SlideShare una empresa de Scribd logo
1 de 38
Comprehensive District
Cybersafety Program
John Woodring
Liberty University
Comprehensive District Cybersafety Program

NEED FOR A CYBERSAFETY PROGRAM
According to Research
• 90% of youth aged 12-17 are online on a daily basis
(Snakenborg, Van Acker, & Gable, 2011).
• 23% of teens age 12-17 own a smartphone.
• 31% of teens age 14-17 own a smartphone.
• 8% of teens age 12-13 own a smartphone.
• 77% of teens age 12-17 own a cell phone (Lenhart, 2012).
• 23% of teens own a tablet computer (Rainie, 2012).
• Cyberbullying is most often done through mobile phones
(Toshack & Colmar, 2012).
While most cyberbullying incidents
take place outside of school,
incidents often originate in school
(Paul, Smith, & Blumberg, 2010).
College admissions staff and human
resource departments are asking for
access to personal web pages (or
searching for them) to view what the
applicant has posted (Dowell, Burgess, &
Cavanaugh, 2009).
Children’s Internet Protection Act
of 2012 (CIPA)
“Schools may not receive E-rate discounts unless they certify they
provide an educational program for students about appropriate
online behavior, including interacting with individuals on social
networking websites and in chat rooms, and Cyberbullying
awareness and response” (Federal Communications
Commission, 2013).
(Stauffer, Heath, Coyne, & Ferrin, 2012)

(Stauffer, Heath, Coyne, & Ferrin,
2012)

School Districts and Schools may
be held legally accountable for
failing to respond to cybersafety
violations if any harm is caused by
these violations.
Students need to be taught cyberbullying
safety strategies explicitly if they are going
to protect themselves when using
electronic devices (Toshack & Colmar, 2012).
Comprehensive District Cybersafety Program

UNDERSTANDING THE PROBLEM
While there are other cybersafety threats
such as identity theft and computer
viruses and malware, cyberbullying and
sexting pose the greatest threat to
disrupting the educational process.
Definitions
• Cyberbullying
• Using computers, cell phones, and other electronic devices to
commit willful and repeated harm to others (Hinduja & Patchin,
2011).
Definitions
• Sexting
• Sending or receiving of sexually explicit or sexually-suggestive
images or video via a cell phone or other electronic device.
• This could mean students taking and distributing nude or seminude photos of themselves.
• While photos are meant for a boyfriend or girlfriend, they can be
sent to unintended people.
(Hinduja & Patchin, 2010)
(Hinduja & Patchin, 2011)

Scope of the Problem: Cyberbully
Victims
(Hinduja & Patchin, 2011)

Scope of the Problem: Cyberbully
Offenders
(Hinduja & Patchin, 2010)
(Hinduja & Patchin, 2010)
Potential Harm: Cyberbullying
• Victims often have a variety of mental issues
such as:
• Depressed
• Sad
• Angry
• Frustrated
• Some victims have suicidal thoughts,
attempted suicide, or committed suicide.
(Hinduja & Patchin, 2011)
Potential Harm: Cyberbullying
• Show signs of physical illnesses.
• Low self-esteem
• Embarrassed or afraid to go to school.
• Family and academic problems.
• School violence or delinquent behavior.
(Hinduja & Patchin, 2011)
Potential Harm: Cyberbullying
• Cyberbullying has an anonymity factor that leads
to less social accountability (Sbarbaro & Enyear Smith,
2011).
• Cyberbullies develop a lack of empathy (Hinduja &
Patchin, 2011).
• Those who engage in cyberbullying often
become targets of traditional bullying or
cyberbullying (Accordino & Accordino, 2011).
Potential Harm: Sexting
• Shame
• Cyberbullied
• Harassed and bullied at school.
• Called derogatory names.
• Unwanted attention making someone feel
uncomfortable.
• Mental, physical, and emotional problems.
• Up to and including suicide.
• Belief no one cares.
(Hinduja & Patchin, 2010)
Comprehensive District Cybersafety Program

