358
Views
1
CrossRef citations to date
0
Altmetric
Articles

Understanding cyberbullying: Hannah Arendt’s public-private-social distinctions and online communication

References

  • Allers, C. R. (2010). Undoing what has been done: Arendt and Levinas on forgiveness. At the Interface/Probing the Boundaries, 66, 19–42.
  • Anderson, M. (2018). A majority of teens have experienced some form of cyberbullying. Retrieved from http://www.pewinternet.org/2018/09/27/a-majority-of-teens-have-experienced-some-form-of-cyberbullying/
  • Anderson, R. (1994). Anonymity, presence, and the dialogic self in a technological culture. In R. Anderson, K. N. Ca, & R. C. Arnett (Eds.), The reach of dialogue: Confirmation, voice, and community (pp. 91–110). Cresskill, NJ: Hampton Press, Inc.
  • Arendt, H. (1994). Eichmann in Jerusalem: A report on the banality of evil. New York, NY: Penguin Books. (Original work published in 1963).
  • Arendt, H. (1998). The human condition (2nd ed.). Chicago, IL: The University of Chicago Press. (Original work published in 1958.
  • Arendt, H. (1998). The Human Condition (2nd ed.). Chicago, IL: The University of Chicago Press. (Original work published in 1958)
  • Arnett, R. C. (2012a). Biopolitics: An Arendtian communication ethic in the public domain. Communication and Critical/Cultural Studies, 9(2), 225–233. doi:10.1080/14791420.2012.681443
  • Arnett, R. C. (2012b). The Bureaucrat as problematic other: Arendt’s warning. In B. L. Omdahl & J. H. Fritz (Eds.), Problematic relationships in the workplace (Vol. 2, pp. 145–162). New York, NY: Peter Lang.
  • Arnett, R. C. (2013). Communication ethics in dark times: Hannah Arendt’s Rhetoric of warning and hope. Carbondale: Southern Illinois University Press.
  • Arnett, R. C. (2016). An immemorial obligation: Countering the eclipse of the other. Journal of Communication & Religion, 39(2), 7–21.
  • Arnett, R. C. (2018). Hannah Arendt: Story-Laden action. In R. C. Arnett, A. M. Holba, & S. Mancino (Eds.), An encyclopedia of communication ethics: Goods in contention (pp. 21–25). New York, NY: Peter Lang Publishing, Inc.
  • Arnett, R. C., Bell, L. M., & Fritz, J. M. H. (2010). Dialogic learning as first principle in communication ethics. Atlantic Journal of Communication, 18(3), 111–126. doi:10.1080/15456871003742021
  • Arntfield, M. (2015). Towards a Cybervictimology: Cyberbullying, Routine Activities Theory, and the Anti-Sociality of Social Media. Canadian Journal of Communication, 40, 371–388. 3 doi:10.22230/cjc.2015v40n3a2863
  • Bell, V. (2005). On the critique of secular ethics: An essay with Flannery O’Connor and Hannah Arendt. Theory, Culture & Society, 22(2), 1–27. doi:10.1177/0263276405051663
  • Brody, N., & Vangelisti, A. L. (2016). Bystander intervention in cyberbullying. Communication Monographs, 83(1), 94–119. doi:10.1080/03637751.2015.1044256
  • Butler, J. (2015). Notes toward a performative theory of assembly. Cambridge, MA: Harvard University Press.
  • Carpio, G. G. (2018). Racial projections: Cyberspace, public space, and the digital divide. Information, Communication & Society, 21(2), 174–190. doi:10.1080/1369118X.2016.1271899
  • Carr, N. (2010). The Shallows: What the internet is doing to our brains. New York, NY: W. W. Norton & Company.
  • Carr, N. (2014). The Glass Cage: How our computers are changing us. New York, NY: W. W. Norton & Company.
  • Cathcart, R., & Gumpert, G. (1994). Anonymity, presence, and the dialogic self in a technological culture. In R. Anderson, K. N. Ca, & R. C. Arnett (Eds.), The reach of dialogue: Confirmation, voice, and community (pp. 91–110). Cresskill, NJ: Hampton Press, Inc.
  • Colleoni, E., Rozza, A., & Arvidsson, A. (2014). Echo chamber or public sphere? Predicting political orientation and measuring political homophily in twitter using big data. Journal of Communication, 64(2), 317–322. doi:10.1111/jcom.12084
  • Crapanzano, V. (1990). On dialogue. In T. Maranhao (Ed.), The interpretation of dialogue (pp. 269-291). Chicago: University of Chicago Press.
