27.06.2013 Views

learning - Academic Conferences Limited

learning - Academic Conferences Limited

learning - Academic Conferences Limited

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

David Mathew<br />

disclose this information to the police, and Rob was reluctant to involve the police. He now wishes<br />

that he had involved the police, and much earlier on.<br />

It is somewhat ironic that a piece of work that Rob had authored earlier, during the year in which<br />

everyone seemed happy, had been on the subject of bullying. Thus it was that Rob had some<br />

recourse to information that he never thought that he would use practically; now that his health had<br />

been affected (headaches, anxiety attacks, vomiting) he looked back on this work and at some of the<br />

references therein. He was alarmed to note how little of what he’d written could be used in his own<br />

case. For example, victims of cyberabuse are advised to block emails or remove names from<br />

contacts; but how is this possible if one’s bully is also one’s manager? Similarly, when a YouTube<br />

‘joke’ had been sent to everyone in the department as a link, with the single line in the body of the<br />

email that read ‘One for Rob…’ and the film contained content that addressed something personal to<br />

Rob, the victim was unsure of how to proceed. After all, everyone had been sent the joke film. How<br />

was he meant to say that he alone had found it offensive without appearing as a crybaby?<br />

Eventually Rob screwed up the courage to approach a Union representative. Next, on his eventual<br />

return to work, he reported the cyberbullying to his manager’s manager, even though he suspected<br />

that the latter would be futile. So it proved: the manager’s manager merely told Rob that his<br />

perception was wrong and that what he thought was happening was not happening at all. It was all in<br />

his mind: his tormentor didn't mean him any harm, and so on. Rob was flatly informed that<br />

cyberbullying did not exist in the Institution for the simple reason that it was not acceptable. This was<br />

the extent of the mitigation: it does not exist because we say that it not allowed to exist. (Surely this is<br />

the workplace equivalent of a child holding his hands over his own eyes and assuming that no one<br />

can see him because he is now in darkness. It is workplace equivalent of putting fingers in one's ears<br />

and chanting: Can't here you! Can't hear you!)<br />

There followed months of meetings (while the counselling continued) and Rob was eventually forced<br />

out of the Institution with a payment of several thousands of pounds and a copy of a contract that he<br />

was obliged to sign that said that he accepted this payment as a redundancy package. Needless to<br />

say, the contract said nothing about bullying: Rob, or rather the man whose real name I must not<br />

disclose, had effectively been gagged on the subject, legally, for ever. If the title of one of Slavoj<br />

Žižek’s many papers – namely, ‘Is this digital democracy, or a new tyranny of cyberspace?' – was not<br />

applicable enough in this instance, then let us take a glance at what the author has to say. ‘Our social<br />

identity, the person we assume to be in our social intercourse, is already a "mask" that involves the<br />

repression of our inadmissible impulses,’ Žižek’ writes. ‘The fact that I perceive my virtual self-image<br />

as mere play thus allows me to suspend the usual hindrances which prevent me from realising my<br />

"dark half" in real life. My electronic id is given wing’ (web article).<br />

3. Unpatrolled boundaries<br />

When cases of cyberbullying are of a severity to make the news (ref the Houghton case,<br />

NetFamilyNews 2009) there is often a reference to the anonymity (or attempted anonymity) or the<br />

perpetrator. The idea is for the audience to recognise the sly and insidious fashion with which the<br />

bully reached his/her victim. Arguably, however, the case where the bully is completely upfront and<br />

'open' is worse. In cases such as this, it becomes a matter of misdirection and stealth. The bully<br />

knows enough about the victim to be able to hurt him by using languages/images that might be<br />

regarded (by others outside the dualogue) as innocuous enough. This serves, of course, to make<br />

matters worse. If the bully is hurt by words/images that might be innocent in an uncontextualised<br />

situation, the bully is thought to be 'too sensitive' or 'not tough enough'. It represents another slur on<br />

the bully's character, and now a wider audience is allowed to join in.<br />

The workplace bully is an abuser of power, whether this power is actual (where the bully might have<br />

influence over someone’s career, for example) or supposed (where the bullying has been left alone<br />

because it is easier to accept than the challenge to its existence would be). Either way, relationships<br />

in the workplace should be governed by the same sort of boundaries that survive in any other<br />

relationship; and where cyberbullying has been ignored we see a clear example of unpatrolled<br />

boundaries. No one is checking. According to Wenger (2000), members of a community are bound<br />

together by a collective understanding of what their community is about; they hold each other<br />

accountable to his joint enterprise. In the absence of a possibility to maim or kill physically, the<br />

workplace bully’s only real ‘weapon’ is the use of technology, and the only real target the victim's<br />

476

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!