Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBER-BULLYING Kevin Cummins – www.edgalaxy.com. What is cyber-bullying? Cyber-bullying “Cyber-bullying involves the use of information and communication.

Similar presentations


Presentation on theme: "CYBER-BULLYING Kevin Cummins – www.edgalaxy.com. What is cyber-bullying? Cyber-bullying “Cyber-bullying involves the use of information and communication."— Presentation transcript:

1 CYBER-BULLYING Kevin Cummins –

2 What is cyber-bullying? Cyber-bullying “Cyber-bullying involves the use of information and communication technologies such as , cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others.” (Bell Belsey, )www.cyberbullying.ca

3 How is cyber-bullying the same as face to face (f2f) bullying?  It involves human relationships power control fear e.g. physical harm or social isolation victim feels worthless, weak or unwanted psychological pain humiliation  Victims are afraid to disclose

4 How is cyber-bullying different from face to face (f2f) bullying?  Technology is the vehicle ANYTIMEANYWHERE  24 / 7: It is ANYTIME and ANYWHERE  Bullies can hide behind anonymity  Bullying communications can reach a huge audience at great speed  The image is out there forever and keeps re-victimizing the person  Zero empathy  Zero empathy for the victim

5 Vehicles for cyber-bullying   IM – MSN  Social networking sites – Facebook, Twitter, Myspace, Bebo etc.Facebook  Bash boards, Chat rooms  Virtual learning environments – school work sites  Mobile phones, Camera phones  On line and interactive gamesinteractive games  Blogs, Wikis Blogs  Bashing site – Rate My SchoolRate My School  Internet polling – DoodleDoodle  Webcams  Video hosting sites – YouTubeYouTube  Game sites

6 Direct cyber-bullying  Direct attack to the victim via , IM, blog  Phishing address or web site  Text war leading to huge bills and denial of service  Photoshop pictures sent or posted as real pics  Use a stolen password to lock out the rightful owner and then hijack the account for nasty purposes  Create a poll, survey or bash board to vote on who is hot, ugly, stupid, gay, sexy or a slut

7 Direct cyber-bullying  Tease or taunt  Impersonation: create a Facebook page to publish fake information, rumours or stories  Insult or dissing  Threaten the victim or a member of the victim's family  Outing  Create and spread rumours (true or not)  Post clips on YouTube out of context

8 Secondary school, student to student cyber- bullying examples  Repeating what a person said, or commenting on what a person wore or did in school, leading to fear of being stalked  Threats of violence to the student or the family  Blackmail for sexual or monetary favours  Impersonation of a person, teacher, school web site or organization – phishing site  I know where you live!  Teens transmit pornographic pictures of themselves or their underage peers, from their cell phones.

9 What educators can do  Investigate to see if the victim(s) of cyber-bullying need support from a professional.  Be sure that your school’s anti-bullying rules and policies include cyber-bullying.  Investigate reports of cyber-bullying immediately even if the cyber-bullying occurs off-campus  Notify parents of victims and parents of known or suspected cyber-bullies.  Contact the police immediately if known or suspected cyber-bullying involves acts such as: ◦ Threats of violence ◦ Extortion ◦ Obscene or harassing phone calls or text messages ◦ Harassment, stalking, or hate crimes ◦ Child pornography 

10 What schools must do  Put  Put cyber-bullying prevention in the curriculum  Educate  Educate everyone about the consequences and ethics of cyber-bullying  Address  Address the content and not the technology  Enforce  Enforce clearly and publicly stated consequences of cyber-bullying up to and including the pressing of criminal charges  Make  Make the cyber bully accountable ◦ Rethink ◦ Rethink the effectiveness of zero tolerance, suspension, restitution, restoration of trust  Include  Include cyber-bullying in the school's code of behaviour

11 What we do here at (School Name)  We have an Internet User Agreement Policy – Co-signed by Parents and Students.  We have an excellent filtering system that simply does not allow for access to sites such as MSN, Facebook and Myspace.  All 3 – 6 Students complete the internet safety and awareness course on Superclubs Plus and we actively encourage our students to use this to communicate with friends as it is monitored by adults. - Mainly teachers.  Any cyber bullying issues that arise are treated exactly the same as a face to face issue and we call upon our existing school values and protocols in dealing with cyber bullying.

