cyber powerpoint
TRANSCRIPT
-
8/8/2019 Cyber PowerPoint
1/28
CYBER BULLYINGand its impact on the 21stCentury School
Mr. Bryan OBlackMr. Bryan OBlack
Director of Technology & AssessmentDirector of Technology & Assessment
Shaler Area School DistrictShaler Area School District
-
8/8/2019 Cyber PowerPoint
2/28
CYBER BULLYING IS
Being cruel to others by sending or posting harmful
material using technological means;
an individual or group that uses
information and communication involving
electronic technologies to facilitate
deliberate and repeated harassment or
threat to an individual or group.
Also known as:
ElectronicBullying &
Online Social Cruelty
-
8/8/2019 Cyber PowerPoint
3/28
CYBER BULLIES TECHNOLOGY
E-mail
Cell phones
Pagertextmessages
Instantmessaging
Defamatory personal web sites
Defamatoryonline personal pollingweb sites
Chatrooms
-
8/8/2019 Cyber PowerPoint
4/28
DIFFERENCESBULLYING
DIRECT
Occursonschool property
Poorrelationshipswithteachers
FearretributionPhysical: Hitting, Punching &Shoving
Verbal: Teasing, Namecalling &GossipNonverbal: Useof gestures &Exclusion
www.stopbullyingnow.hrsa.gov
CYBERBULLYING
ANONYMOUS
Occursoffschoolproperty
Goodrelationships withteachers
Fearlossoftechnologyprivileges
Furtherundertheradarthanbullying
Emotionalreactionscannotbedetermined
{McKenna & Bargh, 2004; Ybarra & Mitchell, 2004}
-
8/8/2019 Cyber PowerPoint
5/28
CYBER BULLY CATEGORIES
Inadvertent Role-play Responding Maynotrealizeitscyber
bullying
Vengeful Angel Righting wrongs Protecting themselves
Mean Girls Bored; Entertainment Ego based; promoteown
socialstatus Oftendoina group Intimidateonandoffline Needothersto bully; if
isolated, stop
Power-Hungry Wantreaction Controlling with fear
Revenge of the Nerds(Subsetof Power-Hungry)
Often Victimsofschool-yardbullies Throw cyber-weightaround Notschool-yard bullieslike
Power-Hungry & Mean Girls
{Parry Aftab. Esq., Executive Director, WiredSafety.org}
-
8/8/2019 Cyber PowerPoint
6/28
CYBER BULLYING TYPES
Flaming: Online fightsusing electronicmessages withangryand vulgarlanguage
Harassment: Repeatedlysending offensive,rude, andinsulting messages
Cyber stalking: Repeatedlysending messagesthatincludethreatsofharmorarehighlyintimidating. Engaging inotheron-lineactivitiesthatmakeapersonafraid forhisorherown
safety
Denigration:Dissingsomeoneonline.Sending orposting cruel gossiporrumorsaboutapersontodamagehisorherreputationorfriendships
-
8/8/2019 Cyber PowerPoint
7/28
CYBER BULLYING TYPES
Impersonation: Pretending to besomeoneelseandsending orposting materialonlinethatmakesthatpersonlook bad, getsthatpersonintroubleordanger, ordamagesthatpersonsreputationor friendships
Outing and Trickery: Sharing someonessecretor embarrassing informationonline. Trickingsomeoneintorevealing secretsor embarrassinginformation whichisthensharedonline
Exclusion: Intentionally excluding someonefromanon-line group, likea buddylist
{Nancy Willard, M.S., J.D., Director of the Center for Safe andResponsible Internet Use}
-
8/8/2019 Cyber PowerPoint
8/28
CYBER BULLYINGPREVALENCE
Cyber bullying typically starts atabout 9 years of age and usuallyends after 14 years of age; after
14, it becomes cyber or sexualharassment due to nature of actsand age of actors {Aftab}
Affects 65-85% of kids in the coregroup directly or indirectlythrough close friends (Aftab)
-
8/8/2019 Cyber PowerPoint
9/28
CYBER BULLYINGPREVALENCEAftabs statistics:
90% ofmiddleschoolstudentstheypolledhadtheir feelingshurtonline
65% oftheirstudents between 8-14 have beeninvolveddirectlyorindirectlyinacyber bullyingincidentasthecyber bully, victimor friend
50% hadseenorheardofa website bashing ofanotherstudent
75% had visiteda website bashing 40% hadtheirpasswordstolenandchanged bya
bully(locking themoutoftheirownaccount)orsentcommunicationsposing asthem
Problemsinstudies: notassessing the realthingi.e. Only 15% ofparentpolled knew whatcyberbullying was
-
8/8/2019 Cyber PowerPoint
10/28
CYBER BULLYINGPREVALENCE
In the 2003-04 school year, i-SAFE America surveyed studentsfrom across the country on a new topic: Cyber Bullying
It is a topic that not many adults were talking about but one that is alltoo familiar with students.
