SlideShare una empresa de Scribd logo
1 de 19
Cyber Bullying  http://www.flickr.com/photos/treehead/3159844551/sizes/m/in/photostream/ Presented by:  Jayme Thompson
What is Cyber Bullying?  http://www.flickr.com/photos/wentongg/2717345676/sizes/m/in/photostream/
What Cyber Bullying Can Do… http://youtu.be/yZgpmuz2MQc
The Many Forms of Cyber Bullying  Flaming Harassment http://office.microsoft.com/en-us/images/results.aspx?qu=Email&ctt=1#ai:MP900438968| http://www.flickr.com/photos/suecline/2766531962/
3. Denigration  http://office.microsoft.com/en-us/images/results.aspx?qu=Gossip&ctt=1#ai:MP900439453| 4. Impersonation  5. Outing  http://www.flickr.com/photos/12099541@N06/4776989552/ http://office.microsoft.com/en-us/images/results.aspx?qu=Typing%20on%20the%20computer&ctt=1#ai:MP900443151|mt:0|
6. Trickery  7. Exclusion http://office.microsoft.com/en-us/images/results.aspx?qu=Fingers+crossed&ctt=1#ai:MP900400181| 8. Cyberstalking http://office.microsoft.com/en-us/images/results.aspx?qu=Gossip#ai:MP900448468|mt:0| http://www.flickr.com/photos/thomaseuler/3752691544/sizes/m/in/photostream/
Cyber Bullying and You….
Recognizing the Signs Isolation Poor Grades Change in Behaviors or Routines http://office.microsoft.com/en-us/images/results.aspx?qu=Signs&ctt=1#ai:MP900407571|
What Can Schools Do? http://office.microsoft.com/en-us/images/results.aspx?qu=school+building&ctt=1#ai:MP900433198| Acceptable Use Policy (AUP)  Inform students of searches Private reporting “Safe Schools” committee Education
When to Get Involved… http://office.microsoft.com/en-us/images/results.aspx?qu=meeting&ctt=1#ai:MP900422855|
Legal Implications of Cyber Bullying Civil Law  Standards Criminal Law  http://office.microsoft.com/en-us/images/results.aspx?qu=Legal&ctt=1#ai:MP900395954|
Who and When to Contact… ,[object Object]
Law Enforcement http://office.microsoft.com/en-us/images/results.aspx?qu=Phone+Call&ctt=1#ai:MP900284906|
Education = Prevention  http://youtu.be/iDBiqUWRtMo
Teach Students to Prevent Cyber Bullying Protect Yourself Examine Your Communication Find New Friends  http://office.microsoft.com/en-us/images/results.aspx?qu=Teaching&ctt=1#ai:MP900439377|
Beating Bullies  Step Away Clam Down Never Retaliate http://office.microsoft.com/en-us/images/results.aspx?qu=Laptop&ctt=1#ai:MP900433172|
Ways to Stop Cyber Bullying  Tell the cyber bully to stop Ignore the cyber bully Have your parents contact the cyber bully’s parents. File a complaint with the Web site or service Talk to someone at school Contact an attorney or the police http://office.microsoft.com/en-us/images/results.aspx?qu=Stop+Sign&ctt=1#ai:MC900434805|
http://youtu.be/NbtajOvAU10
Web Sites to Help With Cyber Bullying WiredSafety www.wiredsafety.org www.stopcyberbully.org Media Awareness Network www.media-awareness.ca Bully Online www.bullyonline.org/related/cyber.htm Internet Super Heroes www.internetsuperheroes.org/cyberbullying/ NetSamrtz Workshop Real Life Stories www.netsamrtz.org/resources/reallife.htm National Crime Prevention Council: Cyberbullying www.ncpc.org/parents/cyberbullying.php iSafe www.isafe.org

Más contenido relacionado

La actualidad más candente

Policy for Social Media
Policy for Social MediaPolicy for Social Media
Policy for Social MediaMatthew Moore
 
Introducing midwives to social media
Introducing midwives to social mediaIntroducing midwives to social media
Introducing midwives to social mediaSarah Stewart
 
Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan
Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan
Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan SinthiyaSoori
 
