1 / 32

Cyberbullying …

Cyberbullying …. What is it? What does it look like? What can I do about it? [ Click Here ] MaryAnn D. Powell Instructional Technology Facilitator Edgecombe Early College High School Tarboro, NC. Use arrow keys to advance slides. Definition.

bruis
Download Presentation

Cyberbullying …

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbullying… What is it? What does it look like? What can I do about it? [Click Here] MaryAnn D. Powell Instructional Technology Facilitator Edgecombe Early College High School Tarboro, NC Use arrow keys to advance slides.

  2. Definition • “Cyberbullying” is when … a teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another … teen using the Internet, interactive and digital technologies or mobile phones. • Must be a minor instigating against another minor. • Adult? Cyber-harassment/Cyber-stalking

  3. What does it look like? • Limited only by the student’s imagination and access to technology! • Instant Messaging/Text Messaging Harassment • http://www.ikeepsafe.org/psa/#gotovideo • Please play Auditorium & Kitchen videos

  4. What does it look like? • Limited only by the student’s imagination and access to technology! • Instant Messaging/Text Messaging Harassment • Stealing/Guessing Passwords • Blogs • Web Sites • Sending Pictures Through E-Mail or Cell Phones • Internet Polling • http://www.netsmartz.org/stories/canttake.htm

  5. What does it look like? • Limited only by the student’s imagination and access to technology! • Instant Messaging/Text Messaging Harassment • Stealing/Guessing Passwords • Blogs • Web Sites • Sending Pictures Through E-Mail or Cell Phones • Internet Polling • Interactive Games

  6. What does it look like? • Limited only by the student’s imagination and access to technology! • Sending Malicious Code • Sending Porn and Other Junk E-Mail and IMs • Impersonation • Getting someone else to do the “dirty work” • Warnings War • Stirring Up Trouble

  7. Why do they do it? • Why do kids do anything? • Anger • Revenge • Frustration • Entertainment • Accident • Didn’t think • Ego • Social standing • Righting wrongs

  8. Prevention • Consequences • Loss of priveleges • Loss of accounts • Loss of ISP • Respect of others

  9. Have you ever… • … signed on with someone else’s screen name to gather info? • … sent an e-mail or online greeting card from someone’s account? • … impersonated someone over IM or online? • … teased or frightened someone over IM? • … not told someone who you really are online, telling them to “guess”?

  10. Have you ever… • … forwarded a private IM conversation or e-mail without permission of the other person? • … changed your profile or away message designed to embarrass or frighten someone? • … posted pictures or information about someone on a web site without their consent?

  11. Have you ever… • … created an Internet poll, either over IM or on a web site, about someone without their consent? • …used information found online to follow, tease, embarrass or harass someone in person? • … sent rude or scary things to someone, even if you were just joking? • … used bad language online?

  12. Have you ever… • … signed someone else up for something online without their permission? • … used an IM or e-mail address that looked like someone else’s? • … used someone else’s password for any reason without their permission? • … hacked into someone else’s computer or sent a virus or Trojan horse to them? • … insulted someone in an interactive game room?

  13. Have you ever… • … posted rude things or lies about someone online? • … voted at an online bashing poll or posted to a guestbook saying rude or mean things?

  14. Now calculate your score: • 0-5 Cyber Saint • Congratulations! You’re a cyber saint! Your online behavior is exemplary! Keep up the good work! • 6-10 Cyber Risky • Well, you’re not perfect, but few people are. Chances are you haven’t done anything terrible and were just having fun, but try not to repeat your behaviors, since they are all offenses. Keep in mind the pain that your fun might be causing others!

  15. Calculate your score (continued) • 11-18 Cyber Sinner • Your online behavior needs to be reproached! You have done way too many cyber no- nos! Keep in mind that these practices are dangerous, wrong, and punishable and try to clean up that cyber record! • More than 18: Cyber Bully • Put on the brakes and turn that PC/MAC/ text-messaging device around! You are headed in a very bad direction! You need to sign off and think about where that little mouse of yours has been clicking before serious trouble results for you and/or your victim(s), if it hasn’t happened already!

  16. What can I do about it? • No “one size fits all” solution • Student’s role • Take a stand! • Think before you send/speak! • School’s role • Educate students on cyber bullying and the law • Is the intent of the bullying to adversely affect the safety/well-being of a student while he/she is in school?

