1 / 36

Administrator’s Briefcase

Administrator’s Briefcase. Keeping Our Kids Safe On-Line. Marlene Boney Knox County Schools marlene.boney@knoxschools.org. Cyberbullied Teens in the News for past 10 years

galvin
Download Presentation

Administrator’s Briefcase

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Administrator’s Briefcase Keeping Our Kids Safe On-Line Marlene Boney Knox County Schools marlene.boney@knoxschools.org

  2. Cyberbullied Teens in the News for past 10 years • Lennon Baldwin, a 15-year-old high school student found hanged in his home, death may have been the result of bullying, The Tampa Tribune Published: April 05, 2012 • Phoebe Prince Again? Bullying Linked to Suicide of 10 Year Old Ashlynn Conner. Psych Central. Retrieved on April 5, 2012, • Morristown, NJ teen's apparent suicide being investigated as possible bullying case, officials say Published: Saturday, March 31, 2012, 7:00 AM     • A Gordonsville, TN boy’s parents say bullying caused their son to take his own life. Phillip Parker, 14, died this week. His parents said he was constantly bullied for being gay. Posted January 23rd, 2012 • How Many More Amanda Cummings Must Die Before Bullying Is Forever Banned? Wednesday, January 3, 2012-A Staten Island teenager whose family says she was bullied died after jumping in front of a city bus while carrying a suicide note, reports said. • A Tennessee teen has taken his own life after being subjected to anti-gay bullying which, friends say, officials at his high school did little to prevent. 12-08-11 • 9-21-11Jamey Rodemeyer, from Buffalo, New York-Right before he committed suicide NY JAMIE IS STUPID, GAY, FAT ANND UGLY. HE MUST DIE!' read one post. Another read: 'I wouldn't care if you died. No one would. So just do it :) It would make everyone WAY more happier!’ On September 9, Jamey wrote on his Tumblr site: 'I always say how bullied I am, but no one listens. What do I have to do so people will listen to me? • A case of schoolyard bullying has cost the New South Wales Education Department a six-figure payout to the family of a teenager who killed himself. 4-3-2012

  3. MO 2006 NJ 2010 CT 2008 Megan Meier 13 Alexa Berman 14 Tyler Clelmenti 18 Ryan Halligan 13 Phoebe Prince 15 MA 2010 VT 2003

  4. Cyber Bullying and Social Networking files Administrator’s Briefcase • How do Administrators fit into the Internet Safety picture in Cyber Bullying and/or Social Networking?

  5. NETS for Administrators

  6. Information on Cyber Bullyingthat Educators Need to Know • The National Crime Prevention Council defines cyber-bullying as “the process of using the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” • While bullying is nothing new, today's kids have found another, often more anonymous way, to be cruel to each other: cyberbullying. Hiding behind their cell phone or computer screens, kids are now humiliating and harassing each other in ways most of their parents didn't have to deal with. As Common Sense, a national not-for-profit that provides digital citizenship curriculum to schools across the country says, "this type of bullying is especially disturbing because it is constant, pervasive, and very, very public." http://council.nyc.gov/html/pr/stopcyberbullying.shtm l http://www.internetsafety101.org/cyberbullying.htm

  7. Cracking down on CyberBully? ??? CYBERBULLYING

  8. Types of CyberBullying Den-i-gra-tionto attack one’s reputation Angry, rude arguing Repeatedly sending offensive messages “Dissing” someone online by spreading rumors or posting false information

  9. More Types of CyberBullying Disseminate: to broadcast or scatter widely: to circulate Intentionally excluding someone from an online group Pretending to be someone else and posting material to damage that person’s reputation Disseminating intimate private information or tricking someone into disclosing private information, which is then disseminated

  10. Another Type of CyberBullying Creating fear by sending offensive messages and engaging in threatening activities Everyone hates you. You had better watch your back.

  11. How? CYBERBULLYING CyberBullying may occur via personal Web sites, blogs, e-mail, discussion groups, message boards, chat, instant messaging, or voice, text, or image cell phones.

  12. Who? CYBERBULLYING • A cyberbully may be a person whom the target knows or an online stranger. A cyberbully may be anonymous and enlist the aid of others, including online “friends.”

  13. Why? CYBERBULLYING • Cyberbullying may be a continuation of, or in retaliation for, in-school bullying. It may be related to fights about relationships or be based on hate or bias. Some kids think cyberbullying is a fun game.