DISTRICT LEVEL
Challenges to a Cybersafety
Program
• Anonymous nature of Cyberbullying.
• Wider audience.
• Lack of supervision online.
• Easy and continuous access to technology.
• Rapid changes in technology.
(Pearce, Cross, Monks, Waters, & Falconer, 2011)
Cybersafety Student Survey
• The district and individual schools should know what
kind of cybersafety problem they have and how big it is.
• This information should guide district and school
administrators on an appropriate response and they type
of cybersafety education program needed.
• One instrument to use is the Cyberbullying and Online
Aggression Survey developed by Hinduja & Patchin
(2009) (Sbarbaro & Enyear Smith, 2011).
Select Appropriate Programs
• Programs should provide uniformity of
instruction but allow flexibility to address unique
school needs.
• Program should be appropriate and engaging for
• Elementary
• Middle School
• High School
(Ahlfors, 2010)
Select Appropriate Programs
• Programs such as the European
CyberTraining programcan train adults on
how to run a cybersafety program (Jager,
Amado, Matos, & Pessoa, 2010).

• Students should be consulted when
selecting a cybersafety program (Toshack &
Colmar, 2012).
Budgeting for Programs
• Ensure proper training and professional
development.
• Provide needed materials to schools.
District Cybersafety Coordinator
• Additional duty assigned by the district
superintendent.
• Coordinates school cybersafety programs.
• Researches latest trends in cybersafety.
• Trains school Cybersafety Coordinators.
• Helps set consequences and guidelines for
cybersafety violations.
• Ensures the district is compliant with E-rate
cybersafety requirements.
District Cybersafety Coordinator
(continuted)
• Speaks at parent and community functions but
cybersafety and district cybersafety initiatives.
• Works with law enforcement on cybersafety
issues when necessary.
• Readily available to the media to address
cybersafety issues in cooperation with district
public relations.
Comprehensive District Cybersafety Program

