SlideShare una empresa de Scribd logo
1 de 25
Cyberbullying What can help me help my students?
What is cyberbullying? ,[object Object]
It is not uncommon for cyberbullying to be prevalent in students ages 8-15 and beyond. Webb 2010
Vehicles for Cyberbullying ,[object Object]
Text messages
Picture messages
Email
Internet
Social networking sites
Chatrooms
Chat tools                                       and more…Webb 2010
Statistics ,[object Object]
One in three teens (ages 12-17) have been victims of cyberbullying
One in six pre-teens (ages 6-11) have been victims of cyberbullying
Children are just as likely to receive threatening messages at school as they are at home
The impact on the victims of bullying often include truancy, depression, poor academic performance, and sometimes suicideWebb 2010
Is it against the law? That depends… In the First Amendment we are all given the right of freedom of speech. There have been numerous court cases concerning cyberbullying, however each is individual and rulings remain just as unique and difficult to predict. Webb 2010
Law ,[object Object]
On this website, each state receives a letter grade based on the occurrences of cyberbullying cases and how they are handled. www.bullypolice.org
Also in Illinois schools are required to provide a minimum of two hours of Internet safety instruction annually to their K-12 students.Webb 2010
Challenges for Teachers ,[object Object]
Is bullying that takes place at home able to be disciplined within the school?
When do teachers step in?
What steps should be taken to decrease occurrences?Webb 2010
Challenges for Teachers None of these questions can be answered definitively.  So… What does the research say? Webb 2010

Más contenido relacionado

La actualidad más candente

Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentGail Matthews-DeNatale
 
Influence of Internet
Influence of InternetInfluence of Internet
Influence of InternetAhmed Faisal
 
Digital citizenship action plan
Digital citizenship action planDigital citizenship action plan
Digital citizenship action planlzoerhoff
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveSecurly
 
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...Mark Bullen
 
Web 2.0 and Education
Web 2.0 and EducationWeb 2.0 and Education
Web 2.0 and EducationJulie Evans
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014bellla33
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
Technology and the Classroom
Technology and the ClassroomTechnology and the Classroom
Technology and the ClassroomBen Rayome
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Week 13 Addressing Issues Part 2
Week 13 Addressing Issues   Part 2Week 13 Addressing Issues   Part 2
Week 13 Addressing Issues Part 2anneleftwich
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetMd Jahirul Islam Sojib
 

La actualidad más candente (18)

Iste2010
Iste2010Iste2010
Iste2010
 
Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to Assessment
 
Influence of Internet
Influence of InternetInfluence of Internet
Influence of Internet
 
Digital citizenship action plan
Digital citizenship action planDigital citizenship action plan
Digital citizenship action plan
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
 
Web 2.0 and Education
Web 2.0 and EducationWeb 2.0 and Education
Web 2.0 and Education
 
E safety inset
E safety insetE safety inset
E safety inset
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Technology and the Classroom
Technology and the ClassroomTechnology and the Classroom
Technology and the Classroom
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
Chapter 2 oblinger & oblinger
Chapter 2  oblinger & oblingerChapter 2  oblinger & oblinger
Chapter 2 oblinger & oblinger
 
Week 13 Addressing Issues Part 2
Week 13 Addressing Issues   Part 2Week 13 Addressing Issues   Part 2
Week 13 Addressing Issues Part 2
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
ETEC635 Paper
ETEC635 PaperETEC635 Paper
ETEC635 Paper
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internet
 

Destacado

Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentationYuming Peng
 
Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...
Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...
Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...prakashrohit
 

Destacado (6)

Introtoedtech0
Introtoedtech0Introtoedtech0
Introtoedtech0
 
Musicians
MusiciansMusicians
Musicians
 
Introtoedtech0
Introtoedtech0Introtoedtech0
Introtoedtech0
 
Raven
RavenRaven
Raven
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...
Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...
Presentation on Plastic By Kanishka and Nishtha from Hillwoods academy school...
 

