1 / 21

Cyberbullying Case Studies

Cyberbullying Case Studies. Joan Lange Katie Derrick. What is Cyberbullying?. The high tech way for kids to pick on each other Cruel or demeaning notes are sent from one child to another through e-mail, text messaging or chat rooms/social networking sites

kaiser
Download Presentation

Cyberbullying Case Studies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbullying Case Studies Joan Lange Katie Derrick

  2. What is Cyberbullying? • The high tech way for kids to pick on each other • Cruel or demeaning notes are sent from one child to another through e-mail, text messaging or chat rooms/social networking sites • Cyberthreats - cyberbullying that contain messages of possible violence against someone else or themselves (http://cyberbully.org/)

  3. Target Group & Timeframe • High school Juniors (ages 16-17) • Approximately 74 studentsin a required Theology class (Morality) • 4 classes • Breakdown of unit: • 1st 50 min. class - students read case study, identify the primary problem, formulate their question for research and brainstorm 3 keywords to search in TEL • 2nd 50 min class – librarian presents TEL (15 min.) and students conduct search for 2 articles at computers (35 min).

  4. Teaching Strategies • Direct teacher instruction & questioning • Direct librarian instruction & questioning • Student-directed research on computers • Guided reading • Small group discussions

  5. Resources Used • Computers with Internet access to TEL- 30 • Information about search strategies gained from initial library instruction • TEL Powerpoint presentation • Keyword brainstorming handout • Student search worksheet • Background on topic from librarian & classroom teacher • Copy of “Ethical Decision-Making Model” • Case Study handout • Support Group list • Computer Projector/laptop with internet connection

  6. Tennessee Electronic Library (TEL)Expanded Academic Database

  7. How to find and Access TEL • Go to JPII website • Select “database library” from website menu • Select “Tennessee Electronic Library” from list • When Infotrac screen comes up, password is elvis

  8. Now is it like Google? • Uncheck the “Select All” box at the top of the screen • Check the select box next to Expanded Academic Index ASAP

  9. Yes, it’s similar to Google. You are using keyword searching in both (right now)… • But these results are really overwhelming! • 2,947 magazine results • 512 academic journal results

  10. Are you going to look through 3,000+ records? • Click on “advanced search” at the top of the screen • Try an AND search to narrow results

  11. Now we’ve only got 50 instead of 2900+ magazines! But… some are brief or do not contain the full text of the article

  12. But this too can be overcome… • Click on the “Expand/Limit” link above the result number • Choose only documents with FULL TEXT • Click “GO”

  13. How can you tell if these REALLY match with what you are looking for and not a related topic (like sexual predators or filtering)? We can narrow it down more by going back to the Advanced Search screen - Add another AND keyword search term - Search “bullies”

  14. Use this article to create new search terms…

  15. Armed with new terms you can go back to your advanced search and try other techniques… • Wildcard searching – searches different word forms • Cyberbull* will search cyberbully, cyberbullying, cyberbullies, etc.

  16. But no matter how brilliant you think your search is, don’t forget to evaluate your results for RELEVANCY!!!

  17. Evaluation & Assessment • Informal: • Circulate among students as they brainstorm and perform TEL search • Check for Understanding (questioning technique) as students evaluate and adapt search strategy to locate articles to fit their need • Formal: • Final assessment will be student generated Powerpoint Presentation which incorporates their research of the primary problem into their ethical decision-making model.

  18. Follow-up Activities • Invite guest speaker from “You Have the Power” to speak to the class • Discussion of support groups for Internet Safety and to counter Cyberbullying • Lesson on MLA citation of sources • Noodletools

  19. Curriculum & Information Literacy Standards Taught • Standard 1: The student who is information literate accesses information efficiently and effectively. • Indicators 1, 3 and 5 • Standard 2: The student who is information literate evaluates information critically and competently. • Indicators 1 and 4 • Standard 3: The student who is information literate uses information accurately and creatively. • Indicators 3 and 4 • Standard 9: The student who contributes positively to the learning community and to society is information literate and participates effectively in groups to pursue and generate information. • Indicators 3 and 4

  20. Yes, this has been attempted… • What went well: • What needs modification:

  21. Questions???

More Related