SCHOOL LEVEL
Implementation
• Cybersafety units must be taught in courses all students
are required to take.
• Elementary (Proposed)
• Technology classes or Homeroom periods.
• Middle School (Proposed)
• Health Classes
• English Language Arts assign an informative research
and writing assignment on a cybersafety topic.
• High School (Proposed)
• English classes have an informative research and
writing assignment on a cybersafety topic.
School Cybersafety Response Team
• Research does not show what happens after cybersafety
incidents are reported to administrators (Stauffer, et
al.).
• School administrator designated as School Cybersafety
Coordinator.
• Selected Guidance Counselor
• Receives special training in handling cybersafety issues
involving:
• Victims
• Offenders
• Parents
Staff Development
• Research shows students are not willing to
report cybersafety incidents to teachers (Accordino
& Accordino, 2011).
• Teachers need to understand the impact of
cybersafety violations on their students (Stauffer, et.
al., 2012).
• Understand the process of reporting cybersafety
violations to the school’s Cybersafety Response
Team.
Annual Presentation to Parents and
Community
• Schools must make efforts to inform and work
with parents about the dangers of cyberbullying
and sexting (Accodino & Accordino, 2011).
• Explain cybersafety issues
• Present information from cybersafety surveys.
• Explain school cybersafety initiatives.
• Explain what parents and community members
can do to promote cybersafety.
Parent-School Cooperation
• Parents often feel they are not able to effectively
respond to online dangers because they did not grow-up
in that environment (Hannah, 2010).
• Parents should be encouraged to follow cybersafety
recommendations provided by the school.
• Encourage parents to educate themselves about
technology tools and their uses.
• Offer classes if there is enough interest.
• Provide support and guidance to their children when
using technology.
References
Accordino, D. B., & Accordino, M. P. (2011). An exploratory study of
face-to-face and cyberbullying in sixth grade students. American
Secondary Education, 40(1), 14-30. Retrieved August 22, 2013.
Ahlfors, R. (2010). Many sources, one theme: Analysis of cyberbullying
prevention and intervention websites. Journal of Social Sciences,
6 (4), 513-520.
Dowell, E.B., Burgess, A.W., & Cavanaugh, D.J. (2009). Clustering of
internet risk behaviors in a middle school population. Journal of
School Health, 79 (11), 547-553.
Federal Communications Commission. (2013). Consumer guide:
Children's Internet Protection Act (United States, Federal
Communications Commission, Consumer and Governmental
Affairs Bureau). Washington: Federal Communications
Commission.
References
Hannah, M. (2010). Cyberbullying education for parents: A guide for clinicians.
Journal of Social Sciences, 6 (4), 530-534).
Hinduja, S., & Patchin, J. W. (2009). Cyberbullying and online agression survey
instrument 2009 version. Cyberbullying Research Center.
Hinduja, S. & Patchin, J.W. (2011). Cyberbullying identification, prevention,
and response. Cyberbullying Research Center, 1-5.
Hinduja, S. & Patchin, J.W. (2010). Sexting: A brief guide for educators and
parents. Cyberbullying Research Center, 1-4.
Jager, T., Amado, J., Matos, A., & Pessoa, T. (2010). Analysis of experts’ and
trainers’ views on cyberbullying. Australian Journal of Guidance &
Counseling, 20 (2), 169-181.
Lenhart, A. (2012). Teens, Smartphones & Texting. Pew Internet and American
Life Project. Retrieved February 16, 2013.
References
Paul, S., Smith, P. K., & Blumberg, H. H. (2010). Addressing cyberbullying in
school using the Quality Circle approach. Australia Journal of Guidance &
Counseling, 20 (2), 157-168. DOI: 10.1375/ajgc.20.2.157
Pearce, N., Cross, D., Monks, H., Waters, S., & Falconer, S. (2011). Current
evidence of best practice in whole-school bullying intervention and its
potential to inform cyberbullying interventions. Austrailian Journal of
Guidance and Counseling, 21 (1), 1-21. DOI:10.1375/ajgc.21.1.1
Rainie, L. (2012). Tablet and E-book reader Ownership Nearly Double Over the
Holiday Gift-Giving Period. Pew Internet and American Life Project.
Retrieved February 16, 2013.
Sbarbaro, V. & Enyart Smith T. M. (2011). An exploratory study of bullying and
cyberbullying behaviors among economically/educationally disadvantaged
middle school students. American Journal of Health Studies, 26 (3), 139151.
References
Snakenborg, J., Van Acker, R., & Gable, R. A. (2011). Cyberbullying: Prevention and
intervention to protect our children and youth. Preventing School Failure, 55 (2),
88-95. DOI: 10.1080/1045988X.2011.539454
Stauffer, S., Heath, M.A. Coyne, S. M., & Ferrin, S. (2012). High school teachers’
perceptions of cyberbullying prevention andintervention strategies. Psychology in
the Schools, 49 (4), 353-367. DOI: 10:1002/pits.21603

Toshack, T., & Colmar, S. (2012). A cyberbullying intervention with primary-aged
students. Australian Journal of Guidance and Counseling, 22 (2), 268-278. DOI:
10.1017/jgc.2012.31
Woodring, J. (2008, June 25). [Cyberbullying Ribbon]. Retrieved October 12, 2013.

Más contenido relacionado

Más de John Woodring

Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Making Your Class More Social
Making Your Class More SocialMaking Your Class More Social
Making Your Class More SocialJohn Woodring
 
Don’t put that phone away
Don’t put that phone awayDon’t put that phone away
Don’t put that phone awayJohn Woodring
 
Test taking strategies
Test taking strategiesTest taking strategies
Test taking strategiesJohn Woodring
 
Someone Hacked Into Your Facebook
Someone Hacked Into Your FacebookSomeone Hacked Into Your Facebook
Someone Hacked Into Your FacebookJohn Woodring
 
Computer Tech Introduction
Computer Tech IntroductionComputer Tech Introduction
Computer Tech IntroductionJohn Woodring
 
Don’t put that phone away
Don’t put that phone awayDon’t put that phone away
Don’t put that phone awayJohn Woodring
 
