The Ultimate 41-Word Cyber Bullying Prevention Crossword Puzzle Young Teen version Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC

Similar documents
Online Safety for Middle and High School

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

CyberbullyNOT Student Guide to Cyberbullying

Today s teens use technology more than ever. Most have

STOP. THINK. CONNECT. Online Safety Quiz

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Internet Safety Fact Sheet Facts about Social Networking:

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

CYBERBULLYING TEACHER S GUIDE:

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

School Bullying Survey

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

Bullying 101: Guide for Middle and High School Students

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

PRIVACY POLICY. I. Introduction. II. Information We Collect

FIRBANK GRAMMAR SCHOOL

Technology Acceptable Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Chapter 3. Online Bullying

i-safe America Internet Safety Tips for Parents

National Cybersecurity Awareness Campaign. Kids Presentation

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

A Time to Tell Troop Meeting Guide

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Grand Canyon Council - Social Media Policy

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

e-rate toolkit Cyberbullying: Crossing the Line

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Finchley Catholic High School. Anti Bullying Policy

Privacy Policy Version 1.0, 1 st of May 2016

Social Networking Sites like Facebook, MSN

Girls & Cyber- bullying

Contents Security Centre

Class 2: Manage Your Digital Footprint. Student Handbook

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

Guidelines for Preventing and Dealing with Bullying Issues

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

DIGITAL TECHNOLOGY POLICY St Example s School

EADS up. stop think connect

Social Networking Sites A Predator s Playground?

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

Lutheran Education Association of Houston Acceptable Use Policy (Students)

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

E Safety Policy. 6 th March Annually. 26 th February 2014

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

Wakefield Public Schools Technology Acceptable Use Policy

Understand What s Going On

Affirmative Action Presentation

Technology Department 1350 Main Street Cambria, CA 93428

Parent Guide to Cyber bullying and Cyber threats

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito


Cyberbullying. How common is cyberbullying?

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Saint Martin s Catholic Academy

Zero-knowledge games. Christmas Lectures 2008

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

Acceptable Use Policy Holy Spirit Catholic School

Handbook on Conducting Research on Social-Networking Websites in California 1

SOCIAL NETWORKING SITES

Practical tips for a. Safe Christmas

Lesson Plan for Senior Secondary

How To Behave At A School

Social Media Guidelines Resource

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

Social Media Guidebook. by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Disability Hate Crime /3/09 12:03 Page 1. Disability Hate Crime. Reporting Book

Art-list License Agreement

Internet Safety. A guide to staying smart & safe online

Notice of Privacy Practices Walter L Cohen High School School-based Health Center. Effective as of August 6, 2004

THE TRUTH ABOUT BULLIES

What Is the Olweus Bullying Prevention Program?

Table of Contents. 1. Basic Netiquette Pg Copyright Pg Plagiarism Pg Privacy Pg. 6

2012 NCSA / McAfee Online Safety Survey

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

HEADS up. stop think connect

Digital Citizenship Lesson Plan

E-Safety Issues and Online Safety

Leonardo Hotels Group Page 1

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

The Respectful Workplace: You Can Stop Harassment: Opening the Right Doors. Taking Responsibility

A Parents Guide to ConnectSafely.org saferinternet.org.uk

Transcription:

% The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC This crossword puzzle was designed as an educational tool to teach both teens and adults about cyber bullying. It is recommended for individuals age 13-14; please preview the entries in the crossword puzzle before using it with younger populations to determine appropriateness. Additional versions of this crossword puzzle are available for other age groups. The clues to the puzzle contain safety messages designed to teach young teens what cyber bullying is, how damaging cyber bullying can be, how to avoid being cyber bullies themselves, and what to do if they know someone who is being cyber bullied, or if they are being cyber bullied themselves. The value of this tool is increased if an adult reviews the clues and the answers with the youth, to ensure that the safety messages contained in the puzzle are fully understood and taken to heart. Permission is granted for educators, counselors, and parents to duplicate this crossword puzzle, and to further distribute it for educational purposes, as long as the source information located at the bottom of each page remains intact on each copy. Copies of pages 2-6 (blank puzzle and clues) may be distributed without page 1 (this cover page) and/or page 7 (the answer key). This puzzle is the sole creation of Dr. Paula C. Rodríguez Rust, owner, Spectrum Diversity, LLC. No puzzle making software was used in the creation of this puzzle. Please send comments and suggestions for this activity, or suggestions regarding other activities that you would find useful, to spectrumdiversity@comcast.net "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% # "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% $013456(1/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% %#"$%# 74**86%9/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% # "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "()##*/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% %#"$%" 01$1("/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% 2+))# &'()*# "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%#"()"*+##,-'./% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%#"&'"()##*+,-./ Page 1

