cyber powerpoint

Upload: oblackb

Post on 10-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Cyber PowerPoint

    1/28

    CYBER BULLYINGand its impact on the 21stCentury School

    Mr. Bryan OBlackMr. Bryan OBlack

    Director of Technology & AssessmentDirector of Technology & Assessment

    Shaler Area School DistrictShaler Area School District

  • 8/8/2019 Cyber PowerPoint

    2/28

    CYBER BULLYING IS

    Being cruel to others by sending or posting harmful

    material using technological means;

    an individual or group that uses

    information and communication involving

    electronic technologies to facilitate

    deliberate and repeated harassment or

    threat to an individual or group.

    Also known as:

    ElectronicBullying &

    Online Social Cruelty

  • 8/8/2019 Cyber PowerPoint

    3/28

    CYBER BULLIES TECHNOLOGY

    E-mail

    Cell phones

    Pagertextmessages

    Instantmessaging

    Defamatory personal web sites

    Defamatoryonline personal pollingweb sites

    Chatrooms

  • 8/8/2019 Cyber PowerPoint

    4/28

    DIFFERENCESBULLYING

    DIRECT

    Occursonschool property

    Poorrelationshipswithteachers

    FearretributionPhysical: Hitting, Punching &Shoving

    Verbal: Teasing, Namecalling &GossipNonverbal: Useof gestures &Exclusion

    www.stopbullyingnow.hrsa.gov

    CYBERBULLYING

    ANONYMOUS

    Occursoffschoolproperty

    Goodrelationships withteachers

    Fearlossoftechnologyprivileges

    Furtherundertheradarthanbullying

    Emotionalreactionscannotbedetermined

    {McKenna & Bargh, 2004; Ybarra & Mitchell, 2004}

  • 8/8/2019 Cyber PowerPoint

    5/28

    CYBER BULLY CATEGORIES

    Inadvertent Role-play Responding Maynotrealizeitscyber

    bullying

    Vengeful Angel Righting wrongs Protecting themselves

    Mean Girls Bored; Entertainment Ego based; promoteown

    socialstatus Oftendoina group Intimidateonandoffline Needothersto bully; if

    isolated, stop

    Power-Hungry Wantreaction Controlling with fear

    Revenge of the Nerds(Subsetof Power-Hungry)

    Often Victimsofschool-yardbullies Throw cyber-weightaround Notschool-yard bullieslike

    Power-Hungry & Mean Girls

    {Parry Aftab. Esq., Executive Director, WiredSafety.org}

  • 8/8/2019 Cyber PowerPoint

    6/28

    CYBER BULLYING TYPES

    Flaming: Online fightsusing electronicmessages withangryand vulgarlanguage

    Harassment: Repeatedlysending offensive,rude, andinsulting messages

    Cyber stalking: Repeatedlysending messagesthatincludethreatsofharmorarehighlyintimidating. Engaging inotheron-lineactivitiesthatmakeapersonafraid forhisorherown

    safety

    Denigration:Dissingsomeoneonline.Sending orposting cruel gossiporrumorsaboutapersontodamagehisorherreputationorfriendships

  • 8/8/2019 Cyber PowerPoint

    7/28

    CYBER BULLYING TYPES

    Impersonation: Pretending to besomeoneelseandsending orposting materialonlinethatmakesthatpersonlook bad, getsthatpersonintroubleordanger, ordamagesthatpersonsreputationor friendships

    Outing and Trickery: Sharing someonessecretor embarrassing informationonline. Trickingsomeoneintorevealing secretsor embarrassinginformation whichisthensharedonline

    Exclusion: Intentionally excluding someonefromanon-line group, likea buddylist

    {Nancy Willard, M.S., J.D., Director of the Center for Safe andResponsible Internet Use}

  • 8/8/2019 Cyber PowerPoint

    8/28

    CYBER BULLYINGPREVALENCE

    Cyber bullying typically starts atabout 9 years of age and usuallyends after 14 years of age; after

    14, it becomes cyber or sexualharassment due to nature of actsand age of actors {Aftab}

    Affects 65-85% of kids in the coregroup directly or indirectlythrough close friends (Aftab)

  • 8/8/2019 Cyber PowerPoint

    9/28

    CYBER BULLYINGPREVALENCEAftabs statistics:

    90% ofmiddleschoolstudentstheypolledhadtheir feelingshurtonline

    65% oftheirstudents between 8-14 have beeninvolveddirectlyorindirectlyinacyber bullyingincidentasthecyber bully, victimor friend

