What is Cyberbullying? How is it Different from Traditional Bullying?
|
|
- Hugh Skinner
- 7 years ago
- Views:
Transcription
1 Bullying occurs when a person or a group of people hurt, scare or are mean to another person or group on purpose. Bullying usually occurs more than once. In the past, these encounters generally happened during school on the playground or in the hallways between classes. But more and more, people are using computers, cell phones and other electronic devices to taunt and humiliate other people. This educational series was created to give students and readers a general understanding of what bullying and, more specifically, cyberbullying is and how it can affect those involved. It will also explore strategies for preventing it. For the next six days (weeks) this newspaper will run features covering the following topics: What is Cyberbullying? Cyber Terms You Should Know The Effects of Cyberbullying Who Participates in Cyberbullying? How to Respond to Cyberbullying How Can Cyberbullying be Prevented? The Cyberbullying Research Center was used as a source for much of the content in this series. All other sources are cited within the features containing their content.
2 What is Cyberbullying? How is it Different from Traditional Bullying? While similar to traditional bullying, cyberbullying has many differences that make it challenging to deal with. Victims often do not know who the bully is, or why they are being targeted. The cyberbully can hide his or her identity by using anonymous addresses or screen names. Hurtful actions of a cyberbully with a few keystrokes or clicks of a mouse can include an increasing number of people - at school, in the neighborhood or across the world! Everyone might not be directly involved but the incident can be witnessed by millions in a matter of days or even hours if the posting goes viral. This could give the victim the feeling that absolutely everyone knows about it. Cyberbullying, unlike physical bullying, does not provide an option Cyberbullying can be defined as the use of computers, cell phones and other electronic devices by people to deliberately and repeatedly taunt, harass, threaten, humiliate or otherwise hassle others. for its victims to walk away. It can be easier to be cruel using technology because a cyberbully doesn t have to face his/her target or see the immediate response. In fact, some teens might not realize the serious harm they are causing because they do not witness the victim s reaction. Finally, while parents and teachers are doing a better job supervising young people at school and at home, many adults don t have the technological know-how to keep track of what teens are up to online. As a result, a victim s experience may be missed and a bully s actions may be left unchecked. Even if bullies are identified, many adults don t know how to stop the cyberbullying from happening. Go viral used in reference to Internet content which can be passed through electronic mail and social networking sites (Facebook, Twitter, etc.). An image, video, or link that spreads rapidly through a large number of users by being frequently shared is said to have gone viral. Source: Urbandictionary.com Cyberbullying is a growing problem because increasing numbers of children are continuously using computers, cell phones or other electronic devices. Two-thirds of young people go online every day for school work, to communicate with friends, or just for fun. The fact that teens may be connected to technology 24/7, means they are open to cyberbullying around the clock. Next installment: Cyber Terms You Should Know Newspaper Activity: Appreciating Others Sometimes bullying happens because of misunderstandings among people of different backgrounds. Look through the newspaper for articles or pictures about customs and traditions of various cultures, religions, nationalities and ethnic groups. With your class and/or family, discuss the special qualities of these groups. Do you have similar traditions? What makes these groups unique and worth appreciating?