Similar a Cyberbullying prevention policy

A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
pppppppppptttttttt.pptx
pppppppppptttttttt.pptxpppppppppptttttttt.pptx
pppppppppptttttttt.pptxMarcBacus2
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Part 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docxPart 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docxdanhaley45372
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.docmebrahten1
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.docAyesha Lata
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxmarilucorr
 
Bullying in the digital age4
Bullying in the digital age4Bullying in the digital age4
Bullying in the digital age4lheikkila
 
e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?Becta FE and Skills
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docxRunning head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docxcharisellington63520
 
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docxRunning head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docxtodd271
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Josie Fraser
 
Its the law
Its the lawIts the law
Its the lawnsharoff
 
Running head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docxRunning head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docxjoellemurphey
 

Similar a Cyberbullying prevention policy (20)

A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
pppppppppptttttttt.pptx
pppppppppptttttttt.pptxpppppppppptttttttt.pptx
pppppppppptttttttt.pptx
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Part 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docxPart 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docx
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
Bullying in the digital age4
Bullying in the digital age4Bullying in the digital age4
Bullying in the digital age4
 
e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docxRunning head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
 
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docxRunning head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Its the law
Its the lawIts the law
Its the law
 
Its the law
Its the lawIts the law
Its the law
 
Running head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docxRunning head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docx
 

Último

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Cyberbullying prevention policy

