SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Cyberbullying in the Middle
          Years

         March 2011
Hello teachers!
                What we will discuss today:
     What is cyberbullying?
     The impact of cyberbullying on our teaching and
      student‘s learning
     Let‘s explore and compare the different
      programs/resources in place in the USA and Australia.
     We‘ll look at how the Australian cyberbullying
      programs/resources are used within a Queensland
      private High School and a Queensland public High
      School.
     Some recommendations for dealing with cyberbullying
      in our school

2
What is cyberbullying?
     Cyberbullying is harassment via email, mobile phone
      texts, personal websites, blogs, online gaming, instant
      messaging, social networks.
     Cyber bullies can target victims seemingly
      anonymously
     Cyber bullies are often students you may not suspect
     (Urbanski & Permuth, 2009).
     Victims fear losing Internet access if they tell parents
     (Goodstein, 2007).
     Victims may also engage in cyberbullying (Urbanski &
     Permuth, 2009).
     Bystanders or onlookers allow bullying to continue and
3
     give the bully power (Coloroso, 2008).
Cyberbullying in the middle
       years
     The middle years is from Years 4 to 9.
     The amount of teenagers on the Internet has
      increased and the amount of time they spend on the
      Internet is increasing.
     Accessing the Internet and communicating with
      mobiles are part of the everyday life of many of our
      students. Teens may have access to the Internet
      24/7 which makes them ―…susceptible to
      victimization (and able to act on mean intentions
      towards others) around the clock‖ (Hinduja & Patchin,
     2010, p. 2).
     ―ONE in five Australian parents believes their child

4
     has been bullied over the internet…‖ (Thom, 2011, p. 1).
Impact on teaching and learning
      Victims of cyberbullying may get
      ―…depressed, sad, angry, and frustrated‖
      (Hinduja & Patchin, 2010, p. 1).
      Victims may develop social and psychological
      issues as well as have educational difficulties
      (Australian Communications and Media Authority, 2009b).
      Cyberbullying has resulted in suicide and it
      negatively effects a student‘s capacity to learn
      in your classrooms.
         Let’s do something about it!
5
The emotional effect of
    cyberbullying




    Victims of bullying, including cyberbullying, do not feel
    safe at school (Varjas, Henrich & Meyers, 2009).
6
Cyberbullying programs and
        resources from the USA
     Conference on Bullying Prevention ~ a major
      conference headed by President Obama and the First
      Lady in March 2011.
       The media generated around this conference would have
        increased the public awareness of cyberbullying

     Check out this video clip next time you‘re at your
      computer:
        President Obama & the First Lady: Conference on
                      Bullying Prevention

     www.StopBullying.gov ~ new USA Govt. website which
      went online the day of the conference.
7
Cyberbullying programs and
      resources from the USA
     Centers for Disease Control and Prevention have
     created assessment tools/surveys (Hamburger, Basile
     & Vivolo, 2011) which are used by health educators or
     teachers.
       We could use some of the survey questions as
       a great way to start talking about cyberbullying
       in the classroom!

     OnGuard Online ~ http://www.onguardonline.gov/
       Lots of information, onlines quizzes and videos (another
        great resource to use in our classrooms!)
       Net Cetera, a specific campaign to help inform kids
8
Australian cyberbullying programs
      and resources used in schools
     Youth Advisory Group on cyber safety (YAG) ~
      established by the Australian Govt. in 2009. A part of
      the comprehensive cyber safety plan (Department of
      Broadband, Communications and the Digital Economy, 2011).
       In 2011 YAG will include 120 schools and 1200
         students to inform them of young adult‘s cyber issues
         and concerns.
     Cybersafety Help Button ~ developed
      from the YAG advice. On desktops of all
      school computers. Can download onto home
       computer. The user double-clicks on the
      button and then can Talk, Learn or Report.
      The Talk section will link the user to Kids
      Helpline (Department of Broadband,
      Communications and the Digital Economy, 2010).
9
Australian online resources for
          students, teachers & parents
 budd:e ~ an eSecurity education package.
  https://budd-e.staysmartonline.gov.au/
    An Australian resource that informs students of online safety
 cyber(smart:) ~ created by the Australian Communications and
  Media Authority (ACMA). http://www.cybersmart.gov.au/
    Includes educational lesson plans with videos
 Think U Know ~ Australian Federal Police and Microsoft Australia
  joined to create this site. http://www.thinkuknow.org.au/site/
    This explains how kids use technology
 Cure The Bullies ~ fun, interactive website that focuses on
     the bystander and helps kids realise that some things they
     may do might actually be an act of cyberbullying
     http://www.curethebullies.com.au/



10
The Queensland Department of
          Education &Training
      Queensland Government Responsible
      Behaviour Plan for Students ~ all state
      schools are required to have one and it should
      be reviewed at least every 3 years (Department of
      Education and Training, 2011a).