12 We teach the students to:  Never share  Never share passwords or log-in information except with their teacher or a parent  If harassed they should ◦ tell ◦ tell a trusted adult ◦ leave ◦ leave the harassment location ◦ never respond ◦ never respond to harassing messages ◦ save ◦ save the harassing messages for the ISP or school ◦ report ◦ report it to the police if necessary ◦ Stop, block, save and tell stand against  Take a stand against bullying of all kinds Acceptable Use Policy  Know and adhere to the Acceptable Use Policy ◦

13 Signs Your Child May be a Victim of Cyberbullying  Unexpectedly stops using the computer  Appears nervous or jumpy when an instant message, text message or appears  Appears uneasy about going to school or outside in general  Appears angry, frustrated, or depressed after using the computer  Avoids discussions about what they are doing on the computer  Becomes abnormally withdrawn from usual friends or family

14 Signs a Child May be Cyberbullying Others  Quickly switches screens or closes programs when you walk by  Uses computer at all hours of the night  Gets unusually upset if he/she cannot use the computer  Laughs excessively while using the computer  Avoids discussions about what they are doing on the computer  Uses multiple online accounts or uses an account that is not their own

15 PART 2: USE OF DIGITAL TECHNOLOGY IS NOT WITHOUT RISKS

16 Exposure to Inappropriate and Harmful Content  Such as Pornography  Easily available on the Net - Australian Broadcasting Authority (ABA) study: 14million pornographic websites across the world – some carrying pornographic images of children (Wellard 2001)  Promotes a demeaning view of women & men  Is addictive  Can be used to sexualise young children  Children games sites – known to have inappropriate games hidden within the site or links to inappropriate sites

17 Unsafe Contacts or inappropriate contacts  Predators in chat rooms/stalking/online grooming – pretending to be someone else or not pretending (WA recently– man charged with grooming a 12 year old girl for sex over the internet)  People know when you online – so invasion of privacy and easy access  Cyber sex – yes they do do this  Exposure or engagement with inappropriate discussions/language

18 Racist/sexist/hate based text  Small extreme groups use the web for this purpose. Some pose as churches, or other “acceptable” groups. Some target children.  Exposure to other offensive material in the form of photos, videos, or text of this nature  Links that take us to homophobic sites or racist cites

19 Inaccurate information  Fake sites  URL mimickers eg - known to be done by using a word that young children commonly misspell to have the child enter their sitewww.microdoft.com  Historical revisionist material  Inaccurate health information – a real problem

20 Invasion of privacy  Often advertising is masked as content on a site  Subtle request for information (games, auctions competitions etc)  Collection of information is a net marketers dream  Information going out may relate to other members of the family or the family address, phone, parents income, movements etc

21 In opposition to your parenting values  Our children can easily access magazines, clips to films or music on the internet that you may not allow them to normally purchase or view in your home  Young siblings may gain exposure to material you don’t want them to

22 Health risks  Addiction  Sedentary  Virtual world vs. real world  Loss of communication & other skills  Social isolation or loneliness  Lack of sleep – sms on mobiles at night

23 Wrongdoing by children could result in serious long term consequences  Commonwealth Telecommunications laws make certain misuse of mobile phones unlawful  Criminal offence eg: child pornography by transmitting certain photos  Expulsion from school  Loss of friends/reputation  Legal action

24 Myths  If we ban it there will be no risk  It’s a normal part of adolescent behaviour  This one-off session will fix the risk problem  We had no problems until computer technology and mobile phones became so popular  Its character building  It won’t happen to my child  My child will tell me we have an open relationship (hopefully they will but they may not)

25 FACTS Young people hold more power than any other group in terms of their capacity to influence other young people Recent research shows that teenagers are less likely to tell their parents (tell a friend or teacher first) if it occurs because of fear parents will remove their access to mobile/computers

