1 / 22

Cyberbullying

Cyberbullying. 21 st Century Harassment. The Changing Face of Bullying. Physical strength or size is no longer a factor Online – anyone can be a victim or a bully There is often a ‘mob’ or ‘faceless’ mentality We, as educators, can often be the victims. Bullying is Easier Online.

neva
Télécharger la présentation

Cyberbullying

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbullying 21st Century Harassment

  2. The Changing Face of Bullying • Physical strength or size is no longer a factor • Online – anyone can be a victim or a bully • There is often a ‘mob’ or ‘faceless’ mentality • We, as educators, can often be the victims

  3. Bullying is Easier Online • Internet offers a sense of protection • Free from cultural norms and adult supervision • Observers and contributors are unlimited • The majority of teens use the internet daily

  4. Who is a Cyberbully? • Cyberbullies say: • They don’t like the other person(s) • They have been cyberbullied first • They were upset by the other person • They have friends who engage in Cyberbullying • They do it because it is fun

  5. Why Isn’t Cyberbullying Reported? • It is the student’s problem and not the school’s • The school staff can’t stop the bullying anyway • Their friends could get into trouble • Their parents would restrict access to the Internet or other technology • Other students will think they are ‘rats’ • The bullying will get worse

  6. Legal Consequences • Schools have a legal duty of care • The School Act says that Boards of Education have authority when conduct has an impact or connection on the school environment • Harassing conduct includes repeated communication with a person • Threatening Conduct occurs when someone utters, or causes another person to receive a threat to cause ‘death or bodily harm’ or a threat to damage property

  7. Human Rights • We must maintain a discrimination-free learning environment for students & staff • Prohibited grounds include: -race, colour, ancestry, religion, family status, marital status, place of origin, physical or mental disability, gender, sexual orientation.

  8. Communicating With Parents • Most parents don’t fully supervise teens when the teens are on the internet • We need to educate the parents • We need to tell parents to communicate with their children and support them • Save all examples (MSN, nexopia, emails etc) that show bullying

  9. Tips for Parents • If your child is being victimized: - Support your children; tell them that they have done the right thing in telling you -Use “Block”, “Ban”, or “Ignore” feature on Instant Messaging -Print out he messages or the websites -Inform the school -Inform the police, if necessary -Inform the internet service provider

  10. Tips for Parents • If you find out your child is a ‘cyberbully’: -Take it seriously -Print out any communication -Find out who else was involved -Inform the school -Talk to your child and help him/her understand why the behaviour is wrong

  11. If Your Child is a Cyberbully: • Talk to your child and help him/her understand why the behaviour is wrong -His/Her actions may have caused serious harm to another person • Ask -“How would you feel if this ended up on the front page of the newspaper?” ”What if everyone did this?” ”How do you think it makes the other person feel?” ”How does this make you feel inside?”

  12. If Your Child is a Cyberbully: • Support him/her, and help him/her through whatever restitution needs to occur • Promote he/she doing the right thing

  13. For Students • When you are accessing the Internet, remember the following guidelines: -Always keep your password private. -Always keep your personal information to yourself and off the Internet -Always check first with your parents before entering a chat room. Remember that people on the Internet are not always who they say they are -- Always ignore emails and instant messages when you are unsure of the sender.

  14. For Students • Always treat other people the way that you would like to be treated • Always check first with your parents before signing up for anything on the Internet • Always talk with your parents about what you are doing online and to whom you are speaking • Always trust your instincts. If something does not seem right or makes you feel uncomfortable, speak to a trusted adult • Always turn off the computer if someone harasses, threatens or makes you feel uncomfortable in any way

  15. Online Safety - Direct Protective Factors • Use anti-virus software and firewalls • Keep all software up to date • Review sites your teen visits and ensure online diaries/profiles do not contain identifying personal information • Reinforce the public nature of the Internet • Inform your adolescent that once a picture or information is sent, he/she loses control of what happens to it, so be mindful of what is sent. • Inform your adolescent that pictures can be captured (freezing photos, recording video) by others without knowing, so to be mindful of how the webcam is used. Disconnect the webcam when not in use.

  16. Indirect Protective Measures – Positive Identity Formation • Be emotionally available for your adolescent • Pay attention to how your adolescent is feeling. Acknowledge their feelings. Encourage him/her to talk to you whenever needed. • Needs Feelings of accomplishment • Needs to understand the importance of morality • Needs to feel a sense of belonging • Your adolescent needs to feel love from the family

  17. What Behaviours Might Signal a Problem? • It is important to pay attention to any behaviours that become excessive and interfere with the teen’s life. • The teen is acting very differently – more withdrawn, emotional, defensive, aggressive, angry, or secretive? • The teen has significantly increased time spent online • The teen does not respond to limits • Online activities are interfering with life

  18. Steps Parents Can Take • Step 1 - Increase your involvement. • Step 2 - Increase supervision and directly monitor online activities and phone calls. • Step 3 - Enforce limits on Internet use (depending on the level of risk, you may consider taking away Internet privileges for a limited time.) • Step 4 - Build your relationship with your adolescent.

  19. Email Protection Tips • Email Protection Tips • By "Forwarding" emails which contain many email addresses, you jeopardize the computers of the people to whom you forward these emails. There are three main issues in emails: • VIRUSES: This can be how viruses get onto people's computer and can hide in email addresses. Sometimes there are viruses hidden in the code of an email and you don't even know you are forwarding them. • SPAM: By forwarding on to multiple addresses (using the 'To' address) you can potentially put everyone's email on MASS mailing lists... (better to use 'BCC', blind carbon copy, if sending an email to a bunch of people) • PRIVACY: Also, by using the To address, you expose the email addresses of everyone in your list, PLUS everyone's address within the message that you didn't delete, and just forwarded. • It is better and safer if you receive an email that you think is funny or nice to share to COPY & PASTE the words or pictures into a new email; or at the very least FORWARD the message WITHOUT the email addresses

  20. Posters One Web cam, countless Peeping Toms. Who’s watching Your Kids?

  21. Posters “I shouldn’t have sent it. He promised he wouldn’t show anyone.”

  22. Websites • www.kidsintheknow.ca • www.wiredsafety.org • www.webaware.ca • www.cybertip.ca

More Related