      Queensland Schools Alliance Against
      Violence ~ advice on the best practices to
      address bullying and violence in Queensland
      schools (Department of Education and Training, 2011b).

11
Comparison of USA & Australian
          programs/resources
      Both the USA and Australia have identified
       cyberbullying as a major problem
      Both countries have numerous programs and
       online tools to help teachers, parents and
       students understand cyberbullying issues and
       how to keep safe online.
      I believe positive change is possible if we talk
       about this issue more and engage students,
       parents and the community in this discussion.
        The action taken by the USA Government to hold a
        major Whitehouse Bullying conference is a good step in
        educating their whole community.



12
(Sample Public School)
              A Queensland State School
      Responsible Behaviour Plan for Students
        Zero tolerance of bullying
        Staff to take action for all bullying complaints
      (Sample Public School) Anti Bullying Policy
        No specific mention of cyberbullying within this document
      Anti-bullying program
        In-class lessons and reminders at assembly of the impact of
         cyberbullying
        Have set up an anonymous bullying email ‗Hotline‘
        Input student behaviour data on a daily basis into a
         database that helps track the effectiveness of their program
         and also identify specific issues
      Internet usage agreement to be read and signed by
      both students and their parents.

13
(Sample Private School)
            A Queensland private school
      Computer usage agreement
        Have students and parents read and sign
      Include information regarding cyberbullying and the
      use of technology in their monthly newsletters
      Internet Safety Awareness Presentation (Australian
       Communications and Media Authority: CyberSmart, 2009a)
        The school holds these presentations once or twice a
        year for parents, students and teachers
      Advise parents who complain about child being
      cyber bullied to inform the police

14
Comparison of private and state
           school approaches to
                cyberbullying
      Both schools have Internet usage agreements which
      parents and students are to read and sign
      (Sample Public School) (state school) has a specific
      anti-bullying program in place, which means that
      they have specifically identified the issue and are
      trying to minimise its impact on a daily basis.
      (Sample Private School) (private school)
      communicates to parents about cyberbullying and
      the use of technology on a regular basis through
      their monthly newsletters.
15
“cyberbullying rarely
           occurs in our school”
      I communicated with a teacher at (Sample
      Public School) and the Assistant to Director of
      Student Services at (Sample Private School)
      and both claimed that cyberbullying rarely
      occurred at their schools.
     Discussion:
        Is this realistic?
        Possibly students are reluctant to inform the
         school. Why do you think this may be the
         case? How can we ensure that students
         feel safe to tell us about these occurrences?
16
Recommendations
      Let‘s be realistic! Cyberbullying is more prevalent than
       we may realise. Talk about it with your students.
      Introduce an anti-bullying program within our school and
       specifically include cyberbullying as a main focus.
        Get more information regarding the use of a student
         behaviour database, as used at (Sample Public School)
        Have students be part of deciding on what is acceptable
         behaviour and outline the steps that they can take to stop
         cyberbullying
        Make action plans with students about how to deal with
         bullies, the victims and the bystander
      Talk to students and parents about the use of technology
       and identify what is cyberbullying and the impacts that it
       has on our teaching and student‘s learning.


