Presentation on theme: "Maureen Baron, M.A. firstname.lastname@example.org Cyber-Bullying Maureen Baron, M.A. email@example.com."— Presentation transcript:
1Maureen Baron, M.A. firstname.lastname@example.org Cyber-BullyingMaureen Baron, M.A.
2Legal DisclaimerThe information and resources presented are for information purposes. Although the English Montreal School Board endeavours to provide accurate information, there can be no guarantee of the accuracy or completeness of the information available from the linked external sites.All information provided is of a general nature and is not intended to address the circumstances of any particular individual or entity. No one should act without appropriate professional advice after a thorough examination of the facts of the particular situation.Although the English Montreal School Board believes the information on this Website to be correct the English Montreal School Board does not warrant the accuracy or completeness of any information.
3What is cyber-bullying? “Cyber-bullying involves the use of information and communication technologies such as , cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others.”(Bell Belsey, )
4Who bullies whom? Student student Students student Student teacher Students teacherStudents school administratorEmployee employerEmployer employee
5Cyber-bullying hurtsElectronic or Cyber-bullying includes the use of , cell phones, text messages, and internet sites to threaten, harass, embarrass, socially exclude, or damage reputations and friendships.PREVnet
6How is cyber-bullying the same as face to face (f2f) bullying? It involveshuman relationshipspowercontrolfear e.g. physical harm or social isolationvictim feels worthless, weak or unwantedpsychological painhumiliationVictims are afraid to disclose
7How is cyber-bullying different from face to face (f2f) bullying? Technology is the vehicle24 / 7There is no safe haven such as home or beside a teacherIt is ANYTIME and ANYWHEREBullies can hide behind anonymityBullying communications can reach a huge audience at great speedThe image is out there forever and keeps re-victimizing the personZero empathy for the victim
8Vehicles for cyber-bullying IM – MSNSocial networking sites – FacebookWeb sitesBash boardsChat roomsVirtual learning environments – school work sitesCel phonesCamera phonesOn line and interactive gamesBlogsWikisBashing site – Rate My SchoolInternet polling – DoodleWebcamsVideo hosting sites – YouTubeGame sitesClick on Examples on the left of the site
9Characteristics of Cyber-bullying Unequal power – technology divideHurtful actionsRepetitive behavioursBully can remain anonymousBully can pretend to be another personBullying can happen anywhere, anytime, given that cyber-space and cel phone access is everywhere all of the timeCapacity for instant and limitless dissemination of words and imagesKids Help Phone Cyber--bullying Study, April 2007
10Why do they cyber-bully? To right wrongs or defend others – knight on white horse syndromeAnger, revenge or frustrationBoredomLet’s see what happensImpulsive responsePowerRevenge of the Nerd may start out defending themselves but they enjoy being the tough guy or galMean girls do it to sustain their social standingSocial relationship problemsGender based issues15 minutes of fameTo be Jerry Springer and reveal or disclose: OutingControl
11But sir, we were just joking! But miss, we didn't mean it! Cyber-bullyingUnwantedDeliberately hurtfulPersistentPower imbalanceVictim is socially excludedCovertPerceived threatDeliberate pain or hurtJokingTarget is in on the jokeTarget also laughsEndsEveryone is on the same levelNo discriminationOvertNo fear or threatAccidental pain or hurt
13Direct cyber-bullying Direct attack to the victim via , IM, blogPhishing address or web siteText war leading to huge bills and denial of servicePhotoshop pictures sent or posted as real picsUse a stolen password to lock out the rightful owner and then hijack the account for nasty purposesCreate a poll or survey to vote on who is hot, ugly, stupid, gay, sexy or a slutCreate a bash board to advertise who is considered to be sexy, ugly, stupid, gay or a slut
14Direct cyber-bullying Gang up against a player in a gameSend spam to overload an account - harassmentPost pictures without permission and ask others to rate who is fat or ugly or sexyPublicly ridicule someone on web sites, blogs, IMPretend to be a friend, solicit secrets and publicize the secrets - trickeryArrange to socially isolate or ignore someoneCreate, share and use insulting code names for people (bb=big butt)Post happy slapping videos (videoing and sharing acts of bullying and assault via camera phone )
15Direct cyber-bullying Tease or tauntImpersonation (principal, student, Foundation)Insult or dissingThreaten the victim or a member of the victim's familyOutingCreate and spread rumours (true or not)Post clips on YouTube out of context
16Cyber-bullying by proxy The bully instigates others by creating indignation or strong emotion, and then lets others do their dirty work.The bully sets up the victim and then prints / publishes / shows the final explosion to peers, parents, teacher or principal while claiming innocence.The “forwarding” accomplicepostings on YouTube, MySpace, and Photobucket. Girls are photographing each other doing things in their underwear at slumber parties and pictures are appearing on porn sites. Parents are horrified to learn that their daughter is now on a porn site indefinitely.
