Presentation is loading. Please wait.

Presentation is loading. Please wait.

What does it look like today? What can be done?

Similar presentations


Presentation on theme: "What does it look like today? What can be done?"— Presentation transcript:

1 What does it look like today? What can be done?
Cyber Bullying: What does it look like today? What can be done? Let the audience know that this presentation can be used as or in two parts with one session being just information and a second session using the activities to reinforce participant understanding of cyber bullying. Presented by: Kathy Lockard, Olweus Trainer AEA 14 Jaymie Randel, Olweus Trainer AEA 267 Penny Bisignano, Iowa Olweus Coordinator

2 Today’s agenda: What is Cyber Bullying and why should schools address it? How does Cyber Bullying affect students and their ability to learn? Carol Greta - legal responsibilities

3 Today’s agenda: What AEA resources are available to assist in bullying prevention? What can be done to prevent or intervene in Cyber Bullying? Resources that are available to assist with Cyber Bullying prevention and intervention?

4 The major resource for today’s presentation is…
Cyber Bullying: A Prevention Curriculum for Grades 6-12 By Susan P. Limber, Ph.D., Robin M. Kowalski, Ph.D., and Patricia W. Agatston, Ph.D. Have slides 1-3 up while talking. For slides 4-8 talk through the slides informing the participants that the information is on the PowerPoint slides that they can access after the ICN through IPTV (the audience needs to see a face here).

5 Resources at your fingertips:
"Cyber Bullying:  A Prevention Curriculum for Grades 3-5.“ Susan P. Limber, Ph.D., Robin M. Kowalski, Ph.D., and Patricia W. Agatston, Ph.D. Cyber-bullying Cyber-threats: Responding to the Challenge of On- line Social Aggression, Threats, & Distress Nancy Willard

6 Resources at your fingertips:
Stop Bullying Now Olweus Bullying Prevention Program Cyber Smart Bullying/nsba/features That's Not Cool

7 Webinars re: Cyber Bullying
The Stop Bullying Now Campaign will host a Web cast focusing on cyber bullying on April 22, from 3:00-4:30 PM EST. For up-to-date details related to this Web cast or if you would like a blurb about the Web cast for a newsletter or Web posting, please Nicolle Grayson at Show this slide. This webinar is a great opportunity for you and members of your organization to learn how to help prevent cyber bullying and lend support when bullying occurs. The April 22 Web cast will include experts in cyber bullying, including Susan Limber, PhD, MLS, from Clemson University, who will provide current information on the use of cyber technologies and the emerging phenomenon of cyber bullying among youth.  Participants will learn about best practices in prevention and intervention.

8 Bullying Prevention Resources
Work to create a school environment in which respect and responsibility are promoted and bullying is not. Each AEA has trained personnel for assisting LEAs in implementing a school-wide approach to bullying prevention. Show the person talking

9 Think about traditional bullying and Cyber Bullying.
On a piece of paper, write the following headings: Traditional bullying is….. Cyber Bullying is……. Take 5 minutes to fill in characteristics of each. Show the slides

10 What is bullying? Bullying is when someone repeatedly and on purpose says or does mean or hurtful things to another person who has a hard time defending himself or herself. Olweus et al. 2007

11 What is Cyber Bullying? Cyber Bullying is bullying through , instant messaging (IMing), chat room exchanges, Web site posts, or digital messages or images sent to a cellular phone or personal digital assistant (PDA). Kowalski et al. 2008

12 Cyber Bullying is Bullying on Steroids!
Below is the image at: my.uen.org/c/portal/layout?p_l_id=PUB Remove frame 

13 Cyber Bullying can involve:
sending mean or offensive messages repeatedly through s, IM, texting, phone messages, chat room posts, or social- networking postings blog.core-ed.net/derek/2007/06/perspectives_o...

