P911, bff, ttyl, lol, – what are our kids talking about? From inclusion/exclusion comments in a person’s profile to directly attacking someone, bullying has taken on a new dimension through a variety of online tools. In this workshop, adults will learn more about Instant Messaging (IM), the subversive tactics of cyber-fighting and resources to help you protect your children from cyberbullies.
Cyberbullying on The Rise: What You Can Do To Stop It.
1.
2. Zoey’s Room -- www.zoeysroom.com A fun and safe online community for 10- to 14-year-old girls, encouraging their interest in science, technology, engineering and math.
3.
4. The New Cause for Internet Safety 21 million teens use the Internet 79% of online teens agree that teens aren ’ t careful enough when sharing personal information online. 65% of all parents and 64% of all teens say that teens do things online that they wouldn ’ t want their parents to know about. Source: Pew Internet and American Life Project, 2007
10. Time to IM each Other Image from gulf-times.com
11.
12.
13. Who Gets Cyberbullied? More than 40% of kids have reported being bullied online Study reported by The Early Show, CBS News 2-22-07, “Cyberbullying Growing.” Cyberbullying usually starts at age 9. Wired Safety.og Girls are just as prone to engage in this sort of bullying as boys.
14.
15.
16. How Cyberbullying Works Warning Wars “ Telling on” kids by pressing the warn or abuse button to get them kicked off IM IM “ What is Cyberbullying Exactly” Parry Aftab, Wiredsafety.org, 2006
17. How Cyberbullying Works Internet Polls Offensive polls designed to “rate” other kids Websites “ What is Cyberbullying Exactly” Parry Aftab, WiredSafety.org, 2006
18. How Cyberbullying Works Flaming Hateful messages (including lies and gossip) sent directly to victim or spread to other kids Chat Room Blogs Email IM Texting “ What is Cyberbullying Exactly” Parry Aftab, WiredSafety.org, 2006
19. How Cyberbullying Works Website Bashing Putting up a mean/cruel website about someone and letting people comment. Websites - You can even Create your own Social network now Comments “ What is Cyberbullying Exactly” Parry Aftab, WiredSafety.org, 2006
20. How Cyberbullying Works Impersonation Pretending to be someone else online Chat Room Blogs Email IM Websites “ What is Cyberbullying Exactly” Parry Aftab, WiredSafety.org, 2006
21. How Cyberbullying Works Outing Revealing someone’s secrets to humiliate someone or ruin her reputation Blog Websites Cell phone Email “ What is Cyberbullying Exactly” Parry Aftab, WiredSafety.org, 2006
22. How Cyberbullying Works Criminal Threat Serious language to warn you or threaten you bodily harm. Chat Room Blogs Websites “ What is Cyberbullying Exactly” Parry Aftab, WiredSafety.org, 2006
23. How To make yourself -Be very selective with your buddy list. -Never give out very personal info (even to friends). -Think b4 u Click …check to see who ur sending message to, JK or :-) [IM language matters] -Don’t let people take compromising pics of u or put up on social networking sites …keep ur info PRIVATE -Do not engage in revenge / cyberbullying yourself …Take 5 if something upsets you Flame Resistant
24. Google Yourself Google “alerts” can be programmed to find your name all over the ‘Net and to alert you if your name or info is popping up in inappropriate places. Have you “Googled” yourself?
25. How To Protect Yourself FIRST LEVEL Is it a one-time prank? Is it mild teasing? DON’T RETALIATE BEST ADVICE--IGNORE SECOND LEVEL Is it one of the tactics we discussed today? Does it feel vicious? BEST ADVICE--TELL A TRUSTED ADULT POST ONE COMMENT: “LEAVE ME ALONE.” SAVE EVERYTHING WITH SCREEN SHOTS BLOCK SENDERS/GET OFF PEOPLE’S BUDDY LISTS NOTIFY THE INTERNET SERVICE PROVIDER (ISP) Advice from Maine Attorney General’s office and WiredSafety.org
26. How To Protect Yourself THIRD LEVEL-Cyberstalking Have you been threatened? Are you afraid for your safety? Have they made any abusive comments? BEST ADVICE--INFORM SCHOOL AUTHORITIES GIVE POLICE SAVED RECORDS CONTACT WIREDSAFETY.ORG IF THREATENED. When do you need to bring in the law? To see specific threats/behaviors, go to http://www.stopcyberbullying.org/lawenforcement