    50% hadseenorheardofa website bashing ofanotherstudent

    75% had visiteda website bashing 40% hadtheirpasswordstolenandchanged bya

    bully(locking themoutoftheirownaccount)orsentcommunicationsposing asthem

    Problemsinstudies: notassessing the realthingi.e. Only 15% ofparentpolled knew whatcyberbullying was

  • 8/8/2019 Cyber PowerPoint

    10/28

    CYBER BULLYINGPREVALENCE

    In the 2003-04 school year, i-SAFE America surveyed studentsfrom across the country on a new topic: Cyber Bullying

    It is a topic that not many adults were talking about but one that is alltoo familiar with students.

    42% of kidshave been bullied whileonline. 1 in 4 havehadithappenmore

    thanonce.

    35% of kidshave beenthreatenedonline. Nearly 1 in 5 havehadithappenmorethanonce.

    21% of kidshavereceivedmeanorthreatening e-mailorothermessages.

    58% of kidsadmitsomeonehassaidmeanorhurtfulthingstothemonline.Morethan 4 outof 10 sayithashappenedmorethanonce.

    53% of kidsadmithaving saidsomething meanorhurtfultoanotherpersononline. Morethan 1 in 3 havedoneitmorethanonce.

    58% havenottoldtheirparentsoranadultaboutsomething meanorhurtfulthathappenedtothemonline.

    Basedon 2004 i-SAFE surveyof 1,500 students grades 4-8 http://www.isafe.org

  • 8/8/2019 Cyber PowerPoint

    11/28

    CYBER BULLYINGSTATISTICS

    *Taken from an i-SAFE America survey of students nationwide.

  • 8/8/2019 Cyber PowerPoint

    12/28

    CYBER BULLYINGLEGAL ISSUES

    Who May Be Involved:

    SchoolCounselor

    Principal

    Resource Officer

    Police

    Attorney(School or Private)

    Superintendent

    InternetService Provider

    General (Willard, 2005)

    School Limits:Schoolshavepoliciesagainst

    bullying

    Civil Law Limits:

    Cyber bullying mayalsomeetstandards for institutional

    torts(wrongdoings)

    Defamation

    Material that Constitutesan Invasion of Privacy

    (1stAmendment)

    Intentional Infliction ofEmotional Distress

  • 8/8/2019 Cyber PowerPoint

    13/28

    CYBER BULLYINGLEGAL ISSUES

    Criminal Law LimitsThe following kindsofspeechcanleadtoarrest&prosecution:

    Making threatsof violencetopeopleortheirproperty

    Engaging incoercion Making obsceneorharassing phonecalls Harassmentorstalking Hateor biascrimes Creating orsending sexually explicitimagesof

    teens Sexual exploitation Taking aphotoofsomeoneinplace where

    privacy expectedGeneral (Willard, 2005)

  • 8/8/2019 Cyber PowerPoint

    14/28

    CYBER BULLYINGLEGAL ISSUES

    Educators Guide To Cyber bullying:Addressing theHarmof On-lineSocialCruelty

    (NancyWillard, 2005)

    Law Enforcement should be contacted if

    educator becomes aware of:

    Deaththreatsorthreatsofother formsof violence

    toapersonorproperty

    Excessiveintimidationor extortion

    Threatsorintimidationthatinvolveany formof

    biasordiscrimination

    Any evidenceofsexual exploitation

  • 8/8/2019 Cyber PowerPoint

    15/28

    CYBER BULLYINGLEGAL ISSUES

    Offsite Internet Activities and Schools(Copyright 2005 Parry Aftab, Esq. All rights reserved)

    Conflicting decisions in regard to schools authority with respect tocases under state and federal jurisdictions

    School should seek legal consult often beyond regular schoolattorney (e.g., a constitutional or cyber-free speech lawyer)

    Within School Authority Guidelines: Clear-cut threats Clearly disruptive of school discipline encouraged to visit website; student accesses or works on

    website in school

    School owned website or school-sponsored project website Any proof of in-school impact (e.g., materials on grounds;

    psychosocial, behavioral or academic impact on others) Proof the students website or harassment has had impact on

    staff(e.g., quits, leave of absence, medical TX for emotional issues)-

    otherwise seek outside legal recourse

  • 8/8/2019 Cyber PowerPoint

    16/28

    CYBER BULLYINGLEGAL ISSUES

    What Everyone Needs to Know AboutCyber Bullying

    (Aftab)