Honors Lit Africa Presentation
Honors Lit Africa PresentationHonors Lit Africa Presentation
Honors Lit Africa Presentationblleon
 
Echo 08 Presentation
Echo 08 PresentationEcho 08 Presentation
Echo 08 PresentationGraham Wegner
 
Creating e learning mashups
Creating e learning mashupsCreating e learning mashups
Creating e learning mashupsNeil Mehta
 
Why Extension should use social media
Why Extension should use social mediaWhy Extension should use social media
Why Extension should use social mediaAnne Adrian
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures Bryan Fendley
 
Iteigo20110225
Iteigo20110225Iteigo20110225
Iteigo20110225managami
 
Real World Sourcing - SourceCon NYC 2011
Real World Sourcing - SourceCon NYC 2011Real World Sourcing - SourceCon NYC 2011
Real World Sourcing - SourceCon NYC 2011Katharine Robinson
 
Legal and ethical use of social media
Legal and ethical use of social mediaLegal and ethical use of social media
Legal and ethical use of social mediaSarah Stewart
 
Online identity. What midwives should care and what they can do about it
Online identity. What midwives should care and what they can do about itOnline identity. What midwives should care and what they can do about it
Online identity. What midwives should care and what they can do about itSarah Stewart
 
Social Media and Extension
Social Media and ExtensionSocial Media and Extension
Social Media and ExtensionAnne Adrian
 
10 things to do when you discovered you've been cyber-libeled or cyberbullied
10 things to do when you discovered you've been cyber-libeled or cyberbullied10 things to do when you discovered you've been cyber-libeled or cyberbullied
10 things to do when you discovered you've been cyber-libeled or cyberbulliedDebbie Elicksen
 

La actualidad más candente (20)

Policy for Social Media
Policy for Social MediaPolicy for Social Media
Policy for Social Media
 
Introducing midwives to social media
Introducing midwives to social mediaIntroducing midwives to social media
Introducing midwives to social media
 
Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan
Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan
Your Digital Footprint - A Flipbook by Sinthiya Sooriyaganthan
 
Honors Lit Africa Presentation
Honors Lit Africa PresentationHonors Lit Africa Presentation
Honors Lit Africa Presentation
 
Echo 08 Presentation
Echo 08 PresentationEcho 08 Presentation
Echo 08 Presentation
 
Creating e learning mashups
Creating e learning mashupsCreating e learning mashups
Creating e learning mashups
 
Safe kids (2)
Safe kids (2)Safe kids (2)
Safe kids (2)
 
Professionalism in the Age of Selfie
Professionalism in the Age of SelfieProfessionalism in the Age of Selfie
Professionalism in the Age of Selfie
 
Why Extension should use social media
Why Extension should use social mediaWhy Extension should use social media
Why Extension should use social media
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
 
Iteigo20110225
Iteigo20110225Iteigo20110225
Iteigo20110225
 
Real World Sourcing - SourceCon NYC 2011
Real World Sourcing - SourceCon NYC 2011Real World Sourcing - SourceCon NYC 2011
Real World Sourcing - SourceCon NYC 2011
 
Generations kalamazoo
Generations   kalamazooGenerations   kalamazoo
Generations kalamazoo
 
Legal and ethical use of social media
Legal and ethical use of social mediaLegal and ethical use of social media
Legal and ethical use of social media
 
Joining Up Content
Joining Up ContentJoining Up Content
Joining Up Content
 
Online identity. What midwives should care and what they can do about it
Online identity. What midwives should care and what they can do about itOnline identity. What midwives should care and what they can do about it
Online identity. What midwives should care and what they can do about it
 
Social Media and Extension
Social Media and ExtensionSocial Media and Extension
Social Media and Extension
 
10 things to do when you discovered you've been cyber-libeled or cyberbullied
10 things to do when you discovered you've been cyber-libeled or cyberbullied10 things to do when you discovered you've been cyber-libeled or cyberbullied
10 things to do when you discovered you've been cyber-libeled or cyberbullied
 
Vt law
Vt lawVt law
Vt law
 

Similar a Cyber bullying

Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620mccready95
 
The Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care ServicesThe Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care ServicesJJ Lassberg
 