3 Cyber Terms You Should Know Anonymizer Software that hides or disguises the IP address of an Internet user. This allows a person to use the Internet without leaving a digital footprint that can be tracked. Bash Board An online bulletin board on which individuals can post what they want. Generally, posts are malicious and hateful statements directed against another person or group. Blocking The denial of access to particular parts of the Internet. Cyber Bullycide Suicide stemming directly or indirectly from being cyberbullied. Cyberspace The electronic universe created by computer networks in which individuals interact. Cyberstalking Harassment that includes threats of harm or is highly intimidating and intruding upon one s personal privacy. Cyber Threats Electronic material that either generally or specifically raises concerns that the creator may intend to inflict harm or violence to other or self. Digital Footprint Evidence of a person s use of the Internet. This includes anything that can be linked to his or her existence, presence, or identity. Filtering The applying of a set of criteria against which Internet content is judged acceptable or not. For example, a filter might check the text on a web page with a list of forbidden words. If a match is found, that web page may be blocked or reported through a monitoring process. Generally speaking, it lets data pass or not pass based on previously specified rules. Flaming Sending angry, rude, or obscene messages directed at a person privately or an online group. A flame war erupts when flames are sent back and forth. Happy Slapping An extreme form of bullying where physical assaults are recorded on mobile phones and distributed to others. IP Address Stands for Internet Protocol address. It is a unique address assigned to a computing device that allows it to send and receive data with other computing devices that have their own unique addresses. ISP Internet Service Provider or the company that provides an Internet connection to individuals or companies. Your ISP can help with identifying the individual who posts or sends harassing or threatening words. Monitoring The recording and reporting of online activity through software. It may record a history of all Internet use or just of inappropriate use. A person can also serve this function. Trolling Deliberately but disingenuously posting information to entice genuinely helpful people to respond (often emotionally). Often done to inflame or provoke others. Next installment: The Effects of Cyberbullying Newspaper Activity: Understanding Terms Look through several editions of the newspaper (print or electronic) to see if you can fi nd news stories about incidents of cyberbullying. Did you fi nd any of these terms mentioned? Were other cyber terms or text talk abbreviations used? With your class and/ or family discuss any terms you don t know or understand.
4 The Effects of Cyberbullying Many targets of cyberbullying report feeling depressed, sad, angry and frustrated. As one teenager stated, It makes me hurt both physically and mentally. It scares me and takes away all my confidence. It makes me feel sick and worthless. Victims who experience cyberbullying say they are afraid or embarrassed to go to school. In addition, research has revealed a link between cyberbullying and low self-esteem, family problems, academic problems, school violence, and delinquent Warning Signs of Cyberbulling: behavior. Finally, A child or teenager may be a victim of cyberbullying if he or she: unexpectedly stops using their computer or cell phone; appears nervous or jumpy when receiving an instant message or ; appears uneasy about going to school or outside in general; appears to be angry, depressed, or frustrated after using the computer or cell phone; avoids discussions about what they are doing on the computer or cell phone; or becomes abnormally withdrawn from usual friends and family members. A child may be cyberbullying others if he or she: quickly switches screens or closes programs when you walk by; uses the computer at all hours of the night; gets unusually upset if he/ she cannot use the computer; laughs excessively while using the computer; avoids discussions about what they are doing on the computer or uses multiple online accounts or using an account that is not their own. cyberbullied youth also report having suicidal thoughts. There have been a number of recent, well-publicized cases involving cyberbullying sometimes combined with other forms of bullying that have contributed to acts of suicide. According the U.S. Department of Health and Human Services, children who are cyberbullied are more likely to: Use alcohol and drugs Skip school Experience in-person bullying Be unwilling to attend school Receive poor grades Have lower self-esteem Have more health problems But cyberbullying can impact more than just its victims. Family and friends of the target, witnesses and the even the people who bully can be affected. According to the American Psychological Association bullies are more prone to other forms of antisocial behavior such as vandalism, fighting and shoplifting. The APA estimates that one in four boys who bully will have a criminal record by age 30. Next installment: Who Participates in Cyberbullying? Newspaper Activity: Understanding Actions and Effects Look through editions of the newspaper for a current problem affecting your school or community. It can but doesn t have to involve bullying or cyberbullying. As a class and/or family discuss what you think about how the people are handling the problem. Are their actions having positive or negative effects?
