All students who have taken a Social Psychology course have been exposed to the work of Darley and Latane on bystander apathy. The study followed the infamous public murder of Kitty Genovese. Research following the event attempted to understand why no one had come to her aid. By staging simulated events under different conditions, the research evaluated various hypotheses.
Obviously, bullying and cyberbullying provide similar circumstances and bystander apathy is often offered as an explanation for lack of intervention. Why are attackers not reprimanded by others? Note that encouraging peers to intervene online is frequently offered as a possible solution.
A recent study (I believe unpublished at present) has taken a similar experimental approach to studying cyberbullying (Dillon). The results are very similar to the old Darley and Latane research and just as disheartening. However, the manipulative methodology does offer a useful approach for evaluating the impact of whatever techniques are used to encourage peer support.
I like Dan Gilmor’s writing because he thinks a lot like me. I admit it. I hope this commonality does not diminish how seriously you take my suggestion that you read his work.
A recent post to Medium explains why Gilmor is attempting to become more independent from Apple, Google and Microsoft. The post explains the steps he is taking to explore just how much separation is possible.
If you find the Gilmor post intriguing, I recommend his book MediActive. The book and associated web site came before the post and you can see how the actions described in the blog might follow from the observations made in the book. I am not to the point of taking the actions described in the blog post – my attitude might be described as “do not become dependent on any one service”.
Gilmor offers his book from the web site under a creative commons license. I purchased the book through Amazon and learned about the creative commons option on my Kindle, but supporting content creators is a good thing. Like I said, Gilmor and I share many values. His book is augmented by online resources. He argues that a book alone will not be able to keep up with rapid developments in a field. This is one of arguments Cindy and I used in proposing a hybrid approach to the latest edition of our textbook. Gilmor proposes that we are not informed by reading along endorsing the value of production as well as consumption. Our notion of learning aloud (authoring to learn) is very similar. And, Gilmor argues for an open Internet – supporting net neutrality, reasonable interpretation of copyright rights, and freedom from dependence on any given set of corporate hardware, software, or access providers. The book explores each of these topics in detail.
Gilmor is a journalist and frames his arguments as applied to his profession. It strikes me that journalism and education share a great deal especially the way Gilmor interprets journalism. Learning in both cases is not a simple matter of consumption.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.