take a stand against cyber-bullying information, tips and tools for keeping kids safe on-line
TRANSCRIPT
Take a Stand Against Cyber-Bullying
Information, Tips and Tools for Keeping Kids Safe On-line
Instructor
Dr. Michelle Bennett
Serving as the police chief for the City of Maple Valley
Ed.D, Seattle Pacific University
M.S. Central Washington University
Take a Stand Against Cyber-BullyingCourse Outline
1 - The Prevalence of Virtual Life
2 - Definition, Methods and Examples of Cyber-bullying
3 - The Permanent Internet
4 - Who are Cyber-bullies and why do they do it?
5 - Effects of Cyber-bullying on the Target
6 - Cyber-Bullying and Criminal Behavior
7 - How to Protect Kids against Cyber-bullying
8 - Questions?
The Prevalence of Virtual Life
Questions…
Do you have teenagers at home?
Do you have Internet access at home?
If you are a teacher, do your students have Internet access at school?
94%Youth with Internet Access at Home
90%Youth who use the Internet at School
Media Awareness Network (MNET), Cyberbullying, 2006), JJDP, 2005
The prevalence of virtual lifeA recent study showed:
Where do teens go on-line?
(OJJDP, 2005) (Pew Internet and American Life Project)
Where do teens go on-line?
79%Youth who talk to people they know in person online.
34%Youth who talk to people they know ONLY online.
Cyber-bullying
What is school bullying?
“An intentional written, verbal, or physical act
against a student which is motivated by the
bully’s perception of that student’s race,
color, or creed, gender, sexual orientation, or
other distinguishing characteristics… “
What is school bullying?
(Senate Bill 5528)
When the intentional act physically harms a student or damages his/her property; substantially interfereswith the student’s education; is so severe, persistent or pervasive that it creates an intimidating or threatening educational environment; or substantially disrupts the orderly operation of a school.”
Why is the issue of school bullying so important?
A Secret Service study found that two-thirds of school shooters said they felt “persecuted, bullied, threatened, attacked or injured.” National Threat Assessment Center and Secret Service
A National Education Association study found that more than 160,000 kids do not go to school each day because they fear being bullied. National Education Association & National Association of School Psychologists
A study conducted by CNN showed that 4 out of 5 middle school students had engaged in bullying behavior in the last 30 days.
What is cyber-bullying?
instant messaging, defamatory personal Web-sites, and defamatory on-line personal polling Web-sites, to support deliberate, repeated and hostile behavior by an individual or group that is intended to harm others.
Bill Belsey, (Anderson and Sturm, 2007)
instant messaging, defamatory personal Web-sites, and defamatory on-line personal polling Web-sites, to support deliberate, repeated and hostile behavior by an individual or group that is intended to harm others.
Bill Belsey, (Anderson and Sturm, 2007)
Cyber-bullying involves the use of information and communication technologies such as e-mail, cell phone and pager text messages,
Cyber-bullying involves the use of information and communication technologies such as e-mail, cell phone and pager text messages,
Cyber-bullying is easy? Used to be bigger kids picked on smaller
kids, now anyone can pick on anyone… It’s anonymous, so it is easier to hide-
That hiding does not let the bully know how much stress they are causing
Bullies think they do not have to own up to their actions
Because they think they are hard to find, bullies think they won’t be punished.
It takes less energy and courage to be hurtful on-line using a keyboard than using one’s own voice for an in-person attack.
Cyber-bullying is particularly cowardly… Most often, what is said on-line would never be said
in person. (Wikipedia, 2007)
How often does cyber-bullying happen?
Cyber-bullying is wide-reaching… …anyone can participate.
A National i-SAFE survey found half of students who use the Internet are being harassed on-line.
One in four kids had been bullied via their cell phones.
www.cyberbullying.ca: Britain
58% of students have not told their parents or another adult about someone being mean or hurtful to them online. I-safe
How often do youth cyber-bully?