42% of kidshave been bullied whileonline. 1 in 4 havehadithappenmore
thanonce.
35% of kidshave beenthreatenedonline. Nearly 1 in 5 havehadithappenmorethanonce.
21% of kidshavereceivedmeanorthreatening e-mailorothermessages.
58% of kidsadmitsomeonehassaidmeanorhurtfulthingstothemonline.Morethan 4 outof 10 sayithashappenedmorethanonce.
53% of kidsadmithaving saidsomething meanorhurtfultoanotherpersononline. Morethan 1 in 3 havedoneitmorethanonce.
58% havenottoldtheirparentsoranadultaboutsomething meanorhurtfulthathappenedtothemonline.
Basedon 2004 i-SAFE surveyof 1,500 students grades 4-8 http://www.isafe.org
-
8/8/2019 Cyber PowerPoint
11/28
CYBER BULLYINGSTATISTICS
*Taken from an i-SAFE America survey of students nationwide.
-
8/8/2019 Cyber PowerPoint
12/28
CYBER BULLYINGLEGAL ISSUES
Who May Be Involved:
SchoolCounselor
Principal
Resource Officer
Police
Attorney(School or Private)
Superintendent
InternetService Provider
General (Willard, 2005)
School Limits:Schoolshavepoliciesagainst
bullying
Civil Law Limits:
Cyber bullying mayalsomeetstandards for institutional
torts(wrongdoings)
Defamation
Material that Constitutesan Invasion of Privacy
(1stAmendment)
Intentional Infliction ofEmotional Distress
-
8/8/2019 Cyber PowerPoint
13/28
CYBER BULLYINGLEGAL ISSUES
Criminal Law LimitsThe following kindsofspeechcanleadtoarrest&prosecution:
Making threatsof violencetopeopleortheirproperty
Engaging incoercion Making obsceneorharassing phonecalls Harassmentorstalking Hateor biascrimes Creating orsending sexually explicitimagesof
teens Sexual exploitation Taking aphotoofsomeoneinplace where
privacy expectedGeneral (Willard, 2005)
-
8/8/2019 Cyber PowerPoint
14/28
CYBER BULLYINGLEGAL ISSUES
Educators Guide To Cyber bullying:Addressing theHarmof On-lineSocialCruelty
(NancyWillard, 2005)
Law Enforcement should be contacted if
educator becomes aware of:
Deaththreatsorthreatsofother formsof violence
toapersonorproperty
Excessiveintimidationor extortion
Threatsorintimidationthatinvolveany formof
biasordiscrimination
Any evidenceofsexual exploitation
-
8/8/2019 Cyber PowerPoint
15/28
CYBER BULLYINGLEGAL ISSUES
Offsite Internet Activities and Schools(Copyright 2005 Parry Aftab, Esq. All rights reserved)
Conflicting decisions in regard to schools authority with respect tocases under state and federal jurisdictions
School should seek legal consult often beyond regular schoolattorney (e.g., a constitutional or cyber-free speech lawyer)
Within School Authority Guidelines: Clear-cut threats Clearly disruptive of school discipline encouraged to visit website; student accesses or works on
website in school
School owned website or school-sponsored project website Any proof of in-school impact (e.g., materials on grounds;
psychosocial, behavioral or academic impact on others) Proof the students website or harassment has had impact on
staff(e.g., quits, leave of absence, medical TX for emotional issues)-
otherwise seek outside legal recourse
-
8/8/2019 Cyber PowerPoint
16/28
CYBER BULLYINGLEGAL ISSUES
What Everyone Needs to Know AboutCyber Bullying
(Aftab)
Manycasesofchildcyber bullying, likeadult
counterpartsofcyber-harassment, notcriminal
Law Enforcement needs to be aware of: Difference betweenannoying anddangerouscommunications
How toinvestigateacybercrime
How toobtaininformation froman ISP
-
8/8/2019 Cyber PowerPoint
17/28
CURRENT ANTI-BULLYING PROGRAMS