The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC " # $ % & ' ( ) * "+ "" "# "$ "% "& "' "( ") "* #+ #" ## #$ #% #& #' #( #) #* $+ $" $# $$ $% $& $' $( $) $* "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# Page 2

CLUES TO The Ultimate Notes for the Clues: A user is a user of electronic technology. This includes individuals who use cell phones, gaming systems, and the internet. Some entries in the crossword puzzle consist of more than one word, or of hyphenated words. To fit the entries in the puzzle, leave out any blanks between words. For example, if the answer to a clue were peach tree, you would write peachtree in the crossword puzzle, and if the answer were multi- layered, you would write multilayered. ACROSS 5. To copy something from a website onto one s own computer, usually by transferring a file containing the information, photo, video, etc. to one s computer. 6. A string of letters and/or numbers that allows the owner of an account to gain legitimate access to that account. To prevent bullying by impersonation, users should keep this string of letters and/or numbers private, and not reveal it even to their best friends. 8. To copy something from one s computer to a website, usually by transferring a file containing the information to the website, and usually for the purpose of making the information available or visible to others who visit the website. 10. Information that is secret, i.e., that another person does not have the right to pass on to others without permission from the owner of the information. 12. A message that is sent, with instructions for the recipient to forward it to a certain number of other people. Sometimes, a promise of a reward is offered for forwarding the message to the correct number of people, sometimes a time limit is imposed for the forwarding, and sometimes a threat is made in case the message is not forwarded as instructed. Sending such a message can be a crime. 13. Oh My God or Oh My Goodness 14. The information an account holder provides that is made visible by the host to other users is called the user s. For example, the information on a Facebook page about the owner of the page that is visible to people who visit the page. 19. Abbreviated IM, this is a type of message that is transmitted directly from one user s computer to the other, bypassing the filtering, logging, and Page 3

monitoring functions of a host server. Youth are more likely to use services to communicate with their friends, than to use e- mail services. 21. In Real Life 22. A list of the individuals with whom an instant message user has established ongoing channels of communication. When one of these individuals is online, an icon might appear to indicate their availability, thus facilitating communication. 24. A popular web application used to broadcast comments to one s followers. Often used to let one s circle of friends know where one is and what one is doing or thinking at the moment. 25. In My Opinion, similar to the more frequently used In My Humble Opinion 28. Acronym for internet service provider. Each message sent using a computer connection to the internet contains an electronic address assigned by the internet service provider, called the address that allows the police to identify a person who committed a crime online, even if that person made an effort to disguise their identity online. 30. is a statement made by a person indicating that s/he will do harm to another person, or that harm will come to another person. Many users make s without realizing that, even if the act described is not carried out, that the act of making itself does harm, and is often illegal. Many chain letters/e- mails contain s about what will happen to a recipient if the chain e- mail is not forwarded, and people who forward these messages often do not realize that they have made to someone else. 32. Laughing Out Loud. 33. Pretending to be someone else online, including sending messages or posting information online under someone else s name, or logging onto someone else s account using their password without their permission. This is a form of cyber bullying that can be partly avoided if users keep their passwords private. 34. What people who harass others online are usually seeking, because they do not feel they have enough of it in their everyday lives. If others do not react to the bullying, sometimes the bully will stop because they are not getting the feeling of that they are trying to get by bullying. 35. Also called revenge, is the act of getting back at someone for something they did that was hurtful. 36. Passing information about someone around to others behind the person s back. Usually, the information is untrue, and often it is hurtful or derogatory. is sometimes also called gossip. 37. A name, which might or might not reflect a user s real name, that is used to represent the user online. Messages sent by the user and postings made by the user are received or posted under this name, and this name is part of Page 4