Technological+Tools+For+Social+Change
Technological+Tools+For+Social+ChangeTechnological+Tools+For+Social+Change
Technological+Tools+For+Social+ChangeErin O'Hanlon
 
MI Social Media & Prevention: Getting Started
MI Social Media & Prevention: Getting StartedMI Social Media & Prevention: Getting Started
MI Social Media & Prevention: Getting StartedLaDonna Coy
 
Social Media & Prevention
Social Media & PreventionSocial Media & Prevention
Social Media & PreventionLaDonna Coy
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
#10NIC Social media for immunization promotion & education dac10
#10NIC Social media for immunization promotion & education dac10#10NIC Social media for immunization promotion & education dac10
#10NIC Social media for immunization promotion & education dac10Dawn Crawford
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingktast
 
Online Engagement
Online EngagementOnline Engagement
Online EngagementAnne Adrian
 
Virtual Branding: How to Effectively Curate Your Online Brand
Virtual Branding: How to Effectively Curate Your Online BrandVirtual Branding: How to Effectively Curate Your Online Brand
Virtual Branding: How to Effectively Curate Your Online BrandElizabeth (Liz) Ngonzi
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentationavarry
 
Web 2.0, Social Media and Internet Safety Final
Web 2.0, Social Media and Internet Safety FinalWeb 2.0, Social Media and Internet Safety Final
Web 2.0, Social Media and Internet Safety Finalkrc99080
 
AAF Ft. Worth Talk to Mobile Marketing
AAF Ft. Worth Talk to Mobile MarketingAAF Ft. Worth Talk to Mobile Marketing
AAF Ft. Worth Talk to Mobile MarketingEd Schipul
 
Rice University Advertising Spring 2010
Rice University Advertising Spring 2010Rice University Advertising Spring 2010
Rice University Advertising Spring 2010Ed Schipul
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpa21raym
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire HoseAnne Adrian
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingjpliska
 
Domestic violence
Domestic violenceDomestic violence
Domestic violenceascott11
 

Similar a Cyber bullying (20)

Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
 
The Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care ServicesThe Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care Services
 
Technological+Tools+For+Social+Change
Technological+Tools+For+Social+ChangeTechnological+Tools+For+Social+Change
Technological+Tools+For+Social+Change
 
MI Social Media & Prevention: Getting Started
MI Social Media & Prevention: Getting StartedMI Social Media & Prevention: Getting Started
MI Social Media & Prevention: Getting Started
 
Social Media & Prevention
Social Media & PreventionSocial Media & Prevention
Social Media & Prevention
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
#10NIC Social media for immunization promotion & education dac10
#10NIC Social media for immunization promotion & education dac10#10NIC Social media for immunization promotion & education dac10
#10NIC Social media for immunization promotion & education dac10
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online Engagement
Online EngagementOnline Engagement
Online Engagement
 
Virtual Branding: How to Effectively Curate Your Online Brand
Virtual Branding: How to Effectively Curate Your Online BrandVirtual Branding: How to Effectively Curate Your Online Brand
Virtual Branding: How to Effectively Curate Your Online Brand
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentation
 
Web 2.0, Social Media and Internet Safety Final
Web 2.0, Social Media and Internet Safety FinalWeb 2.0, Social Media and Internet Safety Final
Web 2.0, Social Media and Internet Safety Final
 
AAF Ft. Worth Talk to Mobile Marketing
AAF Ft. Worth Talk to Mobile MarketingAAF Ft. Worth Talk to Mobile Marketing
AAF Ft. Worth Talk to Mobile Marketing
 
Rice University Advertising Spring 2010
Rice University Advertising Spring 2010Rice University Advertising Spring 2010
Rice University Advertising Spring 2010
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Media Overview
Social Media OverviewSocial Media Overview
Social Media Overview
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire Hose
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Domestic violence
Domestic violenceDomestic violence
Domestic violence
 