17
Recommendations
                        continued…
      Look into hosting an Internet Safety Awareness
         Presentation by ACMA for our students, teachers,
         parents and interested community members
         Hold evening cyberbullying information sessions for
         parents – create an online presentation for those parents
         unable to attend
        Include in-class sessions in ICT, Business or Art courses
         using the budd:e and www.curethebullies.com.au
         websites as a basis for learning about cyberbullying,
         technology, web art and web design
        All teachers in classroom with computers should remind
         students about the purpose and use of the CyberSafety
         Help button.
18      Review our Responsible Behaviour Plan for students
Conclusions
      Cyberbullying has a negative impact on our
      students
      Victims of bullying do not feel safe at school. Often
      they feel sad, embarrassed, depressed, frustrated
      and scared and this impacts on their ability to learn
      The USA and Australia have strong cyberbullying
      programs and resources
      Both private and public schools have Internet usage
      plans and have anti-cyberbullying programs or
      online safety awareness presentations – but more
      can be done!
19
References
Australian Communications and Media Authority : CyberSmart. (2009a). Internet safety
  awareness presentation . Retrieved on 15 March, 2011 from
  http://www.cybersmart.gov.au/Schools/Book%20school%20seminars/Internet%20Saf
  ety%20Awareness%20Presentation.aspx
Australian Communications and Media Authority : CyberSmart. (2009b). Key
  characteristics and forms of cyberbullying. Retrieved on 15 March, 2011 from
  http://www.cybersmart.gov.au/Schools/Common%20cybersafety%20issues/Cyberbull
  ying/Key%20characteristics%20and%20forms%20of%20cyberbullying.aspx
Coloroso, B. (2008). The Bully, the Bullied, and the Bystander. New York : Collins Living
Department of Broadband, Communications and the Digital Economy. Australian
  Government. (2010). Cybersafety help button download page. Retrieved on 20
  March, 2011 from
  http://www.dbcde.gov.au/online_safety_and_security/cybersafetyhelpbutton_downloa
  d
Department of Broadband, Communications and the Digital Economy. Australian
  Government . (2011). Youth Advisory Group on cybersafety. Retrieved on 20 March,
  2011 from
  http://www.dbcde.gov.au/funding_and_programs/cybersafety_plan/youth_advisory_gr
  oup
Department of Education and Training. (2011a). Responsible Behaviour Plan for
  Students. Retrieved on 20 March, 2011 from
  http://education.qld.gov.au/studentservices/behaviour/bm-plans.html



20
Department of Education and Training. (2011b). Queensland school alliance against
   violence. Retrieved on 20 March, 2011 from
   http://education.qld.gov.au/studentservices/behaviour/qsaav/background.html
Goodstein, A. (2007). Totally wired: what teens and tweens are really doing online. New
   York : Saint Martin's Griffin
Hamburger, M. E., Basile, K.C., & Vivolo, A.M. (2011). Measuring bullying victimization,
   perpetration, and bystander experiences: a compendium of assessment tools. Atlanta,
   GA: Centers for Disease Control and Prevention, National Center for Injury Prevention
   and Control.
Hinduja, S. & Patchin, J. W. (2010). Cyberbullying: identification, prevention, and response.
   Retrieved on March 15, 2011 from
   http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_Response_Fact_S
   heet.pdf
Sameer, H. & Patchin, J. W. (2008). How cyberbullying victims felt (table). Retrieved on 20
   March, 2011 from
   http://cyberbullying.us/2007_charts/cyberbullying_how_victims_felt_2007.JPG
Thom, G. (March 6, 2011). Cyber bullying fears rife among parents. Herald Sun. Retrieved
   on March 15, 2011 from http://www.heraldsun.com.au/news/national/cyber-bullying-
   fears-rife-among-parents/story-e6frf7l6-1226016745249
Urbanski, J. & Permuth, S. (2009). The truth about bullying: what educators and parents
   must know and do. Lanham, Md. : Rowman & Littlefield Education
Varjas, K., Henrich, C. C., & Meyers, J. (2009). Urban middle school students perceptions
   of bullying, cyberbullying, and school safety. Journal of School Violence, 8: 2, 159 —
21 176

Más contenido relacionado

La actualidad más candente

Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saadsbaluch1
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 

La actualidad más candente (18)

Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saad
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Destacado

Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...
Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...
Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...SolarWinds Loggly
 
D5 crazy speed web development
D5 crazy speed web developmentD5 crazy speed web development
D5 crazy speed web developmentNAVER D2
 
Big Data Expo 2015 - Teradata Big Data : Just use it!
Big Data Expo 2015 - Teradata Big Data : Just use it!Big Data Expo 2015 - Teradata Big Data : Just use it!
Big Data Expo 2015 - Teradata Big Data : Just use it!BigDataExpo
 
Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...Dynatrace
 
How to Collect and Process Data Under GDPR?
How to Collect and Process Data Under GDPR?How to Collect and Process Data Under GDPR?
How to Collect and Process Data Under GDPR?Piwik PRO
 
