdf (accessed on 4 March 2019).
- Hood, M.; Duffy, A.L. Understanding the relationship between cyber-victimization and cyber-bullying on Social Network Sites: The role of moderating factors. Personal. Individ. Differ. 2018, 133, 103–108. [Google Scholar] [CrossRef] [Green Version]
- Gordon, J.U. (Ed.) Bullying Prevention and Intervention at School: Integrating Theory and Research into Best Practices; Springer: Cham, Switzerland, 2018; pp. 139–149. [Google Scholar]
- Wieringa, R.J. Design Science Methodology for Information Systems and Software Engineering; Springer: Berlin, Germany, 2014; pp. 121–133. [Google Scholar] [CrossRef]
- Ajzen, I. From Intentions to Actions: A Theory of Planned Behavior. In Action-Control; Kuhl, J., Beckman, J., Eds.; Springer: Heidelberg, Germany, 1985; pp. 11–39. [Google Scholar]
- Gàmez-Guadix, M.; Gini, G. Individual and class justification of cyberbullying and cyberbullying perpetration: A longitudinal analysis among adolescents. J. Appl. Dev. Psychol. 2016, 44, 81–89. [Google Scholar] [CrossRef]
- Auemaneekul, N.; Powwattana, A.; Kiatsiri, E.; Thananowan, N. Investigating the mechanisms of theory of planned behavior on Cyberbullying among Thai adolescents. J. Health Res. 2019, 34, 42–55. [Google Scholar] [CrossRef] [Green Version]
- Espelage, D.L. Ecological theory: Preventing youth bullying, aggression, and victimization. Theory Pract. 2014, 53, 257–264. [Google Scholar] [CrossRef]
- Cross, D.; Barnes, A.; Papageorgiou, A.; Hadwen, K.; Hearn, L.; Lester, L. A social–ecological framework for understanding and reducing cyberbullying behaviours. Aggress. Violent Behav. 2015, 23, 109–117. [Google Scholar] [CrossRef]
- Dasgupta, K. Youth response to state cyberbullying laws. N. Z. Econ. Pap. 2019, 53, 184–202. [Google Scholar] [CrossRef]
- Molenaar, P.; Lerner, R.M.; Newell, K.M. (Eds.) Developmental systems theory and methodology: A view of the issues. In Handbook of Developmental Systems Theory and Methodology; The Guilford Press: New York, NY, USA, 2014; pp. 3–15. [Google Scholar]
- Walgrave, L. Restorative Justice and Human Rights in a Democratic Society. In Rights and Restoration within Youth Justice; Gavrielides, T., Ed.; De Sitter: Whitby, ON, Canada, 2012; pp. 117–147. [Google Scholar]
- Bishop, F.L. Using Mixed Methods Research Designs, In Health Psychology: An Illustrated Discussion from a Pragmatist Perspective. Brit. J. Health Psychol. 2015, 20, 5–20. [Google Scholar] [CrossRef]
- Wahyuni, D. The research design maze: Understanding paradigms, cases, methods and methodologies. J. Appl. Manag. Account. Res. 2012, 10, 69–80. [Google Scholar]
- Hevner, A.R. A three-cycle view of design science research. Scand. J. Inf. Syst. 2007, 19, 87–92. [Google Scholar]
- Espinoza, G.; Juvonen, J. Methods used in cyberbullying research. In Principles of Cyberbullying Research: Definitions, Measures and Methodology, 1st ed.; Bauman, S.A., Cross, D., Walker, J., Eds.; Routledge: Milton Park, UK, 2015; pp. 140–152. [Google Scholar]
- O’Raghallaigh, P.; Sammon, D.; Murphy, C. Using Focus Groups to Evaluate Artefacts in Design Research. In Proceedings of the 6th European Conference on Information Management and Evaluation, Cork, Ireland, 13–14 September 2012; Nagle, T., Ed.; University of Cork: Cork, Ireland, 2012; pp. 251–257. [Google Scholar]
- Odora, R.J.; Matoti, S.N. The nature and prevalence of cyber bullying behaviors among South African high school learners. Int. J. Educ. Sci. 2015, 10, 399–409. [Google Scholar] [CrossRef]
- Badenhorst, C. Legal Responses to Cyber Bullying and Sexting in South Africa. CJCP Issue Paper No. 10; Centre for Justice and Crime Prevention: Cape Town, South Africa, 2011; pp. 1–20. [Google Scholar]
- Prinsloo, I.J. How safe are South African schools? S. Afr. J. Educ. 2005, 25, 5–10. [Google Scholar]
