Presentation is loading. Please wait.

Presentation is loading. Please wait.

Administrator’s Briefcase Keeping Our Kids Safe On-Line Marlene Boney Knox County Schools

Similar presentations

Presentation on theme: "Administrator’s Briefcase Keeping Our Kids Safe On-Line Marlene Boney Knox County Schools"— Presentation transcript:

1 Administrator’s Briefcase Keeping Our Kids Safe On-Line Marlene Boney Knox County Schools

2 Cyberbullied Teens in the News for past 10 years Lennon Baldwin, a 15-year-old high school student found hanged in his home, death may have been the result of bullying, The Tampa Tribune Published: April 05, 2012 Phoebe Prince Again? Bullying Linked to Suicide of 10 Year Old Ashlynn Conner. Psych Central. Retrieved on April 5, 2012, Phoebe Prince Morristown, NJ teen's apparent suicide being investigated as possible bullying case, officials say Published: Saturday, March 31, 2012, 7:00 AM A Gordonsville, TN boy’s parents say bullying caused their son to take his own life. Phillip Parker, 14, died this week. His parents said he was constantly bullied for being gay. Posted January 23rd, 2012 How Many More Amanda Cummings Must Die Before Bullying Is Forever Banned? Wednesday, January 3, 2012-A Staten Island teenager whose family says she was bullied died after jumping in front of a city bus while carrying a suicide note, reports said. A Tennessee teen has taken his own life after being subjected to anti-gay bullying which, friends say, officials at his high school did little to prevent. 12-08-11 9-21-11Jamey Rodemeyer, from Buffalo, New York-Right before he committed suicide NY JAMIE IS STUPID, GAY, FAT ANND UGLY. HE MUST DIE!' read one post. Another read: 'I wouldn't care if you died. No one would. So just do it :) It would make everyone WAY more happier!’ On September 9, Jamey wrote on his Tumblr site: 'I always say how bullied I am, but no one listens. What do I have to do so people will listen to me? A case of schoolyard bullying has cost the New South Wales Education Department a six-figure payout to the family of a teenager who killed himself. 4-3-2012

3 Phoebe Prince 15 Alexa Berman 14 Tyler Clelmenti 18 Megan Meier 13 Ryan Halligan 13 MO 2006 CT 2008 NJ 2010 VT 2003 MA 2010

4 How do Administrators fit into the Internet Safety picture in Cyber Bullying and/or Social Networking? Cyber Bullying and Social Networking files Administrator’s Briefcase

5 NETS for Administrators

6 Information on Cyber Bullying that Educators Need to Know The National Crime Prevention Council defines cyber-bullying as “the process of using the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” While bullying is nothing new, today's kids have found another, often more anonymous way, to be cruel to each other: cyberbullying. Hiding behind their cell phone or computer screens, kids are now humiliating and harassing each other in ways most of their parents didn't have to deal with. As Common Sense, a national not-for-profit that provides digital citizenship curriculum to schools across the country says, "this type of bullying is especially disturbing because it is constant, pervasive, and very, very public." l

7 CYBERBULL YING CRACKING down on ??? CyberBully?

8 Denigration Harassment Flaming Angry, rude arguing Repeatedly sending offensive messages “Dissing” someone online by spreading rumors or posting false information Den-i-gra-tion to attack one’s reputation

9 Exclusion Impersonation Outing Disseminating intimate private information or tricking someone into disclosing private information, which is then disseminated Pretending to be someone else and posting material to damage that person’s reputation Intentionally excluding someone from an online group Disseminate: to broadcast or scatter widely: to circulate

10 CyberStalking Creating fear by sending offensive messages and engaging in threatening activities Everyone hates you. You had better watch your back.