5 Who Participates in Cyberbullying? Nearly every child at some point will face a situation where he/she is either a bully, a target or victim of bullying or a bystander. At different times, any one of these roles can be switched among participants. An individual s physical size and strength doesn t necessarily determine the make-up of a cyberbully. As a result, young people occasionally change roles, going from victim to bully and back again. Here s one example: a victim of bullying responds by providing the personal information including phone numbers and addresses of the people who have bullied him. His online friends decide to get even by making dozens of prank calls, sending anonymous, inappropriate and threatening s and even ordering hundreds of pizzas to the victims (former bullies) doors. According to the Cyberbullying Research Center about 20% of 11 to 18 year-old students surveyed in 2010 have been a victim of cyberbullying at some point in their lives. About the same number admitted to cyberbullying others and 10% of kids said they had been both a victim Bystander: a person present but not actively involved; onlooker; spectator and an offender. Most traditional bullying occurs around other people who assume the role of bystanders or witnesses. Being a bystander in the cyber world is different because bystanders aren t just onlookers. Bystanders participate by receiving and forwarding s or instant messages, viewing web pages, forwarding images sent to cell phones, etc. And, unlike the limited crowd of spectators in a traditional bullying event, the number of cyber-bystanders can reach into the millions and throughout the world. Those who witness cyberbullying generally do not want to get involved out of fear, yet they often realize that what they are seeing is not right and should stop. Experts believe that bystanders can make a huge difference in helping cyberbullying victims, who often feel helpless and hopeless and need someone to offer support. Bystanders should note what they see and when. They should also stand up for the victim, becoming an ally or upstander, and tell an adult they trust who can step in and improve the situation. Finally, they should never encourage or indirectly contribute to the behavior by forwarding hurtful messages, laughing at inappropriate jokes or content, agreeing with the act just to fit in, or otherwise silently allowing it to continue. Whether you ve been a victim of cyberbullying, know someone who has been cyberbullied, or have even cyberbullied yourself, there are steps you and your friends can take to stop cyberbullying and stay cyber-safe. Next installment: How to Respond to Cyberbullying Newspaper Activity: Bullying/Cyberbullying is No Laughing Matter Look through several editions of the comics section and fi nd instances of bullying or cyberbullying. Pick one and identify the bully, the victim and bystanders. As a class and/or family discuss why the cartoon character is being a bully, how the victim is responding, and what the bystanders are doing. Can you think of better and more positive ways in which these characters could interact with each other?
6 How to Respond to Cyberbullying So what should a person do if he or she is the target or know someone else who is being cyberbullied? Do not reply to cyberbullying. If the cyberbully is ignored and doesn t get a reaction, he or she may stop or move on. But, save or print text messages, postings or s as evidence. Block offending addresses and cell phone numbers, or if necessary change your phone number and address. Report bullying and file complaints with communication services providers and websites where the cyberbullying is occurring. Service providers can find the offenders, cancel their service, and report them to the police if necessary. Try to identify the cyberbully and have a parent or guardian contact his or her parents if Dignity for All Students Act - As the original 2010 New York state law was taking effect in July 2012, an amendment to the new law expanded it to help protect students from cyberbullying as well as other forms of harassment, bullying and discrimination. Effective July 1, 2013, the law requires school districts to have a plan in place to deal with cyberbullying and to act when cyberbullying occurs. School offi cials must investigate reports of cyberbullying, on or off campus, when it creates or would create a substantial risk to the school environment, substantially interferes with a student s educational performance or mental, emotional or physical well-being, or causes a student to fear for his or her physical safety. The law also requires current and future school employees to be trained to identify and reduce the incidences of harassment, bullying, cyberbullying and discrimination. possible. Notify your school of the problem. Involve law enforcement when extremely harmful online speech (including harassment, stalking and threats of violence) is involved. When you see someone being bullied, try to step in and do something about it. Tell the bully to stop. If a bully or cyberbully receives criticism from their peers, they may not do it in the future. If someone tells you that they are being cyberbullied, help them get help so the problem is resolved. All young people should be instructed that when in doubt about what to do log off the computer or electronic device and ask for help from a trusted adult. Newspaper Activity: Resolving Confl icts Use the newspaper (print or electronic) as a resource to fi nd a current confl ict among individuals or groups of people that may or may not involve bullying or cyberbullying. As a class and/or family discuss the possible solutions and work on fi nding the best compromise. Next installment: How can Cyberbullying be Prevented?