AWSome Day - Milan, July 24th 2014
AWSome Day - Milan, July 24th 2014AWSome Day - Milan, July 24th 2014
AWSome Day - Milan, July 24th 2014Amazon Web Services
 
Modernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedModernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedMicrosoft Österreich
 
Secure and Private Email 2017
Secure and Private Email 2017Secure and Private Email 2017
Secure and Private Email 2017Ioli Papadopoulou
 
Developers Summit 2012 16-E-1
Developers Summit 2012 16-E-1Developers Summit 2012 16-E-1
Developers Summit 2012 16-E-1Kohei Kumazawa
 
Things you should know about Scalability!
Things you should know about Scalability!Things you should know about Scalability!
Things you should know about Scalability!Robert Mederer
 
2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_Roo
2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_Roo2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_Roo
2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_RooKai Wähner
 
Fontys eric van tol
Fontys eric van tolFontys eric van tol
Fontys eric van tolBigDataExpo
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finaleileendohertysmith
 
1st step LogicFlow
1st step LogicFlow1st step LogicFlow
1st step LogicFlowTomoyuki Obi
 
Red Hat Storage Server Roadmap & Integration With Open Stack
Red Hat Storage Server Roadmap & Integration With Open StackRed Hat Storage Server Roadmap & Integration With Open Stack
Red Hat Storage Server Roadmap & Integration With Open StackRed_Hat_Storage
 

Destacado (20)

Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...
Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...
Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...
 
D5 crazy speed web development
D5 crazy speed web developmentD5 crazy speed web development
D5 crazy speed web development
 
Big Data Expo 2015 - Teradata Big Data : Just use it!
Big Data Expo 2015 - Teradata Big Data : Just use it!Big Data Expo 2015 - Teradata Big Data : Just use it!
Big Data Expo 2015 - Teradata Big Data : Just use it!
 
Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...Gaining visibility into your Openshift application container platform with Dy...
Gaining visibility into your Openshift application container platform with Dy...
 
How to Collect and Process Data Under GDPR?
How to Collect and Process Data Under GDPR?How to Collect and Process Data Under GDPR?
How to Collect and Process Data Under GDPR?
 
AWSome Day - Milan, July 24th 2014
AWSome Day - Milan, July 24th 2014AWSome Day - Milan, July 24th 2014
AWSome Day - Milan, July 24th 2014
 
Modernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedModernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future Decoded
 
Go Serverless with AWS Lambda and Apex
Go Serverless with AWS Lambda and ApexGo Serverless with AWS Lambda and Apex
Go Serverless with AWS Lambda and Apex
 
Secure and Private Email 2017
Secure and Private Email 2017Secure and Private Email 2017
Secure and Private Email 2017
 
okspring3x
okspring3xokspring3x
okspring3x
 
Developers Summit 2012 16-E-1
Developers Summit 2012 16-E-1Developers Summit 2012 16-E-1
Developers Summit 2012 16-E-1
 
Things you should know about Scalability!
Things you should know about Scalability!Things you should know about Scalability!
Things you should know about Scalability!
 
2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_Roo
2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_Roo2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_Roo
2011_Herbstcampus_Rapid_Cloud_Development_with_Spring_Roo
 
Fontys eric van tol
Fontys eric van tolFontys eric van tol
Fontys eric van tol
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
 
Resume Building for Teens
Resume Building for TeensResume Building for Teens
Resume Building for Teens
 
1st step LogicFlow
1st step LogicFlow1st step LogicFlow
1st step LogicFlow
 
Red Hat Storage Server Roadmap & Integration With Open Stack
Red Hat Storage Server Roadmap & Integration With Open StackRed Hat Storage Server Roadmap & Integration With Open Stack
Red Hat Storage Server Roadmap & Integration With Open Stack
 
Andreas weigend
Andreas weigendAndreas weigend
Andreas weigend
 
ecdevday7
ecdevday7ecdevday7
ecdevday7
 

Similar a Cyberbullying in the Middle Years

Protection of Students Online
Protection of Students Online Protection of Students Online
Protection of Students Online Wabel Alwabel
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefSecurly
 
