No Cyberbullying or Sexting: Prevention Strategies for Tweens, Teens, Educators, and Parents

Similar documents
Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

Springfield Public Schools

Affirmative Action Presentation

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander

Landmark School Bullying Prevention & Intervention Plan

Social Media Guidelines Resource

Cyberbullying. How common is cyberbullying?

Comments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying.

Cyberbullying, Sexting & Predators Oh My!

BULLYING/ANTI-HARASSMENT

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Girls & Cyber- bullying

Online Safety for Middle and High School

FAIRFIELD AREA SCHOOL DISTRICT

Lesson Plan for Senior Secondary

Internet Safety Fact Sheet Facts about Social Networking:

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Charles Williams Church in Wales Primary School. Bullying Prevention Policy. June 2014 Review date June A Definition Of Bullying

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

STUDENT BULLYING PREVENTION AND INTERVENTION

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE

Edward W. Brooke Charter School Bullying Prevention and Intervention Plan

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D.

Preventing Bullying and Harassment of Targeted Group Students. COSA August 2013 John Lenssen

HIGH SCHOOL FOR RECORDING ARTS

Applying the Washington State HIB Law in Your School

Cyber-bullying is covered by this policy: all members of the community need to be aware that

Bullying Prevention: Steps to Address Bullying in Schools. Getting Started

Infusion of School Bullying Prevention Into Guidance Curriculum. Significance of Bullying Prevention Program

September A Anti Bullying (Cyber Bullying) version 9

Under the Start Your Search Now box, you may search by author, title and key words.

How To Protect Children From Abuse

THE EFFECTS OF FAMILY VIOLENCE ON CHILDREN. Where Does It Hurt?

Massachusetts Anti-bullying Law:

APPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative)

Strategies for Victim Service Providers for Combating Cyberbullying

Updated Guidance for Schools and Districts on Addressing Teen Dating Violence (2013)

St. Gregory s Catholic Primary School Behaviour Policy

Bullying Prevention and Intervention:

FAQs: Bullying in schools

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.

Cyberbullying Resources. The Cyberbullying Virus (4:40 min): 5PZ_Bh- M6o

Chapter 3. Online Bullying

Georgia Performance Standards. Health Education

IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH

Safe & Caring Schools Policy Revised 2013

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Bullying 101: Guide for Middle and High School Students

Discussing Bullying Behaviors with Teens: Tips for Adults at School and Home

Burlington Public Schools. Bullying Prevention and Intervention Plan

Gender Based Violence

HATE CRIMES AND THE VICTIM

School Bullying and the Law in the Republic of Ireland David Quirke BA, LLM

HARTFORD PUBLIC SCHOOLS DISTRICT SAFE SCHOOL CLIMATE PLAN

VIDEO SCRIPT. Bullying, Harassment, & Civil Rights: An Overview of School Districts Federal Obligation to Respond to Harassment

LEVEL I SCREENING Step 1: Make Sure All Students / Staff Are Safe

GENERATION SAFE 360 SELF ASSESSMENT: PRINTABLE VERSION. Page 1

CyberbullyNOT Student Guide to Cyberbullying

Purpose of Presentation

Cyber safety Parent Easy Guide 63

Finchley Catholic High School. Anti Bullying Policy

Stalking 101: Understanding the lethality of stalking in today s world

Digital Citizenship Lesson Plan

ANTI-BULLYING POLICY

TAVISTOCK COLLEGE POLICIES & PROCEDURES

1. Preamble This policy is created with due regard to Law Number 61 of July 17, 1998 about primary and secondary education.

ACTION. What if Your Child IS the One Showing Bullying Behavior? PACER CENTER. So who does it? What is bullying? Bully versus child who bullies

INTRODUCTION 2 WORKPLACE HARASSMENT

Godley Community Primary School. Anti-Bullying Policy

What Is the Olweus Bullying Prevention Program?

Today s teens use technology more than ever. Most have

SCHOOLS SAFE 4 GIRLS - Questionnaire for schools

Toronto District School Board

Jenny Walker, Ph.D.