7 How Can Cyberbullying be Prevented? Parents and teachers need to educate young people about what is appropriate to write, post or share online. Rules need to be established for safe use of the Internet, cell phones and other electronic devices. Parents also need to monitor use of these devices. Monitoring can be done through active participation or through the use of software. Keep in mind filtering and blocking software alone cannot keep young users safe or prevent them from bullying others or accessing inappropriate content. Everyone, but especially children, should protect their passwords and private information even from best friends. If others find out your password change it immediately! Also, when using social media, set up privacy controls restricting access of your online profile to friends only. No one should open messages ( s, text messages, instant messages (IMs) etc.) from people they don t know or from known bullies. These messages should be deleted without opening them or reading the content. They could Think before you post. Don t post when you re angry or upset. You might express something you ll regret later. Also, consider whether what you re about to write or the photo or video you re ready to post is something you want your parents, grandparents, teachers or complete strangers to see. Ask yourself How would I feel if someone posted this about me? If you might be embarrassed or get in trouble for your action later this is probably not worth sharing now. Remember, even after comments, photos, video, etc. have been deleted from the Internet, this content never completely goes away. contain viruses that automatically infect the electronic device when opened. It is important to remember to log out of online accounts. And, don t save passwords in form fields within websites or web browsers for convenience. Leaving an account open can give someone else access to pose as you online using your account. According to Eyes on Bullying, bystanders also have the power to play a key role in preventing or stopping bullying. Some bystanders directly intervene, by discouraging the bully, defending the victim, or redirecting the situation away from bullying. Other bystanders get help, by rallying support from peers to stand up against bullying or by reporting the bullying to adults. Finally, in keeping with the central theme of folk singer, Peter Yarrow s Operation Respect, we need to work togehter to create a climate where we say - We don t do that here. We all need to understand and reinforce the importance of how everyone should always be treated with respect and dignity in-person and in cyberspace. Newspaper Activity: Use Technology For Good/Protect Against Bad Look through recent editions of the newspaper (print or electronic) for stories about new inventions and discoveries. As a class and/ or family discuss whether each could be used to promote respect, peace or understanding. Consider ways some may be misused to spread disrespect. Think about how people could and should guard against these misuses. For more information about anti-bullying and anti-cyberbullying go online to Operation Respect at and to the Cyberbullying Research Center at
CyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationFAQs: Bullying in schools
FAQs: Bullying in schools FAQs: Bullying in schools answers frequently asked questions about bullying, provides useful advice to parents and students about dealing with bullying, and summarises contemporary
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationWhat Is the Olweus Bullying Prevention Program?
Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive
More informationGRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY
GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationCyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationBullying: A Systemic Approach to Bullying Prevention and Intervention
Bullying: A Systemic Approach to Bullying Prevention and Intervention Session 3 Educators and Teachers icare.ebrschools.org An Alcohol, An Alcohol, Drug Abuse Drug Abuse and Violence and Violence Prevention
More informationA Guide for Parents. of Elementary and Secondary School Students
A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.
More informationBullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping
switching seats in the classroom stealing money Take Action Against Bullying spreading rumors pushing & tripping U.S. DEPARTMENT OF HEALTH & HUMAN SERVICES Substance Abuse and Mental Health Services Administration
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationCyber-bullying is covered by this policy: all members of the community need to be aware that
DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings
More informationBystander Intervention
Bystander Intervention T Y P E S 1 Common Components 2 What is Bystander Intervention 3 Techniques to Try 4 Steps to Action 5 Who you can contact for more information regarding bystander intervention and
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationBullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander
Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,
More informationBullying Prevention: Steps to Address Bullying in Schools. Getting Started
Bullying Prevention: Steps to Address Bullying in Schools Getting Started Bullying can threaten students physical and emotional safety at school and can negatively impact their ability to learn. The best
More informationPOLICY 5111 ANTI-BULLYING/HARASSMENT/HATE
POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school
More informationCrossing. the. L ne. Sexual Harassment at School
Crossing the L ne Sexual Harassment at School Executive Summary Executive Summary A student is groped on the way to class. Kids call a student gay and faggot and just won t quit. A demeaning sexual rumor
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationBullying Prevention and Intervention:
Bullying Prevention and Intervention: A Guide for the Individualized Education Program (IEP) Team Dr. Carol R. Johnson Superintendent Boston Public Schools 26 Court St. Boston, MA 02108-2528 www.bostonpublicschools.org
More informationCyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence
Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationIt s hard to know what to do when you know or suspect that a friend or family member is living with violence.