Making your class more sociable
Making your class more sociableMaking your class more sociable
Making your class more sociableJohn Woodring
 

Más de John Woodring (9)

Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Making Your Class More Social
Making Your Class More SocialMaking Your Class More Social
Making Your Class More Social
 
Don’t put that phone away
Don’t put that phone awayDon’t put that phone away
Don’t put that phone away
 
Test taking strategies
Test taking strategiesTest taking strategies
Test taking strategies
 
Someone Hacked Into Your Facebook
Someone Hacked Into Your FacebookSomeone Hacked Into Your Facebook
Someone Hacked Into Your Facebook
 
Computer Tech Introduction
Computer Tech IntroductionComputer Tech Introduction
Computer Tech Introduction
 
Don’t put that phone away
Don’t put that phone awayDon’t put that phone away
Don’t put that phone away
 
Digital portfolios
Digital portfoliosDigital portfolios
Digital portfolios
 
Making your class more sociable
Making your class more sociableMaking your class more sociable
Making your class more sociable
 

Último

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

District Cybersafety Program John Woodring

  • 2. Comprehensive District Cybersafety Program NEED FOR A CYBERSAFETY PROGRAM
  • 3. According to Research • 90% of youth aged 12-17 are online on a daily basis (Snakenborg, Van Acker, & Gable, 2011). • 23% of teens age 12-17 own a smartphone. • 31% of teens age 14-17 own a smartphone. • 8% of teens age 12-13 own a smartphone. • 77% of teens age 12-17 own a cell phone (Lenhart, 2012). • 23% of teens own a tablet computer (Rainie, 2012). • Cyberbullying is most often done through mobile phones (Toshack & Colmar, 2012).
  • 4. While most cyberbullying incidents take place outside of school, incidents often originate in school (Paul, Smith, & Blumberg, 2010).
  • 5. College admissions staff and human resource departments are asking for access to personal web pages (or searching for them) to view what the applicant has posted (Dowell, Burgess, & Cavanaugh, 2009).
  • 6. Children’s Internet Protection Act of 2012 (CIPA) “Schools may not receive E-rate discounts unless they certify they provide an educational program for students about appropriate online behavior, including interacting with individuals on social networking websites and in chat rooms, and Cyberbullying awareness and response” (Federal Communications Commission, 2013).
  • 7. (Stauffer, Heath, Coyne, & Ferrin, 2012) (Stauffer, Heath, Coyne, & Ferrin, 2012) School Districts and Schools may be held legally accountable for failing to respond to cybersafety violations if any harm is caused by these violations.
  • 8. Students need to be taught cyberbullying safety strategies explicitly if they are going to protect themselves when using electronic devices (Toshack & Colmar, 2012).
  • 9. Comprehensive District Cybersafety Program UNDERSTANDING THE PROBLEM
  • 10. While there are other cybersafety threats such as identity theft and computer viruses and malware, cyberbullying and sexting pose the greatest threat to disrupting the educational process.
  • 11. Definitions • Cyberbullying • Using computers, cell phones, and other electronic devices to commit willful and repeated harm to others (Hinduja & Patchin, 2011).
  • 12. Definitions • Sexting • Sending or receiving of sexually explicit or sexually-suggestive images or video via a cell phone or other electronic device. • This could mean students taking and distributing nude or seminude photos of themselves. • While photos are meant for a boyfriend or girlfriend, they can be sent to unintended people. (Hinduja & Patchin, 2010)
  • 13. (Hinduja & Patchin, 2011) Scope of the Problem: Cyberbully Victims
  • 14. (Hinduja & Patchin, 2011) Scope of the Problem: Cyberbully Offenders
  • 17. Potential Harm: Cyberbullying • Victims often have a variety of mental issues such as: • Depressed • Sad • Angry • Frustrated • Some victims have suicidal thoughts, attempted suicide, or committed suicide. (Hinduja & Patchin, 2011)