14 Cyber Bullying can involve:
playing an online game and ruining the game for others on purpose

15 Cyber Bullying can involve:
humiliating people by posting information that is not true, altering photos in an offensive way, or making fun of someone through statements, photos, or songs

16 Cyber Bullying can involve:
sending mean or offensive messages as though they are from someone else so that the receiver thinks the targeted student sent them

17 Cyber Bullying can involve:
creating Web sites designed to humiliate or embarrass others, such as “slam books” (Web sites that list students’ names for other students to make mean comments about) sumitbelsare.blogdrive.com/archive/21.html

18 Cyber Bullying can involve:
sharing personal, often embarrassing, information about someone that they would not want shared by forwarding an or a photo to others

19 Cyber Bullying can involve:
hitting or hurting someone while photographing or videotaping the person, usually with a cell phone, and then sending the photos or videos to others for amusement mikebogdanski.com/site/index.php?option=com_c...

20 Cyber Bullying can involve:
tricking someone into sharing personal information and then telling others about it through s or text messaging

21 Cyber Bullying can involve:
leaving someone out of a group by taking the person off buddy lists or leaving the person out of password- protected sites archive.salon.com/.../cyber_bullies/print.html

22 Cyber Bullying can involve:
sending threats intending to harm someone or encouraging the person to commit suicide

23 Let’s see if you are able to identify what kinds of situations and online communications could be considered Cyber Bullying. Read each of the following situations and identify if it “is” or “is not” an instance of Cyber Bullying.

24 “Is” or “Is Not” Cyber Bullying?
Alicia sends a text message to Tina telling her that she has a crush on a boy in her math class but not to tell anyone. Tina shows the message to the boy and sends it to everyone else in the class. “Is” or “Is Not” Cyber Bullying?

25 It is Cyber Bullying. Reason 1: Tina shares personal information that Alicia sends to her and does not want shared. Reason 2: It is embarrassing and, even though the message is sent one time, it really happens over and over every time someone else receives and reads the message.

26 “Is” or “Is Not” Cyber Bullying?
Mike sends links to inappropriate adult Web sites to Sophie through several times over a few months, even though she keeps asking him to stop. “Is” or “Is Not” Cyber Bullying?

27 It is Cyber Bullying. Reason 1: Mike is using technology to harass her. Reason 2: Mike continues to do it even though Sophie has asked him to stop. Note: Sophie should tell an adult immediately! Sexual harassment is against the law!

28 “Is” or “Is Not” Cyber Bullying?
Daniel is IMing with his girlfriend. She is angry with him and says some pretty nasty things to him online. “Is” or “Is Not” Cyber Bullying?

29 It is not Cyber Bullying.
Reason 1: The messages are not repeated. Reason 2: The messages are not sent to anyone else.

30 Let’s summarize…. Both traditional bullying and Cyber Bullying are very harmful. Cyber Bullying can reach and involve many people very quickly.

31 Let’s summarize…. People who might not bully someone face to face might cyber bully someone because they can’t be seen and think they are anonymous.

32 Let’s summarize…. Traditional bullying involves an imbalance of power.
Because those who cyber bully think they can be anonymous, they might not really be more physically or socially powerful. Traditional bullying – the student who bullies often targets someone he or she thinks won’t fight back. Cyber Bullying – they feel powerful by using technology.

33 Let’s summarize…. Traditional forms of bullying can cause physical harm and psychological harm. In most cases, Cyber Bullying causes psychological harm.

34 Let’s summarize…. Traditional bullying is usually limited to the people in the immediate area where the bullying is taking place. Cyber Bullying can reach many people immediately – and often the student who is targeted doesn’t know who is doing it.

35 Let’s summarize…. Traditional bullying usually has a time and place, such as during lunch on school grounds. Cyber Bullying can happen anytime and anyplace. Cyber Bullying – The targeted student may even be unaware that it is happening for a while.

36 Let’s summarize…. It is usually apparent who is doing traditional bullying. It is often difficult to find out who is Cyber Bullying.

37 What are the warning signs of Cyber Bullying?
A child may be experiencing Cyber Bullying if he or she… appears upset after using the computer or being online. appears upset after viewing a text message. freeza.vic.gov.au

38 What are the warning signs of Cyber Bullying?
A child may be experiencing Cyber Bullying or bullying at school if he or she… …appears sad, moody, or anxious. …avoids school. …withdraws from or shows a lack of interest in social activities. …experiences a drop in grades or decline in academic performance.