School Librarians Case Study
School Librarians Case StudySchool Librarians Case Study
School Librarians Case StudyYolanda Gonzalez
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentationYuming Peng
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentationYuming Peng
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Cyber Bullying Chapter-LeCadre&Zapp
Cyber Bullying Chapter-LeCadre&ZappCyber Bullying Chapter-LeCadre&Zapp
Cyber Bullying Chapter-LeCadre&ZappCraig LeCadre
 
Cyber safe manual_2_final_lowres
Cyber safe manual_2_final_lowresCyber safe manual_2_final_lowres
Cyber safe manual_2_final_lowresEDITHA HONRADEZ
 
Hipaa Compliance And Technology Use Essay
Hipaa Compliance And Technology Use EssayHipaa Compliance And Technology Use Essay
Hipaa Compliance And Technology Use EssayAndrea Turner
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Modulelpj101
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 

Similar a Cyberbullying in the Middle Years (20)

Protection of Students Online
Protection of Students Online Protection of Students Online
Protection of Students Online
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 
School Librarians Case Study
School Librarians Case StudySchool Librarians Case Study
School Librarians Case Study
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Cyber Bullying Chapter-LeCadre&Zapp
Cyber Bullying Chapter-LeCadre&ZappCyber Bullying Chapter-LeCadre&Zapp
Cyber Bullying Chapter-LeCadre&Zapp
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Cyber safe manual_2_final_lowres
Cyber safe manual_2_final_lowresCyber safe manual_2_final_lowres
Cyber safe manual_2_final_lowres
 
Hipaa Compliance And Technology Use Essay
Hipaa Compliance And Technology Use EssayHipaa Compliance And Technology Use Essay
Hipaa Compliance And Technology Use Essay
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
finalproposal
finalproposalfinalproposal
finalproposal
 
Final project
Final projectFinal project
Final project
 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Module
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 

Más de elketeaches

PD Byte - 'Coding' introduction
PD Byte - 'Coding' introductionPD Byte - 'Coding' introduction
PD Byte - 'Coding' introductionelketeaches
 
Alice3 Introduction
Alice3 IntroductionAlice3 Introduction
Alice3 Introductionelketeaches
 
The promise of digital technology in education to deliver equity and transfor...
The promise of digital technology in education to deliver equity and transfor...The promise of digital technology in education to deliver equity and transfor...
The promise of digital technology in education to deliver equity and transfor...elketeaches
 
Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...elketeaches
 
Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...elketeaches
 
Lego Mindstorms EV3 - teaching & learning
Lego Mindstorms EV3 - teaching & learningLego Mindstorms EV3 - teaching & learning
Lego Mindstorms EV3 - teaching & learningelketeaches
 
School Arcade proposal presentation
School Arcade proposal presentationSchool Arcade proposal presentation
School Arcade proposal presentationelketeaches
 
Arduino Introduction Guide 1
Arduino Introduction Guide 1Arduino Introduction Guide 1
Arduino Introduction Guide 1elketeaches
 
Arduino Intro Guide 2
Arduino Intro Guide 2Arduino Intro Guide 2
Arduino Intro Guide 2elketeaches
 
2022 Commonwealth Games in Quebec
2022 Commonwealth Games in Quebec2022 Commonwealth Games in Quebec
2022 Commonwealth Games in Quebecelketeaches
 
Social connectedness teaching strategy
Social connectedness teaching strategySocial connectedness teaching strategy
Social connectedness teaching strategyelketeaches
 
e4e Mrs Schneider Introduction
e4e Mrs Schneider Introductione4e Mrs Schneider Introduction
e4e Mrs Schneider Introductionelketeaches
 
IPT Year 12 how to design database
IPT Year 12 how to design databaseIPT Year 12 how to design database
IPT Year 12 how to design databaseelketeaches
 

Más de elketeaches (15)

PD Byte - 'Coding' introduction
PD Byte - 'Coding' introductionPD Byte - 'Coding' introduction
PD Byte - 'Coding' introduction
 
Alice3 Introduction
Alice3 IntroductionAlice3 Introduction
Alice3 Introduction
 
Robotics intro
Robotics introRobotics intro
Robotics intro
 
The promise of digital technology in education to deliver equity and transfor...
The promise of digital technology in education to deliver equity and transfor...The promise of digital technology in education to deliver equity and transfor...
The promise of digital technology in education to deliver equity and transfor...
 
Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...
 
Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...Leading Girls into ICT: Increasing female participation at Somerset College (...
Leading Girls into ICT: Increasing female participation at Somerset College (...
 