  • 1. Cyberbullying What can help me help my students?
  • 2.
  • 3. It is not uncommon for cyberbullying to be prevalent in students ages 8-15 and beyond. Webb 2010
  • 4.
  • 11. Chat tools and more…Webb 2010
  • 12.
  • 13. One in three teens (ages 12-17) have been victims of cyberbullying
  • 14. One in six pre-teens (ages 6-11) have been victims of cyberbullying
  • 15. Children are just as likely to receive threatening messages at school as they are at home
  • 16. The impact on the victims of bullying often include truancy, depression, poor academic performance, and sometimes suicideWebb 2010
  • 17. Is it against the law? That depends… In the First Amendment we are all given the right of freedom of speech. There have been numerous court cases concerning cyberbullying, however each is individual and rulings remain just as unique and difficult to predict. Webb 2010
  • 18.
  • 19. On this website, each state receives a letter grade based on the occurrences of cyberbullying cases and how they are handled. www.bullypolice.org
  • 20. Also in Illinois schools are required to provide a minimum of two hours of Internet safety instruction annually to their K-12 students.Webb 2010
  • 21.
  • 22. Is bullying that takes place at home able to be disciplined within the school?
  • 23. When do teachers step in?
  • 24. What steps should be taken to decrease occurrences?Webb 2010
  • 25. Challenges for Teachers None of these questions can be answered definitively. So… What does the research say? Webb 2010
  • 26. Research: Bullying is a relatively recent research focus with work beginning in the early 70’s. Because of the even more recent nature of cyberbullying, there are several issues that characterize research in this area, and there are not many helpful conclusions. Webb 2010
  • 27.
  • 28. What are some effective intervention methods from previous studies in traditional bullying that could effect work on cyberbullying?Webb 2010
  • 29.
  • 30. Several pieces of cyberbullying research cite previous studies of traditional bullying, but it is difficult to transfer any prevention methods because of the often secretive nature of cyberbullying
  • 34. What now? For now, short of conducting more research, teachers can choose to follow their school’s technology policy and/or compose their own. Having a classroom technology policy could prevent problems from happening before they occur. It can also provide teachers with a set of fair and equal consequences for policy violations. Webb 2010
  • 35.
  • 36. clearly states the goals that the teacher intends to achieve by using technology and names any known activities that will use certain technologies
  • 37. shows compliance and understanding by both parent(s)/guardian(s) and student (preferably by means of a signature) and returned to the teacher to be filedWebb 2010
  • 38.
  • 39. provides the teacher and administrator’s contact information
  • 40. is thoroughly checked for correct spelling, grammar, and structure
  • 41. is approved by an administrator before being sent home with students (Some schools require this, others do not, but it’s still a good idea!)Webb 2010
  • 42. HINT Between the previous two slides and several additional slides that will be seen shortly in this presentation, you will be easily able to compose a technology policy for your desired setting and fulfill the assignment requirements. Note those slides!
  • 43.
  • 44. Remind students of the policies in place frequently throughout the duration of a project or school year.
  • 45. Post your policy in the classroom or computer lab so students have no excuse for being unfamiliar with it.Webb 2010
  • 46. Complete the Activity: Locate the Cyberbullying Activity on WesternOnline. Read it carefully and complete it by the posted due date. Worth 40 pts. Don’t forget to review the rubric before starting! The following slides will help you create your submission. Read the instructions and use this presentation to guide your progress. Webb 2010
  • 47. How to write your introduction An introduction should begin by stating the need for keeping our students safe while using technology and defining unfamiliar terms like “cyberbullying.” Next, it should mention what types of technology students may use in the classroom, for which activities they will be used, and what this document actually is. Lastly, the introduction should provide additional resources for parents/guardians or students to find more information on different computer programs, processes or devices you might be using. Webb 2010
  • 48. How to word your policy Divide your policy into two or three paragraphs depending upon the age of your students. ¶ - Expectations (i.e. …) students are expected to treat all technological equipment with care and respect. Students are expected to follow teacher instructions with regard to internet usage and website viewing with no exceptions. Students are prohibited from… ¶ - Consequences (might be identical to school’s handbook consequences) Webb 2010
  • 49. How to word your policy ¶ - Student usage expectations of outside devices: Cell phones Pagers Cameras Mp3 players Gaming devices etc… Many schools simply prohibit use of these during school hours or on school grounds. Webb 2010
  • 50. How to incorporate compliance This consists of a couple simple sentences. All the sentences need to state is that a signature at the bottom of the document represents agreement with the policies outlined in the document, and that students who do not comply will not be allowed to participate in such activities. Both student and parent(s)/guardian(s) signatures should be present. Webb 2010
  • 51. How to include contact information Finally, include your personal as well as school office contact information for families to use if they have any questions. Ms. Doe, 3rd grade, 555-1234, jdoe@school.edu Elementary office, West Best School: 555-5678 Webb 2010
  • 52. References Bully Police U.S.A. (2009). Retrieved from website: www.bullypolice.org Meyers, J. J. (2009). Censoring cyber speech on campus??? Unpublished manuscript. Presented September 29, 2009 at Western Illinois University. Meyers, J. J., & Carper, G. T. (2009). Cyberbullying: The legal challenge for educators. West’s Educational Law Reporter. Meyers, J. J., Carper, G. T., & Hemphill, L. S. (2009). Cyber Bullies Come to Campus: Are Administrators and Faculty Ready? Roskamp, T. J. (2009). Cyberbullying in Illinois public schools. Unpublished doctoral dissertation, Western Illinois University. Webb 2010
  • 53. References Backer, T. E., & Russ, A. (2007). Implementing evidence-based youth violence prevention programs: one community’s experiences. Human Interaction Research Institute, Retrieved from: http://www.humaninteract.org/images/finalrep149.pdf. Hirschstein, M. K., Van Schoiack Edstrom, L., Frey, K. S., Snell, J. L., & MacKenzie, E. P. (2007). Walking the talk in bullying prevention: teacher implementation variables related to initial impact of the Steps to Respect program. School Psychology Review, 36(1), 3-21. Hoff, D. L., & Mitchell, S. N. (2008). Cyberbullying: causes, effects, and remedies. Journal of Educational Administration, 47(5), 652-665. Juvonen, J., & Gross, E. F. (2008). Extending the school grounds? Bullying experiences in cyberspace. Journal of School Health, 78(9), 496-505. Webb 2010
  • 54. References Salmivalli, C., Kaukiainen, A., & Voeten, M. (2005). Anti-bullying intervention: implementation and outcome. British Journal of Educational Psychology, 75, 465-487. Slonje, R., & Smith, P. K. (2007). Cyberbullying: another main type of bullying? Scandinavian Journal of Psychology, 49, 147-154. Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: its nature and impact in secondary school pupils. The Journal of Child Psychology, 49(4), 376-385. Wright, V. H., Burnham, J. J., Inman, C. T., & Ogorchock, H. N. (2009). Cyberbullying: using virtual scenarios to educate and raise awareness. Journal of Computing in Teacher Education, 26(1), 35-42.  Yasuda, H. (2009). Preventing cyberbullying without prohibitions: looking at web science from an educational perspective. In: Proceedings of the WebSci ‘09: Society On-line, 18-20 March 2009, Athens, Greece. (In Press) Webb 2010