Traditional Program Concerns(Fleming, Towey, Limber, Gross, Rubin, Wright& Anderson, 2002)
Zero Tolerance & 3 Strikes & OutNegativelyimpactson willingnesstoreportCastslargenet
Bulliesneedpro-socialrolemodels
Anger Management, Skill Building, Empathy Building, Self-EsteemEnhancement
Groupmembersserveasrolemodels & reinforcersof bullying, anti-socialbehaviorBulliesdontneedself-esteem boosted
MediationAppropriateincasesof equalpower, not bully & victimParallelspossibleindoing mediationindomestic violenceAppropriatemessageto bullies: Your behaviorisinappropriate, wontbetoleratedMessageto victim: Noonedeservesto be bulliedand were going totrytostopit
-
8/8/2019 Cyber PowerPoint
18/28
CURRENT CYBER BULLYINGPROGRAMS & RESONSES
(Aftab, PowerPointcommunication)
PROGRAM OFFERINGS:
Teenangels.org: trains teens & preteens to be part of solution
WiredKids and WiredTeens programs for schools andcommunities
Wiredsafety.org: one to one hotline and multiple resourcesVideos, Lesson Plans and Activities
Parent and Community Programs
Law enforcement training and briefings
Local county level summits on cyber bullying
Assistance on technological software & tools to help
-
8/8/2019 Cyber PowerPoint
19/28
CURRENT CYBER BULLYINGPROGRAMS & RESPONSES
What Everyone Needs to Know AboutCyber bullying (Aftab)
Education of Children: Allactionshaveconsequences
Cyber bullying hurts
Theyare justbeing usedandmanipulated by
cyber bully Cyber bullyandaccomplicesoften becomethe
targetofcyber bullying themselves
Careaboutothersandstandup for whatsright
-
8/8/2019 Cyber PowerPoint
20/28
CURRENT CYBER BULLYINGPROGRAMS & RESPONSES
Comprehensive Plan (Willard, 2005)Schools
Policiesconcerning misuseoftechnology
Evaluatehow staffisandcanmore effectively
monitor InternetuseParents
Discusscyber bullying
Superviseandincrease effectivemonitoring ofInternetuse
Sincemoreadultssupervise, morechildren willhideactivities, strategiesneededtochangesocialnormsintheseon-line works, empowerthe victim withknowledgehow toprevent& respond, & todiscourage bullies from engaging insuchactivities
-
8/8/2019 Cyber PowerPoint
21/28
CURRENT CYBER BULLYINGPROGRAMS & RESPONSES
Schools should:
Focuson valuesof kindnessandrespectfulhumanrelations
Enhancementof empathicawareness
Develop effectiveproblemsolvingskills
Empowermentof bystanders
-
8/8/2019 Cyber PowerPoint
22/28
CURRENT CYBER BULLYINGASSESSMENT
(Willard, 2005)
Specific Step Wise Plan:1 Engageinparticipatoryplanning {IntegrateintoSafeSchools. DistrictTechnology Awareness; Non-school Participants}
2 Conductneedsassessment {AssessmentavailableatCenter forSafe& Responsible InternetUse}
3 Ensurethatan effectiveanti--bullying programinplace{corenotauthoritarian values; predictive empathy; peernorms vs. bullying; peerinterventionskills, effectiveadministrativeresponses}
4 Review policies & Procedures {Monitoring, reportbox, internet&othertechnologicalpp}
5 ConductProfessional Development {keyindividualsophisticatedin
thearea; alladministrators, librarians, counselorsandtechnologyeducators basicunderstanding; allotherstaffalertedto existence, howtodetect}
6 Provide ParentEducation {prevention, detection & interventionstrategies; alertchildtopotentialconsequencesofschooldiscipline, lossof familyaccount, civillitigation, criminalprosecution}
7 Evaluate{prevention & interventionprograms}
-
8/8/2019 Cyber PowerPoint
23/28
CURRENT CYBER BULLYINGPROGRAMS & RESPONSES