Cyber-bullying Methods
Types of cyber-bullying
There are 2 types of cyber-bullying: Direct attacks and Indirect
attacksDirect attacks Messages sent to youth directly:
• Instant Messaging / E-mail• Blogs or Message Boards• Text Messaging/Pictures• Social Networking Sites
Direct attacks Messages sent to youth directly:
• Instant Messaging / E-mail• Blogs or Message Boards• Text Messaging/Pictures• Social Networking Sites
Instant messaging (IM) Teens can be bullied when they have
instant messaging conversations with friends or “buddies” in real time. These social websites provide fertile ground for
this behavior: instant communication in e-mail style
Students are bullied by their friends or peers who post with anonymous screen names
Buddies can also insert derogatory or slanderous remarks for anyone to read, or create false personal profiles that insult or ridicule the victim.
Youth can also block other youth, or refuse to add them as buddies, manipulating peer relationships by socially excluding other students. (Anderson and Sturm, 2007)
Web-logs (Blogs)
Blogs are on-line journals where readers can comment about others’ entries.
Users can: Bash victims Post entries as an anonymous guest Post mean comments about a victim’s personal
beliefs Take comments from the blog out of context
and post them on the bully’s own blog, Web-site, or message board
(Anderson and Sturm, 2007)
Cell phone pictures orText-messaging
Cell-phone cyber-bullying occurs when students use cell phones to:
Send text messages in order to bully, intimidate or harass another person
1.2 TrillionThe approximate annual number of text and
visual messages sent over the Internet. Bill Belsey: Cyber bullying.ca
Cell phone pictures orText-messaging
Send photos to deliberately try to scare, upset, threaten, embarrass, humiliate or abuse another person
10% of teens have reported being victimized because someone posted unflattering pictures of them on-line, without permission (NCPC, 2007)
Spread gossip or rumors about a person to other students
Social Networking Sites
Facebook / MySpace, etc. There are more than 750 million active
users on Facebook, nearly 500 million users of YouTube and approximately 200 million users of Twitter.
Social networking now accounts for 22% of total time spent on the internet (www.nw3c.org).
If Facebook were a country, it’d be the world’s third largest. (www.socialnomics.net).
Types of cyber-bullyingIndirect attacksCyber-bullying through indirect
means Hacking into someone else’s
cyber-property (using someone else’s password or information) To gain personal
information To alter the person’s
‘cyber-property’
Types of cyber-bullying
Indirect attacks
Cyber-bullying through indirect means Pretending to be someone else electronically
Using someone else’s electronic tools to cyber-bully others
Enlisting friends to join in
Cyber-bullying examples
In a Manhattan High School, several boys created a website dedicated to spreading sexual gossip about female classmates.
In Allentown, NJ students started a Web site that named the 20 most hated students in their school.
In Dallas, students created a Web-site dedicated to attacking a teen with Multiple Sclerosis.
A Washington high school counselor said that pictures of a 17-year-old female student had been circulated by students using cell phones. The pictures reportedly were taken by the girl’s 20-year old boyfriend.
Another Danger… The Permanent Internet
What could happen?
A 16-year-old boy in Jefferson, Colorado was arrested after police say he showed pictures of himself on his MySpace page holding handguns. Police subsequently found the same weapons in his home.
The boy has been charged with three misdemeanors for being a juvenile in possession of handguns.
Kornblum & Marklein, 2006
What could happen?
In a school in Wisconsin, two 9th grade boys created an Internet “hit-list” with 60 names of students. Four days later, school administrators
solved the case.
Both boys were arrested by local police for disorderly conduct and expelled for the year.
(Blair, 2003)
The solution?
Rather than trying to get those Web-sites to delete the offending photos and text (and many sites are still in the Internet Archive even after they've been taken down), be your own spin doctor.
"The secret to burying unflattering Web details about yourself is to create a preferred version of the facts on a home page or a blog of your own, then devise a strategy to get high-ranking Web sites to link to you.“
Times reports
10-Minute Break!
Is someone you know a Cyber-bully?
Ask teens or students, have you ever…
Signed on using someone else’s screen name so you could gather information?
Impersonated someone else over e-mail, IM, or on a blog?
Forwarded a private conversation or e-mail without permission from the other person?
Posted a picture or information about someone on a Web-site without that person’s consent?