11 CyberBullying may occur via personal Web sites, blogs, e-mail, discussion groups, message boards, chat, instant messaging, or voice, text, or image cell phones. CYBERBULLYING

12 A cyberbully may be a person whom the target knows or an online stranger. A cyberbully may be anonymous and enlist the aid of others, including online “friends.” CYBERBULLYING

13 Cyberbullying may be a continuation of, or in retaliation for, in-school bullying. It may be related to fights about relationships or be based on hate or bias. Some kids think cyberbullying is a fun game. CYBERBULLYING


15 “Some people plan a violent conflict (cyber- bashing) in advance so that their buddies can stand nearby and videotape the assault. To add insult to injury, the video of the attack is posted on the Internet so these bullies can earn so-called bragging rights.” “Children are doubly victimized -- first by the assault itself, then a second time by the public humiliation when the taping of the attack is shown on the Internet for classmates and the world to see.” by Elizabeth Wasserman websitewebsite

16 The Harm of CyberBullying Cyberbullying can cause great emotional harm. The communications can be vicious and occur 24/7. Damaging material can be widely disseminated and impossible to fully remove. Teens are reluctant to tell adults for fear they will be restricted from online activities or the cyberbully will retaliate. Cyberbullying can lead to youth suicide and violence.

17 Sadness or anger during or after Internet use withdrawal from friends and activities school avoidance decline of gradesdepression are ALL indications of being bullied at school or online.

18 Make sure the child knows not to retaliate, to save the evidence, and to ask for your help if he or she is having difficulties. Identify the cyberbully or bully group. Ask your Internet Service provider for help.


20 Cyberbullying Sites dex.html dex.html

21 Calmly and strongly tell the cyberbully to stop and to remove any harmful material. Ignore the cyberbully by leaving the online environment, blocking communications, or both. File a complaint with the Internet or cell phone company. Send the cyberbully’s parents a letter that includes the evidence of cyberbullying. Demand that the actions stop and harmful material be removed.

22  Seek assistance from the child’s school.  Contact an attorney to send a letter or file a lawsuit against the cyberbully’s parents.  Contact the police if the cyberbullying involves threats of violence, coercion, intimidation based on hate or bias, or any form of sexual exploitation.

23 Administrators Need to Know all about Social Networking "Social networking sites provide great opportunities for young people to meet and share experiences, but with this freedom comes a degree of risk and the need to act responsibly. We know that where children go online, so do those who seek to abuse them."

24 Friends or Foes?

25 A Guide to Social Networks A Guide to Social Networks from Social Networks can be a great home on the web can help you connect with people can help reconnect with long-lost friends can even help your career by making business contacts Social networks can be friends-based networks like Facebook and MySpace music and movie networks like Flixster and Last.FM business social networks like LinkedIn and XING.

26 Facebook with 750,000,000 visits monthly Twitter with 250,000,000 visits monthly Linkedin with 110,000,000 visits monthly MySpace with 70,500.000 visits monthly Google Plus with 65,000,000 visits monthly key to what makes photo-sharing great in Google PlusGoogle Plus As of February 2012: Facebook has more than 845 million active users; Twitter has close to 500 million; MySpace 225 Million; Linkedin 150 million

27 Just remember this, “You can’t get to 500 million without making a few

28 Social Networking In 2012 all of our school’s students are busy cyber-socializing; they’re chatting, blogging and posting pictures and videos. Should you and your schools stay current with these new social networking applications? As an administrator should you take advantage of these applications to interact with students in their own forum or you should stay on the side-lines and become aware of the applications so as to better understand today’s students? Some popular forms of Social Networking Facebook-. As of February 2012, Facebook has more than 845 million active users. Facebook Twitter-On March 21, 2012, Twitter celebrated it's sixth birthday while also announcing that it has 140 million users and sees 340 million tweets per day. Twitter Blogging-Blogs are web sites containing the writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other Web sites. Blogging Instant Message (IM)- Instant messaging (IM) is a form of communication over the Internet, that offers an instantaneous transmission of text-based messages from sender to receiver. Instant Message Social Networking in Plain English A short introduction to the concepts behind social networking

