Also, they use the text-messaging system by way of cellular phones. On the other hand, these places of activity are open to the public making it accessible for bullies share their message. Technology is advancing very fast, and American youths are more and more participating in the Internet- based conversation. It is now estimated that at least 90% of adolescents use the Internet, with 50% using it on a daily basis (Lenhart, Madden, & Hitlin, 2005). In addition, almost half of all adolescents have personal cellular phones, permitting them instant access to text messaging (Lenhart et al., 2005). Given these estimation, it is greater clear that cyberspace equips the social networking forum where tech-savvy teenagers can interact with one another. In fact, the popularity of cyber exchanging information shows by statistics revealing that about half of all adolescents interact with friends and meet new online users via social networking sites (Lenhart & Madden, …show more content…
Adolescents could be victimized via two forms of peer attack: secret and relational attack (Crick & Grotpeter, 1995; Prinstein, Boergers, & Vernberg, 2001; Sullivan, Farrell, & Kliewer, 2006). Secret attack that involves physics (e.g., hitting, pushing, flicking, touching) and verbal (e.g., taunting, threatening) forms of intrusive practice. In contrast, relational attack is the intentional act of manipulation of harm to a victim’s social status or relationships and involves action, such as social exclusion, rumor spreading, instigating interpersonal peer conflicts, and uncovering personal information (Crick & Grotpeter,