Gaming & Gender
Gaming & GenderGaming & Gender
Gaming & Gender
 
Lego Mindstorms EV3 - teaching & learning
Lego Mindstorms EV3 - teaching & learningLego Mindstorms EV3 - teaching & learning
Lego Mindstorms EV3 - teaching & learning
 
School Arcade proposal presentation
School Arcade proposal presentationSchool Arcade proposal presentation
School Arcade proposal presentation
 
Arduino Introduction Guide 1
Arduino Introduction Guide 1Arduino Introduction Guide 1
Arduino Introduction Guide 1
 
Arduino Intro Guide 2
Arduino Intro Guide 2Arduino Intro Guide 2
Arduino Intro Guide 2
 
2022 Commonwealth Games in Quebec
2022 Commonwealth Games in Quebec2022 Commonwealth Games in Quebec
2022 Commonwealth Games in Quebec
 
Social connectedness teaching strategy
Social connectedness teaching strategySocial connectedness teaching strategy
Social connectedness teaching strategy
 
e4e Mrs Schneider Introduction
e4e Mrs Schneider Introductione4e Mrs Schneider Introduction
e4e Mrs Schneider Introduction
 
IPT Year 12 how to design database
IPT Year 12 how to design databaseIPT Year 12 how to design database
IPT Year 12 how to design database
 

Último

AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSyedNadeemGillANi
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxvidhisharma994099
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceApostolos Syropoulos
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...M56BOOKSTORE PRODUCT/SERVICE
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 

Último (20)

AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptx
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 