How can you help? A B It s hard to know what to do when you know or suspect that a friend or family member is living with violence. How do I know what is the right thing to do? Should I say something or
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationEducator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationLesson 3 Preventing Bullying
Lesson 3 Preventing Bullying Overview This lesson focuses on bullying. Students read and react to the thoughts of someone who is a target of bullying. They identify key elements of bullying and discuss
More informationIdaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents
stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationTHE TRUTH ABOUT BULLIES
THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationCranmere Primary School ANTI-BULLYING POLICY
Cranmere Primary School reviewed Autumn 2015 Governors committee: Learning and Achievement Part i) Advice for children ANTI-BULLYING POLICY Bullying is never right. If you are being bullied tell someone.
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationTalking to our children about Violence and Terrorism: Living in Anxious times
Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationParent Guide to Cyber bullying and Cyber threats
School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people
More informationPreventing Bullying and Harassment of Targeted Group Students. COSA August 2013 John Lenssen
Preventing Bullying and Harassment of Targeted Group Students COSA August 2013 John Lenssen Definition Bullying is unfair and one-sided. It happens when someone keeps hurting, frightening, threatening,
More informationTheir stories are tragic. A new chapter starts now. now.
! Their stories are tragic. A new chapter starts now. now.! Bully is a movie that tells powerful stories about children and their families dealing with extreme pain and tragic consequences related to bullying.
More informationHAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
More informationWhat does compassion look like?
Lesson One: What does compassion look like? Learning Objectives: Students will: Demonstrate an understanding of the concept compassion. Identify elements of compassion shown in various images. Begin to
More informationDigital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12
Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which
More informationPreventing bullying: a guide for teaching assistants. SEN and disability: developing effective anti-bullying practice
Preventing bullying: a guide for teaching assistants SEN and disability: developing effective anti-bullying practice Preventing bullying: a guide for teaching assistants 2 Introduction This guide is based
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationACTION AGAINST BULLYING POLICY
Page 1 of 13 ACTION AGAINST BULLYING POLICY We want our pupils to be: Eager, excited, curious and engaged in learning. Have a sense of self and are happy, confident and emotionally healthy. Able to co-operate
More informationMental Health Role Plays
Mental Health Role Plays Goals: To discuss various mental health issues and mental illnesses. To discuss stigma, support and treatment options surrounding mental health issues and mental illnesses. Requirements:
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationPortmarnock Community School ICT and Social Media Expected Use Policy. June 2013
Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives
More informationChild Protection. Be vigilant, report child abuse
Child Protection Be vigilant, report child abuse Introduction All children have the right to live free of abuse. Most children grow up in families where they are safe and secure. Others may be abused
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationOPENING ACTIVITY BALL OF STRING FLING
NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction
More informationAnti-Bullying Policy. Page 1 of 6
Anti-Bullying Policy Date of Last Review: May 2016 Reviewed by: Mr R Beattie Agreed by Governors: Frequency of Review: Annually Date of Next Review: May 2017 Page 1 of 6 Statement of Intent 1 We are committed
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationInternet Safety. A guide to staying smart & safe online
Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationEanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
More informationSpringfield Public Schools
Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationWhat do I Need to Know?
Community Legal Information Association of PEI What do I Need to Know? A Guide to Child Protection for Youth Number to call evenings, weekends and holidays if you are being abused: 368-6868 or 1-800-341-6868
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationSWITZERLAND COUNTY School Corporation Policy Anti-Bullying Policy
SWITZERLAND COUNTY School Corporation Policy Anti-Bullying Policy SCSC POLICY 6.72 The following policy has been established by the school board of Switzerland County School Corporation regarding anti-bullying.