Cyber bullying

  • 1. Cyber Bullying http://www.flickr.com/photos/treehead/3159844551/sizes/m/in/photostream/ Presented by: Jayme Thompson
  • 2. What is Cyber Bullying? http://www.flickr.com/photos/wentongg/2717345676/sizes/m/in/photostream/
  • 3. What Cyber Bullying Can Do… http://youtu.be/yZgpmuz2MQc
  • 4. The Many Forms of Cyber Bullying Flaming Harassment http://office.microsoft.com/en-us/images/results.aspx?qu=Email&ctt=1#ai:MP900438968| http://www.flickr.com/photos/suecline/2766531962/
  • 5. 3. Denigration http://office.microsoft.com/en-us/images/results.aspx?qu=Gossip&ctt=1#ai:MP900439453| 4. Impersonation 5. Outing http://www.flickr.com/photos/12099541@N06/4776989552/ http://office.microsoft.com/en-us/images/results.aspx?qu=Typing%20on%20the%20computer&ctt=1#ai:MP900443151|mt:0|
  • 6. 6. Trickery 7. Exclusion http://office.microsoft.com/en-us/images/results.aspx?qu=Fingers+crossed&ctt=1#ai:MP900400181| 8. Cyberstalking http://office.microsoft.com/en-us/images/results.aspx?qu=Gossip#ai:MP900448468|mt:0| http://www.flickr.com/photos/thomaseuler/3752691544/sizes/m/in/photostream/
  • 8. Recognizing the Signs Isolation Poor Grades Change in Behaviors or Routines http://office.microsoft.com/en-us/images/results.aspx?qu=Signs&ctt=1#ai:MP900407571|
  • 9. What Can Schools Do? http://office.microsoft.com/en-us/images/results.aspx?qu=school+building&ctt=1#ai:MP900433198| Acceptable Use Policy (AUP) Inform students of searches Private reporting “Safe Schools” committee Education
  • 10. When to Get Involved… http://office.microsoft.com/en-us/images/results.aspx?qu=meeting&ctt=1#ai:MP900422855|
  • 11. Legal Implications of Cyber Bullying Civil Law Standards Criminal Law http://office.microsoft.com/en-us/images/results.aspx?qu=Legal&ctt=1#ai:MP900395954|
  • 12.
  • 14. Education = Prevention http://youtu.be/iDBiqUWRtMo
  • 15. Teach Students to Prevent Cyber Bullying Protect Yourself Examine Your Communication Find New Friends http://office.microsoft.com/en-us/images/results.aspx?qu=Teaching&ctt=1#ai:MP900439377|
  • 16. Beating Bullies Step Away Clam Down Never Retaliate http://office.microsoft.com/en-us/images/results.aspx?qu=Laptop&ctt=1#ai:MP900433172|
  • 17. Ways to Stop Cyber Bullying Tell the cyber bully to stop Ignore the cyber bully Have your parents contact the cyber bully’s parents. File a complaint with the Web site or service Talk to someone at school Contact an attorney or the police http://office.microsoft.com/en-us/images/results.aspx?qu=Stop+Sign&ctt=1#ai:MC900434805|
  • 19. Web Sites to Help With Cyber Bullying WiredSafety www.wiredsafety.org www.stopcyberbully.org Media Awareness Network www.media-awareness.ca Bully Online www.bullyonline.org/related/cyber.htm Internet Super Heroes www.internetsuperheroes.org/cyberbullying/ NetSamrtz Workshop Real Life Stories www.netsamrtz.org/resources/reallife.htm National Crime Prevention Council: Cyberbullying www.ncpc.org/parents/cyberbullying.php iSafe www.isafe.org
  • 20. Works Cited Aftab, Parry. "Net Bullies...preventing and Handling Cyberbullying and Harassment." Net Bullies. Web. 26 Apr. 2011. <http://www.netbullies.com/pages/4/index.htm>. CSRIU: Center for Safe and Responsible Internet Use. Web. 26 Apr. 2011. <http://www.cyberbully.org/>. "Cyberbullying | StopBullying.gov." StopBullying.gov. U.S. Government Department of Health and Human Service. Web. 25 Apr. 2011. <http://www.stopbullyingnow.hrsa.gov/topics/cyberbullying/index.html>. Hinduja, Ph D., Sameer, and Justin W. Patchin, Ph D. "Cyberbullying Warning Signs Red Flags That Your Child Is Involved in Cyberbullying." Cyberbullying. Cyberbullying Research Center. Web. 20 Apr. 2011. <http://www.cyberbullying.us/cyberbullying_warning_signs.pdf>. Kowalski, Robin M., Patricia W. Agatston, and Susan P. Limber. Cyber Bullying: Bullying in the Digital Age. Malden: Blackwell, 2008. Print. Willard, Nancy E. Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress. Champaign, IL: Research, 2007. Print. Willard, Nancy. "Educator’s Guide to Cyberbullying, Cyberthreats & Sexting." Cyberbully.org. Center for Safe and Responsible Use of the Internet. Web. 26 Apr. 2011. <http://www.cyberbully.org/cyberbully/documents/educatorsguide.pdf>.