Cyberbullying in the Middle Years

  • 1. Cyberbullying in the Middle Years March 2011
  • 2. Hello teachers! What we will discuss today:  What is cyberbullying?  The impact of cyberbullying on our teaching and student‘s learning  Let‘s explore and compare the different programs/resources in place in the USA and Australia.  We‘ll look at how the Australian cyberbullying programs/resources are used within a Queensland private High School and a Queensland public High School.  Some recommendations for dealing with cyberbullying in our school 2
  • 3. What is cyberbullying?  Cyberbullying is harassment via email, mobile phone texts, personal websites, blogs, online gaming, instant messaging, social networks.  Cyber bullies can target victims seemingly anonymously  Cyber bullies are often students you may not suspect (Urbanski & Permuth, 2009).  Victims fear losing Internet access if they tell parents (Goodstein, 2007).  Victims may also engage in cyberbullying (Urbanski & Permuth, 2009).  Bystanders or onlookers allow bullying to continue and 3 give the bully power (Coloroso, 2008).
  • 4. Cyberbullying in the middle years  The middle years is from Years 4 to 9.  The amount of teenagers on the Internet has increased and the amount of time they spend on the Internet is increasing.  Accessing the Internet and communicating with mobiles are part of the everyday life of many of our students. Teens may have access to the Internet 24/7 which makes them ―…susceptible to victimization (and able to act on mean intentions towards others) around the clock‖ (Hinduja & Patchin, 2010, p. 2).  ―ONE in five Australian parents believes their child 4 has been bullied over the internet…‖ (Thom, 2011, p. 1).
  • 5. Impact on teaching and learning  Victims of cyberbullying may get ―…depressed, sad, angry, and frustrated‖ (Hinduja & Patchin, 2010, p. 1).  Victims may develop social and psychological issues as well as have educational difficulties (Australian Communications and Media Authority, 2009b).  Cyberbullying has resulted in suicide and it negatively effects a student‘s capacity to learn in your classrooms. Let’s do something about it! 5
  • 6. The emotional effect of cyberbullying Victims of bullying, including cyberbullying, do not feel safe at school (Varjas, Henrich & Meyers, 2009). 6
  • 7. Cyberbullying programs and resources from the USA  Conference on Bullying Prevention ~ a major conference headed by President Obama and the First Lady in March 2011.  The media generated around this conference would have increased the public awareness of cyberbullying  Check out this video clip next time you‘re at your computer: President Obama & the First Lady: Conference on Bullying Prevention  www.StopBullying.gov ~ new USA Govt. website which went online the day of the conference. 7
  • 8. Cyberbullying programs and resources from the USA  Centers for Disease Control and Prevention have created assessment tools/surveys (Hamburger, Basile & Vivolo, 2011) which are used by health educators or teachers.  We could use some of the survey questions as a great way to start talking about cyberbullying in the classroom!  OnGuard Online ~ http://www.onguardonline.gov/  Lots of information, onlines quizzes and videos (another great resource to use in our classrooms!)  Net Cetera, a specific campaign to help inform kids 8
  • 9. Australian cyberbullying programs and resources used in schools  Youth Advisory Group on cyber safety (YAG) ~ established by the Australian Govt. in 2009. A part of the comprehensive cyber safety plan (Department of Broadband, Communications and the Digital Economy, 2011).  In 2011 YAG will include 120 schools and 1200 students to inform them of young adult‘s cyber issues and concerns.  Cybersafety Help Button ~ developed from the YAG advice. On desktops of all school computers. Can download onto home computer. The user double-clicks on the button and then can Talk, Learn or Report. The Talk section will link the user to Kids Helpline (Department of Broadband, Communications and the Digital Economy, 2010). 9
  • 10. Australian online resources for students, teachers & parents  budd:e ~ an eSecurity education package. https://budd-e.staysmartonline.gov.au/  An Australian resource that informs students of online safety  cyber(smart:) ~ created by the Australian Communications and Media Authority (ACMA). http://www.cybersmart.gov.au/  Includes educational lesson plans with videos  Think U Know ~ Australian Federal Police and Microsoft Australia joined to create this site. http://www.thinkuknow.org.au/site/  This explains how kids use technology  Cure The Bullies ~ fun, interactive website that focuses on the bystander and helps kids realise that some things they may do might actually be an act of cyberbullying http://www.curethebullies.com.au/ 10
  • 11. The Queensland Department of Education &Training  Queensland Government Responsible Behaviour Plan for Students ~ all state schools are required to have one and it should be reviewed at least every 3 years (Department of Education and Training, 2011a).  Queensland Schools Alliance Against Violence ~ advice on the best practices to address bullying and violence in Queensland schools (Department of Education and Training, 2011b). 11
  • 12. Comparison of USA & Australian programs/resources  Both the USA and Australia have identified cyberbullying as a major problem  Both countries have numerous programs and online tools to help teachers, parents and students understand cyberbullying issues and how to keep safe online.  I believe positive change is possible if we talk about this issue more and engage students, parents and the community in this discussion.  The action taken by the USA Government to hold a major Whitehouse Bullying conference is a good step in educating their whole community. 12
  • 13. (Sample Public School) A Queensland State School  Responsible Behaviour Plan for Students  Zero tolerance of bullying  Staff to take action for all bullying complaints  (Sample Public School) Anti Bullying Policy  No specific mention of cyberbullying within this document  Anti-bullying program  In-class lessons and reminders at assembly of the impact of cyberbullying  Have set up an anonymous bullying email ‗Hotline‘  Input student behaviour data on a daily basis into a database that helps track the effectiveness of their program and also identify specific issues  Internet usage agreement to be read and signed by both students and their parents. 13