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationPolicy/Program Memorandum No. 128
Date of Issue: December 5, 2012 Effective: Until revoked or modified Subject: Application: THE PROVINCIAL CODE OF CONDUCT AND SCHOOL BOARD CODES OF CONDUCT Directors of Education Supervisory Officers and
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationIt is hard to express just how awful the whole situation was and the problems that it still brings us five years on.
Bullying of children with disabilities and Special Educational Needs in schools: briefing paper for parents on the views and experiences of other parents, carers and families Introduction This briefing
More informationAre You In An Emotionally Destructive Relationship?
Are You In An Emotionally Destructive Relationship? By Leslie Vernick From Chapter 1 The Emotionally Destructive Relationship Seeing It! Stopping It! Surviving It! (Harvest House Publishers 2007) Complete
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationWisconsin Anti-Bullying Center
Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,
More informationCOMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012
COMPUTERS & INTERNET SAFETY Saint Francis Academy April 26, 2012 HELLO! Mr. Michael Hoehl Pronounced Mr. Hale AGENDA Let s talk about the Internet! Challenges Trivia Safety Awareness Call to Action CHALLENGE
More informationSTUDENT BULLYING PREVENTION AND INTERVENTION
0115 STUDENT BULLYING PREVENTION AND INTERVENTION The Board of Education is committed to providing an educational and working environment that promotes respect, dignity and equality. The Board recognizes
More informationSTOP BULLYING. take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series KNOW?
STOP BULLYING take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series Hosted by Erika Harold, Miss America 2003, herself a victim of severe harassment, this solution
More informationFAIRFIELD AREA SCHOOL DISTRICT
No. 249 FAIRFIELD AREA SCHOOL DISTRICT SECTION: PUPILS TITLE: BULLYING / CYBERBULLYING ADOPTED: REVISED: August 11, 2015 249. BULLYING / CYBERBULLYING 1. Purpose 2. Definitions The Board is committed to
More informationUTC READING Anti-Bullying Policy
UTC READING Anti-Bullying Policy Introduction Bullying may be defined as deliberately hurtful behaviour usually repeated over a period of time, where it is difficult for those bullied to defend themselves.
More informationWhether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.
Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationWHOLE SCHOOL ANTI-BULLYING POLICY
130 High Road, Buckhurst Hill, Essex IG9 5SD Telephone number: 0208 504 1133 WHOLE SCHOOL ANTI-BULLYING POLICY 1 Persons responsible: The Head Teacher, in consultation with the Directors, the Governing
More informationClassroom Toolkit for National Bullying Prevention Awareness Week
Classroom Toolkit for National Bullying Prevention Awareness Week Uniting people, schools, and communities nationwide to prevent bullying Promote bullying awareness in your classroom by using the activities
More informationHow To Prevent Bullying At The Beaconsfield School
ANTI-BULLYING POLICY 2015 Approved by the Governing Body: 25 th November 2015 Approved by the Learning & Development Committee: 21 st October 2015 Approved by Leadership Team: 8 th October 2015 Review
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationImprove Your Ability to Handle Workplace Conflict: An Interview with Judy Ringer
Improve Your Ability to Handle Workplace Conflict: An Interview with Judy Ringer Recently our local newspaper interviewed me on the subjects of workplace conflict, difficult people, and how to manage them
More informationThe Bullying Triangle
R343 Justin Hall Kansas State University Manhattan, Kansas 66506 785-532-5773 http://www.theringofvalor.com Charles A. Smith, Ph.D. The Bullying Triangle.......... An Activity for Fifth and Sixth Graders
More informationAnti Bullying Policy
BRABYNS PREPARATORY SCHOOL Anti Bullying Policy This policy applies all pupils in the school, including in the EYFS Created July 2014 Revised August 2015 Date for revision august 2016 Lee Sanders. Headteacher
More informationThe Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
More information