Stopcyberbullying.org
Ask teens or students, have you ever…
Used someone else’s password for any reason without their permission?
Insulted someone in an interactive game room?
Posted rude things or lies about someone on-line?
Voted at an on-line bashing poll or posted to a guest-book saying rude things?
Stopcyberbullying.org
The cyber-bully
Who cyber-bullies?
Why do teens cyber-bully? For “fun” or “laughs” or
entertainment Bored, too much time on hands Many technical toys available with no
restrictions Power hungry, do it to torment others
and stoke their own ego Feel they can “Get away with it”
Stopcyberbullying.org
Why do teens cyber-bully?
Anger, revenge or frustration Less popular kids may start out
defending themselves only to find they now enjoy being the bully
Mean girls do it to bolster or remind people of their social status
Stopcyberbullying.org
Effects of Cyber-bullying on the Target
Effects of cyber-bullying
90% of those bullied reported psychological consequences, including:
A drop in grades Increased anxiety Loss of friends
How cyber-bullying affected the victim 30% said they were extremely upset
24% said they were extremely frightened
22% said they were extremely embarrassed
34% had one or more symptoms of stress: stayed away from the Internet or part of it; were unable to stop thinking about the incident; felt jumpy or irritable; lost interest in things
OJJDP, 2005
Results of cyber-bullying
VIOLENCE The Secret Service completed a study on school violence and found that bullying and tormenting were a factor in 37 school violence incidents. (Labi, 2005)
Violence: It’s not always homicide
SUICIDE
It’s the third leading cause of death among persons 10 to 24 years old
US. Centers for Disease Control and Prevention (CDC).
500,000 teens attempt suicide every year
5,000 succeed
Megan Meier; Tyler Clementi
Cyber-bullying and Criminal Behavior
Crimes at school What happens at home, can it affect
you at school? Legal experts agree that schools are on
solid ground to discipline students when: A clear link can be shown between the
cyber-bullying and what is occurring at school
Examples:
A student takes a picture or video of a youth in a school locker room and posts it online
A student uses school computers to send harassing or derogatory e-mail
Reporting cyber-bullyingto the police
Some bullying behaviors can be categorized as criminal activity.
In many states, the following behaviors are actually crimes punishable by fines and/or jail time: Threats (to person or property) Harassment Extortion
Can the police help in acyber-bullying incident?
If someone feels threatened and fears for their personal safety and/or damage to their property, the police can: Order cell phone or text msg.
records Confiscate hard-drives Criminally charge suspects (if
appropriate)
Cyber-Stalking Cyberstalking.
(1) A person is guilty of cyberstalking if he or she, with intent to harass, intimidate, torment, or embarrass any other person, and under circumstances not constituting telephone harassment, makes an electronic communication to such other person or a third party: (a) Using any lewd, lascivious, indecent, or obscene words, images, or language, or suggesting the commission of any lewd or lascivious act; (b) Anonymously or repeatedly whether or not conversation occurs; or (c) Threatening to inflict injury on the person or property of the person called or any member of his or her family or household. RCW 9.61.260
Cyber-Stalking
(2) Cyberstalking is a gross misdemeanor, except as provided in subsection (3) of this section.
Cyber-Stalking
(3) Cyberstalking is a class C felony if either of the following applies: (a) The perpetrator has previously been convicted of the crime of harassment, as defined in RCW 9A.46.060, with the same victim or a member of the victim's family or household or any person specifically named in a no-contact order or no-harassment order in this or any other state; or (b) The perpetrator engages in the behavior prohibited under subsection (1)(c) of this section by threatening to kill the person threatened or any other person.
Cyber-Stalking
(4) Any offense committed under this section may be deemed to have been committed either at the place from which the communication was made or at the place where the communication was received.
(5) For purposes of this section, "electronic communication" means the transmission of information by wire, radio, optical cable, electromagnetic, or other similar means. "Electronic communication" includes, but is not limited to, electronic mail, internet-based communications, pager service, and electronic text messaging. [2004 c 94 § 1.]
