Download presentation
Presentation is loading. Please wait.
Published byBritney Hallows Modified over 9 years ago
1
CYBER-BULLYING Kevin Cummins – www.edgalaxy.com
2
What is cyber-bullying? Cyber-bullying “Cyber-bullying involves the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others.” (Bell Belsey, www.cyberbullying.ca )www.cyberbullying.ca
3
How is cyber-bullying the same as face to face (f2f) bullying? It involves human relationships power control fear e.g. physical harm or social isolation victim feels worthless, weak or unwanted psychological pain humiliation Victims are afraid to disclose
4
How is cyber-bullying different from face to face (f2f) bullying? Technology is the vehicle ANYTIMEANYWHERE 24 / 7: It is ANYTIME and ANYWHERE Bullies can hide behind anonymity Bullying communications can reach a huge audience at great speed The image is out there forever and keeps re-victimizing the person Zero empathy Zero empathy for the victim
5
Vehicles for cyber-bullying Email IM – MSN Social networking sites – Facebook, Twitter, Myspace, Bebo etc.Facebook Bash boards, Chat rooms Virtual learning environments – school work sites Mobile phones, Camera phones On line and interactive gamesinteractive games Blogs, Wikis Blogs Bashing site – Rate My SchoolRate My School Internet polling – DoodleDoodle Webcams Video hosting sites – YouTubeYouTube Game sites
6
Direct cyber-bullying Direct attack to the victim via email, IM, blog Phishing email address or web site Text war leading to huge bills and denial of service Photoshop pictures sent or posted as real pics Use a stolen password to lock out the rightful owner and then hijack the account for nasty purposes Create a poll, survey or bash board to vote on who is hot, ugly, stupid, gay, sexy or a slut
7
Direct cyber-bullying Tease or taunt Impersonation: create a Facebook page to publish fake information, rumours or stories Insult or dissing Threaten the victim or a member of the victim's family Outing Create and spread rumours (true or not) Post clips on YouTube out of context
8
Secondary school, student to student cyber- bullying examples Repeating what a person said, or commenting on what a person wore or did in school, leading to fear of being stalked Threats of violence to the student or the family Blackmail for sexual or monetary favours Impersonation of a person, teacher, school web site or organization – phishing site I know where you live! Teens transmit pornographic pictures of themselves or their underage peers, from their cell phones.
9
What educators can do Investigate to see if the victim(s) of cyber-bullying need support from a professional. Be sure that your school’s anti-bullying rules and policies include cyber-bullying. Investigate reports of cyber-bullying immediately even if the cyber-bullying occurs off-campus Notify parents of victims and parents of known or suspected cyber-bullies. Contact the police immediately if known or suspected cyber-bullying involves acts such as: ◦ Threats of violence ◦ Extortion ◦ Obscene or harassing phone calls or text messages ◦ Harassment, stalking, or hate crimes ◦ Child pornography http://www.stopbullyingnow.hrsa.gov http://www.stopbullyingnow.hrsa.gov
10
What schools must do Put Put cyber-bullying prevention in the curriculum Educate Educate everyone about the consequences and ethics of cyber-bullying Address Address the content and not the technology Enforce Enforce clearly and publicly stated consequences of cyber-bullying up to and including the pressing of criminal charges Make Make the cyber bully accountable ◦ Rethink ◦ Rethink the effectiveness of zero tolerance, suspension, restitution, restoration of trust Include Include cyber-bullying in the school's code of behaviour
11
What we do here at (School Name) We have an Internet User Agreement Policy – Co-signed by Parents and Students. We have an excellent filtering system that simply does not allow for access to sites such as MSN, Facebook and Myspace. All 3 – 6 Students complete the internet safety and awareness course on Superclubs Plus and we actively encourage our students to use this to communicate with friends as it is monitored by adults. - Mainly teachers. Any cyber bullying issues that arise are treated exactly the same as a face to face issue and we call upon our existing school values and protocols in dealing with cyber bullying.
