SlideShare una empresa de Scribd logo
1 de 18
21st Century Bullying:
        Cyber-Bullying




  A Guide and Tutorial for Parents and
Educators on How to Recognize, Prevent,
      and Address Cyber-Bullying
Cyber Bullying
            A Statement of Goals




                                Tutorial Goals
1.Identify what constitutes cyber-bullying and review some examples.

2.Learn Preventative Cyber-Bullying Steps to Take.

3.Learn How to Address Cyber-Bullying.
Legal Definition of Cyber-Bullying
California Education Code 48900r: Engaged in an act of bullying. For purposes of this subdivision, the following
     terms have the following meanings:
             (1) "Bullying" means any severe or pervasive physical or verbal act or conduct, including
             communications made in writing or by means of an electronic act, and including one or more acts
             committed by a pupil or group of pupils as defined in Section 48900.2, 48900.3, or 48900.4,
             directed toward one or more pupils that has or can be reasonably predicted to have the effect of
             one or more of the following:
                           (A) Placing a reasonable pupil or pupils in fear of harm to that pupil's or those pupils'
                          person or property.
                          (B) Causing a reasonable pupil to experience a substantially detrimental effect on his
                          or her physical or mental health.
                          (C) Causing a reasonable pupil to experience substantial interference with his or her
                          academic performance.
                          (D) Causing a reasonable pupil to experience substantial interference with his or her
                          ability to participate in or benefit from the services, activities, or privileges provided
                          by a school.
             (2) "Electronic act" means the transmission of a communication, including, but not limited to, a
            message, text, sound, or image, or a post on a social network Internet Web site, by means of an
            electronic device, including, but not limited to, a telephone, wireless telephone or other wireless
            communication device, computer, or pager.
            (3) "Reasonable pupil" means a pupil, including, but not limited to, an exceptional needs pupil,
            who exercises average care, skill, and judgment in conduct for a person of his or her age, or for a
            person of his or her age with his or her exceptional needs.
What is Bullying?

                  Physical Bullying is when one person uses threatening physical
                  action or force in order to make another person comply with
                  them, scare them, intimidate them, or harm them.


Verbal Bullying is when one person uses verbal communication to
intimidate, harm, or threaten another into doing or acting how the
bully wants . This would also include verbal retaliation threats with
terms such as “snitch, narc, tattle, etc.” that are intended to keep the
victim from speaking out.



                 Gossiping or spreading rumors about another person is also a form
                 of bullying meant to hurt someone else’s feelings, intimidate them,
                 and /or harm them.
Adding Cyber to the Bullying
When the bullying is communicated or committed through an electronic device or an electronic
   transmission, it becomes cyber bullying. This would include threats, intimidation, gossip,
   rumors, or any other verbal or visual actions that are meant to harm another person.




                                 Cyber bullying can take place on cell phones, tablets,
                                 computers, laptops, etc. Cyber bullying messages can
                                 be transmitted via text messages, social media posts,
                                 images, pictures, and video.
Goal 1 Identifying Cyber Bullying
            Wrap-Up
How do parents and educators prevent
          Cyber Bullying?
Be Active… Be Vigilant
For parents, monitor, monitor, and monitor
your child’s use on the internet. Let them
know that you expect computer use to be
done in an open area of the house.

For educators, circulate, circulate, and keep
circulating around when students are on
the computer in your classroom or in the computer lab.


                           Give Expectations
                           Both parents and educators need to let kids know that if
                           you would not say something in person to someone, you
                           would not say it to them online in a post or text.
How do parents and educators prevent
           Cyber Bullying?
Utilize computer monitoring software
Parents can purchase or download software that can
monitor what sites children go to, block certain sites as
needed, and provide a way to see what kids are posting.

Educators should check with their local IT person to learn
what is software available at the school site, what is in
place, what its limitations are and how to use it.

                  Set up guidelines at home for social media use
                  Parents should talk to their child about rules for using social media
                  sites. One of the rules should be that parents have the passwords for
                  the child’s site in order to be able to check or access their account.

                  Educators should already have usernames and password
                  lists set up from their IT person for student use at school
How do parents and educators prevent
           Cyber Bullying?
Don’t be afraid to
terminate or block access.
Parents can always end their child’s
access to a computer, website, or
cell phone if the child is not
following the expectations laid out
or agreed upon. This can be a
temporary restraint or a permanent
one depending on the situation.