one s profile, which is visible to others. The might be the same as the user name one uses to sign onto an account, or it might be different. Also called a tag or a handle,, it is important that young people choose s that do not reveal their real name, gender, age, or location. 38. The act of harassing another player within an online game. Gamers sometimes excuse this behavior by saying that psyching out the other player is an expected part of the game, and might or might not be aware that, in fact, a line has been crossed and the behavior has become harassment. 39. To another player in a game means to try to win an electronic online game by attacking the opponent psychologically; this behavior often crosses the line and becomes bullying, but gamers sometimes excuse their actions by claiming that it is an expected part of the game. DOWN 1. Many kinds of cyber bullying are illegal. When a crime is committed online, the become involved to conduct an investigation and criminal charges might be filed. 2. Young people who run into trouble online, or who know that a friend is being bullied or has run into other trouble online, should tell a trusted immediately. 3. Someone who use their physical or social power, or technological knowledge of digital communications, to do or say things that harass or bother other people. 4. It is unsafe to allow anyone whom you do not already know in real life to find out who you are, that is, to be able to you. Therefore, you should never give out ing information such as your name, age, address, or phone number online. 5. of character is the act of spreading rumors or other information that impunes another person s character or damages their reputation. This activity is covered under civil law, because it violates the individual s civil rights and might be grounds for a lawsuit. 7. Posting or messaging without revealing one s real name. One reason some people do things online that they would not do to someone else F2F is because, online, they feel even if they know that, in fact, the police would be able to identify them if they commit a crime online. 9. A person who witnesses or knows that someone is being bullied. This person can help, either by telling a trusted adult, by being a friend to the person who is being bullied, or by helping that person stop the bullying. 11. A person who seeks out victims for the purpose of taking advantage of them. A cyber uses information gathered online to identify and locate victims. Page 5

15. An important civil right which is often used by cyber bullies to excuse their actions, but harassing and harming others is not, in fact, covered by this right. 16. A security setting in which not only the members of one s own friend list on a social networking site can view a piece of information, but the members of those individuals friends lists can also view the information. This setting is less private than the friends only setting, and only slightly more private than the everyone setting. 17. When one s cyber activity violates someone else s civil rights, for example by invading their privacy or spreading damaging rumors, the injured person might file a against the person who hurt them online. 18. A way to view a conversation between two people who are writing to each other on their walls on Facebook, in which the comments of both participants are visible. 20. Many types of cyber bullying are, for which individuals can be prosecuted under criminal law, leading to prison time and other consequences. 23. To visit a chatroom or forum invisibly, so that other participants do not know that you are listening to the conversation. When you participate in a chatroom or forum, you should always be aware that there might be ers; do not give out any personal information. 24. Written shorthand language used to send messages between cell phones, designed to reduce the number of keystrokes required for a message. Young people are usually much faster at using this shorthand language than adults are. 26. Because experiences and spaces that exist in cyber space are sometimes called reality as opposed to IRL experiences and places- - users sometimes develop the impression that what is said or done online is somehow not quite real. 27. A very popular social networking site among both youth and adults, about which a movie was made. 29. The right to is a civil right under which people have the right to keep certain kinds of information about themselves private, and to expect others to keep their confidential information confidential, and not to pass that information including photos or videos of them on to others without their consent. Violations of this right are illegal, and can lead to lawsuits against someone who does not maintain the confidentiality of another person s information or image. 31. I was only is a favorite excuse of cyber bullies. Many do not realize that if their actions hurt another person, the argument that they were only will not excuse them and they will still be responsible for the hurt they caused to another person. Page 6

ANSWERS TO The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC " " # # $ $ % % & & ' ( ) * ' # & + ' " ( #,, ( ' - &. * ) + " * ' # & ). / * $ % * * "+ 0 ' ) / % &. ) 1 % # * 2 0 1 2 ) 1 3,. "" " 2 "# 0 4 # % ) # 1 - "$ ' 3 5 / 1 # "% " - ' "& / % *. ' "' / 2 % ) - & + "( * - ' & ") (. #, # "* % ), 1 # ) 1 3.,, # 5. 1 #+ 0 (. - *, ' -, ) * " #" % - * % ## $ + & & 2 #$ * %, 1 #% 1 ( % 1 1. - #& % 3 ' %, + 6 '.. 1 ' - #' 7 1 ( 0 #( / #) %, #* " / 8 % $+ # 1 4 -. # 1 - / - $" 9 $# * ' * 0 $$ % 3 ". -, ' ) # 1 % ' ) * $% " ' (. - 7 % + 8 $ # $& -. 1 # * % # 1 % ' ) $' - + 3 ' - $(, 0 -.. ) * ) ' 2 & $) 5 - %. / % ) 5 8 $* ", 2 0 4 ' + 1 $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " Page 7