12
We teach the students to: Never share Never share passwords or log-in information except with their teacher or a parent If harassed they should ◦ tell ◦ tell a trusted adult ◦ leave ◦ leave the harassment location ◦ never respond ◦ never respond to harassing messages ◦ save ◦ save the harassing messages for the ISP or school ◦ report ◦ report it to the police if necessary ◦ Stop, block, save and tell stand against Take a stand against bullying of all kinds Acceptable Use Policy Know and adhere to the Acceptable Use Policy ◦ http://www.bewebaware.ca/english/CyberBullying.aspx http://www.bewebaware.ca/english/CyberBullying.aspx
13
Signs Your Child May be a Victim of Cyberbullying http://www.cyberbullying.us/cyberbullying_warning_signs.pdf Unexpectedly stops using the computer Appears nervous or jumpy when an instant message, text message or email appears Appears uneasy about going to school or outside in general Appears angry, frustrated, or depressed after using the computer Avoids discussions about what they are doing on the computer Becomes abnormally withdrawn from usual friends or family
14
Signs a Child May be Cyberbullying Others http://www.cyberbullying.us/cyberbullying_warning_signs.pdf Quickly switches screens or closes programs when you walk by Uses computer at all hours of the night Gets unusually upset if he/she cannot use the computer Laughs excessively while using the computer Avoids discussions about what they are doing on the computer Uses multiple online accounts or uses an account that is not their own
15
PART 2: USE OF DIGITAL TECHNOLOGY IS NOT WITHOUT RISKS
16
Exposure to Inappropriate and Harmful Content Such as Pornography Easily available on the Net - Australian Broadcasting Authority (ABA) study: 14million pornographic websites across the world – some carrying pornographic images of children (Wellard 2001) Promotes a demeaning view of women & men Is addictive Can be used to sexualise young children Children games sites – known to have inappropriate games hidden within the site or links to inappropriate sites
17
Unsafe Contacts or inappropriate contacts Predators in chat rooms/stalking/online grooming – pretending to be someone else or not pretending (WA recently– man charged with grooming a 12 year old girl for sex over the internet) People know when you online – so invasion of privacy and easy access Cyber sex – yes they do do this Exposure or engagement with inappropriate discussions/language
18
Racist/sexist/hate based text Small extreme groups use the web for this purpose. Some pose as churches, or other “acceptable” groups. Some target children. Exposure to other offensive material in the form of photos, videos, or text of this nature Links that take us to homophobic sites or racist cites
19
Inaccurate information Fake sites URL mimickers eg www.microdoft.com - known to be done by using a word that young children commonly misspell to have the child enter their sitewww.microdoft.com Historical revisionist material Inaccurate health information – a real problem
20
Invasion of privacy Often advertising is masked as content on a site Subtle request for information (games, auctions competitions etc) Collection of information is a net marketers dream Information going out may relate to other members of the family or the family address, phone, parents income, movements etc
21
In opposition to your parenting values Our children can easily access magazines, clips to films or music on the internet that you may not allow them to normally purchase or view in your home Young siblings may gain exposure to material you don’t want them to
22
Health risks Addiction Sedentary Virtual world vs. real world Loss of communication & other skills Social isolation or loneliness Lack of sleep – sms on mobiles at night
23
Wrongdoing by children could result in serious long term consequences Commonwealth Telecommunications laws make certain misuse of mobile phones unlawful Criminal offence eg: child pornography by transmitting certain photos Expulsion from school Loss of friends/reputation Legal action
24
Myths If we ban it there will be no risk It’s a normal part of adolescent behaviour This one-off session will fix the risk problem We had no problems until computer technology and mobile phones became so popular Its character building It won’t happen to my child My child will tell me we have an open relationship (hopefully they will but they may not)
25
FACTS Young people hold more power than any other group in terms of their capacity to influence other young people Recent research shows that teenagers are less likely to tell their parents (tell a friend or teacher first) if it occurs because of fear parents will remove their access to mobile/computers
26
WHEN A PARENT SAYS: I don't tell you how to run your school, you don't tell me how to run my house!