39 Students may cyber bully because…..
They think people won’t know who they are; they can be anonymous. They can’t be seen. They don’t have to see the other person’s reactions. They think everybody does it, so it’s no a big deal. They like making someone else feel bad.

40 How does Cyber Bullying affect students, schools, and communities?
Current research suggests that students involved in Cyber Bullying, are more likely to…. be anxious be depressed have low self-esteem have lower grades have higher absenteeism rates Kowalski et al. 2008

41 How does Cyber Bullying affect students, schools, and communities?
Cyber Bullying affects everyone. You may be a part of Cyber Bullying even if you don’t know it. For example, if you’ve forwarded an that makes fun of someone to one or more friends, that is considered Cyber Bullying.

42 How does Cyber Bullying affect students, schools, and communities?
Cyber Bullying can also affect other people in the Bullying Circle. Those students who bully and are allowed to continue their behavior are also affected. People who see it happening to others might be afraid it will happen to them. Some might feel pressured to join in when they don’t want to. A school environment in which Cyber Bullying or any kind of bullying is taking place is not one that feels like a safe, friendly community. As students who bully get older, these students are more likely to get into other types of trouble and even commit crimes.

43 Everyone has the right to live his or her life without being bullied or harassed by someone else. It is important to understand that even if someone cyber bullies another person as a joke, it may not be a joke to the person who is being bullied.

44 What should educators do if they know or suspect Cyber Bullying is occurring?
Educate all students about how to report all forms of bullying. Advise the student to save any evidence of the Cyber Bullying and report it. How to report bullying, including Cyber Bullying, should be part of a teacher’s ongoing classroom discussions. Attach a copy of the printed online communications as evidence. The student can bring the evidence to the teacher, school counselor, or an administrator. If there is no evidence, the student should still report the Cyber Bullying and include a description of what is taking place, so a counselor or administrator can investigate and speak with the parties involved.

45 Help students know what to DO FIRST.
Do not retaliate. Off your buddy list. This should be a live person and not the slides. Have the right down Do First and listen to the meaning of each. Do not retaliate: Students who engage in bullying behavior want to see your reaction. When they cyber bully they are unable to your reaction so do not send one; plus they could use what you send/do as evidence against you. Off your buddy list: Take the screen name off your list so that person who may use IM, or other social networking sites such as MySpace.com or Xanga.com can not bully you; however, be on the lookout for the person to sue another user’s name to bully you.

46 Help students know what to DO FIRST.
Figure out who it is. Ignore it. Respond after you think about it carefully. Save the evidence Tell an adult. Figure out who it is: Trace the number used in text messaging. If you are receiving threatening messages that threaten you or someone else, tell an adult right away and have your Internet provider trace the source. Ignore it: By ignoring it, the person(s) engaging in bullying behavior do not get a reaction from you, so they may stop. If they persist, then action does need to be taken. Respond after you think it carefully: Responding is different than retaliation. For example, a friend may do something inappropriate thinking that it is funny, so let him/her know that what he/she did or said was inappropriate. Save the evidence: Save all evidence even stuff that you ignored. You will need evidence to take action. Tell an adult: Always tell an adult when you receive a threatening or disturbing message. Schools should make sure students know who should be contacted.

47 Carol Greta Attorney IDE
State laws, litigation, and guidelines for teachers and administrators about legal issues and Cyber Bullying.

48 Resources at your fingertips:
Stop Bullying Now Olweus Bullying Prevention Program Cyber Smart Bullying/nsba/features That's Not Cool Show Cyber Smart and That’s Not Cool ending with the video on That’s Not Cool. The example is not really bullying, but addresses how technology can be used in relationships to control someone which is also unhealthy and needs to be addressed.

49 Contacts… Penny Bisignano, gbiz@mchsi.com
Kathy Lockard, Jaymie Randel, Local AEA Olweus Bullying Prevention Trainers


Download ppt "What does it look like today? What can be done?"

Similar presentations


Ads by Google