  • 18. Potential Harm: Cyberbullying • Show signs of physical illnesses. • Low self-esteem • Embarrassed or afraid to go to school. • Family and academic problems. • School violence or delinquent behavior. (Hinduja & Patchin, 2011)
  • 19. Potential Harm: Cyberbullying • Cyberbullying has an anonymity factor that leads to less social accountability (Sbarbaro & Enyear Smith, 2011). • Cyberbullies develop a lack of empathy (Hinduja & Patchin, 2011). • Those who engage in cyberbullying often become targets of traditional bullying or cyberbullying (Accordino & Accordino, 2011).
  • 20. Potential Harm: Sexting • Shame • Cyberbullied • Harassed and bullied at school. • Called derogatory names. • Unwanted attention making someone feel uncomfortable. • Mental, physical, and emotional problems. • Up to and including suicide. • Belief no one cares. (Hinduja & Patchin, 2010)
  • 21. Comprehensive District Cybersafety Program DISTRICT LEVEL
  • 22. Challenges to a Cybersafety Program • Anonymous nature of Cyberbullying. • Wider audience. • Lack of supervision online. • Easy and continuous access to technology. • Rapid changes in technology. (Pearce, Cross, Monks, Waters, & Falconer, 2011)
  • 23. Cybersafety Student Survey • The district and individual schools should know what kind of cybersafety problem they have and how big it is. • This information should guide district and school administrators on an appropriate response and they type of cybersafety education program needed. • One instrument to use is the Cyberbullying and Online Aggression Survey developed by Hinduja & Patchin (2009) (Sbarbaro & Enyear Smith, 2011).
  • 24. Select Appropriate Programs • Programs should provide uniformity of instruction but allow flexibility to address unique school needs. • Program should be appropriate and engaging for • Elementary • Middle School • High School (Ahlfors, 2010)
  • 25. Select Appropriate Programs • Programs such as the European CyberTraining programcan train adults on how to run a cybersafety program (Jager, Amado, Matos, & Pessoa, 2010). • Students should be consulted when selecting a cybersafety program (Toshack & Colmar, 2012).
  • 26. Budgeting for Programs • Ensure proper training and professional development. • Provide needed materials to schools.
  • 27. District Cybersafety Coordinator • Additional duty assigned by the district superintendent. • Coordinates school cybersafety programs. • Researches latest trends in cybersafety. • Trains school Cybersafety Coordinators. • Helps set consequences and guidelines for cybersafety violations. • Ensures the district is compliant with E-rate cybersafety requirements.
  • 28. District Cybersafety Coordinator (continuted) • Speaks at parent and community functions but cybersafety and district cybersafety initiatives. • Works with law enforcement on cybersafety issues when necessary. • Readily available to the media to address cybersafety issues in cooperation with district public relations.
  • 29. Comprehensive District Cybersafety Program SCHOOL LEVEL
  • 30. Implementation • Cybersafety units must be taught in courses all students are required to take. • Elementary (Proposed) • Technology classes or Homeroom periods. • Middle School (Proposed) • Health Classes • English Language Arts assign an informative research and writing assignment on a cybersafety topic. • High School (Proposed) • English classes have an informative research and writing assignment on a cybersafety topic.
  • 31. School Cybersafety Response Team • Research does not show what happens after cybersafety incidents are reported to administrators (Stauffer, et al.). • School administrator designated as School Cybersafety Coordinator. • Selected Guidance Counselor • Receives special training in handling cybersafety issues involving: • Victims • Offenders • Parents
  • 32. Staff Development • Research shows students are not willing to report cybersafety incidents to teachers (Accordino & Accordino, 2011). • Teachers need to understand the impact of cybersafety violations on their students (Stauffer, et. al., 2012). • Understand the process of reporting cybersafety violations to the school’s Cybersafety Response Team.