27
YES I CAN! YES I CAN! …said the principal When there is a nexus, convergence, meeting or intersection between the school and the behaviour Disruption of school environment Negatively impacts the learning environment Negatively impacts the mental or physical well being of others Schools are taking on the role of parents to students. Eric M. Roher, LLP, Toronto, Ontario
28
Take responsibility Predominantly the problem is cultural – damage is borne out of a culture that permits or condones (directly or indirectly) Understand that young people are the most powerful source of influence on other young people Inaction can be as damaging as the behavior itself Value the proper use of the technology – mentor this Everyone has a right to feel safe
29
STRATEGIES AND SUPPORTS
30
2 Main Principles 1) Parents are primary educators in safety and values for their children – You must be proactive in this 2) A Multi facet approach is necessary. A Technical Approach Parental Ownership Education and reinforcement at school.
31
The solutions are not rocket science There are no miracle answers or solutions It’s about using the basic parenting skills and strategies that work with you know so well Its about working alongside other stakeholders Each person taking responsibility makes a difference
32
Educate yourself Spend some time learning about cyber tech Get involved with your children’s online activities, validate their skills and learn from them Get on the internet and mobile phone and learn how it works. Ask your children to show you Research and follow up anything that has interested you tonight. Work with the school on an awareness raising project with the students leading it
33
Build a positive culture within the community let others know that you take it seriously encourage others to be proactive and prepared to keep children safe in cyber use talk to the school about the subject Talk to each other about it
34
Be a role model Model appropriate and responsible use of digital technology (time in front of the computer; circulating photos, emails, SMS etc). eg: Don’t sit at a computer for 12 hrs at night.
35
Be prepared Know where to get help and support if you have any concerns Know where to report any inappropriate material or contact Know what to do if your child, or another child, discloses - do the following. Use the 2 R’s: Reassure Report (or seek assistance) to the appropriate persons/authority Remedy
36
Implement safe tools now - habitual Have the computer in a place that you can see it (not hidden away in child’s bedroom) Choose products with parental controls Have a suitable filter on the computer to stop inappropriate material or sites Ensure you as the parent has access rights to your children’s computers and passwords
37
Set rules for use in your family (social contract – sample in package). Include Statement of what you value eg: social interaction, Clear rules for amount of use (when, and how long) Clear rules of what you can and cannot do on the internet Have a ‘Netiquette’ – expectations on how they treat others Let them know you as parent will check the computer Be clear about consequences if they misuse it (Use language that is consistent with home and school and community)
38
Bridge the gap Talk to your children about it. Let them know you value the internet and mobile but you also value social interaction (healthy balance) Learn Cyber tech language and use it with your children Let your children know you want them to use the tech safely and responsibly. Ask your child what they did on the net or who they spoke with today just as you would ask them this about school Ask older children to mentor safe practices with younger siblings
39
Make it a permissible topic in your home Engage in discussion with your children on this – so its not an awkward topic if they need to seek your help. Let them know if they were hurt by cyber misuse you would not take away their use of it Give them ideas of who else they could go to for help if they needed to and didn’t come to you (give them the kids help contacts) Talk to them and their friends about it Tell them what your concerns are and ask them for their ideas and views (and listen to them)
40
How to Keep Your Child Safe Online Create an Internet Use Contract If you can’t beat them, join them Know who your child is communicating with Be aware of what your teens are posting Blocking/Parental Controls Lead by example Cyberbullying.us
41
Some Filtering Options There are no more free options from the Australian Government as of 31 Dec 2008 but... www.netnanny.com.au Around $30 for solid protection for kids online. www.netnanny.com.au Both Mcafee, Kapersky and Norton offer complete antivirus options for around $50 - $100. My personal pick is Mcafee total Protection $95.00 for all internet threats.
42
Pick 3 things strategies you will do in the next month … Put them in your diary Tell someone what you are doing
43
Going further http://cyberbullying.us/ http://cyberbullying.us/ http://www.netsmartz.org/ http://www.netsmartz.org/ http://www.stopcyberbullying.org/ http://www.stopcyberbullying.org/ http://stopbullyingnow.hrsa.gov/index.asp http://stopbullyingnow.hrsa.gov/index.asp http://www.wiredsafety.com/ http://www.wiredsafety.com/ http://www.ncpc.org/cyberbullying http://www.ncpc.org/cyberbullying
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.