17Technology can help win against the bullies! CBC News story:Students use the technology against the bulliesThe Power of PinkBully B’ware web site
18Real life stories Sarah’s Story Sharing personal pictures and videos Personal webcamsCyber-bullying
19Elementary School Cyber-bullying Examples Actual sent s:theres no school u loser,crazy wommen!hey u idiot shutup!stupid,loser!!!ur stupiddd!!paolina is cuteIMMA TELL THIS TO EVERYONE I DO NOT LIKE PAOLINA AND WE DO NOT NO WHO IS HACKING MY FILE ALTHOUG ME, MICHAEL, ANTHONY AND MILAN ARE TRYING TO FIND OUT WHO DID IT!!!!!!!!!
20Secondary school, student to student cyber-bullying examples Repeating what a person said, or commenting on what a person wore or did in school, leading to fear of being stalkedUse of cel phones, bash boardsThreats of violence to the student or the familyBlackmail for sexual or monetary favoursImpersonation of a person, teacher, school web site or organization – phishing siteI know where you live!Teens transmit pornographic pictures of themselves or their underage peers, from their cell phones.
21Student to administrator examples of cyber- bullying Bash boards and phishing sitesDenial of service on cel phonesThreats against family membersUse of social networking sites or Craig's List to solicit people to help target the administratorFacebook page to publish fake information, rumours or storiesImpersonation of the administrator to destroy their reputation: Manitoba criminal charge
22When do they cyber-bully Rarely from school computersCel phone use from schoolCel phone use anytime anywhereHome computersOutside of usual school supervised areasOff-campusHallways or stairwells in school
23Tracking an email sender Cyber sleuthing tools for from outside the EMSBWHOISIP informationRight-click on the header of the and choose the "Options". This will give you the IP address.If the message comes from within the EMSB, forward it to David Verrillo and Maureen Baron
24Legs into the classroom so report it A grade 5 player, X, was playing his friend in Runescape. The friend, Y, wanted to trade game items and was friendly. When X refused, Y became nasty and started threatening and swearing. X did a ‘Print Screen’ of the abusive messages and blocked Y to prevent any further on screen contact. X forwarded Y`s name and copies of the messages to the game site administrator who then barred Y from the game.
25Preserving the Bully's Message On cels, keep / save all messages. Do not forward the messages to another cel as information from the original message, such as the sender’s phone number, will be lost. However, this may have been blocked.On IM, some services allow the user to record all conversations or copy and paste, save and print these. When reporting to the service provider, or even to the police, copied and pasted conversations are less useful as evidence, as they can easily be edited. Conversations recorded / archived are better evidence. Conversations can also be printed out in hard copy or sections can be saved as a screen grab.On social networking sites, video-hosting sites, or other websites, keep the site link, print page or produce a screen grab of the page and save it. To copy what is on the screen, press Control and Print Screen, and then paste this into a word-processing document.In chat rooms, print the page or produce a screen grab of the page.On , print the message; forward the message on to the staff member investigating the incident. Preserving the whole message, and not just the text, is more useful, as this will contain ‘headers’ (information about where the message has come from)
26Excuses: or: Whose Fingers Were on the Keyboard 12 inch rule: wasn't meSomeone hacked the account and pretended to be me: wasn't meShared password therefore it wasn't meWebsite, phishing or bash board created with series of anonymous s or from a public wi-fi Internet connection: wasn't meLost my phone for a while or it was stolen and then returned: wasn't meMy daughter and her friends were at the computer, don't know which one typed or sent the message. wasn't mine
27Why didn't you tell someone? Didn't think it would helpThought it would get worsefear of retaliationWas ashamedAfraid people would find outCalled a ratParents cut off cel or computer accessFriends would get into troubleLose my job or promotion
28What Doesn't WorkTelling the victim not to access the social networking sites or theirSocial isolation from the peer groupCan't drop off the grid - always on generationDenying technology access to the bullyWill always find a way to accessCan utilize accomplices or proxy sitesVictim blocking bully: bullying through proxies or forwarders or in public cyberspace continues
29Cyber-bullying + Canadian Law Under the Criminal Code of Canada, it is a crime to communicate repeatedly with someone if your communication causes them to fear for their own safety (physical or psychological) or the safety of others. Section (1)(a)It is a crime to publish a "defamatory libel" - writing something that is designed to insult a person or likely to injure a person's reputation by exposing him or her to hatred, contempt or ridicule.A cyber-bully is violating the Canadian Human Rights Act, if he or she spreads hate or discrimination based on race, national or ethnic origin, colour, religion, age, sex, sexual orientation, marital status, family status or disability.
30Cyber-bullying + Canadian Law Only the Police can force ISPs to divulge street address linked to IP address12 inch rule as proofIdentity theft is fraudDefamation / Cyber-libel
31Current Canadian Cases Brandon Manitoba teen criminally charged with Personification after he set up a Facebook profile impersonating a teacher including the teacher's picture and biographical details.Edmonton Alberta junior high students expelled for posting fake profiles in the names of 2 teachers.Montreal Quebec students set up a phishing school site asking for donations to support school building fund. They couldn't cash the cheques.Quebec teacher entrapped to verbally explode in the classroom. Film of explosion was edited and posted on YouTube. Teacher is on extended sick leave.