  • 33. Annual Presentation to Parents and Community • Schools must make efforts to inform and work with parents about the dangers of cyberbullying and sexting (Accodino & Accordino, 2011). • Explain cybersafety issues • Present information from cybersafety surveys. • Explain school cybersafety initiatives. • Explain what parents and community members can do to promote cybersafety.
  • 34. Parent-School Cooperation • Parents often feel they are not able to effectively respond to online dangers because they did not grow-up in that environment (Hannah, 2010). • Parents should be encouraged to follow cybersafety recommendations provided by the school. • Encourage parents to educate themselves about technology tools and their uses. • Offer classes if there is enough interest. • Provide support and guidance to their children when using technology.
  • 35. References Accordino, D. B., & Accordino, M. P. (2011). An exploratory study of face-to-face and cyberbullying in sixth grade students. American Secondary Education, 40(1), 14-30. Retrieved August 22, 2013. Ahlfors, R. (2010). Many sources, one theme: Analysis of cyberbullying prevention and intervention websites. Journal of Social Sciences, 6 (4), 513-520. Dowell, E.B., Burgess, A.W., & Cavanaugh, D.J. (2009). Clustering of internet risk behaviors in a middle school population. Journal of School Health, 79 (11), 547-553. Federal Communications Commission. (2013). Consumer guide: Children's Internet Protection Act (United States, Federal Communications Commission, Consumer and Governmental Affairs Bureau). Washington: Federal Communications Commission.
  • 36. References Hannah, M. (2010). Cyberbullying education for parents: A guide for clinicians. Journal of Social Sciences, 6 (4), 530-534). Hinduja, S., & Patchin, J. W. (2009). Cyberbullying and online agression survey instrument 2009 version. Cyberbullying Research Center. Hinduja, S. & Patchin, J.W. (2011). Cyberbullying identification, prevention, and response. Cyberbullying Research Center, 1-5. Hinduja, S. & Patchin, J.W. (2010). Sexting: A brief guide for educators and parents. Cyberbullying Research Center, 1-4. Jager, T., Amado, J., Matos, A., & Pessoa, T. (2010). Analysis of experts’ and trainers’ views on cyberbullying. Australian Journal of Guidance & Counseling, 20 (2), 169-181. Lenhart, A. (2012). Teens, Smartphones & Texting. Pew Internet and American Life Project. Retrieved February 16, 2013.
  • 37. References Paul, S., Smith, P. K., & Blumberg, H. H. (2010). Addressing cyberbullying in school using the Quality Circle approach. Australia Journal of Guidance & Counseling, 20 (2), 157-168. DOI: 10.1375/ajgc.20.2.157 Pearce, N., Cross, D., Monks, H., Waters, S., & Falconer, S. (2011). Current evidence of best practice in whole-school bullying intervention and its potential to inform cyberbullying interventions. Austrailian Journal of Guidance and Counseling, 21 (1), 1-21. DOI:10.1375/ajgc.21.1.1 Rainie, L. (2012). Tablet and E-book reader Ownership Nearly Double Over the Holiday Gift-Giving Period. Pew Internet and American Life Project. Retrieved February 16, 2013. Sbarbaro, V. & Enyart Smith T. M. (2011). An exploratory study of bullying and cyberbullying behaviors among economically/educationally disadvantaged middle school students. American Journal of Health Studies, 26 (3), 139151.
  • 38. References Snakenborg, J., Van Acker, R., & Gable, R. A. (2011). Cyberbullying: Prevention and intervention to protect our children and youth. Preventing School Failure, 55 (2), 88-95. DOI: 10.1080/1045988X.2011.539454 Stauffer, S., Heath, M.A. Coyne, S. M., & Ferrin, S. (2012). High school teachers’ perceptions of cyberbullying prevention andintervention strategies. Psychology in the Schools, 49 (4), 353-367. DOI: 10:1002/pits.21603 Toshack, T., & Colmar, S. (2012). A cyberbullying intervention with primary-aged students. Australian Journal of Guidance and Counseling, 22 (2), 268-278. DOI: 10.1017/jgc.2012.31 Woodring, J. (2008, June 25). [Cyberbullying Ribbon]. Retrieved October 12, 2013.