Notas del editor

  1. ALA Standards: 1.3.5, 3.3.7, &amp; 4.3.4Welcome and intro.Today’s topic Cyber Bullying Cyber Bullying is a large problem today.
  2. Cyber bullying is bullying through e-mail, instant messaging, in a chat room, on a Web site, or through digital messages or images sent to a cellular phone or personal digital assistant (PDA) (Kowalski et al, 2008)Bullying online is very different from face-to-face bullying because messages and images can be: Sent 24 hours a day, 7 days a week, 365 days a year, Shared be shared to a very wide audience and Sent anonymouslyhttp://www.stopbullyingnow.hrsa.gov/topics/cyberbullying/index.html
  3. 90% of middle school students have had their feelings hurt online. – www.wiredsafety.org
  4. Nancy Willard with the Center for Safe and Responsible Internet Use (CSRIU) has developed useful list of various forms of cyber bullying. http://www.csriu.org/F: Using inflammatory or vulgar words to provoke an online fight; Ex and discussH:Repeatedly sending offensive, rude and insulting messages; Ex and discusshttp://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf
  5. D: Spreading rumors, lies or gossip to hurt a person’s reputation Ex and discuss I: Posting offensive or aggressive messages under another person’s name; Ex and discussO: Posting or sharing confidential or compromising information or images; Ex and discuss http://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf
  6. T: Fooling someone into sharing personal information which you then post online; Ex and discuss E: Purposefully excluding someone from a online group; Ex and discuss; Ex and discussC: Ongoing harassment and denigration that causes a person considerable fear for his/ her safety; Ex and discusshttp://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf75% of middle school students have visited Web sites bashing another student.40% have had their passwords stolen and change by a bully www.wiredsafety.org
  7. Now that you know what cyber bullying is….Lets take a poll…Instructions for Poll EverywhereAllow time for poll to updateThe National Crime Prevention Council reports cyber bullying is problem that affects almost half of all American teens. http://www.ncpc.org/cyberbullyingA 2006 survey by Harris Interactive reported that 43% of U.S. teens have experienced some form of cyber-bullying the in past year. Kids have reported being mean to each other online beginning as young as 2nd grade. According to research, boys initiate mean online activity earlier than girls do. However, by middle school, girls are more like to engage in cyber bullying than boys do. http://www.fairfaxtimes.com/cms/story.php?id=2078Discuss totals
  8. 15 % of parent polled knew what cyber bullying was. – www.wiredsaftety.orgResearch has shown that not all students perceive cyber bullying as a form of bullying behavior (Kowalski et al. 2008). Therefore, classroom lessons and discussions that focusdirectly on cyber bullying are critical to preventing it from flourishing.Unexpectedly stops using the computerAppears nervous or jumpy when an Instant Message, text message, or Email appears.Appears uneasy about going to school or outside in general.Appears to be angry, depressed, or frustrated after using the computer.Avoids discussions about what they are doing on the computer.Becomes abnormally withdrawn from usual friends and family members. http://www.cyberbullying.us/cyberbullying_warning_signs.pdf
  9. Make sure your school has an AUP that outlines what is and is not the permitted use of the school’s technology and computer systemsHave both parents and students sign this AUPWhy? Stipulations in the AUP that deal with the safety of students from dangerous or abusive actions of other students, give the school more legal authority to take the appropriate measures in cyberbullying cases, even if the incident occurs outside of school. –Aftab; “Netbullies”Let students know that their school Internet use records and files can be searchedIf there is legitimate suspicion that a school or district policy has been broken by a student, schools have the right to search these records and files.Why? By letting students know that searches can take place, they are more likely to think twice before breaking the rules. – Nancy Willard “Cyberbulling and Cyberthreats”Provide a way for students to privately report cyber bullyingSetting this precaution in place lets students know that there is a safe place to share cyber safety violations.Would-be cyber bullies might be deterred if they know that there is a general awareness of this problem in his/her school, and if they realize there is a greater chance of being caught. – Nancy Willard: “Cyberbulling and Cyberthreats” Create a “Safe Schools” CommitteePut together a group of educators (usually administrators, counselors, school resource officers) that deal with issues of cyber security, such as cyber bullying. – Nancy Willard; “Cyberbullying and Cyberthreats”Provide Proper Student Education on Cyber safetyIntegrate cyber safety into your curriculum so that students become aware of these issues. Encourage them to mentor and pass along this information to their peers.