Chicago Public Schools Policy Manual

Model Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups

Bullying: Analysis of 10 year Global Data

Counselors Guidelines for the Healthy Development of Youth in the Digital Age

Teacher Guide TEEN SAFETY

Young Men s Work Stopping Violence & Building Community A Multi-Session Curriculum for Young Men, Ages From HAZELDEN

Lydiate Primary School. Anti-Bullying Policy. This document outlines the practises to be followed in tackling bullying at

Bullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping

POLICY 5.9: ANTI-BULLYING

Hope In-Home Care CODE OF CONDUCT AND ETHICS

Class 2: Manage Your Digital Footprint. Student Handbook

CT BOARD OF REGENTS FOR HIGHER EDUCATION. RESOLUTION concerning. Sexual Misconduct Reporting, Support Services and Processes Policy

BERKELEY COLLEGE Equal Opportunity Policy

The Respectful Workplace: You Can Stop Harassment: Opening the Right Doors. Taking Responsibility

OHIO ANTI -HARASSMENT, INTIMIDATION, AND BULLYING INITIATIVE

ANTI-BULLYING POLICY. Every ThreeYears. Ratified by Governors: January 2014 Review date: January One part of the Safeguarding Policy portfolio

Youth Protection Training

[Name of School] E-safety policy

e-rate toolkit Cyberbullying: Crossing the Line

POLICY ON SEXUAL AND GENDER-BASED MISCONDUCT AND OTHER FORMS OF INTERPERSONAL VIOLENCE

Anti Bullying Policy

Transcription:

No Cyberbullying or Sexting: Prevention Strategies for Tweens, Teens, Educators, and Parents Christine Suniti Bhat, PhD, LPC, LSC Associate Professor (bhatc@ohio.edu) Counselor Education The Patton College, Ohio University

Session Objectives Overview of social media popular with youth along with statistics of usage. Definitions of Cyberbullying and Sexting Specific cases to the misuse of social media for cyberbullying and sexting. Prevention Resources for Youth Includes peer programs to educate tweens and teens about immature, impulsive, and dangerous uses of social media. Prevention resources and initiatives for educators and parents/guardians of youth. (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 2

Teens, Social Media & Technology Overview 2015 Pew Research Center 92% of teens (13-17) go online daily 24% of teens report being online almost constantly 12% report once-a-day use (Lenhart, 2015; Pew Research Center). 73% of teens have a smartphone; 15% a basic phone (Anderson, 2015; Pew Research Center) Median number of texts sent per day is around 60 (Lenhart, 2012: Pew Research Center) (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 3

Cyberbullying Defined Cyberbullying involves the use of information and communications technology (ICT) to intimidate, harass, victimize, or bully an individual or a group of individuals (Bhat, 2008) Willful and repeated harm inflicted through the use of computers, cellphones, and other electronic devices (Hinduja & Patchin, 2009, p.5) (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 4

Elements of Cyberbullying Harm to victim or target Power imbalance Cyberbullies more powerful than victims Power may come from anonymity, information, social status Repetition Technology aids in this Often a sexual component Adds to shame and secrecy on the part of victims (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 5

Four Roles in Cyberbullying or Sexting Situations (a) active or initiating cyberbully or sexter (b) secondary cyberbully or sexter (c) observer (d) target (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 6

Sexting Defined Sexting is the sending or receiving of sexually-explicit or sexually-suggestive images or video via a cell phone (Patchin & Hinduja) Sexting has become a part of many relationships for teens and adults Considered as a normal expression of sexuality Examples of normalization Cosmopolitan How to send sexy texts and messages Bustle 50 Example Sexting Ideas You Can Use Right Now Problems related to misuse of images and videos (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 7

Problems Related with Sexting Images, Videos, and Words are out of the sender s control as soon as they are sent Revenge Porn sharing of intimate images and videos after a break-up Nonconsensual Porn taking and sharing of images and videos taken without the target s knowledge or consent Distribution of sexually graphic images of individuals without their consent. Sexting Laws in some states (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 8

Typical Behaviors of Targets of Cyberbullying & Sexting Seek help from friends Hide from adults such as parents and personnel at school Keep to self (don t tell anyone including friends or significant adults) Attempt to ignore (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 9

Why Do Youth Engage in Cyberbullying and Sexting? How Can Education Help? EMPHASIZE ETHICAL BEHAVIOR Media literacy initiatives could and should pay much more attention to the ethical use of technology. Using real-life cases and discussing the ethical dimension would help young people pause before they engage in forwarding, etc. MORAL COMPASS Create educational programs that teach our technologically savvy youth the difference between right and wrong BEFORE they are confronted with a situation in which they have to make a decision (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 10

Why Do Youth Engage in Cyberbullying and Sexting? How Can Education Help? LURE OF INSTANT CELEBRITY STATUS Education programs should focus on secondary cyberbullies as they can expand the reach of the primary cyberbully and thereby increase the harm to the victim. If no one jumped on the bandwagon, the harm could be minimized. IMPULSIVITY Again, education using case studies and teaching decision-making models and evaluating consequences is important. (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 11