Computer Trespass 1
Computer trespass in the first degree. (1) A person is guilty of computer trespass in
the first degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another; and
(a) The access is made with the intent to commit another crime; or
(b) The violation involves a computer or database maintained by a government agency.
(2) Computer trespass in the first degree is a class C felony.
RCW 9A.52.110; [1984 c 273 § 1.]
Computer Trespass 2
Computer trespass in the second degree. (1) A person is guilty of computer trespass in
the second degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another under circumstances not constituting the offense in the first degree.
(2) Computer trespass in the second degree is a gross misdemeanor.
RCW 9A.52.120; [1984 c 273 § 2.]
Examples/Questions about Cyberbullying
“If I am angry and I write an e-mail, post, or text-message to someone saying that I want to punch them in the face, is that a crime?
“If I am angry at someone because of something they sent me in a text message from their I-phone, and I write an e-mail, post, or text-message to them saying I want to take their I-phone and smash it on the ground, is that a crime?”
Examples/Questions about Cyberbullying
“If I use someone else’s computer and then post messages from that computer that contains mean sexual comments or pictures regarding that person, is that a crime?”
“If I use someone else’s password to get onto their on-line social networking site, and then post or alter that site to include mean sexual comments or pictures regarding that person, is that a crime?”
How can you Protect Kids from Cyber-Bullying?
Protecting against Cyber-bullying One advantage the Internet is that
you can advise youth to simply not log on or avoid a certain chat room or Web-site
If compromised, youth can change their e-mail address/password and only give it out to close friends and family (or change their identity in chat rooms)
(Borucki, 2006)
Protecting against Cyber-bullying Advise youth to be private, keep their
pictures passwords, and all secrets to themselves.
Tell them to take a minute… Instead of instantly replying to an
upsetting message, advise them to walk away and do something they enjoy for a few minutes.
(Borucki, 2006)
Protecting against Cyber-bullying
Stop, block and tell Tell them to stop before they reply, block
unwanted senders, and to tell someone they trust about what kind of messages they are receiving.
Save the evidence of the cyber-bullying Keep messages on the computer or use
some type of monitoring software. Track the time and date of all unwanted
messages on a computer or cell phone. (Borucki, 2006)
Protecting against Cyber-bullying Advise youth to:
Never discuss their own or someone else’s intimate details or reputation-damaging information by electronic means
Not retaliate: This only gives the bully a “Win” and makes the youth part of the problem
File a complaint with the site, ISP, or cell phone company
(Willard, 2006)
Protecting against Cyber-bullying
Advise youth to: Tell a parent, teacher or a trusted adult
about what is happening who have the option of communicating with the parents of the aggressor
Seek assistance from school officials Contact an attorney Contact law enforcement
(Willard, 2006)
Teachers and school staff play an important role in stamping out cyber-bullying.
Educators can infuse anti-bullying and violence prevention into the curriculum: Use group activities or assignments that
require sharing or collaboration Praise students for acts of kindness and
respect Choose stories and books to share that have an
anti-bullying theme Warn students that all computer activity is
traceable Teach each students to print all unwanted
messages received on a computer
Teaching kids about the “Golden Rule”
Teach youth 5 things to think about before posting: Is this respectful or kind to others? How would I feel if someone did this to me or
my best friend? Am I violating any laws, rules or personal
agreements? What would happen if everyone did what I am
about to do? How would this reflect on me if what I am
about to write was posted on the front page of a newspaper naming me as the author?
Take a Stand TODAY Against Cyber-bullying
Questions?
TOGETHER
EVERYONE
ACHIEVES
MORE!!!
References Albanese, L. (2007). Senator says cyberbullying of children is on the rise. Retrieved
November 8, 2007 from Newsday.com. Alexandra Blair, E. (n.d.) Girls are main target of ‘cyberbullies’. Times, The (United
Kingdom), Retrieved July 30, 2007 from Newspaper Source database. Anderson, T. & Sturm, B. (2007, Winter). Cyberbullying: From Playground to
Computer. Young Adult Library Services, 5(2)24-27. Retrieved July 31, 207, from Academic Search Premier database.
