It’s Everyone’s Responsibility. Bullying Eyed in NJ Teen's Apparent Suicide: Sources NBC New York, March 31, 2012.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
INTERNET SAFETY.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Harmless Joke or Cyber-Bullying?
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
SOCIAL DEVELOPMENT: CYBER BULLYING TEXTING/SOCIAL MEDIA LESSON ONE 8th Grade 1.
Cyberbullying A new and dangerous phenomenon. What is Cyberbullying? “Cyberbullying involves the use of information and communication technologies to.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Bullying & Cyber Bullying Presented by… Teresa Errickson, SMS Counselor A-L Stephanie Davis, SMS Counselor M-Z.
The Internet is Forever
Take the Cyber Bullying Quiz Source:
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Things To Know SOURCES:
What are the differences between bullying and cyberbullying?
Anti-Bullying Presentation September 24 th, 2012.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Cyber Bullying Challenges for Educators, Legal issues, and Advice for Students and Parents.
By: Brett Sauve. What is Cyber-bullying? Being tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
YOUTH AND TECHNOLOGY KNOWING WHAT’S COOL & PROMOTING RESPONSIBLE USE.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Cyberbullying Online Social Aggression Guidelines for Educators.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Medway High School Health “Never be bullied into silence. Never allow yourself to be made a victim. Accept no one’s definition of your life, but define.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
Lauren Sayah, Abby Wills, Sara Stahl. What is Cyber Bullying?  Is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
4th Grade Stop Bullying Now! Lesson. Whip Around  Find a partner  Turn back-to-back  Answer question -True: Make a “T” with hands -False: Cross arms.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Bullying & Cyber Bullying
Cyberbullying project
CYBER BULLYING.
BULLYING
GOSSIP and CYBERBULLYING
HIB Lesson Bullying Prevention 7th Grade
Pics, Flicks, and Sexting
Cyber Bullying 1. ONLINE.
Virtual Battles: Cyberbullies
Issues In media studies: Cyberbullying
Knowing the facts and consequences of cyber bullying
Personal Safety- Bullying
GOSSIP and CYBERBULLYING
Cyber Bullying.
Life High school waxahachie
Issues With Internet in College
What it is, how to spot it, and how to respond to it
Presentation transcript:

It’s Everyone’s Responsibility

Bullying Eyed in NJ Teen's Apparent Suicide: Sources NBC New York, March 31, 2012

 Over one half of adolescents and teen report being bullied online.  Over one half of teens and adolescents have engaged in cyber bullying.

Cyberbullying Continued After Teen's Death CBS News, March 29, 2010

 Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet.  1 in 3 adolescents and teens have received cyber threats.

Teen Commits Suicide Due to Bullying: Parents Sue School for Son's Death ABC News, April 2, 2009

Well over half of young people do not tell their parents when cyber bullying occurs.

What is Cyberbullying?  Cyberbullying is using the internet or other technologies to deliberately target people and cause them harm.  Cyberbullying can happen 24/7. It does not stop when the school day ends.  Cyberbullying takes many forms.

Forms of Cyberbullying  Hateful messages  Bashing Websites  Threats  Hacking  Password Theft  Trickery  Harassment

Hateful messages Instant messaging, cell phone texts, social networking sites are all outlets for harmful messages or threats such as:  I hate you!  No body likes you!  You’re ugly!  You should die!

Bashing Websites Sadly, there are websites that allow people to post comments, photos, or videos of people for the purpose of bashing them. People can “vote” on others solely for embarrassment or harassment.  Who is the ugliest boy at SoSo School?  Is Susie J. Gay?  People who should drop off the planet:

Death threats Sometimes called cyber-threats or cyber stalking, these forms of bullying inspire genuine fear in victims or encourage them to harm or kill themselves.  I know where you live and I’m going to kill you when I get you.  Why don’t you just kill yourself? No one cares anyway!

