240 likes | 405 Views
CyberBullying. A Professional Development Initiative Created by Marianne Hart. An Introduction. Targeted Audience District Administrators Program Directors Media Specialists Instructional Specialists. Three Phase PD Initiative.
E N D
CyberBullying A Professional Development Initiative Created by Marianne Hart GCSD January 2007
An Introduction • Targeted Audience • District Administrators • Program Directors • Media Specialists • Instructional Specialists
Three Phase PD Initiative • Phase 1 will educate and train staff to identify cyberbullying. • Phase 2 will introduce parents and care givers to the program. • Phase 3 will teach students to recognize and report bullying
The ABC’s CyberBullying • A new and growing form of bullying. • Bullying is any kind of harassment, or intimidation. • CyberBullying is the online equivalent of bullying, and can be email, cell phone and pager text messaging, instant messaging, defamatory personal Web sites and defamatory online personal polling.
Why is it different from old-fashioned bullying? • The bully is removed from victim. • They don't "see" the harm they have caused or the consequences of their actions • This minimizes any remorse or empathy • Kids do and say things on the Internet that they would be much less likely to do in person.
Occurs on school property Physical: Hitting, Punching & Shoving Verbal: Teasing, Name calling & Gossip Nonverbal: Use of gestures & Exclusion Occurs off school property Direct Acts - Sending messages of hate, gossip or cruel messages CyberBullying by Proxy –Getting someone else to do the bullying Bullying CyberBullying
Why Does It Happen? • Cyberbullying may be a continuation of in-school bullying. • Cyberbullying may be a retaliation for in-school bullying.
Concerns • Some students, as is to be expected, are not making good choices. • Dangerous adults are attracted to environments where children are not making good choices • Many parents are not paying sufficient attention
Where Does It Happen? • Most cyberbullying occurs off campus • MNet research shows that 50% of kids are online most of the time without adult supervision. (http://www.mindohfoundation.org/bullying.htm)
CyberBullies’ Technology • E-mail • Cell phones • Pager text messages • Instant messaging • Defamatory personal web sites • Defamatory online personal polling web sites • Chat rooms
Terminology • Flaming: Online fights using electronic messages with angry and vulgar language. • Joe and Alec’s online fight got angrier and angrier. Insults were flying. Joe warned Alec to watch his back in school the next day • Harassment: Repeatedly sending nasty, mean, and insulting messages. • Sara reported to the principal that Kayla was bullying another student. When Sara got home,she had 35 angry messages in her e-mail box. The anonymous cruel messages keptcoming—some from strangers
Terminology • Impersonation - Pretending to be someone else and sending or posting material to get that person in trouble or danger or damage that person’s reputation or friendships. • Laura watched closely as Emma logged on to her account and discovered her password.Later, Laura logged on to Emma’s account and sent a scathing message to Emma’s boyfriend, Adam.•
Denigration - “Dissing” someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships. Some boys created a “We Hate Joe” Web site where they posted jokes, cartoons, gossip,and rumors all dissing Joe Outing - Sharing someone’s secrets or embarrassing information or images online. Greg, an obese high school student, was changing in the locker room after gym class. Matt took a picture of him with his cell phone camera. Within seconds, the picture was flying around the phones at school Terminology
Terminology Cyberstalking - Repeated, intense harassment and denigration that includes threats or creates significant fear. When Annie broke up with Sam, he sent her many angry, threatening, pleading messages.He spread nasty rumors about her to her friends and posted a sexually suggestive picture she had given him in a sex-oriented discussion group, along with her e-mail address and cell phone number.
Trickery - Tricking someone into revealing secrets or embarrassing information, then sharing it online. Katie sent a message to Jessica pretending to be her friend and asking lots of questions.Jessica responded, sharing really personal information. Katie forwarded the message to lots Exclusion -Intentionally and cruelly excluding someone from an online group. Millie tries hard to fit in with group of girls at school. She recently got on the “outs” with a leader in this group. Now Millie has been blocked from the friendship links of all the girls Terminology
Free speech Students have the First Amendment right to free speech when it is created off school grounds District negligence Protect the educational environment from anything that hinders its intended purpose--educating students. Legal Issues
Speech on campus, on a school computer or if a student brings a print-out to school school officials may take action if the expression is lewd, vulgar, or profane Off-campus speech discipline if the speech causes a substantial disruption to the educational environment interferes with the rights of another or is a true threat Social Networking Websites
Layschock v. Hermitage School District • The court determined that a student substantially disrupted the school environment when he created an online parody profile of his principal on an off-campus computer
Slander and Defamation • J.S. v. Bethlehem Area School Dist. • A teacher recently won a $500,000 lawsuit for defamation from an incident at issue in a suit the student, J.S., brought against the school district
Policy Protections • Computers and Internet are prohibited for personal use • Prohibited sites that have no educational value: myspace, facebook, youtube, and xanga • Students and parents sign the policy. Keep it on file • Post rules
Policy Protections • Internet access is limited to educational activities only • Filter social networking sites to catch postings that contain messages promoting violence • Monitor for postings that could be conceived as slanderous to school personnel
The Locker Standard • Limited expectation of privacy on the district's Internet system. • Routine maintenance and monitoring should be expected. • If there is reasonable suspicion that the student has violated district policy
Individual Search • Keep accurate records • Follow District procedures • Clear notice to students that network storage files can & will be searched if necessary
References • http://www.mindohfoundation.org/bullying.htm • http://www.cyberbully.org/docs/cbcteducator.pdf. • ttp://boardbuzz.nsba.org/discussions/archive/session.110806.onlinehangouts.php • http://www.nyssca.org/CYBERBULLYING-pp-BT28th.ppt.