  14. CyberBullying can lead to… SUICIDE

  15. NEW: What is Cyber-bashing? “Some people plan a violent conflict (cyber-bashing) in advance so that their buddies can stand nearby and videotape the assault. To add insult to injury, the video of the attack is posted on the Internet so these bullies can earn so-called bragging rights.” “Children are doubly victimized -- first by the assault itself, then a second time by the public humiliation when the taping of the attack is shown on the Internet for classmates and the world to see.” byElizabeth Wasserman website

  16. The Harm of CyberBullying • Cyberbullying can cause great emotional harm. The communications can be vicious and occur 24/7. Damaging material can be widely disseminated and impossible to fully remove. Teens are reluctant to tell adults for fear they will be restricted from online activities or the cyberbully will retaliate. Cyberbullying can lead to youth suicide and violence.

  17. Warning Signs

  18. Action Steps • Make sure the child knows not to retaliate, to save the evidence, and to ask for your help if he or she is having difficulties. Identify the cyberbully or bully group. Ask your Internet Service provider for help.

  19. What to do if a child has been cyberbullied:1. Act immediately by letting them know you can and will help.2. Acknowledge the pain. Affirm what happened isn’t right and that they’re not at fault.3. Tell your kids not to respond or retaliate, but save any evidence for authorities.4. Block anyone whose behavior is inappropriate or threatening.5. Report the problem. Consider reporting fellow students to the school. Report the bullying and the website where the abuse occurred. 6. Visit http://www.athinline.org/take-control for a list of hotlines and organizations to call in case of a problem.

  20. Cyberbullying Sites • http://www.stopcyberbullying.org/parents • http://www.stopcyberbullying.org/index2.html • http://www.stopcyberbullying.org/reportfbabuse/index.html • http://www.wiredsafety.org

  21. Different Ways to RespondParents/Kids • Calmly and strongly tell the cyberbully to stop and to remove any harmful material. • Ignore the cyberbully by leaving the online environment, blocking communications, or both. • File a complaint with the Internet or cell phone company. • Send the cyberbully’s parents a letter that includes the evidence of cyberbullying. Demand that the actions stop and harmful material be removed.

  22. More More Ways to RespondParents/Kids • Seek assistance from the child’s school. • Contact an attorney to send a letter or file a lawsuit against the cyberbully’s parents. • Contact the police if the cyberbullying involves threats of violence, coercion, intimidation based on hate or bias, or any form of sexual exploitation.

  23. Administrators Need to Know all about Social Networking • "Social networking sites provide great opportunities for young people to meet and share experiences, but with this freedom comes a degree of risk and the need to act responsibly. We know that where children go online, so do those who seek to abuse them."

  24. Social Networks Friends or Foes?

  25. A Guide to Social Networksfrom About.com • Social Networks can be a great home on the web • can help you connect with people • can help reconnect with long-lost friends • can even help your career by making business contacts • Social networks can be • friends-based networks like Facebook and MySpace • music and movie networks like Flixster and Last.FM • business social networks like LinkedIn and XING. http://www.internetsafety101.org/socialnetworking.htm

  26. 2012 Five Most PopularSocial Networks • Facebook with 750,000,000 visits monthly • Twitter with 250,000,000 visits monthly • Linkedin with 110,000,000 visits monthly • MySpace with 70,500.000 visits monthly • Google Plus with 65,000,000 visits monthly • key to what makes photo-sharing great in Google Plus As of February 2012: Facebook has more than 845 million active users; Twitter has close to 500 million; MySpace 225 Million; Linkedin 150 million http://www.ebizmba.com/articles/social-networking-websites

  27. FaceBook Quote Just remember this, “You can’t get to 500 million without making a few

  28. Social Networking • In 2012 all of our school’s students are busy cyber-socializing; they’re chatting, blogging and posting pictures and videos. Should you and your schools stay current with these new social networking applications? • As an administrator should you take advantage of these applications to interact with students in their own forum or you should stay on the side-lines and become aware of the applications so as to better understand today’s students? • Some popular forms of Social Networking • Facebook-. As of February 2012, Facebook has more than 845 million active users. • Twitter-On March 21, 2012, Twitter celebrated it's sixth birthday while also announcing that it has 140 million users and sees 340 million tweets per day. • Blogging-Blogs are web sites containing the writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other Web sites. • Instant Message (IM)-Instant messaging (IM) is a form of communication over the Internet, that offers an instantaneous transmission of text-based messages from sender to receiver. A short introduction to the concepts behind social networking Social Networking in Plain English

