Teaching in the 21 st Century: CYBER-BULLYING Dr. Robin Bright Education Undergraduate Society, Faculty of Education ANTI-BULLYING CAMPAIGN Monday, October.

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Technology SafeKEY.
The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Cyber Bullying: Not a Pretty Picture! By: Baylee Reller.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
I. S. W. M.It Starts With Me Cyber Communication Awareness.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Harmless Joke or Cyber-Bullying?
Bullying.
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Bullying & Cyber Bullying Presented by… Teresa Errickson, SMS Counselor A-L Stephanie Davis, SMS Counselor M-Z.
Growing up Digital Opportunities and challenges for parents.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Internet Safety Awareness
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
ICT E-SAFETY ARCHIBALD FIRST SCHOOL. ICT Mark Only the 2 nd school in Newcastle LA to achieve the award: October 2009 Only the 2 nd school in Newcastle.
Preventing Bullying in Your School
Cyberbullying Inspector Paul Lawrence & Stephanie Frankish Crime Prevention Officer.
Bullying is about the abuse of power. Children who bully abuse their power to hurt others, deliberately and repeatedly.
Jennifer Carter RCMS Spring 2012 COWBOY CIRCUIT: Electronic Safety & Your Teen.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Define: Cyberbullying Cyberbullying \ ˈ sī-bər- ˌ bu ̇ -lē-iŋ, - ˈ bə-\ noun The use of digital media tools, such as the Internet and cell phones, to deliberately.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Digital Citizenship and Media Literacy
Digital Citizenship Texting vs. Sexting Cyberbullying.
ANYTHING THAT GETS INVENTED AFTER YOU’RE THIRTY IS AGAINST THE NATURAL ORDER OF THINGS AND THE BEGINNING OF THE END OF CIVILISATION AS WE KNOW IT …UNTIL.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
RAISING A DIGITAL CITIZEN IN A DIGITAL WORLD Cyber Awareness in the 21 st Century.
Promoting Social Emotional Competence
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Learning basic safety precautions can help a person avoid threatening or harmful situations.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
Cyberbullying By Sharon Synan. Recognizing Cyberbullying Cyberbullying is using electronic means to bully, harass, and otherwise make life miserable for.
Promoting Social Emotional Competence
Planning an improved prevention response in middle childhood Ms. Melva Ramirez UNODC Regional Office for Central America and the Caribbean.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
Socializing Online b Can help kids connect with friends and family b But you might share too much information b Or you might hurt someone’s feelings b.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
What Parents and Students Need to Know Presented by Joan Reubens Pinellas County Schools, Prevention Office or Protect with.
Internet Safety. Online Concerns: Contact Content Conduct.
A TEACHER’S GUIDE TO BULLYING IN THE MIDDLE SCHOOL CLASSROOM Types of bullying, what teachers can do, and how to deal with cyber bullying.
Cyber and Internet Safety (Parents’ Night)
E – SAFETY Being safe online
CYBER BULLYING.
Digital Citizenship & Social Media.
By: Olivia Throesch School Bullying By: Olivia Throesch
Digital Citizenship Middle School
Digital Citizenship Middle School
Huntington Middle School Bully Awareness Plan
Bullying The Law, School Policies & the difference between
ICT CyberSecurity Lesson 2:
Life High school waxahachie
Bullying what we need to know
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Cyberbullying: How Can I Protect My Child?
What it is, how to spot it, and how to respond to it
Presentation transcript:

Teaching in the 21 st Century: CYBER-BULLYING Dr. Robin Bright Education Undergraduate Society, Faculty of Education ANTI-BULLYING CAMPAIGN Monday, October 6, 2014 University of Lethbridge Lethbridge, Alberta

Cyberbullying

It’s not about the technology… A key point to understanding technology and children is to keep in mind that the core issue is not about the technology. For children and teens, technology and life online is all about connection, relationships and friends. The technology is simply a vehicle. A key point to understanding technology and children is to keep in mind that the core issue is not about the technology. For children and teens, technology and life online is all about connection, relationships and friends. The technology is simply a vehicle. ChildrenOnline.org ChildrenOnline.org

Cyberbullying What is it? Willful harm inflicted through electronic media Use of electronic devices to threaten, harass, embarrass, socially, exclude, or damage reputations and friendships

Key Research Findings Bullying perpetration rates range from 4-18 % Bullying perpetration rates range from 4-18 % Victimization rates are considerably higher at 7-35% Victimization rates are considerably higher at 7-35% Cyberbullying tends to be low in grade 5, peak in grade 8, and decline by grade 11 Cyberbullying tends to be low in grade 5, peak in grade 8, and decline by grade 11 Over 50% of youth who are cyberbullied don’t inform any adulst about the incidents Over 50% of youth who are cyberbullied don’t inform any adulst about the incidents Less than 35% of students would inform adults if/when they knoew about someone else being cyberbullied Less than 35% of students would inform adults if/when they knoew about someone else being cyberbullied

How vulnerable are you to cyberbullying and cybercrime?