Educators can follow suit by making
sure that they inform
the parent, administration, and the
IT person if a student
violates the school computer use
agreement.
Goal 2 Preventing Cyber Bullying
           Wrap-Up
Cyber Bullying has occurred.
    What do I do now?
Cyber Bullying has occurred.
    What do I do now?
Cyber Bullying has occurred.
  First step is determine and identify…
In the video we saw, it was a clear case of cyber-bullying
 and fulfills the legal requirements of Ed Code 48900r.
The steps to be taken are as follows:
1. An adult is informed by the student/child of the
     situation/event.
2. The adult confirms the good choice of the student
      in letting him/her know.
3. The adult reviews the electronic evidence of the
      cyber-bullying attack and if possible generates a
       hard copy.
4. The adult meets with the school administrator to review what has
      happened, who is involved, and what has been done.
5. School administrator can help determine if local law enforcement also
     needs to be contacted.

Now what?
Cyber Bullying has occurred.
   Second step is contact the school…
1. The administrator will take the cyber-bullying information
   and evidence and meet first with the alleged bully.
2. The administrator will determine the level of responsibility
   for the cyber-bullying by the bully and if any other
   participants are involved.
3. The administrator will then contact
   the parents of the bully and inform
   them of the situation and schedule
   a meeting. This is a meeting only
   between the parent’s of the bully
   and the administrator. The victim and
   victim’s parents are not there.
Cyber Bullying has occurred.
              Third step is resolution…
1. Consequences are determined and explained. In
     this situation a violation of CA EC 48900r carries
     a consequence of suspension. The amount of
     days the student is suspended will be
     determined based on the event and past
     discipline history, but will be between 1 and 5
     days. This is solely a school administration
     decision.
2. Depending on the severity or the frequency of the
     cyber-bullying, law enforcement may be
     contacted.
3. Any further participants related to this incident
     will be dealt with. Any record of the cyber-
     bullying will be removed and/or deleted.
4. Counseling and other follow-up services will be
     suggested/required for the victim and/or the
     bully.
Cyber Bullying has occurred.
                 Final step is outcome…




Reviewing the cycle of bullying, we can see that with our outcome, the victim has stood up
for herself; the bully has been identified and consequenced as well as any other participants
and/or supporters; parents have been informed, made aware, and been involved; the cyber-
bullying has been removed or deleted; and follow-up services have been established
including counseling. In this manner the cycle has been broken successfully.

This was all accomplished by the adults knowing how to identify cyber-bullying, how to
prevent it when possible, and how to address it successfully for both the victim and bully.
Review
Cyber Bullying Assessment
                                   (write down answers and turn in to proctor)
1)    True or False - Bullying is any severe or pervasive physical or verbal act or conduct that is intentionally harmful to another person?

2)    Which device could be used in a cyber-bullying situation? A) Cell Phone     B) Computer      C) Laptop    D) All of the above

3)    Which law is cyber-bullying prohibited by? A) EC 48900r     B) EC 5519x     C) PC 1229      D) PC 3451k

4)    Where should a parent allow their child to work on a laptop computer? A) At their desk in their room          B) At a friend’s house   C) In
      the dining room supervised D) All of the above

5)    What information should a parent have about their child’s social media site? A) The child’s friend list    B) The child’s username and
      password C) The child’s avatar D) The child’s permission

6)    Who has the final say on control of a cell phone or computer at home? A) The parent/guardian        B) The school      C) The Child    D) The
      government

7)    Who should an educator contact if a student violates the school computer use agreement? A) Another teacher              B) School
      administrator C) School secretary D) No one

8)    Who should the parent contact if cyber-bullying is suspected? A) Law enforcement         B) School psychologist     C) School nurse    D)
      School administrator

9)    True or False - A hard copy of what was stated or posted is strong evidence for a cyber bullying crime?

10)   Who should the school administrator involve with a suspected bully? A) The suspected bully’s parents           B) Law enforcement      C) The
      suspected bully’s teacher D) The school counselor

11)   True or False – The victim should be praised for standing up for themselves verbally and telling a trusted adult.