    Manycasesofchildcyber bullying, likeadult

    counterpartsofcyber-harassment, notcriminal

    Law Enforcement needs to be aware of: Difference betweenannoying anddangerouscommunications

    How toinvestigateacybercrime

    How toobtaininformation froman ISP

  • 8/8/2019 Cyber PowerPoint

    17/28

    CURRENT ANTI-BULLYING PROGRAMS

    Traditional Program Concerns(Fleming, Towey, Limber, Gross, Rubin, Wright& Anderson, 2002)

    Zero Tolerance & 3 Strikes & OutNegativelyimpactson willingnesstoreportCastslargenet

    Bulliesneedpro-socialrolemodels

    Anger Management, Skill Building, Empathy Building, Self-EsteemEnhancement

    Groupmembersserveasrolemodels & reinforcersof bullying, anti-socialbehaviorBulliesdontneedself-esteem boosted

    MediationAppropriateincasesof equalpower, not bully & victimParallelspossibleindoing mediationindomestic violenceAppropriatemessageto bullies: Your behaviorisinappropriate, wontbetoleratedMessageto victim: Noonedeservesto be bulliedand were going totrytostopit

  • 8/8/2019 Cyber PowerPoint

    18/28

    CURRENT CYBER BULLYINGPROGRAMS & RESONSES

    (Aftab, PowerPointcommunication)

    PROGRAM OFFERINGS:

    Teenangels.org: trains teens & preteens to be part of solution

    WiredKids and WiredTeens programs for schools andcommunities

    Wiredsafety.org: one to one hotline and multiple resourcesVideos, Lesson Plans and Activities

    Parent and Community Programs

    Law enforcement training and briefings

    Local county level summits on cyber bullying

    Assistance on technological software & tools to help

  • 8/8/2019 Cyber PowerPoint

    19/28

    CURRENT CYBER BULLYINGPROGRAMS & RESPONSES

    What Everyone Needs to Know AboutCyber bullying (Aftab)

    Education of Children: Allactionshaveconsequences

    Cyber bullying hurts

    Theyare justbeing usedandmanipulated by

    cyber bully Cyber bullyandaccomplicesoften becomethe

    targetofcyber bullying themselves

    Careaboutothersandstandup for whatsright

  • 8/8/2019 Cyber PowerPoint

    20/28

    CURRENT CYBER BULLYINGPROGRAMS & RESPONSES

    Comprehensive Plan (Willard, 2005)Schools

    Policiesconcerning misuseoftechnology

    Evaluatehow staffisandcanmore effectively

    monitor InternetuseParents

    Discusscyber bullying

    Superviseandincrease effectivemonitoring ofInternetuse

    Sincemoreadultssupervise, morechildren willhideactivities, strategiesneededtochangesocialnormsintheseon-line works, empowerthe victim withknowledgehow toprevent& respond, & todiscourage bullies from engaging insuchactivities

  • 8/8/2019 Cyber PowerPoint

    21/28

    CURRENT CYBER BULLYINGPROGRAMS & RESPONSES

    Schools should:

    Focuson valuesof kindnessandrespectfulhumanrelations

    Enhancementof empathicawareness

    Develop effectiveproblemsolvingskills

    Empowermentof bystanders

  • 8/8/2019 Cyber PowerPoint

    22/28

    CURRENT CYBER BULLYINGASSESSMENT

    (Willard, 2005)

    Specific Step Wise Plan:1 Engageinparticipatoryplanning {IntegrateintoSafeSchools. DistrictTechnology Awareness; Non-school Participants}

    2 Conductneedsassessment {AssessmentavailableatCenter forSafe& Responsible InternetUse}

    3 Ensurethatan effectiveanti--bullying programinplace{corenotauthoritarian values; predictive empathy; peernorms vs. bullying; peerinterventionskills, effectiveadministrativeresponses}

    4 Review policies & Procedures {Monitoring, reportbox, internet&othertechnologicalpp}

    5 ConductProfessional Development {keyindividualsophisticatedin

    thearea; alladministrators, librarians, counselorsandtechnologyeducators basicunderstanding; allotherstaffalertedto existence, howtodetect}

    6 Provide ParentEducation {prevention, detection & interventionstrategies; alertchildtopotentialconsequencesofschooldiscipline, lossof familyaccount, civillitigation, criminalprosecution}

