Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyberbullying 21 st Century Harassment. The Changing Face of Bullying Physical strength or size is no longer a factor Online – anyone can be a victim.

Similar presentations


Presentation on theme: "Cyberbullying 21 st Century Harassment. The Changing Face of Bullying Physical strength or size is no longer a factor Online – anyone can be a victim."— Presentation transcript:

1 Cyberbullying 21 st Century Harassment

2 The Changing Face of Bullying Physical strength or size is no longer a factor Online – anyone can be a victim or a bully There is often a ‘mob’ or ‘faceless’ mentality We, as educators, can often be the victims

3 Bullying is Easier Online Internet offers a sense of protection Free from cultural norms and adult supervision Observers and contributors are unlimited The majority of teens use the internet daily

4 Who is a Cyberbully? Cyberbullies say: They don’t like the other person(s) They have been cyberbullied first They were upset by the other person They have friends who engage in Cyberbullying They do it because it is fun

5 Why Isn’t Cyberbullying Reported? It is the student’s problem and not the school’s The school staff can’t stop the bullying anyway Their friends could get into trouble Their parents would restrict access to the Internet or other technology Other students will think they are ‘rats’ The bullying will get worse

6 Legal Consequences Schools have a legal duty of care The School Act says that Boards of Education have authority when conduct has an impact or connection on the school environment Harassing conduct includes repeated communication with a person Threatening Conduct occurs when someone utters, or causes another person to receive a threat to cause ‘death or bodily harm’ or a threat to damage property

7 Human Rights We must maintain a discrimination-free learning environment for students & staff Prohibited grounds include: -race, colour, ancestry, religion, family status, marital status, place of origin, physical or mental disability, gender, sexual orientation.

8 Communicating With Parents Most parents don’t fully supervise teens when the teens are on the internet We need to educate the parents We need to tell parents to communicate with their children and support them Save all examples (MSN, nexopia, s etc) that show bullying

9 Tips for Parents If your child is being victimized: - Support your children; tell them that they have done the right thing in telling you -Use “Block”, “Ban”, or “Ignore” feature on Instant Messaging -Print out he messages or the websites -Inform the school -Inform the police, if necessary -Inform the internet service provider

10 Tips for Parents If you find out your child is a ‘cyberbully’: -Take it seriously -Print out any communication -Find out who else was involved -Inform the school -Talk to your child and help him/her understand why the behaviour is wrong

11 If Your Child is a Cyberbully:  Talk to your child and help him/her understand why the behaviour is wrong -His/Her actions may have caused serious harm to another person  Ask - “How would you feel if this ended up on the front page of the newspaper?” ”What if everyone did this?” ”How do you think it makes the other person feel?” ”How does this make you feel inside?”

12 If Your Child is a Cyberbully: Support him/her, and help him/her through whatever restitution needs to occur Promote he/she doing the right thing

13 For Students When you are accessing the Internet, remember the following guidelines: -Always keep your password private. -Always keep your personal information to yourself and off the Internet -Always check first with your parents before entering a chat room. Remember that people on the Internet are not always who they say they are -- Always ignore s and instant messages when you are unsure of the sender.

14 For Students Always treat other people the way that you would like to be treated Always check first with your parents before signing up for anything on the Internet Always talk with your parents about what you are doing online and to whom you are speaking Always trust your instincts. If something does not seem right or makes you feel uncomfortable, speak to a trusted adult Always turn off the computer if someone harasses, threatens or makes you feel uncomfortable in any way

15 Online Safety - Direct Protective Factors Use anti-virus software and firewalls Keep all software up to date Review sites your teen visits and ensure online diaries/profiles do not contain identifying personal information Reinforce the public nature of the Internet Inform your adolescent that once a picture or information is sent, he/she loses control of what happens to it, so be mindful of what is sent. Inform your adolescent that pictures can be captured (freezing photos, recording video) by others without knowing, so to be mindful of how the webcam is used. Disconnect the webcam when not in use.

16 Indirect Protective Measures – Positive Identity Formation Be emotionally available for your adolescent Pay attention to how your adolescent is feeling. Acknowledge their feelings. Encourage him/her to talk to you whenever needed. Needs Feelings of accomplishment Needs to understand the importance of morality Needs to feel a sense of belonging Your adolescent needs to feel love from the family

17 What Behaviours Might Signal a Problem? It is important to pay attention to any behaviours that become excessive and interfere with the teen’s life. The teen is acting very differently – more withdrawn, emotional, defensive, aggressive, angry, or secretive? The teen has significantly increased time spent online The teen does not respond to limits Online activities are interfering with life

18 Steps Parents Can Take Step 1 - Increase your involvement. Step 2 - Increase supervision and directly monitor online activities and phone calls. Step 3 - Enforce limits on Internet use (depending on the level of risk, you may consider taking away Internet privileges for a limited time.) Step 4 - Build your relationship with your adolescent.

19 Protection Tips By "Forwarding" s which contain many addresses, you jeopardize the computers of the people to whom you forward these s. There are three main issues in s: VIRUSES: This can be how viruses get onto people's computer and can hide in addresses. Sometimes there are viruses hidden in the code of an and you don't even know you are forwarding them. SPAM: By forwarding on to multiple addresses (using the 'To' address) you can potentially put everyone's on MASS mailing lists... (better to use 'BCC', blind carbon copy, if sending an to a bunch of people) PRIVACY: Also, by using the To address, you expose the addresses of everyone in your list, PLUS everyone's address within the message that you didn't delete, and just forwarded. It is better and safer if you receive an that you think is funny or nice to share to COPY & PASTE the words or pictures into a new ; or at the very least FORWARD the message WITHOUT the addresses

20 Posters One Web cam, countless Peeping Toms. Who’s watching Your Kids?

21 Posters “I shouldn’t have sent it. He promised he wouldn’t show anyone.”

22 Websites


Download ppt "Cyberbullying 21 st Century Harassment. The Changing Face of Bullying Physical strength or size is no longer a factor Online – anyone can be a victim."

Similar presentations


Ads by Google