32Current Canadian Cases Montreal Quebec student was physically bullied and cyber-bullied on cel phone. Bully threatened the student's mother who reported to the Police. Police visited the bully's parents at home.Montreal Quebec, Sec.1V girls tried to disclose but administrators were out. They called 911 and Police speedily arrived at school.
33When a parent says:I don't tell you how to run your school, you don't tell me how to run my house!
34YES I CAN! …said the principal When there is a nexus, convergence, meeting or intersection between the school and the behaviourDisruption of school environmentNegatively impacts the learning environmentNegatively impacts the mental or physical well being of othersEducation Act Duty of Care in loco parentisEric M. Roher, LLP, Toronto, Ontario
35Supreme Court of Canada Case #1 Robichaud v. CanadaInstitutions are responsible for providing safe environments even if the harassment by a co-worker happens outside of the institution.If the victim has to face the bully in the institution then the institution is responsible for correcting the problemThe institution has the authority to intervene even if the harassment happens outside of the institutionThe school is an institutionTherefore if the student cyber-bullies a student or teacher from home, the school has the legal authority to intervene.Shariff (2005)
36Supreme Court of Canada Case #2 Ross v. New Brunswick School District #15School board has a duty to maintain a positive school environment for all persons served by itStudents knew that Ross distributed anti-Semitic material outside of school.The SCC ruled that the effects of Ross’ actions and behaviours poisoned the school environmentTherefore the school must teach that social responsibility does not end outside of or after school.QEP: To socializeShariff (2005)
37Case #3: Newman et al. vs Halstead, 2006 Canadian defamation caseHalstead, community education activistGroup of teachersand web sites defamed teachersHalstead found guiltyPlaintiffs awarded $626,000+
38Stakeholder Concerns: Shariff 2007, McGill University Sch. Bd.PrincipalTeacherParentStudentReputation ControlBalance demandsAngry UnderminedLearning & SafetyNeed private spacesCater to media & parentsNo time Reputation Quick fixWant immediate actionWant fair treatment for kidsNeed + env to learnMust please UnionsNeed teacher supportDon’t trust adminstrs.Worry about kids’ reputn.Need to ventHave policies Done dutyParents too demandingCynical with admin/parnt want suspen.Concerned teachers will mistreat kidsImmature – need 2nd chanceBan & FilterBan and FilterPunishment for studentsDon’t want to uproot kidFeel Scapegoated
39What educators can doEducate your students, teachers, and staff members about cyber-bullying, its dangers, and what to do if someone is cyber-bullied.Be sure that your school’s anti-bullying rules and policies include cyber-bullying.Investigate reports of cyber-bullying immediately even if the cyber-bullying occurs off-campusNotify parents of victims and parents of known or suspected cyber-bullies.Closely monitor the behaviour of students at school for possible bullying.
40What educators can doInvestigate to see if the victim(s) of cyber-bullying need support from a professional.Cyber-bullying that occurs off-campus walks into the school with your students and affects how they behave and relate to each other, therefore the school must deal with this as though it happened on campusContact the police immediately if known or suspected cyber-bullying involves acts such as:Threats of violenceExtortionObscene or harassing phone calls or text messagesHarassment, stalking, or hate crimesChild pornography
41What schools can do Be proactive and not just reactive Make reporting cyber-bullying easy and safePromote and teach the positive use of technologyImplement prevention programsTeach communication skillsTeach healthy relationship skillsReflect the culture, needs and preferences of your school community.Involve the students in proactive programsPeer mediationDevelopment of strategies and solutionsDecide who within the school community is responsible for the coordination and implementation of cyber-bullying prevention and response strategies.Be proactive and not just reactive
42What schools must do Put cyber-bullying prevention in the curriculum Educate everyone about the consequences and ethics of cyber-bullyingAddress the content and not the technologyEnforce clearly and publicly stated consequences of cyber-bullying up to and including the pressing of criminal chargesMake the cyber bully accountableRethink the effectiveness of zero tolerance, suspension, restitution, restoration of trustInclude cyber-bullying in the school's code of behaviour
43Teach the students to:Never share passwords or log-in information except with their teacher or a parentIf harassed they shouldtell a trusted adultleave the harassment locationnever respond to harassing messagessave the harassing messages for the ISP or schoolreport it to the police if necessaryStop, block, save and tellTake a stand against bullying of all kindsKnow and adhere to the Acceptable Use Policy
44Heroes who help Scenarios to discuss What would you do to stop the bullying?As the studentAs a fellow studentAs the student's teacherAs the parentAs the school administrator
45E.M.S.B. Resources Information Technology Services Student Services Tracks the sender and receiverStudent ServicesProject Harbour deals with the relationship and social causes and helps re-establish trustPedagogical ServicesIT, RECIT and Portal Consultants for classroom programs to prevent cyber-bullying and support positive online behaviourLegal ServicesTime to involve the Montreal Police, or RCMP
47Now: The bully is in front of you The victim’s parents are in the office screaming for consequencesThe teacher doesn’t want the bully back in classThe student body is watching to see what happensThe victim is afraidWHAT DO YOU DO NEXT!