Why Do Youth Engage in Cyberbullying and Sexting? How Can Education Help? LACK OF EMPATHY We have to make conscious efforts to teach relational skills that we previously thought were a distinguishing and natural feature of being human. LIMITED CONSEQUENCES OR LEGAL REPERCUSSIONS One of the reasons that cyberbullying and other unethical uses of media continues is that perpetrators do not fear the consequences of their actions. Having societal and legal sanctions enforced consistently can help redress this perception. (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 12

Psychological Toll of Cyberbullying & Sexting on Targets Depression Anxiety Anger Shame Hurt Low self esteem Self blame Suicidal Ideation (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 13

PREVENTION: A Core Concept in Counseling Primary Prevention Occurs before the fact Attempts to reduce new occurrences of a disordered behavior Includes doing something in the present to prevent something undesirable from happening in the future Prevention conducted to reduce risk factors while building protective factors Involves reducing negative influences (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 14

Prevention at School & Home Educate students, teachers, & parents about misuse of social media School Home Parents must educate and set firm limits for online behavior Peer Education can be very beneficial Peers (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 15

Tips to Keep in Mind with Prevention Education Create an environment that allows students to share, take risks feel safe & respected Include some synchronous interaction and group assignments Model interactions and ask thought-provoking/probing questions Use introductory/ice-breaker assignments Promote student engagement, allow unique perspectives and give timely feedback Share teaching responsibilities with students and consciously build community Use communication and collaboration tools and facilitate personal connections Thormann & Fidalgo, 2014, 385). (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Congerence, June 2016 16

Peer Prevention How can teens and tweens be part of the solution? That s Not Cool Ambassador Program 1 in 4 dating teens is abused through technology Be a Leader EmbraceCivility.Org Invent! Trisha Prabhu Invented ReThink at age 13 after learning about the suicide of 12 year old Rebecca Sedwick (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 17

PREVENTION BY EDUCATORS: Elements to Include in Education, Preventative Programming, and Anti- Bullying Policies A definition of cyberbullying and behavioral examples of types of actions that constitute cyberbullying Knowledge and understanding of the types of ICT used to cyberbully The roles in cyberbullying, including that of active cyberbully, secondary cyberbully, observer, and target, and what actions each one can take to prevent cyberbullying (i.e. a clear list of do s and don ts) Specific safety and reporting features associated with each type of technology; the Australian office of e-safety has developed an excellent guide (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 18

PREVENTION BY EDUCATORS: Elements to Include in Education, Preventative Programming, and Anti- Bullying Policies Specific actions students should take if they are cyberbullied. These actions could be taking screen shots, printing evidence, speaking to trusted adults, and not retaliating as this often escalates the cyberbullying. Behavioral examples of types of actions that are to be taken to curb cyberbullying An understanding the detrimental psychological, social, and academic effects of cyberbullying experienced by targets of such attacks Reporting procedures for cases of cyberbullying and encouragement of observers to step forward to stop the harassment Clear consequences for those who engage in cyberbullying (Bhat, Chang, & Linscott, 2010, p. 39) (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 19

Prevention Resources: Bully Stoppers Victoria, Australia Examples of programs in USA and Australia Bully Stoppers aim is to ensure schools are safe and supportive places Supports students, parents, teachers and principals to work together Goal is that all are empowered to help reduce the incidence of bullying in schools (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 20

Prevention: Psychoeducational Groups for Children Benefits of Groups Promotes security and comfort Enhances learning of practical ways to handle problem situations Allows members to share with one another and learn through peer modeling and feedback Provides resources for children to learn how to help themselves (Gladding, 2009) (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 21

Psychoeducational Groups for Children Children should be free to decide whether to talk Leader should work at creating conditions that promote positive exchange Nonverbal messages in children may be as important as verbal messages; look for incongruences Action Oriented techniques such as role playing and I statements help children orient both verbal and nonverbal messages Materials (videos, exercises) should not detract from meaningful process (Gladding, 2009) (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 22

In addition It is vital to use materials that young people can relate to Recent Age appropriate Relevant to their experience Discussions in sub-groups work better than large group discussions Structure is valuable, especially for processing Pros and cons to groups separated by gender Active methods such as role play and rehearsal help solidify learning 23

Overview of Prevention Group Session 1- Session 2- Session 3- Session 4- Session 5- Session 6- Cyberbullying Defined Empathy Cyberbullies, Victims and Bystanders Empowering the Bystander Why do people cyberbully? Responding to Cyberbullying (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 24

Overview of Group Lessons Videos provide Real-Life stories of cyberbullying Process Questions encourage member interaction Cyberbullying Facts and Strategies help children make positive informed decisions Additional exercises and questions help deepen group discussions. (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 25