12)   What follow-up should be required for the victim and bully? A) Jail time     B) Apologies     C) Counseling     D) Expulsion

Más contenido relacionado

La actualidad más candente

Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Moral presentation
Moral presentationMoral presentation
Moral presentationKhailingWong
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullyingjgrosenthal
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Pointyusko1rj
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Jason Hong
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital LiteracyShSgh4
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship Terri Stice
 

La actualidad más candente (16)

Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullying
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Point
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Social media policy
Social media policySocial media policy
Social media policy
 
W200 final project
W200 final projectW200 final project
W200 final project
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 

Destacado

Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentationamate1cl
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingKatie_Waters
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012atomikey
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 

Destacado (20)

Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Nasilje na internetu
Nasilje na internetuNasilje na internetu
Nasilje na internetu
 

Similar a Aet 545 week 6 tutorial cyber bullying

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Cybercrime bullying report
Cybercrime bullying reportCybercrime bullying report
Cybercrime bullying reportJonald Urcz
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
bullymodule1.docx
bullymodule1.docxbullymodule1.docx
bullymodule1.docxwaihonLam1
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptxRAKHI SAWLANI
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfalshaikhkhanzariarts
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2Oliver Mittl
 

Similar a Aet 545 week 6 tutorial cyber bullying (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cybercrime bullying report
Cybercrime bullying reportCybercrime bullying report
Cybercrime bullying report
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
bullymodule1.docx
bullymodule1.docxbullymodule1.docx
bullymodule1.docx
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptx
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
 

Último

VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiSuhani Kapoor
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineBruce Bennett
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateSoham Mondal
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipSoham Mondal
 

Último (20)

VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University Certificate
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
 