  • Cyberbullying Tactics. (2018, May 10). Stopbullying.gov. Retrieved June 5, 2020, from https://www.stopbullying.gov/cyberbullying/cyberbullying-tactics
  • Downey, J. & Fenton, N. (2003). New media, counter publicity, and the public sphere. New Media & Society, 5(2),185–202. doi:10.1177/1461444803005002003
  • Eicher-Catt, D. (2013). A semiotic interpretation of authentic civility: Preserving the ineffable for the good of the common. Communication Quarterly, 61(1), 1–17. doi:10.1080/01463373.2012.718727
  • Establishing Rules. (2017, September 19). Stopbullying.gov. Retrieved June 5, 2020, from https://www.stopbullying.gov/cyberbullying/establishing-rules
  • Felt, M. (2017). New portrayals of cyberbullying as the product of unstable teen technological culture. Canadian Journal of Communication, 42(5), 893–912. doi:10.22230/cjc.2017v4n5a3083
  • Flaxman, S., Goel, S., & Rao, J. M. (2016). Filter bubbles, echo chambers, and online news consumption. Public Opinion Quarterly, 80(S1), 298–320. doi:10.1093/poq/nfw006
  • Frost, C. (2016). The revolution might be tweeted but the founding will not be: Arendt and Innis on time, authority, and appearance. Canadian Journal of Communication, 41(2), 271–286. doi:10.22230/cjc.2016v41n2a3012
  • Greenfield, P. (2018). Social media firms failing to protect young people, survey finds. The Guardian. Retrieved from https://www.theguardian.com/society/2018/feb/26/social-media-firms-failing-to-protect-young-people-survey-finds
  • Gunkel, D. J. (2007). Thinking otherwise: Philosophy, communication, technology. West Lafayette, IN: Purdue University Press.
  • Hammer, D. (2000). Freedom and fatefulness: Augustine, Arendt and the journey of memory. Theory, Culture & Society, 17(2), 83–104. doi:10.1177/02632760022051121
  • Hayat, T., & Samuel-Azran, T. (2017). “You too, second screeners?” Second screeners’ echo chambers during the 2016 U.S. Elections primaries. Journal of Broadcasting & Electronic Media, 61(2), 291–308. doi:10.1080/08838151.2017.1309417
  • High, A. C., & Young, R. (2018). Supportive communication from bystanders of cyberbullying: Indirect effects and interactions between source and message characteristics. Journal of Applied Communication Research, 46(1), 28–51. doi:10.1080/00909882.2017.1412085
  • Jackson, M. (2009). Distracted: The erosion of attention and the coming dark age. Amherst, NY: Prometheus Books.
  • Juhasz, A. (2019). Instagram now lets you control your Bully’s comments. NPR. Retrieved from: https://www.npr.org/2019/10/03/766507832/instagram-now-lets-you-control-your-bullys-comments
  • Kaposi, D. (2009). The unbearable lightness of identity: Membership, tradition and the Jewish anti-Semite in Gershom Scholem’s letter to Hannah Arendt. Critical Discourse Studies, 6(4), 269–281. doi:10.1080/17405900903181010
  • Lechte, J. (2018). Rethinking Arendt’s theory of necessity: Humanness as ‘Way of Life’, or: The ordinary as extraordinary. Theory, Culture & Society, 35(1), 3–22. doi:10.1177/0263276416674538
  • Lee, J., Lim, J. J. C., & Heath, R. L. (2019). Negotiating faces in coping with workplace bullying: A cross-cultural investigation. Journal of Intercultural Communication Research, 48(2), 112–131. doi:10.1080/17475759.2019.1572640
  • Lenhart, A. (2013). British teen’s suicide puts cyber-bullying back in spotlight. Retrieved from http://www.pewresearch.org/fact-tank/2013/08/21/british-teens-suicide-puts-cyber-bullying-back-in-spotlight/
  • Maier, C. T. (2016). Education for the love of the world: Hannah Arendt’s philosophy of education and communication studies. Atlantic Journal of Communication, 24(5), 289–301. doi:10.1080/15456870.2016.1232261
  • Marletta, D. (2010). Hybrid communities to digital arts festivals: From online discussions to offline gatherings. At the Interface/Probing the Boundaries, 69, 83–96.
  • McLuhan, M. (2011). Understanding media: The extensions of man (Critical ed.) (W. T. Gordon, Ed.). Berkeley, CA: Gingko Press. (Original work published 1964).
  • Meyrowitz, J. (1985). No sense of place: The impact of electronic media on social behavior. New York, NY: Oxford University Press.
  • Milosevic, T. (2016). Social media companies’ cyberbulling policies. International Journal of Communication, 10(2016), 5164–5185.
  • Ollove, M. (2016). Increase in youth suicide prompts states to act. The Pew Charitable Trusts: Stateline Article. Retrieved from https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2016/09/28/increase-in-youth-suicide-prompts-states-to-act
  • Ong, W. J. (1967).The presence of the word: Some prolegomena for cultural and religious history. New York: Simon & Schuster
  • Pitkin, H. F. (1998). The attack of the blob: Hannah Arendt’s concept of the social. Chicago, IL: The University of Chicago Press.