Anti-Defamation League ADF (2007). Children at Risk Online: Problems and Solutions. Annual Meeting. Retrieved November 8, 2007, from www.adl.org/NR/exeres
Baird, L. (2004). Tormented by text. Sunday Times, The, Retrieved July 30, 2007 from Newspaper Source database.
Blair, J. (2003, February 5). New Breed of Bullies Torment Their Peers on the Internet. Education Week, 22(21), 6-6. Retrieved July 30, 2007, from Academic Search Premier database
Bluestein, G. (2007). Teen girls’ suicide rate jumped by 76%, CDC says. Sunday Times, The, Retrieved September 6, 2007 from seattletimes.com
Borucki, M. (2006, September 26). Controlling those mean messages. Chicago Tribune (IL), Retrieved July 30, 2007 from Newspaper Source database.
References Clark, L. (2006, July 26). Parents Could be Fined $1000 over Class
‘Cyberbullies’, Daily Mail, Retrieved July 30, 2007, from Newspaper Source database.
Clark, L. (2007, May 22). Cyberbullies ‘target 20 teachers a day’. Daily Mail, Retrieved July 30, 2007, from Newspaper Source database.
Cyberbullying: Understanding and Preventing Online Harassment and Bullying. (2006). School Libraries in Canada, Retrieved July 31, 2007, from Academic Search Premier database.
Cyberbullying. (2007, June). State Legislatures, Retrieved July 31, 2007 from Academic Search Premier database.
Cyberbullying.us (2007) Anecdotes…identifying the causes and consequences of on-line harassment. Retrieved November 8, 2007 from cyberbullying.us
Cyberbullies. (2004, October). Pediatrics, Retrieved July 30, 2007, from Academic Search Premier database.
References Elena Baca, M. (2007, February 2) Cyberbullies face few consequences. Star Tribune
(Minneapolis, MN), Retrieved July 30, 2007 from Newspaper Source database. Florida Atlantic University (2007). Hinduga, S. & Patchin, J. FAU Professor Investigates
Cyberbullying. Press release from Boca Raton, FL *May 15, 2006). Retrieved online July 30, 2007 from cyberbullying.us
Franek, M. (2004, May 10) Rise of the cyberbully demands new rules. Christian Science Monitor, 96(115), 9. Retrieved July 30, 2007, from Academic Search Premier database.
Harmon, A. (2004, November 15). Cyberbullies. New York Times Upfront. 137(5), 20-21. Retrieved July 30, 2007 from MAS Ultra—Public Library Edition database.
Hinduja, S., Patchin, J. & Burgess-Proctor, A. (2007) Cyberbullying: Parent/Teenager ”Scripts” to promote dialogue and discussion. Retrieved July 30, 2007 from cyberbullying.us
Holohan, C. (2007, April 6). Cleaning Messy Message Boards. Business Week Online, Retrieved July 31, 2007, from Academic Search Premier database.
Kornblum, J., Marklein, M. & Brady, E. (2006, March 8) What you say online could haunt you. USA TODAY. Retrieved November 25, 2007 from http://www.usatoday.com/tech/news/internetprivacy/2006-03-08-facebook-myspace_x.htm
References Lehman, P. & Lowry, T. (2007, April 23). The Marshal of MySpace. Business Week,
Retrieved July 30, 2007, from Academic Search Premier database. Leonor, Garza, C. (2006,October 1). Technology sparks a new generation: PLUGGED
IN FOR LEARNING. Houston Chronicle (TX), Retrieved July 30, 2007, from Newspaper Source database.
Lewis, L. (n.d.). Chat room bullies face end to their internet anonymity. Times, The (United Kingdom), Retrieved July 30, 2007 from the Newspaper Source database.
Li, Qing (2006, May). Cyberbullying in School: A Research of Gender Differences. School Psychology International, 27(2), 157-170. Retrieved July 30, 2007, from Academic Search Premier database.
Moody, J. (2007). Lebanon board argues over blog. Retrieved November 8, 2007 from the Albany Democrat-herald.