Digital Footprints Personal information of yourself, friends and family Personal information of yourself, friends and family Sharing passwords Sharing passwords Connections with people you don’t know Connections with people you don’t know Plans and vacancies Plans and vacancies Quizzes, prizes, samples and products Quizzes, prizes, samples and products Peer-to-peer software Peer-to-peer software Online gaming disclosure Online gaming disclosure Images and video Images and video

Cyber Talk ( ) 676 cyberbullying comments 676 cyberbullying comments “Describe a situation you know about in which someone was the bully or bullied online and what happened as a result.” “Describe a situation you know about in which someone was the bully or bullied online and what happened as a result.”(

Forms of Cyberbullying HarassmentDenigration Impersonation and Pretending Outing or Trickery Exclusion Threats and Violence CyberstalkingFrenemies

Cyberbullying 37% know someone who has been bullied online 37% know someone who has been bullied online 19% have been bullied themselves online (target) 19% have been bullied themselves online (target) 17% have bullied others online 17% have bullied others online

Online Social Norms (cyberbully.org) Life online is just a game. Life online is just a game. Look at me. I am significant. Look at me. I am significant. It’s not me- it’s my online persona. It’s not me- it’s my online persona. What happens online stays online and has no real world consequences. What happens online stays online and has no real world consequences. If the internet lets me do it, it must be okay. If the internet lets me do it, it must be okay. Only the people I intend to see what I post will look at it. Only the people I intend to see what I post will look at it. I have the right to free speech; to write or post anything I want regardless of the harm it may cause another person. I have the right to free speech; to write or post anything I want regardless of the harm it may cause another person.

Cell phones Parents provide them for safety Parents provide them for safety Youth use them for texting (avg. 81 daily) Youth use them for texting (avg. 81 daily) Under 14, consider no text, no camera. Under 14, consider no text, no camera. Adults model appropriate usage. Adults model appropriate usage. School policies must educate. School policies must educate.

Who are the cyberbullies?

The Importance of Teacher Response to Cyberbullying Mishna et. al (2005) found that… “Teacher training is critical in identifying and responding to (cyber)bullying. Teachers require, and want, further training to increase their confidence and competence in this area.”

Teacher education Teachers need: 1. To have a clear definition of bullying 1. To know that their understanding and response can have an effect of students 2. To recognize inconsistencies between their views and their reactions to cyberbullying 3. To know a child’s view may differ from their own

The Role of Adults in Positive Intervention Adults need to talk to youth about cyberbullying-letting them know they will be supportive Adults need to talk to youth about cyberbullying-letting them know they will be supportive Reduction of harm approach: education on net-etiquette and safety (prosocial behavior) Reduction of harm approach: education on net-etiquette and safety (prosocial behavior) Adults need to make it clear that online and cell phone privileges will not be revoked is cyberbullying is reported Adults need to make it clear that online and cell phone privileges will not be revoked is cyberbullying is reported Conduct more work with intervention and prevention programs Conduct more work with intervention and prevention programs

Recognizing the Problem Talk and acknowledge cyberbullying. Talk and acknowledge cyberbullying. Be accessible. Be accessible. Be alert to anxiety, emotional distress and withdrawal. Be alert to anxiety, emotional distress and withdrawal. Watch for changes in behavior. Watch for changes in behavior. Appearing emotionally upset after internet use. Appearing emotionally upset after internet use. Disturbed relationships with parents, family and friends. Disturbed relationships with parents, family and friends. Subtle comments about online concerns. Subtle comments about online concerns.

How? Jenn Cowie (Wilson Middle School) The Wilson Way: Technology, Literacy, Leadership The Wilson Way: Technology, Literacy, Leadership Six-week mandatory exploratory option Six-week mandatory exploratory option An emphasis on developing strong communication skills through technology prepares students to interact effectively in our changing world.

ICT Outcomes and 9 Pillars of Understanding The ICT curriculum presents concepts within three interrelated categories: communicating, inquiring, decision making and problem solving foundational operations knowledge concepts processes for productivity

Who can help? Creating Caring, Respectful, and Safe Learning Environments-Alberta Education and The ATA Creating Caring, Respectful, and Safe Learning Environments-Alberta Education and The ATA feschools.aspx School Resource Officers School Resource Officers

Techno Brain State of continuous partial attention State of continuous partial attention Reduced learning Reduced learning Reduced time spent with peers Reduced time spent with peers Reduced physical activity Reduced physical activity Identity construction. Identity construction.

What to do? STOP, BLOCK, TALK AND SAVE STOP, BLOCK, TALK AND SAVE read privacy policies and settings read privacy policies and settings restrict access to your sites restrict access to your sites take precautions when meeting people you have met online. take precautions when meeting people you have met online. The billboard test. The billboard test. Stop ~Think~ Connect Stop ~Think~ Connect

Best Practices for Schools 1. Introduce Internet safety education early. 2. Revisit and spiral skills each year from elementary through high school. 3. Select topics that are developmentally appropriate and reflect the typical risks and issues facing a particular age group. 4. Create units for developmental age groups with topics that can integrate with existing curriculum. 5. Use quality curricular materials AND current events to teach Internet Safety topics. 5. Use quality curricular materials AND current events to teach Internet Safety topics. 6. Provide students with a lot of opportunity to discuss these issues. 6. Provide students with a lot of opportunity to discuss these issues. 7. Provide opportunities and a forum for parent education and discussion.

Resources ols.aspx ols.aspx ols.aspx ols.aspx plan/Lesson_Winning_Cyber_Security_Game.pdf plan/Lesson_Winning_Cyber_Security_Game.pdf report/summary/YCWWIII_Cyberbullying_ExecutiveSummary_2.p df

Questions