  • Prevent Cyberbullying. (2017, September. 8). Stopbullying.gov. Retrieved June 5, 2020, from https://www.stopbullying.gov/cyberbullying/prevention
  • Primack, A. J., & Johnson, K. A. (2017). Student cyberbullying inside the digital schoolhouse gate: Toward a standard for determining where a “School” is. First Amendment Studies, 51(1), 30–48. doi:10.1080/21689725.2016.1278177
  • Putnam, R. D. (2000). Bowling alone: The collapse and revival of American community. New York, NY: Touchstone Books by Simon & Schuster.
  • Rahimi, B. (2011). The agonistic social media: Cyberspace in the formation of dissent and consolidation of state power in postelection Iran. The Communication Review, 14(3), 158–178. doi:10.1080/10714421.2011.597240
  • Reinecke, L., Aufenanger, S., Beutel, M., Dreier, M., Quiring, O., Stark, B., … Müller, K. W. (2017). Digital stress over the life span: The effects of communication load and internet multitasking on perceived stress and psychological health impairments in a german probability sample. Media Psychology, 20(1), 90–115. doi:10.1080/15213269.2015.1121832
  • Roberto, A. J., & Eden, J. (2010). Cyberbullying: Aggressive communication in the digital age. In T. A. Avtgis & A. S. Rancer (Eds.), Arguments, aggression, and conflict: New directions in theory and research (pp. 198–216). New York, NY: Routledge.
  • Roberto, A. J., Eden, J., Savage, M. W., Ramos-Salazar, L., & Deiss, D. M. (2014). Prevalence and predictors of cyberbullying perpetration by high school seniors. Communication Quarterly, 62(1), 97–114. doi:10.1080/01463373.2013.860906
  • Stefanita, O., Corbu, N., & Buturoiu, R. (2018a). Fake news and the third-person effect: They are more influenced than me and you. Journal of Media Research, 11(3(32)), 5–23. doi:10.24193/jmr.32.1
  • Stefanita, O., Udrea, G., Durach, F., & Corbu, N. (2018b). Facebook use among Romanian graduate students. Influences on self-esteem and feelings of loneliness. Journal of Media Research, 11(1(30)), 5–19. doi:10.24193/jmr.30.1
  • Tamboukou, M. (2013). Love, narratives, politics: Encounters between Hannah Arendt and Rosa Luxemberg. Theory, Culture & Society, 30(1), 35–56. doi:10.1177/0263276412456563
  • Toma, C. L. (2013). Feeling Better but doing worse: Effects of Facebook self-presentation on implicit self-esteem and cognitive task performance. Media Psychology, 16(2), 199–220. doi:10.1080/15213269.2012.762189
  • Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York, NY: Basic Books.
  • Turner, V. (1982). Celebration, Studies in Festivity and Ritual (V. Turner, Ed.). Publisher. Washington, D. C.: Smithsonian Institution Press.
  • Usher, N., Holcomb, J., & Littman, J. (2018). Twitter makes it worse: Political journalists, gendered echo chambers, and the amplification of gender bias. The International Journal of Press/Politics, 23(3), 324–344. doi:10.1177/1940161218781254
  • Vogl-Bauer, S. (2014). When disgruntled students go to extremes: The cyberbullying of instructors. Communication Education, 63(4), 429–448. doi:10.1080/03634523.2014.942331
  • Walther, J. B. (1992). Interpersonal effects in computer-mediated interaction: A relational perspective. Communication Research, 19(1), 52–90. doi:10.1177/009365092019001003
  • Walther, J. B. (1993). Impression development in computer-mediated interaction. Western Journal of Communication, 57(4), 381–398. doi:10.1080/10570319309374463
  • Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23(1), 3–43. doi:10.1177/009365096023001001
  • Walther, J. B. (2017). The merger of mass and interpersonal communication via new media: Integrating metaconstructs. Human Communication Research, 43(4), 559–572. doi:10.1111/hcre.12122
  • Walther, J. B., Anderson, J. F., & Park, D. W. (1994). Interpersonal effects in computer-mediated interaction. Communication Research, 21(4), 460–487. doi:10.1177/009365094021004002
  • West, R. & Beck, C. S. (Eds.). (2019). The routledge handbook of communication and bullying. Routledge.
  • West, R. & Turner, L. H. (2019). Coming to terms with bullying: A communication perspective. In R. West & C. Beck (Eds.), The routledge handbook of communication and bullying. (pp. 3–12). Routledge.
  • What Is Cyberbullying. (2020, May 7). Stopbullying.gov. Retrieved June 5, 2020, from https://www.stopbullying.gov/cyberbullying/what-is-it
  • White, C. J. (2015). Banal nationalism and belonging within the echoed imagined community: The case of New Zealand anthems on Youtube. Journal of Language and Politics, 14(5), 627–644.
  • Young, R., Subramanian, R., Miles, S., Hinnant, A., & Andsager, J. L. (2017). Social representation of cyberbullying and adolescent suicide: A mixed-method analysis of news stories. Health Communication, 32(9), 1082–1092. doi:10.1080/10410236.2016.1214214

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.