  • 14. (Sample Private School) A Queensland private school  Computer usage agreement  Have students and parents read and sign  Include information regarding cyberbullying and the use of technology in their monthly newsletters  Internet Safety Awareness Presentation (Australian Communications and Media Authority: CyberSmart, 2009a)  The school holds these presentations once or twice a year for parents, students and teachers  Advise parents who complain about child being cyber bullied to inform the police 14
  • 15. Comparison of private and state school approaches to cyberbullying  Both schools have Internet usage agreements which parents and students are to read and sign  (Sample Public School) (state school) has a specific anti-bullying program in place, which means that they have specifically identified the issue and are trying to minimise its impact on a daily basis.  (Sample Private School) (private school) communicates to parents about cyberbullying and the use of technology on a regular basis through their monthly newsletters. 15
  • 16. “cyberbullying rarely occurs in our school”  I communicated with a teacher at (Sample Public School) and the Assistant to Director of Student Services at (Sample Private School) and both claimed that cyberbullying rarely occurred at their schools. Discussion:  Is this realistic?  Possibly students are reluctant to inform the school. Why do you think this may be the case? How can we ensure that students feel safe to tell us about these occurrences? 16
  • 17. Recommendations  Let‘s be realistic! Cyberbullying is more prevalent than we may realise. Talk about it with your students.  Introduce an anti-bullying program within our school and specifically include cyberbullying as a main focus.  Get more information regarding the use of a student behaviour database, as used at (Sample Public School)  Have students be part of deciding on what is acceptable behaviour and outline the steps that they can take to stop cyberbullying  Make action plans with students about how to deal with bullies, the victims and the bystander  Talk to students and parents about the use of technology and identify what is cyberbullying and the impacts that it has on our teaching and student‘s learning. 17
  • 18. Recommendations continued…  Look into hosting an Internet Safety Awareness Presentation by ACMA for our students, teachers, parents and interested community members  Hold evening cyberbullying information sessions for parents – create an online presentation for those parents unable to attend  Include in-class sessions in ICT, Business or Art courses using the budd:e and www.curethebullies.com.au websites as a basis for learning about cyberbullying, technology, web art and web design  All teachers in classroom with computers should remind students about the purpose and use of the CyberSafety Help button. 18  Review our Responsible Behaviour Plan for students
  • 19. Conclusions  Cyberbullying has a negative impact on our students  Victims of bullying do not feel safe at school. Often they feel sad, embarrassed, depressed, frustrated and scared and this impacts on their ability to learn  The USA and Australia have strong cyberbullying programs and resources  Both private and public schools have Internet usage plans and have anti-cyberbullying programs or online safety awareness presentations – but more can be done! 19
  • 20. References Australian Communications and Media Authority : CyberSmart. (2009a). Internet safety awareness presentation . Retrieved on 15 March, 2011 from http://www.cybersmart.gov.au/Schools/Book%20school%20seminars/Internet%20Saf ety%20Awareness%20Presentation.aspx Australian Communications and Media Authority : CyberSmart. (2009b). Key characteristics and forms of cyberbullying. Retrieved on 15 March, 2011 from http://www.cybersmart.gov.au/Schools/Common%20cybersafety%20issues/Cyberbull ying/Key%20characteristics%20and%20forms%20of%20cyberbullying.aspx Coloroso, B. (2008). The Bully, the Bullied, and the Bystander. New York : Collins Living Department of Broadband, Communications and the Digital Economy. Australian Government. (2010). Cybersafety help button download page. Retrieved on 20 March, 2011 from http://www.dbcde.gov.au/online_safety_and_security/cybersafetyhelpbutton_downloa d Department of Broadband, Communications and the Digital Economy. Australian Government . (2011). Youth Advisory Group on cybersafety. Retrieved on 20 March, 2011 from http://www.dbcde.gov.au/funding_and_programs/cybersafety_plan/youth_advisory_gr oup Department of Education and Training. (2011a). Responsible Behaviour Plan for Students. Retrieved on 20 March, 2011 from http://education.qld.gov.au/studentservices/behaviour/bm-plans.html 20
  • 21. Department of Education and Training. (2011b). Queensland school alliance against violence. Retrieved on 20 March, 2011 from http://education.qld.gov.au/studentservices/behaviour/qsaav/background.html Goodstein, A. (2007). Totally wired: what teens and tweens are really doing online. New York : Saint Martin's Griffin Hamburger, M. E., Basile, K.C., & Vivolo, A.M. (2011). Measuring bullying victimization, perpetration, and bystander experiences: a compendium of assessment tools. Atlanta, GA: Centers for Disease Control and Prevention, National Center for Injury Prevention and Control. Hinduja, S. & Patchin, J. W. (2010). Cyberbullying: identification, prevention, and response. Retrieved on March 15, 2011 from http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_Response_Fact_S heet.pdf Sameer, H. & Patchin, J. W. (2008). How cyberbullying victims felt (table). Retrieved on 20 March, 2011 from http://cyberbullying.us/2007_charts/cyberbullying_how_victims_felt_2007.JPG Thom, G. (March 6, 2011). Cyber bullying fears rife among parents. Herald Sun. Retrieved on March 15, 2011 from http://www.heraldsun.com.au/news/national/cyber-bullying- fears-rife-among-parents/story-e6frf7l6-1226016745249 Urbanski, J. & Permuth, S. (2009). The truth about bullying: what educators and parents must know and do. Lanham, Md. : Rowman & Littlefield Education Varjas, K., Henrich, C. C., & Meyers, J. (2009). Urban middle school students perceptions of bullying, cyberbullying, and school safety. Journal of School Violence, 8: 2, 159 — 21 176