Prevention Strategies for Parents Know how teens and tweens communicate Accept that Information and Communicatons Technology (ICT) is a BIG part of teens and tween s social life Teach right and wrong, ethical and non-ethical decision-making regarding the use of ICT Discuss cyberbullying and sexting, using teachable moments based on events reported in the media or incidents in the community Have clear agreements (contracts) regarding the use of ICT, and follow through on consequences for non-compliance Avoid knee-jerk reactions when help is sought such as blaming or digital grounding 26 (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016

Intervention Strategies vs. Prevention Strategies Education and Prevention are important Several resources available E.g., http://cyberbullying.org/videos/ http://www.education.vic.gov.au/about/programs/bullystoppers/pa ges/default.aspx http://www.nsteens.org/videos/splitdecisions Intervention is equally important Targets of cyberbullying don t seek help because they believe adults over-react, under-react, or act ineffectively They may also keep it to themselves if they are ashamed or blame themselves (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 27

Intervention Strategies Focused on Empowering the Target When a student seeks help for cyberbullying, TAKE IT SERIOUSLY Listen hear the full story Show empathy Establish trust Normalize the reactions being experienced Avoid blame (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 28

Intervention Strategies Focused on Empowering the Target: Affective, Cognitive, & Behavioral Strategies Affective Encourage student to express emotions of sadness, anger, betrayal, fear, worry Normalize such reactions Cognitive Help student to think differently about the situation Stop the blame game Work to reframe irrational beliefs that reinforce the magnitude of harm (I can t stand-it-itis) Work to reframe irrational beliefs that support lowered self esteem and a loss of control (e.g., awfulization) (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 29

Intervention Strategies Focused on Empowering the Target Behavioral Do NOT retaliate on ICT Do NOT retaliate in person Do NOT take actions to harm self DO seek help from peers, parents, school personnel DO have a plan of action (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 30

Intervention Strategies Focused on Empowering Schools to Act Effectively in Cases of Cyberbullying Steps to be taken by school counselor and administrators Assess the immediate threat Ensure the safety of the target Contact parents Contact the internet service provider Enforce school s disciplinary policy on bullying immediately and consistently across cases (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 31

Intervention Strategies Focused on Empowering Schools to Act Effectively in Cases of Cyberbullying Advocate for the target of cyberbullying with school personnel Know the district/school anti-bullying policy Consult with the target (and parent/s) recommend a written complaint to school administration (if the cyberbully is known) Inform and involve the parents of the cyberbully Help the school devise plans to address the issue if the cyberbully is not known but is suspected to be in the school (i.e., interventions within the school community) (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 32

Policies Related to Cyberbullying in Schools - Example from Ohio Ohio Anti-harassment, anti-intimidation or antibullying model policy (per House Bill 276) Requires each school district board of education adopt a policy prohibiting harassment, intimidation, or bullying of any student Based on premise that all schools in Ohio should provide a physically safe and emotionally secure environment for students and school personnel (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 33

Intervention Strategies Focused on Empowering the Target of Cyberbullying by Involving Law Enforcement Build relationships with local police Discuss situation with school resource officer (if there is one) Some areas have high-tech crime units Law must be informed in duty to warn instances threats of physical harm sexual harassment sexual exploitation posting nude or compromising photographs extortion or stalking behavior hate or bias (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 34

Empowering the Target of Cyberbullying by Knowing about facebook Report link on facebook site Use to report harassment facebook will investigate within 24 hours Use abuse@facebook.com for email complaint Facebook will investigate within 24 hours and respond within 72 hours Print, take screen shots (print screen key), and save all offensive information Block users who are being offensive Adjust your privacy settings (profile, search, news feed, wall) and check on them often Using fake names or lying about age is a violation of the facebook Source: Terms of Use: http://www.new.facebook.com/terms.php?ref=pf (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016 35

Links to Resources Bully Stoppers, Victorian Department of Education http://www.education.vic.gov.au/about/programs/bullystoppers/pages/default.aspx Cyberbullying: A Prevention Curriculum for Grades 6-12 http://www.violencepreventionworks.org/public/cyber_bullying_curriculum.page Cyberbullying Research Center http://cyberbullying.org/videos/ Cyber Civil Rights Initiative http://www.cybercivilrights.org/welcome/ Embrace Civility in the Digital Age http://www.embracecivility.org/ Hinduja, S., & Patchin, J. (2009). Bullying beyond the school yard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Sage Publications (Corwin Press). National Center for Missing or Exploited Children http://www.nsteens.org/videos/splitdecisions Stop Bullying http://www.stopbullying.gov/cyberbullying/ That s Not Cool: Become an Ambassador https://thatsnotcool.com/prevent-violence-online-become-ambassador/ Trisha Prabhu http://www.trishaprabhu.com/index 36 (c) Christine Suniti Bhat, PhD, Ohio University; OPEC Conference, June 2016