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management Internship
 

Aet 545 week 6 tutorial cyber bullying

  • 1. 21st Century Bullying: Cyber-Bullying A Guide and Tutorial for Parents and Educators on How to Recognize, Prevent, and Address Cyber-Bullying
  • 2. Cyber Bullying A Statement of Goals Tutorial Goals 1.Identify what constitutes cyber-bullying and review some examples. 2.Learn Preventative Cyber-Bullying Steps to Take. 3.Learn How to Address Cyber-Bullying.
  • 3. Legal Definition of Cyber-Bullying California Education Code 48900r: Engaged in an act of bullying. For purposes of this subdivision, the following terms have the following meanings: (1) "Bullying" means any severe or pervasive physical or verbal act or conduct, including communications made in writing or by means of an electronic act, and including one or more acts committed by a pupil or group of pupils as defined in Section 48900.2, 48900.3, or 48900.4, directed toward one or more pupils that has or can be reasonably predicted to have the effect of one or more of the following: (A) Placing a reasonable pupil or pupils in fear of harm to that pupil's or those pupils' person or property. (B) Causing a reasonable pupil to experience a substantially detrimental effect on his or her physical or mental health. (C) Causing a reasonable pupil to experience substantial interference with his or her academic performance. (D) Causing a reasonable pupil to experience substantial interference with his or her ability to participate in or benefit from the services, activities, or privileges provided by a school. (2) "Electronic act" means the transmission of a communication, including, but not limited to, a message, text, sound, or image, or a post on a social network Internet Web site, by means of an electronic device, including, but not limited to, a telephone, wireless telephone or other wireless communication device, computer, or pager. (3) "Reasonable pupil" means a pupil, including, but not limited to, an exceptional needs pupil, who exercises average care, skill, and judgment in conduct for a person of his or her age, or for a person of his or her age with his or her exceptional needs.
  • 4. What is Bullying? Physical Bullying is when one person uses threatening physical action or force in order to make another person comply with them, scare them, intimidate them, or harm them. Verbal Bullying is when one person uses verbal communication to intimidate, harm, or threaten another into doing or acting how the bully wants . This would also include verbal retaliation threats with terms such as “snitch, narc, tattle, etc.” that are intended to keep the victim from speaking out. Gossiping or spreading rumors about another person is also a form of bullying meant to hurt someone else’s feelings, intimidate them, and /or harm them.
  • 5. Adding Cyber to the Bullying When the bullying is communicated or committed through an electronic device or an electronic transmission, it becomes cyber bullying. This would include threats, intimidation, gossip, rumors, or any other verbal or visual actions that are meant to harm another person. Cyber bullying can take place on cell phones, tablets, computers, laptops, etc. Cyber bullying messages can be transmitted via text messages, social media posts, images, pictures, and video.
  • 6. Goal 1 Identifying Cyber Bullying Wrap-Up
  • 7. How do parents and educators prevent Cyber Bullying? Be Active… Be Vigilant For parents, monitor, monitor, and monitor your child’s use on the internet. Let them know that you expect computer use to be done in an open area of the house. For educators, circulate, circulate, and keep circulating around when students are on the computer in your classroom or in the computer lab. Give Expectations Both parents and educators need to let kids know that if you would not say something in person to someone, you would not say it to them online in a post or text.
  • 8. How do parents and educators prevent Cyber Bullying? Utilize computer monitoring software Parents can purchase or download software that can monitor what sites children go to, block certain sites as needed, and provide a way to see what kids are posting. Educators should check with their local IT person to learn what is software available at the school site, what is in place, what its limitations are and how to use it. Set up guidelines at home for social media use Parents should talk to their child about rules for using social media sites. One of the rules should be that parents have the passwords for the child’s site in order to be able to check or access their account. Educators should already have usernames and password lists set up from their IT person for student use at school
  • 9. How do parents and educators prevent Cyber Bullying? Don’t be afraid to terminate or block access. Parents can always end their child’s access to a computer, website, or cell phone if the child is not following the expectations laid out or agreed upon. This can be a temporary restraint or a permanent one depending on the situation. Educators can follow suit by making sure that they inform the parent, administration, and the IT person if a student violates the school computer use agreement.
  • 10. Goal 2 Preventing Cyber Bullying Wrap-Up
  • 11. Cyber Bullying has occurred. What do I do now?
  • 12. Cyber Bullying has occurred. What do I do now?
  • 13. Cyber Bullying has occurred. First step is determine and identify… In the video we saw, it was a clear case of cyber-bullying and fulfills the legal requirements of Ed Code 48900r. The steps to be taken are as follows: 1. An adult is informed by the student/child of the situation/event. 2. The adult confirms the good choice of the student in letting him/her know. 3. The adult reviews the electronic evidence of the cyber-bullying attack and if possible generates a hard copy. 4. The adult meets with the school administrator to review what has happened, who is involved, and what has been done. 5. School administrator can help determine if local law enforcement also needs to be contacted. Now what?
  • 14. Cyber Bullying has occurred. Second step is contact the school… 1. The administrator will take the cyber-bullying information and evidence and meet first with the alleged bully. 2. The administrator will determine the level of responsibility for the cyber-bullying by the bully and if any other participants are involved. 3. The administrator will then contact the parents of the bully and inform them of the situation and schedule a meeting. This is a meeting only between the parent’s of the bully and the administrator. The victim and victim’s parents are not there.
  • 15. Cyber Bullying has occurred. Third step is resolution… 1. Consequences are determined and explained. In this situation a violation of CA EC 48900r carries a consequence of suspension. The amount of days the student is suspended will be determined based on the event and past discipline history, but will be between 1 and 5 days. This is solely a school administration decision. 2. Depending on the severity or the frequency of the cyber-bullying, law enforcement may be contacted. 3. Any further participants related to this incident will be dealt with. Any record of the cyber- bullying will be removed and/or deleted. 4. Counseling and other follow-up services will be suggested/required for the victim and/or the bully.
  • 16. Cyber Bullying has occurred. Final step is outcome… Reviewing the cycle of bullying, we can see that with our outcome, the victim has stood up for herself; the bully has been identified and consequenced as well as any other participants and/or supporters; parents have been informed, made aware, and been involved; the cyber- bullying has been removed or deleted; and follow-up services have been established including counseling. In this manner the cycle has been broken successfully. This was all accomplished by the adults knowing how to identify cyber-bullying, how to prevent it when possible, and how to address it successfully for both the victim and bully.
  • 18. Cyber Bullying Assessment (write down answers and turn in to proctor) 1) True or False - Bullying is any severe or pervasive physical or verbal act or conduct that is intentionally harmful to another person? 2) Which device could be used in a cyber-bullying situation? A) Cell Phone B) Computer C) Laptop D) All of the above 3) Which law is cyber-bullying prohibited by? A) EC 48900r B) EC 5519x C) PC 1229 D) PC 3451k 4) Where should a parent allow their child to work on a laptop computer? A) At their desk in their room B) At a friend’s house C) In the dining room supervised D) All of the above 5) What information should a parent have about their child’s social media site? A) The child’s friend list B) The child’s username and password C) The child’s avatar D) The child’s permission 6) Who has the final say on control of a cell phone or computer at home? A) The parent/guardian B) The school C) The Child D) The government 7) Who should an educator contact if a student violates the school computer use agreement? A) Another teacher B) School administrator C) School secretary D) No one 8) Who should the parent contact if cyber-bullying is suspected? A) Law enforcement B) School psychologist C) School nurse D) School administrator 9) True or False - A hard copy of what was stated or posted is strong evidence for a cyber bullying crime? 10) Who should the school administrator involve with a suspected bully? A) The suspected bully’s parents B) Law enforcement C) The suspected bully’s teacher D) The school counselor 11) True or False – The victim should be praised for standing up for themselves verbally and telling a trusted adult. 12) What follow-up should be required for the victim and bully? A) Jail time B) Apologies C) Counseling D) Expulsion