Intervention Strategies for Cyber bullying Directed at Student1-Savethe evidence2-Conductathreatassessment{ifcyber bullying posessubstantialdisruption, violenceorsuicideconcerns; contactlaw enforcementifthreatsof violence}3-Assesssresponseoptions{directschoolnexusmay warrantschooldisciplinaryaction; ifoffcampusandnotsubstantialthreat,
nodisciplinaryaction buthelp victim}4-Identifythe Perpetrators{technicalassistance; assess validityofpersonsidentity; offertechnicalassistancetoparents}5-Supprtthe victim{evenifnodisciplinaryaction, offersupportandassistanceto victimandparents; offercounseling mediation,technicalassistance; directtocommunityresources}6-Provide guidanceonhow toremovethespeech
7-Seek touseinformalresolutionstrategies{contactperpetratorparents, offerassistance, suggestlegalconsultation; offercounseling, mediationinschool; recognizethecyber bullyisahurtkidandtrytohelp both victimandperpetrator
Intervention Strategies for Cyber bullying Directed at Staff1- AssessTypeofSpeech2- Takeaction basedonassessment
-
8/8/2019 Cyber PowerPoint
24/28
CURRENT CYBERBULLYING ASSESSMENT
WhatEveryone NeedstoKnow AboutCyber bullying(Aftab)
Assessment to differentiate between rudecommunications and cyber bullying:
1- KindofThreats
2- FrequencyofThreat
3- SourceofThreats
4- NatureoftheThreats
Themore frequent, the greaterthethreat, thementionofmoredangerousmethods & theinvolvementofthirdpartiestendstoincreasetheseriousnessofthethreat
Knowing thecyber bullymayincreaseordecreasethethreat
-
8/8/2019 Cyber PowerPoint
25/28
ASSESSMENT TREE{PEASPROGRAM}
Assessment
Cyber Bully Incident Report
Completereport& collectevidence
DomainsFamilySchoolSocial
MultipleFactorsRisk vs.
Resiliency
InformantsParents
TeachersStudents
Administrators
MethodsInterview
CollateralinfoAssess. Forms
Standardized Instr.(SAVRY)
Dispositions
Contacts
ParentsAdministration
Police
Disciplinary
DetentionSuspensionExpulsionArrest
Therapeutic
PEAS ProgramFamilySupportCtr.OutsideCounseling
ResidentialTreatment
OngoingPrevention
-
8/8/2019 Cyber PowerPoint
26/28
WHAT IS AN ACCEPTABLEUSE POLICY (AUP)?
"An AUP isa writtenagreement, signed bystudents,theirparents, andteachers, outlining thetermsandconditionsof Internetuse. Itspecificallysetsoutacceptableuses, rulesofon- line behavior, andaccessprivileges. Alsocoveredarepenalties for violationsofthepolicy, including security violationsand vandalismofthesystem. Anyoneusing aschool's Internetconnectionshould berequiredtosignan AUP, and
know thatitwill be kepton fileasalegal,binding document."(Classroom Connect, December1994-January, 1995 issue).
-
8/8/2019 Cyber PowerPoint
27/28
RELATED TO SCHOOLSSPEAR OF INFLUENCE
Responsibility
Usersshould beinformedthattheycould beheldresponsible forthecontentofall
communicationstheystoreorsendusing emailorthe Internet. All emailshould beidentifiedwithanameor emailaddress; usersshouldnotattempttohidetheiridentityorplacesomeone
else'sidentityinorganizationcommunications(spoofing).
-
8/8/2019 Cyber PowerPoint
28/28
AUPS DESIGNEDTO DO THE FOLLOWING
EDUCATE STUDENTS/PARENTS AND STAFF ABOUT:
RISKS PECULIAR TO COMPUTER COMMUNICATIONS.
RULESFOR EFFICIENT, ETHICAL, LEGALCOMPUTER/NETWORKUSE.
SAFE AND APPROPRIATE COMPUTER SOCIAL BEHAVIOR
USE OF AVAILABLE AND UNAVAILABLE SOURCES
PRESERVE DIGITAL MATERIALSCREATED BYSTUDENTSAND TEACHERS
PROTECT VULNERABLE CHILDREN FROMINAPPROPRIATE APPROACHES