- Cresswell, J.W.; Plano Clark, V.L. Designing and Conducting Mixed Method Research, 2nd ed.; Sage: Thousand Oaks, CA, USA, 2011. [Google Scholar]
- Kallio, H.; Pietilä, A.M.; Johnson, M.; Kangasniemi, M. Systematic methodological review: Developing a framework for a qualitative semi-structured interview guide. J. Adv. Nurs. 2016, 72, 2954–2965. [Google Scholar] [CrossRef]
- Howison, J.; Wiggins, A.; Crowston, K. Validity issues in the use of social network analysis with digital trace data. J. Assoc. Inf. Syst. 2011, 12, 767–797. [Google Scholar] [CrossRef] [Green Version]
- Jungherr, A.; Schoen, H.; Posegga, O.; Jürgens, P. Digital trace data in the study of public opinion: An indicator of attention toward politics rather than political support. Soc. Sci. Comput. Rev. 2017, 35, 336–356. [Google Scholar] [CrossRef] [Green Version]
- Miles, M.B.; Huberman, A.M.; Saldaña, J. Qualitative Data Analysis: A Methods Sourcebook, 3rd ed.; Sage: Thousand Oaks, CA, USA, 2014. [Google Scholar]
- Saldaña, J. The Coding Manual for Qualitative Researchers., 2nd ed.; Sage: Thousand Oaks, CA, USA, 2013. [Google Scholar]
- Ashktorab, Z. ”The Continuum of Harm” Taxonomy of Cyberbullying Mitigation and Prevention. In Online Harrasment; Gobeck, J., Ed.; Human–Computer Interaction Series; Springer: Cham, Switzerland, 2018; pp. 211–227. [Google Scholar]
- Mishra, P.; Pandey, C.M.; Singh, U.; Gupta, A.; Sahu, C.; Keshri, A. Descriptive statistics and normality tests for statistical data. Ann. Card. Anaesth. 2019, 22, 67–72. [Google Scholar] [CrossRef] [PubMed]
- Saqr, M.; Fors, U.; Nouri, J. Using social network analysis to understand online Problem-Based Learning and predict performance. PloS ONE 2018, 13, e0203590. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Paullet, K.; Pinchot, J. Behind the screen where today’s bully plays: Perceptions of college students on cyberbullying. J. Inf. Syst. Educ. 2019, 25, 63–69. [Google Scholar]
- Antoniadou, N.; Kokkinos, C.M.; Fanti, K.A. Traditional and cyber bullying/victimization among adolescents: Examining their psychosocial profile through latent profile analysis. Int. J. Bullying Prev. 2019, 1, 85–98. [Google Scholar] [CrossRef] [Green Version]
- Porter, G.; Hampshire, K.; Milner, J.; Munthali, A.; Robson, E.; De Lannoy, A.; Abane, A. Mobile phones and education in Sub-Saharan Africa: From youth practice to public policy. J. Int. Dev. 2016, 28, 22–39. [Google Scholar] [CrossRef] [Green Version]
Theory | Characteristic | Construct | References |
---|---|---|---|
TPB | Drive school climate change, social norms, attitude, and efficacy | Identify cyberbullies, assess impact and reports Resolving cyberbullying incidents | [11,14,36,48] |
SES | Cyberbullying permissible context | Raising cyberbullying awareness | [13,49,50] |
DST | Environmental and personal traits interactions influence envelopment | Provide safe reporting platformInstill trust of authorities | [11,13,41,52] |
ID | Gender | Age Group | Rank or Occupation | Experience (years) | Knowledge Level of Cyberbullying | Frequency of Dealing with Cyberbullying | Social-Media Usage |
---|---|---|---|---|---|---|---|
HP1 | Male | 36–50 | Warrant officer | 31 | Adequate | Rarely | Frequently |
HP2 | Male | 36–50 | Sergeant | 16 | Minimal | Rarely | Never |
PP1 | Female | 36–50 | Captain | 35 | Adequate | Frequently | Rarely |
PP2 | Male | 36–50 | Warrant officer | 29 | Minimal | Frequently | Frequently |
PP3 | Male | 36–50 | Warrant officer | 24 | Minimal | Rarely | Frequently |
PP4 | Male | 50+ | Sergeant | 30 | None | Rarely | Rarely |
PP5 | Female | 20–35 | Sergeant | 9 | Minimal | Rarely | Frequently |
PP6 | Female | 20–35 | Sergeant | 11 | Minimal | Rarely | Frequently |
LTT1 | Male | 20–35 | Teacher | 7 | Minimal | Rarely | Frequently |
