Presentation is loading. Please wait.

Presentation is loading. Please wait.

C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 12 Electronic Bullying © Routledge.

Similar presentations


Presentation on theme: "C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 12 Electronic Bullying © Routledge."— Presentation transcript:

1 C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 12 Electronic Bullying © Routledge Richard Phillips and Rayton R. Sianjina

2 E LECTRONIC B ULLYING The term “electronic bullying” is the use of information and communication technologies to support, deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others. Cyber-bullying subsequently is when students use the Internet, cell phone, along with other devices to send or post text or images intended to hurt or humiliate others. © Routledge

3 Since there are no established federal electronic- bullying laws, many individual states are changing the language and adding addendums to anti-bullying laws that will address the behaviors of individuals who might abuse internet privileges. Currently, more than seven states have passed laws against digital harassment. © Routledge E LECTRONIC B ULLYING

4 Lawmakers have realized the significance of electronic-bullying issues, and are seeking to establish laws that will deter perpetrators from Internet abuse. Electronic bullying is a new form of bullying that may threaten adolescent social and emotional development (Raskauskas and Stoltz, 2007). © Routledge E LECTRONIC B ULLYING

5 One of the most alarming concerns related to electronic bullying is that of sex texting. For the modern teen (ages 12 to 17), according to Pew (2010) cell phones have become the preferred method of communication, social integration, and mode of learning about the world at large. Sexting is a unique phenomenon on a number of levels. The National Center for Missing and Exploited Children identifies sexting as the sharing of nude or seminude images among peers (Nathan, 2009). © Routledge E LECTRONIC B ULLYING

6 A threefold process should be initiated to protect students, adults, and the school/district. Step one: enhance policies to manage and address the problem. Step two: develop a campaign/education plan to combat sexting and cyber bullying. Step three: get involved in petitioning legislators for policy changes. © Routledge E LECTRONIC B ULLYING

7 C ONCLUSION The best policy is to develop a policy that is flexible and changeable but keeps the rights and protection of victimized students and parents as a central focus. An administrative culture built on the awareness of social media norms and how young people use technology is perhaps the best defense against the damages that could be inflicted as a result of such evolving issues. © Routledge


Download ppt "C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 12 Electronic Bullying © Routledge."

Similar presentations


Ads by Google