In order to address the issue of cyber bullying, research supports that it must be met with a systemic approach. Within that response, it is most effective to utilize a triage approach: protection, intervention, and prevention.
2. Goal One: To acquire methods and strategies in protection
from cyber bullying.
Goal Two: To acquire methods and strategies of intervention
with cyber bullying.
Goal Three: To acquire methods and strategies in the
prevention of cyber bullying.
3. “…willful and repeated harm inflicted through the use of
computers, cell phones, and other electronic devices.”
(Hinduja & Patchin, 2009)
5. 1. Synonyms for cyber bullying
2. Types of cyber bullying
3. Relationship to traditional bullying
4. Prevalence
6. Protection – To safeguard against cyber risk and to address
low level cyber harm.
Assessment:
1. Role/s of client
2. Crisis intervention, protection, or both
7. Educate adults and their children about safety measures.
1. Prepare children
2. Supervise and monitor children
3. Technological solutions
“Stop – Save – Share” (Hinduja & Patchin, 2012)
“ I DON’T PLAY” (Sutton, 2009)
8. Educate adults and their children about safety measures.
4. Web sites:
www. Cyberbullying.us
www. Cyberbullyhelp.com
5. Blocking and Filtering Software
6. Report to Internet Service Provider (IPS) or Site
9. Teach adults how to parent a high tech generation.
1. Family Internet Use Agreement (sample)
Personal Code of Conduct
2. Implement safety measures for cyber victim
Implement reasonable consequences for cyber bully
3. Net neighborhood (Coloroso, 2008)
4. Web buddies; peer helper programs
10. Increase awareness of a cyber bullying culture and of the
roles/responsibilities of every individual.
Team Responsibility:
1. Parents
2. Youth
3. Schools
4. Community
5. Society (Trolley & Hanel, 2010)
11. Team Responsibility:
6. Therapists and Clinicians:
Services
Groups
Advocacy
Newsletters or professional materials
12. “A Whole Approach”
Safe environment
Anti –bullying program
Anti –bullying policy
Safe philosophy (Sullivan, 2011)
15. “Cyber bullying [is] an aggressive, intentional act, carried out
by a group or individual, using electronic forms of contact,
repeatedly and over time, against a victim who cannot easily
defend him or herself”.
(Smith, Mahdavid, Carvalho, and Tippett, 2006)
17. Intervention – To identify role/s of clients, to assess level of
cyber harm, and to implement therapeutic strategies.
Assessment:
1. Role/s of clients
2. Crisis intervention, protection and TX
19. To implement treatment strategies given the role/s of
clients.
Cyber victim:
1. Profile
2. Needs/motivations
3. Relationship to technology
20. To implement treatment strategies…
Cyber victim:
1. Protective measures in place; legal issues
2. Address victimization/empowerment
3. Goals of counseling
4. Address presenting or co-occurring disorders
5. Positive peer relationships/social skill building
6. Support groups
7. Work with parent/guardian (Campbell, 2007)
21. To implement treatment strategies given the role/s of
clients.
Cyber bully:
1. Profile
2. Needs/motivations
3. Relationship to technology
22. To implement treatment strategies…
Cyber bully:
1. Punishment (?)
2. Positive need fulfillment
3. Social skill building
4. Empathy building
5. Address presenting or co-occurring disorders
6. Group work
7. Work with parent/guardian; legal issues
23. To implement treatment strategies given the role/s of
clients.
Cyber bully victim:
1. Profile, history, and relationship to both
2. Assess levels of danger to self and others
3. Assess underlying pathology or co-occurring disorders
4. Implement psychological, educational, and social
response
5. Work with parent/guardian; legal issues
25. To implement the “System’s Approach” or “Holistic
Approach” as it applies to treatment.
Parents - Youth - School - Community - Law Enforcement :
1. Psychological response
2. Educational response
3. Social response
26. To implement “System’s Approach”…
IP Family (Relationship to technology)
Schools/Counselors/Therapists
Community/Support Systems/Legal
27. To review role of support systems as they apply to
intervention.
Support systems:
1. Groups
2. Holistic Approach
30. Prevention – To address the causal factors of cyber bullying
and to implement healthy practices in our relationships with
technology and with others.
Causal factors – a review of current thinking:
1. Two social networking norms
2. Technology-induced conditioned responses
3. Profile of bully or bully victim
31. 1. Causal factors – two social networking norms
Anonymity or pseudonymity
1. Detachment from real world
2. Distant from target
3. Disinhibition
Power differential
1. Ease
2. Expansion
3. Emboldened
32. 2. Causal factors – technology-induced conditioned response
Habits of electronic communication reinforced by:
1. Disinhibition
2. Developmental factors
3. Reinforcement from self and from others
4. Repetition
5. Factors in cyber space
33. 3. Causal factors -combine with profile of bully or bully victim
Attitudes, beliefs, and motivations:
1. Regard (lack of empathy)
2. Revenge
3. Relationship between victim (T or C) , cyber bully,
and traditional bully
34. “Technology use is an indirect form of contact and interaction
with society. A healthy balance of direct interaction with peers
and physical activities promotes good social skills, problem
solving abilities, and physical fitness.”
(Trolley & Hanel, 2008)
35. To implement healthy practices in our relationships with
technology.
Cyber balance:
1. Family assessment
2. Education
3. Establish philosophy, guidelines and practices
4. Direct interaction, empathy building, serve others
5. Adults model healthy behaviors
36. To implement healthy practices in our relationships with
others.
1. An enforceable policy in place
2. Peer support
3. Positive interdependent experiences
4. Individual and group accountability
5. Face to face interaction
6. Teach and model interpersonal skills
7. Group process (role play and build empathy)
37. “…restoring the use of technology within the family, particularly
by youth…allows you to experience the benefits of technology
while reducing the risks…cyber bullying is a symptom of being
out of balance with technology.”
(Trolley & Hanel, 2010)
38. Celebrate being present
Celebrate being available
Celebrate our similar need for
respect, dignity & human regard