1 / 47

Strategies for Keeping Our Children Safe from Bullying/ Cyberbullying

Strategies for Keeping Our Children Safe from Bullying/ Cyberbullying. Safe and Drug Free Schools January 24, 2011. Why Stop Bullying?. Look around you…. An estimated 160,000 students miss school every day due to fear of attack or intimidation by other students. Times Have Changed….

yen-kelley
Download Presentation

Strategies for Keeping Our Children Safe from Bullying/ Cyberbullying

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Strategies for Keeping Our Children Safe from Bullying/Cyberbullying Safe and Drug Free Schools January 24, 2011

  2. Why Stop Bullying? Look around you…

  3. An estimated 160,000 students miss school every day due to fear of attack or intimidation by other students

  4. Times Have Changed… Video: “Wally’s Surprise Phone Call”

  5. Millennial Generation Takes Multitasking to a New Level…

  6. Adolescents and the Internet • 91% have an email address • 60%have an IM screen name • 73% have their own cell phones • 72% have a profile on a social networking site Cox Communications Teen Online&Wireless Safety Survey (2009)

  7. Teen Media Use Over Time • Teens average 10.45 hours of media content per day • Music/audio • Video • Online • TV content • Movies • Print

  8. Average Monthly Teen Texts? 3,146 text messages per month Neilson 2009

  9. Bullying vsCyberbullying • Terms have expanded • Regardless of location, it’s all bullying • Same dynamics • Different delivery system • It’s All about power • All bullying is damaging • It can be stopped with a cooperation and a concerted effort

  10. Bullying Defined A willful act or course of conduct on the part of one or more pupils which is not authorized by law and which exposes a pupil repeatedly and over time to one or more negative actions which is highly offensive to a reasonable person and is intended to cause and actually causes the pupil to suffer harm or serious emotional distress.

  11. Bullying is NOT… • A normal childhood activity • A rite of passage • The target’s fault

  12. Bullying Happens in Four Ways • Verbal Teasing, jokes, ignoring/isolation, gossip, threats • Physical Blocking someone’s path, physical restraint, pushing/kicking, hazing • Sexual Teasing, touching, slapping, pictures, emails,graffiti, sexual assault • Property Hiding belongings, theft, arson, extortion, vandalism, destruction

  13. Definition of Cyberbullying • Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. • Stop Cyberbullying Now. org

  14. Student Definition Bullying using technology

  15. Conditions of Cyberbullying • It has to have a minor on both sides, or at least • have been instigated by a minor against another • minor. • Once adults become involved, it is cyber- • harassment or cyberstalking. • Adult cyber-harassment or cyberstalking is • NEVER called cyberbullying.

  16. Cyberbullying: Breaking It Down • Cyber Bullying can take many forms. These are a few: • A threatening e-mail • Nasty instant messaging session • Repeated notes sent to the cell phone • A website set up to mock others • Borrowing someone’s screen name and pretending • to be them while posting a message. • Forwarding supposedly private messages, • pictures, or video to others. • I –SAFE America Inc.

  17. Cyberbullying by Proxy Getting someone else to do the dirty work Warning Wars Posing as victim Control of a victim’s account Reporting a victim to a website- lose their access Endangering the victim through posts

  18. High Risk Behaviors Online • Disclosing Personal Information • Internet Addiction • Suicide and Self-harm Communities • Hate Group Recruitment and Gangs • Risky Sexual Behavior • Violent Gaming

  19. Do You Know….Netlingo? Griefers Dead Tree Version Biobreak Legacy media Meatspace Cornea-Gumbo Double-Geeking Fram Typo-Squatting Leet-Speek 1-3-3-7 • DBEYR • IRL • OIC • ROTFLMAO • 420 • ASL • CD9 • KPC • LMIRL • POS • netlingo.com

  20. DIFFERENCES • BULLYING • DIRECT • Occurs on • school property • Poor relationships • with teachers • Fear retribution • CYBERBULLYING • ANONYMOUS • Occurs off • school property • Good relationships with teachers • Fear loss of technology privileges • Further under the radar than bullying From ‘Demystifying and Deescalating Cyber Bullying’ by Barbara Trolley, Ph.D. CRC, Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d. http://www.nyssca.org/CYBERBULLYING-pp-BT28th.ppt