    7 Evaluate{prevention & interventionprograms}

  • 8/8/2019 Cyber PowerPoint

    23/28

    CURRENT CYBER BULLYINGPROGRAMS & RESPONSES

    Intervention Strategies for Cyber bullying Directed at Student1-Savethe evidence2-Conductathreatassessment{ifcyber bullying posessubstantialdisruption, violenceorsuicideconcerns; contactlaw enforcementifthreatsof violence}3-Assesssresponseoptions{directschoolnexusmay warrantschooldisciplinaryaction; ifoffcampusandnotsubstantialthreat,

    nodisciplinaryaction buthelp victim}4-Identifythe Perpetrators{technicalassistance; assess validityofpersonsidentity; offertechnicalassistancetoparents}5-Supprtthe victim{evenifnodisciplinaryaction, offersupportandassistanceto victimandparents; offercounseling mediation,technicalassistance; directtocommunityresources}6-Provide guidanceonhow toremovethespeech

    7-Seek touseinformalresolutionstrategies{contactperpetratorparents, offerassistance, suggestlegalconsultation; offercounseling, mediationinschool; recognizethecyber bullyisahurtkidandtrytohelp both victimandperpetrator

    Intervention Strategies for Cyber bullying Directed at Staff1- AssessTypeofSpeech2- Takeaction basedonassessment

  • 8/8/2019 Cyber PowerPoint

    24/28

    CURRENT CYBERBULLYING ASSESSMENT

    WhatEveryone NeedstoKnow AboutCyber bullying(Aftab)

    Assessment to differentiate between rudecommunications and cyber bullying:

    1- KindofThreats

    2- FrequencyofThreat

    3- SourceofThreats

    4- NatureoftheThreats

    Themore frequent, the greaterthethreat, thementionofmoredangerousmethods & theinvolvementofthirdpartiestendstoincreasetheseriousnessofthethreat

    Knowing thecyber bullymayincreaseordecreasethethreat

  • 8/8/2019 Cyber PowerPoint

    25/28

    ASSESSMENT TREE{PEASPROGRAM}

    Assessment

    Cyber Bully Incident Report

    Completereport& collectevidence

    DomainsFamilySchoolSocial

    MultipleFactorsRisk vs.

    Resiliency

    InformantsParents

    TeachersStudents

    Administrators

    MethodsInterview

    CollateralinfoAssess. Forms

    Standardized Instr.(SAVRY)

    Dispositions

    Contacts

    ParentsAdministration

    Police

    Disciplinary

    DetentionSuspensionExpulsionArrest

    Therapeutic

    PEAS ProgramFamilySupportCtr.OutsideCounseling

    ResidentialTreatment

    OngoingPrevention

  • 8/8/2019 Cyber PowerPoint

    26/28

    WHAT IS AN ACCEPTABLEUSE POLICY (AUP)?

    "An AUP isa writtenagreement, signed bystudents,theirparents, andteachers, outlining thetermsandconditionsof Internetuse. Itspecificallysetsoutacceptableuses, rulesofon- line behavior, andaccessprivileges. Alsocoveredarepenalties for violationsofthepolicy, including security violationsand vandalismofthesystem. Anyoneusing aschool's Internetconnectionshould berequiredtosignan AUP, and

    know thatitwill be kepton fileasalegal,binding document."(Classroom Connect, December1994-January, 1995 issue).

  • 8/8/2019 Cyber PowerPoint

    27/28

    RELATED TO SCHOOLSSPEAR OF INFLUENCE

    Responsibility

    Usersshould beinformedthattheycould beheldresponsible forthecontentofall

    communicationstheystoreorsendusing emailorthe Internet. All emailshould beidentifiedwithanameor emailaddress; usersshouldnotattempttohidetheiridentityorplacesomeone

    else'sidentityinorganizationcommunications(spoofing).

  • 8/8/2019 Cyber PowerPoint

    28/28

    AUPS DESIGNEDTO DO THE FOLLOWING

    EDUCATE STUDENTS/PARENTS AND STAFF ABOUT:

    RISKS PECULIAR TO COMPUTER COMMUNICATIONS.

    RULESFOR EFFICIENT, ETHICAL, LEGALCOMPUTER/NETWORKUSE.

    SAFE AND APPROPRIATE COMPUTER SOCIAL BEHAVIOR

    USE OF AVAILABLE AND UNAVAILABLE SOURCES

    PRESERVE DIGITAL MATERIALSCREATED BYSTUDENTSAND TEACHERS

    PROTECT VULNERABLE CHILDREN FROMINAPPROPRIATE APPROACHES