  29. FaceBook Facebook is a privately owned company headquartered in Palo Alto, California.  Mark Zuckerberg, age 24 and a Harvard drop-out, is ranked 785 in Forbes Magazine's list of the world's billionaires, with a net worth of approximately $1.5 billion. Facebook includes: • A place for a profile picture • Contact information and "About You" space • The Wall-- a place where friends can publicly post comments for you (a digital bulletin board) • Status update-- where you can tell your friends how you are or what you are doing • News Feed-- regularly updated information about your friends-- groups they've joined, applications or friends they have added, changes to their profiles • A space for uploading photos and videos • But Facebook, like many social software sites, is customizable and there is no end to the number of applications you can add to your Facebook account.  Applications are additional tools and features-- some are created by Facebook, but many more have been created by third party developers. 

  30. Twitter • Twitter is a free micro-blogging tool that allows you to post short "blogging" messages in 140 characters or less. You can post these messages using Twitter on your computer or your mobile device. Twitter provides a way for individuals to share information with one another in real-time. They can share news stories, reviews, complaints and even special deals. • We call these short 140 character messages "tweets" or "tweeting." These messages are broadcast to other Twitter users that follow you and shown on your Twitter profile page. You can also use private messages through Twitter to your followers, this is called a direct message or a DM.

  31. Blog • A blog is often a mixture of what is happening in a person’s life and what is happening on the Web, a kind of hybrid diary/guide site, although there are as many unique types of blogs as there are people. • People maintained blogs long before the term was coined, but the trend gained momentum with the introduction of automated published systems, most notably Blogger at blogger.com. Thousands of people use services such as Blogger to simplify and accelerate the publishing process. • Blogs are alternatively called web logs or weblogs. However, "blog" seems less likely to cause confusion, as "web log" can also mean a server’s log files.

  32. Texting and IM • What Are Texting and IM?LYL, IDK, G2G – what does it all mean??? Text and IM (instant messaging) are fast becoming the communication of choice for teens and it’s also the choice for many educators, teachers and parents. Get the 411 (information) on text lingo and find out what your kids need from you to stay safe online and on the phone. • Text messaging (texting) and instant messaging (IMing) are forms of digital communication that are done from mobile phones and computers. • Text messaging is done with a mobile phone. It allows you to send a short message from one phone to another. If the phone has a camera, you can also text pictures right from your phone. SEXTING has become a serious problem. You can even text from a computer to a mobile phone, if you want to. Sixty-three percent of teen and tweens text daily. • Instant messaging requires an Internet connection and computer (or sometimes a phone, too) and allows you to have longer conversations through a series of messages in a chat window.

  33. Internet Safety Files Needed in Administrator’s Briefcase • Should Administrators encourage teachers to inform parents of Internet Safety issues? Teachers Share With Parents

  34. Tennessee’s Internet Safety and Acceptable Use Policy Resource Guide for Best Practices for Administrators • Barb’s Tech Resources Barbara Denson, Instructional Technology State of Tennessee • Realize the Internet’s educational advantages and how it is used throughout their school. • Have an awareness and understanding of the potential risks of using the Internet for instructional purposes and have a network for data collection, storage, and communication • Stay current with new technologies, vulnerabilities, and legalities related to the Internet and school responsibilities. • Keep parents and students regularly informed about all aspects of Internet safety.  • Recognize professional development on Internet safety as a high priority and offer multiple learning opportunities for staff. • Budget for means to implement communication and training on Internet safety and curriculum. • Maintain current and credible acceptable use policies. http://www.tn.gov/education Teachers Share With Parents

  35. As cyberbullying-linked student suicides and computer hacking continue to make headlines, nearly all educators and school technology coordinators agree it’s important to teach about cybersecurity and cyberethics. But “there seems to be some confusion about who is supposed to be doing it and how much they’re supposed to be doing,” A survey found that seven out of 10 teachers think parents should be primarily responsible for cybersafety lessons. But nearly half of school administrators say teachers should be primarily responsible. • http://whatsyourstory.trendmicro.com/internet-safety/Gallery.do • Stand Up Teachers Share With Parents

  36. LYL Love you lots • IDK I don’t know • G2G Got to go

More Related