  21. CyberbullyingPrevalance • According to the National Crime Prevention Council : • 43% of children 13-17 report being cyberbullied in the last year • Most victims "know" but cannot see the bully • 53% of teens admit sending a nastygram • Only 10% of victims told their parents • Common Sense Media, 2010

  22. Explaining Bullying/CyberbullyingBehavior

  23. Why Do Kids Bully? • Jealousy • Boredom • From example • Attention & Approval • Reputation • Anger • Power • Control • Entertainment • Status

  24. Words Do Hurt • When teens were asked why they cyber bullied, • they responded: • They think it’s funny (81%) • They don’t think it’s a big deal • They are encouraged by friends • They think everybody cyber bullies • They think they won’t get caught They don’t think about the consequences • www.cyberbullying.us

  25. Bullies like what they do most of them have strong self-confidence So, if we tell the whole student body to be nice,the bullies won’t listen

  26. What Are They Thinking? “You can’t see me, I can’t see you” “Life online is just a game” “Look at me—I’m a star” “It’s not me. It’s my online persona” “What happens online stays online” “On the Internet, I have the free-speech right to write or post anything I want, regardless of the harm it might cause to another”

  27. FOR THE TARGET, BULLYING IS A “LOSS” EXPERIENCE: LOSS of safety LOSS of self-esteem LOSS of belonging LOSS of control over their life

  28. Effects of Bullying on Victims • Health Problems • Loss of appetite • Nervousness • Frequent trips to the nurse • Stomach aches, vomiting • Depression • Headaches • Loss of sleep

  29. Effects of Bullying on Victims • Adjustment Problems • Emotional distress • Anxiety • Depression • Lowered self-esteem • Homicidal ideation and attempts • Suicidal ideation and attempts • Loneliness

  30. Effects of Bullying on Victims • Academic Problems • School avoidance, truancy • Lowered grades and reduced learning • Diminished academic risk-taking

  31. 5 minutes

  32. The Good News: • 85% of children are not bullies 85% of kids are not bullies and can be enlisted to STOP THE BULLYING

  33. Encourage Reporting of Bullying

  34. Why Kids Don’t tell… Reporting bullying to parents: • Children frequently do not tell their parents that they are being bullied because they are embarrassed, ashamed, frightened of the children who are bullying them, or afraid of being seen as a “tattler.” If your child tells you about being bullied, it has taken a lot of courage to do so. • Your child needs your help to stop the bullying.

  35. Why Older Kids Won’t Report Bullying Incidents Majority of incidents go unreported • Children fear loss of technology so they do not report to parents or adults • Fear of retaliation/making situation worse • Most reports come through concerned friends

  36. Cyberbullies Can be Traced • A Each time the Internet is accessed, an • IP (Internet Protocol) address, a type of electronic fingerprint, is established. • This IP address can be used by • the authorities to trace all electronic communication between computers and/or mobile phones. • Postings in cyberspace are traceable, downloadable, printable, and sometimes punishable by law. • Cyberstalking is a crime!! • From wiredsafety.org

  37. Where to Start • Communicate your values– and how they apply online: You’re the only one in a position to guide your kids this way. Be very clear with kids about this. It’ll help them make smarter decisions when they’re faced with tricky situations. • Be patient: Most kids need small bits of information repeated – and often – for it to really sink in. Keep talking; chances are it’ll pay off. Net Cetera 2010

  38. Plan of Action for Families • Have family discussions where every member’s opinion is respected • Reassure children that it is OK to tell you without fear of reprisals • Develop Family Media Usage Guidelines • Develop Family Pledge

  39. Support Targets ∙ Mentor them and connect with them. ∙ Increase supervision to protect them. ∙ Help them get support from others with similar histories. ∙ And — most importantly — help them connect with a network of peer support and friendship.

  40. Teach children to: STOP: Don’t respond to the bully. BLOCK: The bully or limit all communication to those you can trust. TELL:A trusted adult.

  41. Let’s Look At Some Internet Safety Resources

  42. LINK

More Related