  17. What can I do about it? • Parent’s Role • Should be a trusted place where kids can turn when things go wrong. • Don’t over-react! • Don’t UNDER-react! • Be supportive! • Words and cyber attacks can wound and have a lasting effect! • Attacks can follow student home! • Let school know • Guidance Counselor is good contact person

  18. What can I do about it? • Parent’s Role • Contact pediatrician/family counselor/clergy for support • Make young person feel secure • Take it seriously • Understand that kid may be just as likely to be a bully as a victim. Roles switch frequently! • Keep printed proof • Two questions: • Is your child at risk of physical assault? • How are they handling it emotionally?

  19. What now? • If: • Personal contact info posted online • Threats made to your child • Then: • Contact local law enforcement (not FBI) • Take print outs • Electronic evidence & live data • Use monitoring product (like Spectorsoft) to collect electronic data [www.spectorsoft.com]

  20. Take a stand! • Keep personal information private! • Take 5! • Stop, Block & Tell • Google Yourself • Don’t be an accomplice! • Practice the Internet Golden Rule

  21. Internet Golden Rule • Do unto others… • Make sure you send things to the right place and the right person gets it. • Is it worth sending? Don’t waste people’s time or bandwidth with junk, chain e-mails and false rumors. • Proofread, spell-check, make sure they know who you are • Don’t attack others online or say things that could be considered insulting or controversial.

  22. Internet Golden Rule • Do unto others… • Don’t forward other people’s emails without permission or share their personal information • Are you angry when you are writing this message? • Don’t reply to spam, even to ask to be removed from the list. • How private is your message? Are you willing to have others read it without your permission?

  23. What’s the law? • In NC this is the law! [House Bill 1261] • Telling the difference between flaming, cyber bullying and harrassment, and cyber stalking • The kind of threat: • Lewd language • Insulting • Threatening (vaguely or boldly) to individual • General threat (bomb threat) • Threat of serious bodily harm to individual

  24. What’s the law? • The frequency of threats: • One-time? • Repeated? • Increasing? • Third-parties joining in? • Source of threats: • Your child knows who is doing this. • Your child thinks they know who is doing this. • Your child has no idea who is doing this. • Messages appear to be from several different people

  25. What’s the law? • Nature of the threats: • Repeated e-mails or IMs • Following child around online, into chat rooms, favorite web sites, etc. • Building fake profiles, “stealing my life” • Planting statements to provoke others into bullying • Signing your child up for porn sites or e-mail lists • Breaking into their accounts online • Stealing passwords • Posting images of your child online • Posting real or doctored sexual images online • Sharing personal information about your child

  26. What’s the law? • Nature of the threats: • Sharing intimate information about the child • Sharing contact information along with solicitation (“for a good time call…”) • Reporting child for real or provoked terms of service violations (“warning wars”) • Encouraging others to share their top ten “hit list,” or “ugly list,” or “slut list” with your child’s name • Posting or encouraging others to post nasty comments on your child’s blog • Hacking your child’s computer and sending malicious code • Sending threats to others posing as your child

  27. What’s the law? • Nature of the threats: • Copying others on your child’s private e-mail conversations • Posting bad reviews or feedback without cause • Registering your child’s name and setting up a bash web site or profile • Posting rude or provocative comments while posing as your child • Sending spam or malware while pretending to be your child • Breaking the rules of a web site while posing as your child

  28. What’s the law? • Nature of the threats: • Setting up a vote for site designed to humiliate your child • Masquerading as your child for any purpose • Posting your child’s cell number online to encourage abuse and run up charges • Launching a denial of service attack • Sending “jokes” about your child to others or mailing lists

  29. Know Before You Need To! • Find contact info for ISP, including hours • Learn to track an IP address and preserve evidence • [http://www.wikihow.com/Trace-an-IP-Address] • Many ISPs discard data after a week to 30 days, so if you need proof, contact your ISP quickly to ask them to preserve records pending your formal subpoena.

  30. Resources Used • http://www.stopcyberbullying.org/ • http://www.teachertube.com/ • http://www.ikeepsafe.org/psa/#gotovideo

  31. Thank you for coming! • MaryAnn Powell Instructional Technology Facilitator maryann.powell@edgecombeearlycollege.com

More Related