  10. Districts should respond when liability concerns are raised when situations occurs through district Internet system, when students are using personal digital devices while on campus, or when the combination of off-campus and on-campus altercations is making it impossible for a students to receive an education. Simply having a policy and responding to reported incidents is not sufficient if the bullying and the harm it causes continues despite the measures.
  11. Cyber bullying can cross legal linesCL: LibelInvasion of privacyPurposeful infliction of emotional destressCriminal LawViolent threatsHarassment and/or stalkingHate/bias crimesHarmful material for minors (sexual exploitation, pornography) Willard, N. Cyberbullying and Cyberthreats
  12. Schools should contact parents and law enforcement whenMaking threats of violence to people or their propertyCoercionMaking obscene or harassing telephone calls (includes text messages)Harassment or stalkingHate or bias crimeCreating or sending sexually explicit images of teensSexual exploitation Taking a photo of someone in place where privacy is expectedNancy Willard- “Educator’s Guide”
  13. Educating the students is keyResearch has shown that not all students perceive cyber bullying as a form of bullying behavior (Kowalski et al. 2008). Therefore, classroom lessons and discussions that focusdirectly on cyber bullying are critical to preventing it from flourishing.
  14. There are several important things that you can teach students to do to avoid being a target of cyber bullying:• Protect yourself. Never provide any information or images in electronic form that could be used against you.• Examine how you are communicating. If you find that people are frequently attacking you, look closely at how you are communicating with them. You might be communicating in a way that is irritating others or hurting their feelings.• Find some new friends. If you are trying to fit into a group of people who are treating you badly, it might be easier to simply find some nicer friends. Life’s too short to waste time trying to be friends with mean people.
  15. Messages to give students about beating bullies:Bullies want to achieve power and be seen by others as stronger and better. If you lose your cool or respond in another way that shows lack of strength, a bully can boast about it to others—and will probably keep bullying you. So the key to handling bullies is to stay calm and not make it fun to harass you. A bully wants you to get upset. If you get mad and strike back in an attempt to hurt the bully as badly as you were hurt, it just won’t work. All it does is give the bully a “win.” Retaliating can also make you look bad. You could also set yourself up for trouble. People who see your post may think you are the one who is causing the problem, not the bully. If someone shows your message to an adult, you could be the one who gets into trouble.Nancy Willard “Cyberbullying and Cyberthreats”
  16. Things you can tell your students about how to stop cyber bullying:Send the bully a message stating “Stop sending me messages” or “Remove the material you posted” . Make sure it is a strong not emotional message. Tell the bully that if it doesn’t stop other steps will be taken.Don’t visit groups where you are cyber bullied. Remove the bully from friends lists.Your parents could talk to the parents of the bully or send a letter. Most sites and services prohibit bully behavior. Contact them through e-mail and explain the situation. Attached material of the bullying and request the material be removed and the account be terminated. If the bully goes to your school, tell your principal, school counselor, or school resource officer. Give them copies of the material. Sometimes the bullying is so bad that your parents can sue the parents of the cyber bully. Or the cyber bullying could be a crime.Nancy Willard- “Cyberbullying and Cyberthreats”
  17. Cyber bullying is harmful to our students and it happens more than we know.We need to teach children Cyber Safety from an early age so that they can safely interact with other onlineCommunication is important in deterring and detecting cyber bullying make sure to let the students know you are there to listen! Cyber Bullying DELETE IT!