26 WHEN A PARENT SAYS: I don't tell you how to run your school, you don't tell me how to run my house!

27 YES I CAN! YES I CAN! …said the principal  When there is a nexus, convergence, meeting or intersection between the school and the behaviour  Disruption of school environment  Negatively impacts the learning environment  Negatively impacts the mental or physical well being of others  Schools are taking on the role of parents to students. Eric M. Roher, LLP, Toronto, Ontario

28 Take responsibility  Predominantly the problem is cultural – damage is borne out of a culture that permits or condones (directly or indirectly)  Understand that young people are the most powerful source of influence on other young people  Inaction can be as damaging as the behavior itself  Value the proper use of the technology – mentor this  Everyone has a right to feel safe

29 STRATEGIES AND SUPPORTS

30 2 Main Principles 1) Parents are primary educators in safety and values for their children – You must be proactive in this 2) A Multi facet approach is necessary.  A Technical Approach  Parental Ownership  Education and reinforcement at school.

31 The solutions are not rocket science  There are no miracle answers or solutions  It’s about using the basic parenting skills and strategies that work with you know so well  Its about working alongside other stakeholders  Each person taking responsibility makes a difference

32 Educate yourself  Spend some time learning about cyber tech  Get involved with your children’s online activities, validate their skills and learn from them  Get on the internet and mobile phone and learn how it works. Ask your children to show you  Research and follow up anything that has interested you tonight.  Work with the school on an awareness raising project with the students leading it

33 Build a positive culture within the community  let others know that you take it seriously  encourage others to be proactive and prepared to keep children safe in cyber use  talk to the school about the subject  Talk to each other about it

34 Be a role model  Model appropriate and responsible use of digital technology (time in front of the computer; circulating photos, s, SMS etc). eg: Don’t sit at a computer for 12 hrs at night.

35 Be prepared  Know where to get help and support if you have any concerns  Know where to report any inappropriate material or contact  Know what to do if your child, or another child, discloses - do the following. Use the 2 R’s:  Reassure  Report (or seek assistance) to the appropriate persons/authority  Remedy

36 Implement safe tools now - habitual  Have the computer in a place that you can see it (not hidden away in child’s bedroom)  Choose products with parental controls  Have a suitable filter on the computer to stop inappropriate material or sites  Ensure you as the parent has access rights to your children’s computers and passwords

37 Set rules for use in your family  (social contract – sample in package). Include  Statement of what you value eg: social interaction,  Clear rules for amount of use (when, and how long)  Clear rules of what you can and cannot do on the internet  Have a ‘Netiquette’ – expectations on how they treat others  Let them know you as parent will check the computer  Be clear about consequences if they misuse it  (Use language that is consistent with home and school and community)

38 Bridge the gap  Talk to your children about it. Let them know you value the internet and mobile but you also value social interaction (healthy balance)  Learn Cyber tech language and use it with your children  Let your children know you want them to use the tech safely and responsibly.  Ask your child what they did on the net or who they spoke with today just as you would ask them this about school  Ask older children to mentor safe practices with younger siblings

39 Make it a permissible topic in your home  Engage in discussion with your children on this – so its not an awkward topic if they need to seek your help. Let them know if they were hurt by cyber misuse you would not take away their use of it  Give them ideas of who else they could go to for help if they needed to and didn’t come to you (give them the kids help contacts)  Talk to them and their friends about it  Tell them what your concerns are and ask them for their ideas and views (and listen to them)

40 How to Keep Your Child Safe Online  Create an Internet Use Contract  If you can’t beat them, join them  Know who your child is communicating with  Be aware of what your teens are posting  Blocking/Parental Controls  Lead by example  Cyberbullying.us

41 Some Filtering Options There are no more free options from the Australian Government as of 31 Dec 2008 but...  Around $30 for solid protection for kids online.  Both Mcafee, Kapersky and Norton offer complete antivirus options for around $50 - $100.  My personal pick is Mcafee total Protection $95.00 for all internet threats.

42 Pick 3 things strategies you will do in the next month …  Put them in your diary  Tell someone what you are doing

43 Going further      


Download ppt "CYBER-BULLYING Kevin Cummins – www.edgalaxy.com. What is cyber-bullying? Cyber-bullying “Cyber-bullying involves the use of information and communication."

Similar presentations


Ads by Google