1 / 20

Cyberbullying

Cyberbullying. Internet Saftey: Information for H.S. Students. Quick Survey. How many people have a cell phone How many people have an email address How many people are on myspace or facebook or another social network How many people have heard of cyberbullying and understand what it entails.

pembroke
Download Presentation

Cyberbullying

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbullying Internet Saftey: Information for H.S. Students

  2. Quick Survey • How many people have a cell phone • How many people have an email address • How many people are on myspace or facebook or another social network • How many people have heard of cyberbullying and understand what it entails

  3. YouTube Example 1 • Cyberbully Video

  4. Hours of Internet Use i-Safe Parent and Student Assessments 2003-04

  5. Cyberbullying Facts • 35% of students have been threatened online • 42% of students have been cyberbullied • 53% of kids admit to bullying online • 58% have not told an adult i-Safe Parent and Student Assessments 2003-04

  6. Cyberbullying Facts • 92% of parents say they have set internet rules • 65% of children say they have no set internet rules i-Safe Parent and Student Assessments 2003-04

  7. Types of Cyberbullying • Flaming – angry, rude arguments. • Harassment – repeatedly sending offensive messages • Denigration – “dissing” someone online by spreading rumors or posting false information • Outing and trickery – disseminating intimate private information or tricking someone into disclosing private information Nancy E. Willard, Center for Safe and Responsible Internet Use

  8. Types of Cyberbullying • Impersonation – pretending to be someone else and posting material to damage that persons reputation • Exclusion – intentional exclusion from an online group • Cyberstalking – creating fear by sending offensive messages and other harmful online activities Nancy E. Willard, Center for Safe and Responsible Internet Use

  9. How • Computers • Cell Phones • Slam Rooms • Chat Rooms • E-mail • Social Networks

  10. Who • A cyberbully may be a person whom the target knows or an online stranger. • A cyberbully may be anonymous and may enlist the aid of others, including online “friends.” Nancy E. Willard, Center for Safe and Responsible Internet Use

  11. Why • Cyberbullying may be a continuation of, or in retaliation for in-school bullying. It may be related to fights about relationships or be based on hate or bias. Some teens think cyberbullying is entertaining – a fun game Nancy E. Willard, Center for Safe and Responsible Internet Use

  12. Why • Teens may not be concerned about the consequences of harmful online behavior because: They think they are invisible or can take steps to become invisible, so they think they can’t be punished. There is no tangible feedback about the harm they cause, so it seems like a game. Nancy E. Willard, Center for Safe and Responsible Internet Use

  13. Why • Harmful online social norms support cyberbullying: “I have a free speech right to post whatever I want, regardless of the harm I cause.” Nancy E. Willard, Center for Safe and Responsible Internet Use

  14. The Harm • Cyberbullying can cause great emotional harm to the target. Online communications can be very cruel and vicious. Cyberbullying can be happening 24/7. Damaging text and images can be widely disseminated and impossible to fully remove. Teens are reluctant to tell adults Nancy E. Willard, Center for Safe and Responsible Internet Use

  15. The Harm: Ryan’s Story • Ryan is a real life kid who fell victim to Bullying and Cyberbullying • From a safe small Vermont town • Technologically savvy parents • Loving close-knit family http://www.mindoh.com/

  16. Ryan’s Story cont. • This is text taken from a aim discussion • RH = Ryan IMP= “Friend” • RH: everything sux and this is the last time you’re going to hear me complain • IMF: the last time i hear you complain? you’re finally going to kill yourself? • RH: yup • IMF: phew • IMF: it’s about f***ing time • RH: lol • RH: you’ll hear about it in the papers tomorrow • Just a few days after this conversation Ryan took his own life http://www.mindoh.com/

  17. If You are a Victim • Save Evidence – Don’t erase or delete • Don’t Keep it to yourself, Tell Parent, Contact Internet Service Provider (ISP), Principal, and Police if necessary • Don’t reply or try to meet the offender • Call the police, if the cyberbullying involves threats of violence, coercion, intimidation based on hate or bias, and any form of sexual exploitation Nancy E. Willard, Center for Safe and Responsible Internet Use

  18. Activity • Divide the board in half; list the positive aspects of the internet on one side of the board and negatives on the other. • What are some positive aspects of the Internet? • What are some negative aspects of the Internet? www.NetSmartz.org

  19. Activity Cont. • In Groups of 2 or 3 design a poster that could be posted at a school to encourage students to think before they act online • Incorporate some of the points raised during the presentation and subsequent discussion www.NetSmartz.org

  20. You Can’t Take It Back www.NetSmartz.org

More Related