Notas del editor

  1. Currentlycybersafety education methods are uncoordinated which leaves schools and school districts exposed to fall out because of incidents involving technology. This proposed plan based on research and personal experience will help standardize cybersafety education so students will understand the dangers misusing technology can bring. The ribbon is the symbol of cyberbullying based on cyberbully victim Megan Meir’s fondness of painting her fingernails black with white polka dots.
  2. This slide shows the percentage of students who use the Internet and have a personal means of Internet access. Also, this shows how mobile devices are used to commit cybersafety violations.
  3. This shows incidents at school play a part in starting cybersafety incidents.
  4. Students do not understand what they post on the Internet stays on the Internet. Posts made during their youth could be found and used against them when a students wants to attend a competitive college or seeking a position in a desired career field.
  5. CIPA clearly states the requirement for cybersafety education.
  6. While there have been few if any cases involving schools and school districts involvement in litigation over cybersafety incidents it is only a matter of time before a plaintiff party attempts to hold schools and school districts liable for a lack of cybersafety education as a cause of an incident.
  7. Students frequently use electronic devices but do not have any concept of how cyberbullying and sexting can harm them when using these devices.
  8. Schools should be encouraged to discuss the threats of identity theft and computer viruses and malware with students. However, cyberbullying and sexting potentially have a greater impact on the instructional process and the personal safety and security of students. Identity theft along with virus and malware threats should be taught but these subjects can be inserted into other subjects such as technology classes.
  9. There are other issues regarding cybersafety such as identity theft or viruses and malware. However, cyberbullying and sexting have the potential of causing the most disruption of the educational process.
  10. The key information to take away from this slide is the average shown.
  11. The key information is the average of students who admit to being cyberbullies.
  12. These numbers might not seem significant, especially the female numbers but there is greater chance of serious harm coming to these students.
  13. This slide shows the need for students to be reminded of cybersafety issues each year. Especially in the high school years.
  14. This slide shows the potential harm to victims of cyberbullying.
  15. This slide shows the potential harm to victims of cyberbullying.
  16. This shows the harm that could come to cyberbullies.
  17. Students have a way of quickly finding ways to misuse new technologies before adults may be aware of them. This is why there should be ongoing research about new technology trends.
  18. Data from these surveys can direct districts and schools on where to focus cybersafety education efforts.
  19. Many programs are targeted more to adults so great care needs to be taken when evaluating such programs. Cybersafety issues can differ from school to school which is why ongoing research is needed to target areas of instructional needs. Students should be consulted for them to buy-in to cybersafety programs and determine potential effectiveness.
  20. Many programs are targeted more to adults so great care needs to be taken when evaluating such programs. Cybersafety issues can differ from school to school which is why ongoing research is needed to target areas of instructional needs. Students should be consulted for them to buy-in to cybersafety programs and determine potential effectiveness.
  21. Training required administrators, guidance counselors, and teachers is key to a successful cybersafety program.
  22. Constant changes in technology and cybersafety issues require someone to manage a cybersafety program but it should not require an FTE. Some of these duties may be done by different people but should be consolidated into one position to maintain continuity in the program.
  23. The candidate for DCC should be someone who is comfortable talking with the press. This PR duty is crucial to showing the public the school district takes the issue of cybersafety seriously.
  24. The key point is cybersafety instruction should take place in classes all students must take to achieve maximum coverage. While technology courses might seem a logical place for cybersafety instruction not all students take these courses every year.
  25. Because cyberbullying and sexting cause unique problems that differ from normal school discipline issues, greater care needs to be taken in dealing with cybersafety issues. An example would be when a female student’s explicit pictures are spread around campus she would feel a shame and guilt that may make her more suicidal. A counselor needs to understand this unique situation and be able to treat it while an administrator would work with the parents to encourage support for the student.
  26. Victims ofcybersafety violations may not be easy to spot so teachers need to understand what to look for in students and how to report violations quickly to minimize damage.
  27. Communication with parents is key in any safety programs. However, many parents may not know what to look for or believe misinformation that focuses attention elsewhere.
  28. Districts should offer classes to parents to educate them more on what can be done at home to safeguard children against cybersafety threats.