Hacking Teens have had their accounts hacked which allows the hacker to post inaccurate information, send fake messages, spread rumors, bully someone else or send out computer viruses. This is common on social networking sites like Facebook or MySpace and online gaming sites.

Password theft Passwords can be stolen or guessed which can allow a bully to lock victims out of their own accounts. It also allows them to harass others using someone else’s identity. This is also common on social networking sites.

Trickery Clever bullies have been known to impersonate someone or create a fake account to chat with someone in order to gain information about them. They then use the personal information or private thoughts to “out” someone.

Harassment Bullies will harass their victims by spreading false rumors, posting pictures, posting gossip, or excluding them from groups The intent is to destroy the victims friendships and/or relationships. Girls have sent provocative or nude photos of themselves to boyfriends who later repost these images or send them to others.

The Data  Pervasive use of technology by adolescents and teens makes cyberbullying easy.  Cell phones, texts, and instant messaging are the most common media for cyberbullying.

 Girls are more likely to be victims of Cyberbullying than boys.  Girls are more likely to cyberbully than boys.  Girls spread rumors more frequently than boys.

Victims don’t tell  Big problem with cyberbullying is that victims do not tell others what is going on.  Victims feel afraid to tell or that the problems will escalate if they do.  Tormentor can often be faceless. Anonymity of the internet can leave victim unsure of who is doing the tormenting.

Schools’ Responsibility Senate Bill 250 (Georgia) includes definitions on bullying and harassment, cyberbullying, and requires the Georgia Department of Education to develop a model policy which prohibits bullying, requires reporting of incidents and procedures for investigating incidents, an age-appropriate range of consequences, procedures for providing information on a bullying activity, prohibition for retaliation, and immunity from liability for those acting in good faith.

 The bill also includes in its description of bullying acts that occur by use of data or software that is accessed through a computer, computer system, computer network or other electronic technology.  Local school boards are required to adopt policies for grades 6-12 that prohibit bullying of a student by another student and include them in the student code of conduct.

Federal Law  18 USC § 875 – INTERSTATE COMMUNICATIONS This is the United States penal code that makes threatening someone via the internet a criminal act. Persons found guilty of threatening someone can be fined or imprisoned for up to two years.

Problems for Schools  Schools must be careful when taking measures to stop cyberbullying. Parents have files law suits against school systems for exceeding their legal rights to punish students for cyberbullying that takes place off of school property.  Parents of cyberbullying victims have sued schools for failure to protect their child.

Library Media Specialists’ Role  Monitor computer use in your school library.  Post signs and/or banners about cyberbully laws.  Develop online internet safety courses  Educate parents of the dangers of cyberbullying and unmonitored Internet use.  Develop tolerance lessons and include resources in collection

Where to find help  A Thin Line  Center for Safe and Responsible Internet Use  Cyberbullying Research Center  Olweus Bullying Prevention Program public/index.page public/index.page

 Pacer’s National Bullying Prevention Center  Stay Safe Online (National Cyber Security Alliance)  Wired Safety

References  18 USC § Interstate communications. (2012, current as of Feb. 12). Legal Information Institute.  Anderson, T., & Sturm, B. (2007). Cyberbullying: from playground to computer. Young Adult Library Services, 5(2),  Bullying Eyed in NJ Teen's Apparent Suicide: Sources (2012, March 31). NBC New York. Baldwin-Morristown-NJ-Death-Investigation htmlhttp:// Baldwin-Morristown-NJ-Death-Investigation html  Cyber-bullying Continued After Teen's Death. (2010, March 29). CBS News.  Cyberbullying Research Center

 James, S. (2009, April 2). Teen Commits Suicide Due to Bullying: Parents Sue School for Son's Death.  State Laws and Info: Georgia. Violence Prevention Network  What is it? Stop Cyberbullying.  Whelan, D. (2011). The bully in the backpack: there’s no limit to the cruelty of online bullies. Here’s what you can do. School Library Journal, 57(10),  l18 USC § Interstate communications. (2012, current as of Feb. 12). Legal Information Institute.