1 / 18

The New Bullies on the Internet

The New Bullies on the Internet. By: Kaitlyn Sassone. What is Cyberbullying?.

read
Download Presentation

The New Bullies on the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The New Bullies on the Internet By: Kaitlyn Sassone

  2. What is Cyberbullying? “Cyberbullying is defined as any cyber-communication or publication posted or sent by a minor online, by instant messenger, e-mail, website, online profile, handheld device, cell phone or other interactive device that is intended to frighten, embarrass, harass or otherwise target another minor.”

  3. Cyberbullying Videos http://www.brainpop.com/technology/computersandinternet/cyberbullying/ http://www.tweenangels.org/video_animation/cyberbullying_video.html

  4. Examples of Cyberbullying . . . Instant Message Chat: BabyGirl: Hey, dork, watch your back!! NmS23: What r u talking about? BabyGirl: Why don't you just run away? NmS23: Why can't you just leave me alone? BabyGirl: Ugly girls like u need to be put in their place.

  5. Technologies Used for Cyberbullying Chat rooms E-mail Instant Messaging Facebook Text Messaging Blogs Cell Phones

  6. Nancy Willard’s 8 Forms of Cyberbullying “Flaming’: Online fights using electronic messages with angry and vulgar language “Harassment”: Repeatedly sending offensive, rude, and insulting messages “Cyber stalking”: Repeatedly sending messages that include threats of harm or are highly intimidating. Engaging in other on-line activities that make a person afraid for his or her own safety “Denigration”: ‘Dissing’ someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships

  7. Nancy Willard’s 8 Forms of Cyberbullying “Impersonation”: Pretending to be someone else and sending or posting material online that makes that person look bad, gets that person in trouble or danger, or damages that person’s reputation or friendships “Outing and Trickery”: Sharing someone’s secret or embarrassing information online. Tricking someone into revealing secrets or embarrassing information which is then shared online “Exclusion”: Intentionally excluding someone from an on-line group, like a ‘buddy list’

  8. Acceptable Use Policy • Every school should have an AUP that outlines what is and is not the permitted use of the school’s technology and computer systems. • Parents and students should read and sign the AUP together. • The AUP document will help keep students safe while accessing the internet in school.

  9. Guidelines for Educators • Teachers should advise students that their school internet records can be searched. • The school district has the right to search students files on the computer if there is suspicion that the AUP has been broken. • AUP should be discussed in school and at home that way students are less likely to break the rules. • Teachers should teach students about cyber safety. This information should be integrated into the curriculum so that students are aware of this problem.

  10. Guidelines for Educators • Teachers should provide a way for students to privately report Cyberbullying. Setting this precaution in place lets students know that there is a safe place to share Cybersafety violations. • If students are aware of this, they will feel safer about reporting this inappropriate behavior. • Students who take part in Cyberbullying might be less likely to perform this act if they know that there school is aware of the problem and they could get into serious trouble.

  11. Example of Acceptable Use Policy Carmel Central School District Carmel Central School District Acceptable Use Policy Consent and Waiver for Employees, Parents, and Students CONSENT AND WAIVER AGREEMENT By signing this Acceptable Use Policy Consent and Waiver Agreement, I agree that I will abide by the terms of the Acceptable Use Policy for Technology and the Internet of the Carmel Central School District. I have read the Acceptable Use Policy for Technology and the Internet, and I understand it. I further understand that this form will be kept on file for future reference. Name: ___________________________________ (Please Print Legibly)Signature: ________________________________Date: ___________

  12. Guidelines for Parents • Let children know what information should not be given out online. • Talk with your child about what he/she does online and who his/her cyber friends are. • Discuss Cyberbullying with your child and let them know the importance of sharing disturbing information (such as threats) with you. • Put your computer in a public place in your home. • Check out your child’s online postings and profiles.

  13. Cyberbullying • Cyberbullying is harmful to children, and it happens very often. • Educators and parents must teach children “Cybersafety” from an early age so that they can safely interact on the internet. • In order to detect if Cyberbullying is occurring, teachers and parents need to have conversations with students.

  14. Suggestions for School Districts. . . . The Technology Facilitator in every school district should be responsible for informing parents/guardians about what can happen to children while using the internet. Part of the Technology Facilitators job should be to create a presentation. This presentation should be presented at the beginning of every school year. It should be open to all Administrators, Educators, Parents and Students in the community. The Technology Facilitator’s presentation should include the following: • Learning how to keep children safe & risk free of the Internet • Understanding technology tools that are available to our students • Find out what children and teens are commonly doing on the Internet • Understand potential life threatening scenarios • Understand “Social Networking” • Discuss school districts Acceptable Use Policy

  15. Cyberbullying Scenario . . . “After rehearsal for the school play, Nicole remains in the auditorium by herself to practice dance moves, forgetting that the video camera is still on. The next day you and a friend discover the video of Nicole, which contains some silly and embarrassing footage. You decide to create a fake Facebook page for Nicole that contains some of the footage, and you invite the whole school to be her friend. The video of Nicole dancing becomes a school-wide joke, and people start to add visual and sound effects that make Nicole look even funnier. Before long, the video begins to spread around the Internet and Nicole receives hundreds of harassing messages.” What would you do?

  16. Something To Think About. . . . If cyberbullying is an ongoing occurrence, what else can educators and parents do to protect our children?

  17. References Brain Pop Cyberbullying Video. http://www.brainpop.com/technology/computersandinternet/cyberbullying/ Carmel Central School District, Acceptable Use Policy. http://www.carmelschools.org/ Cyberbullying Understanding and Addressing Online Cruelty. Cyberbullying Scenarios. http://www.adl.org/education/curriculum_connections/cyberbullying/Middle%20School%20Handouts.pdf Nancy Willard, M.S., J.D., Director of the Center for Safe and Responsible Internet Use. http://privateschool.about.com/gi/o.htm?zi=1/XJ&zTi=1&sdn=privateschool&cdn=education&tm=16&f=10&tt=2&bt=1&bts=1&zu=http%3A//csriu.org/onlinedocs/cskcstschools.pdf Tweenangels Cyberbullying Video. http://www.tweenangels.org/video_animation/cyberbullying_video.html

More Related