29 Facebook includes:  A place for a profile picture  Contact information and "About You" space  The Wall-- a place where friends can publicly post comments for you (a digital bulletin board)  Status update-- where you can tell your friends how you are or what you are doing  News Feed-- regularly updated information about your friends-- groups they've joined, applications or friends they have added, changes to their profiles  A space for uploading photos and videos  But Facebook, like many social software sites, is customizable and there is no end to the number of applications you can add to your Facebook account. Applications are additional tools and features-- some are created by Facebook, but many more have been created by third party developers. Facebook is a privately owned company headquartered in Palo Alto, California. Mark Zuckerberg, age 24 and a Harvard drop-out, is ranked 785 in Forbes Magazine's list of the world's billionaires, with a net worth of approximately $1.5 billion. FaceBook

30 Twitter is a free micro-blogging tool that allows you to post short "blogging" messages in 140 characters or less. You can post these messages using Twitter on your computer or your mobile device. Twitter provides a way for individuals to share information with one another in real-time. They can share news stories, reviews, complaints and even special deals. We call these short 140 character messages "tweets" or "tweeting." These messages are broadcast to other Twitter users that follow you and shown on your Twitter profile page. You can also use private messages through Twitter to your followers, this is called a direct message or a DM. Twitter

31 A blog is often a mixture of what is happening in a person’s life and what is happening on the Web, a kind of hybrid diary/guide site, although there are as many unique types of blogs as there are people. People maintained blogs long before the term was coined, but the trend gained momentum with the introduction of automated published systems, most notably Blogger at Thousands of people use services such as Blogger to simplify and accelerate the publishing process. Blogs are alternatively called web logs or weblogs. However, "blog" seems less likely to cause confusion, as "web log" can also mean a server’s log files. Blog

32  What Are Texting and IM? LYL, IDK, G2G – what does it all mean??? Text and IM (instant messaging) are fast becoming the communication of choice for teens and it’s also the choice for many educators, teachers and parents. Get the 411 (information) on text lingo and find out what your kids need from you to stay safe online and on the phone. LYL, IDK, G2G  Text messaging (texting) and instant messaging (IMing) are forms of digital communication that are done from mobile phones and computers.  Text messaging is done with a mobile phone. It allows you to send a short message from one phone to another. If the phone has a camera, you can also text pictures right from your phone. SEXTING has become a serious problem. You can even text from a computer to a mobile phone, if you want to. Sixty-three percent of teen and tweens text daily.SEXTING  Instant messaging requires an Internet connection and computer (or sometimes a phone, too) and allows you to have longer conversations through a series of messages in a chat window. Texting and IM

33 Should Administrators encourage teachers to inform parents of Internet Safety issues? Internet Safety Files Needed in Administrator’s Briefcase Teachers Share With Parents

34 Tennessee’s Internet Safety and Acceptable Use Policy Resource Guide for Best Practices for Administrators Barb’s Tech Resources Barbara Denson, Instructional Technology State of Tennessee  Realize the Internet’s educational advantages and how it is used throughout their school.  Have an awareness and understanding of the potential risks of using the Internet for instructional purposes and have a network for data collection, storage, and communication  Stay current with new technologies, vulnerabilities, and legalities related to the Internet and school responsibilities.  Keep parents and students regularly informed about all aspects of Internet safety.  Recognize professional development on Internet safety as a high priority and offer multiple learning opportunities for staff.  Budget for means to implement communication and training on Internet safety and curriculum.  Maintain current and credible acceptable use policies. Teachers Share With Parents

35 As cyberbullying-linked student suicides and computer hacking continue to make headlines, nearly all educators and school technology coordinators agree it’s important to teach about cybersecurity and cyberethics. But “there seems to be some confusion about who is supposed to be doing it and how much they’re supposed to be doing,” A survey found that seven out of 10 teachers think parents should be primarily responsible for cybersafety lessons. But nearly half of school administrators say teachers should be primarily responsible. Stand Up Teachers Share With Parents

36 LYL Love you lots IDK I don’t know G2G Got to go

Download ppt "Administrator’s Briefcase Keeping Our Kids Safe On-Line Marlene Boney Knox County Schools"

Similar presentations

Ads by Google