LTT2 | Male | 20–35 | Teacher | 9 | Minimal | Rarely | Frequently |
LTT3 | Female | 20–35 | Teacher (SBST) | 6 | Adequate | Frequently | Frequently |
LTT4 | Male | 36–50 | Teacher | 20 | None | Never | Rarely |
IIT1 | Female | 20–35 | Teacher | 6 | Minimal | Rarely | Frequently |
IIT2 | Female | 20–35 | Teacher (SBST) | 8 | Adequate | Frequently | Frequently |
IIT3 | Male | 36–50 | Teacher | 23 | Minimal | Rarely | Rarely |
IIT4 | Female | 36–50 | Teacher | 20 | None | Rarely | Frequently |
IIT5 | Male | 20–35 | Teacher | 7 | Minimal | Frequently | Frequently |
Grades | Youngest | Oldest | Males | Females | Average Age | Standard Deviation |
---|---|---|---|---|---|---|
Grade 10 (N = 52) | 15 | 19 | 17 | 35 | 16.69 | 1.00 |
Grade 12 (N = 27) | 17 | 23 | 12 | 15 | 19.30 | 1.48 |
Themes | Comments |
---|---|
Developmental | |
Trust | “Learners below grade 6 are not such a big problem but once they start from grade 6, 7, 8 they start to have doubts about adults” (HP1). “Other (police) departments when they go and address the learners, they are not concentrating on their feelings they just tell them what they want” (HP2). |
Cross-age | “We get reports that there are some learners who are bullying them through Facebook. They are talking bad things about their parents and bad things about their lives” (IIT1). “Mam, they wrote about my mom (on Facebook), I’m so angry, and if I find them, those two girls, I’m going to fight them because they wrote about my parent” (IIT2). “Let us take for instance this one (investigation) of today, we come from the class now. That guy (learner) is afraid of those people who have created the account (Facebook account) on his name” (PP1). “The teachers were talking to learners, where they actually did not get to a solution or to even say who did it” (LTT3). |
Cross-platform | “They (perpetrators) are bullies from the class itself, it’s a threat to him (suspect or victim). He (suspect or victim) knows that when he reports. When he comes back those people are going to do whatever they want to him. It’s a fear” (PP1). “I think if we can cut (stop) gangsters at schools. Some of them [learners] are being bullied, and afterwards there are gangsters maybe that are controlling other learners, maybe they are afraid to report this cyberbullying” (PP4). “You hear somebody else saying these (learners) are fighting because this one wrote such and such (on Facebook) about the other” (LTT3). |
Inadequate awareness | |
“It was raised by some of them (learners) that there is mobile bullying in schools, they did not know what the name is for it, but they described bullying by cell phones and WhatsApp, and I said, it is called mobile bullying” (HP1). | |
“Most of the learners of the school were not aware of these cybercrimes. They are using the computer and cell phones” (PP2). ” … we informed the principal that we will bring someone to address all learners” (PP2). “We need to go to more schools and present this cyberbullying, so they can know more about it (cyberbullying). In that way they will be able to come to the police station and report it if it is happening to them. So, they need to get more knowledge about this cyberbullying” (PP5). “there is a school policy, we do not allow phones at school, but you know the learners” (IIT3). | |
Resolving incidents | |
Scare tactics | “As for now we just use (scare) tactics to say this and that will be done on the perpetrators [to discourage their behaviour]. However, it is going to be a difficult thing at some stage because we don’t have full equipment for that. We just tackle it with fear” (PP1). |