MSNBC (2007). Mom: Girl killed herself over online hoax. Teen distraught are end of MySpace relationship; neighbor family created ID. Retrieved on November 17, 2007 from http://www.msnbc.msn.cm/id/21844203/print/1/displaymode/1098/
National Crime Prevention Council, NCPC (2007). Stop cyberbullying before it starts. Retrieved November 8, 2007 from NCPC.org
Net Family News (2005, June 17). Kids, their own best spin doctor. Retrieve November 24, 2007 from http://www.netfamilynews.org/nl050617.html#4
Orsini-Meinhard, K. (2007) Back to School Cellphone Dilemma. Seattle Times, The, September 4, 2007.
References Picker, K. (2006, March). The new danger online. Good
Housekeeping, 242 (3), 112-116. Retrieved July 31, 2007, from Academic Search Premier database.
Pupils not the only victim of cyberbullies, say NAS/UWT. (2006, July 28). Education (14637073), Retrieved July 30, 2007, from Academic Search Premier database.
Reilly, R. (2007, March 26). Majoring in Cyberheckling. Sports Illustrated, 106(13), 142-142. Retrieved July 31, 2007 from Academic Search Premier database.
Russell, E. (2005, September 28). Expert in Bangor addresses issue of cyberbullying. Bangor Daily News (ME), Retrieved July 30, 2007, from Newspaper Source database.
Seattle Times, By The Associated Press (2007, November 6). Police investigation cellphone porn at Montesano High. Retrieved November 6, 2007, from http://seattletimes.nwsource
References Smith, F. (2006). Going after Cyberbullies. Prevention, 58(9), 143-
144. Retrieved July 30, 2007, from Academic Search Premier database.
Snider, M. & Borel, K. (2004, May 24). Stalked by a Cyberbully. Maclean;s, 117 (21/22), 76-77. Retrieved July 30, 2007, from Academic Search Premier database.
Strom, P., and Strom, R. (2005, December). WHEN TEENS TURN CYBERBULLIES. Education Digest, 71(4), 35-41. Retrieved July 30, 2007, from Academic Search Premier database.
StopCyberbullying.org (2007). WiredKids, Inc. Retrieved November 8. 2007 from www.stopcyberbullying.org
Stover, D. (2006, December). Treating Cyberbullying as a School Violence. Education Digest, 72,(4), 40-42. Retrieved July 31, 2007 from Academic Search Premier database.
Sturgeon, J. (2006, September). Bullies in Cyberspace. District Administration, 42,(9), 43-47. Retrieved July 31, 2007, from Academic Search Premier database.
References Tackling the cyberbullies – Jim Knight. (2006, July 25).
M2PressWIRE, Retrieved July 30, 2007, from Newspaper Source database.
Tseng, N. (2006, August 9). Districts grapple with Web bullying: Schoolyard harassment goes high-tech, with insults hurled online and in text messages. Orlando Sentinel, The (FL), Retrieved July 30, 2007 from Newspaper Source database.
Varadi, M. (n.d.). Think twice before you hit ‘send’. Toronto Star (Canada), Retrieved July 30, 2007 from Newspaper Source database.
Web of Lies. (2007, February 23). Know Your World Extra, Retrieved July 30, 2007, from Primary Search database.
Yankelovich Youth Survey (2005).
References Willard, N. (2006, April 1). Flame Retardant: Cyberbullies Torment
Their Victims 24/7: Here’s How to Stop the Abuse. School Library Journal, 52(4), (ERIC Document Reproduction Service No. EJ755113). Retrieved July 30, 2007, from the ERIC database.
Willard, N. (2007). Cyber-safe Kids, Cyber-Savvy Teens, Cyber-Secure Schools. Center for Safe and Responsible Use of the Internet. Retrieved July 30, 2007 from cyberbully.org
Wolak, J., Mitchell, K. & Finkelhor, D. (2006). Online Victimization of Youth, 5 Years Later. Office of Juvenile Justice and Delinquency Prevention, Crimes against Children Research Center & National Center for Missing and Exploited Children. Durham, NH : University of New Hampshire,
Wolfsberg, J. (2006, October). Student Safety from Cyberbullies, In Chat Rooms, and in Instant Messaging. Education Digest, 72(2), 33-37. Retrieved July 30, 2007, from Academic Search Premier database.