Restorative justice | “I decided to talk to them privately and say to them you know what you do not have full evidence” (IIT2). “In actual fact, they are minors we cannot do anything harsh on them” (PP1). “(We) rely on witnesses and maybe on injuries if it was physical bullying, but if it was cyberbullying, they can maybe show you the message on the phone so that you can read it for yourself” (HP1). “So, we managed to get that culprit on Tuesday, and try to show him that this is a not okay” (PP2). “We will call both pupils and address them and show the other party the results of bullying others. For me I think that one has helped a lot in our area” (HP2). “I will call the victim and the perpetrator, sit them down and show them the consequences of cyberbullying” (HP2). “When the issue cannot be resolved parents are called in” (HP1). |
Identification | |
Peer nominations | “I like the idea and agree with you 100%, because it is a closed system, no one will know except for us (police), when we assess to say, okay ten of the pupils identified (nominated) one person, meaning that person is a suspect. We can say this person is the culprit” (PP1). “… but when parents come, they (parents) would like to know who did this to my child. Since they are minors” (PP2). “Sometimes for these learners it is difficult to accept that they are doing wrong, so that is why we involve the Social Workers” (HP2). |
Effects assessments | “Even when it comes to referrals themselves, they can take forever, but it’s only so much that they can do” (LTT3) “Depending on how great the harm is. They (teachers) refer the issue to the district, and when learners are referred to the district, they are assisted whichever way they need” (LTT3). “Even when it comes to referrals themselves (they) can take forever” (LTT3). |
Reporting | |
Unplanned | “We just heard the rumors that these (learners) did that” (IIT1). “You hear somebody else saying these (learners) are fighting because this one wrote such and such (on Facebook) about the other” (LTT3). |
Fear | “It [encouraging learners to report incidents] might be the problem, because some of the learners…, so they are afraid to come forward to report that crime” (PP2). |
Grade | Bullies | Bully-Victims | Victims | Uninvolved |
---|---|---|---|---|
Grade 10 (N = 52) | 11 (21%) | 17 (33%) | 10 (19%) | 14 (27%) |
Grade 12 (N = 27) | 5 (19%) | 14 (52%) | 3 (11%) | 5 (18%) |
Grade | Role | Moderate | Major | Severe |
---|---|---|---|---|
Grade 10 | Bully-victims | 9 (53%) | 0 (0%) | 8 (47%) |
Victims | 5 (50%) | 0 (0%) | 5 (50%) | |
Grade 12 | Bully-victims | 8 (57%) | 6 (43%) | 0 (0%) |
Victims | 0 (0%) | 3 (100%) | 0 (0%) |
Gender | Grade | Mean | SD |
---|---|---|---|
Female | 10 | 0.62 | 0.55 |
Male | 12 | 0.74 | 0.49 |
Total | 10 | 0.56 | 0.55 |
12 | 0.86 | 0.43 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Radebe, F.; Kyobe, M. The Response of Social Crime Prevention Police to Cyberbullying Perpetrated by Youth in Rural Areas of South Africa. Int. J. Environ. Res. Public Health 2021, 18, 13421. https://doi.org/10.3390/ijerph182413421
Radebe F, Kyobe M. The Response of Social Crime Prevention Police to Cyberbullying Perpetrated by Youth in Rural Areas of South Africa. International Journal of Environmental Research and Public Health. 2021; 18(24):13421. https://doi.org/10.3390/ijerph182413421
Chicago/Turabian StyleRadebe, Fani, and Michael Kyobe. 2021. "The Response of Social Crime Prevention Police to Cyberbullying Perpetrated by Youth in Rural Areas of South Africa" International Journal of Environmental Research and Public Health 18, no. 24: 13421. https://doi.org/10.3390/ijerph182413421
APA StyleRadebe, F., & Kyobe, M. (2021). The Response of Social Crime Prevention Police to Cyberbullying Perpetrated by Youth in Rural Areas of South Africa. International Journal of Environmental Research and Public Health, 18(24), 13421. https://doi.org/10.3390/ijerph182413421