Академический Документы
Профессиональный Документы
Культура Документы
WORKSHOP GOALS
Terminology Assessment Issues & Protocol Decision Tree PEAS PROGRAM: Psychological, Educational and Social School Response
CYBER BULLYING IS
Being cruel to others by sending or posting harmful material using technological means; an individual or group that uses information and communication involving electronic technologies to facilitate deliberate and repeated harassment or threat to an individual or group. Also known as: Electronic Bullying & Online Social Cruelty
phones Pager text messages Instant messaging Defamatory personal web sites Defamatory online personal polling web sites Chat rooms
DIFFERENCES
BULLYING
CYBERBULLYING
DIRECT Occurs on school property Poor relationships with teachers Fear retribution
Physical: Hitting, Punching & Shoving Verbal: Teasing, Name calling & Gossip Nonverbal: Use of gestures & Exclusion
ANONYMOUS Occurs off school property Good relationships with teachers Fear loss of technology privileges
Further under the radar than bullying Emotional reactions cannot be determined
www.stopbullyingnow.hrsa.gov
Role-play Responding May not realize its cyber bullying Righting wrongs Protecting themselves Bored; Entertainment Ego based; promote own social status Often do in a group Intimidate on and off line Need others to bully; if isolated, stop
Power-Hungry
Vengeful Angel
(Subset of Power-Hungry)
Mean Girls
Often Victims of school-yard bullies Throw cyber-weight around Not school-yard bullies like Power-Hungry & Mean Girls
Flaming: Online fights using electronic messages with angry and vulgar language Harassment: Repeatedly sending offensive, rude, and insulting messages Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating. Engaging in other on-line activities that make a person afraid for his or her own safety Denigration: Dissing someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships
Impersonation: Pretending to be someone else and sending or posting material online that makes that person look bad, gets that person in trouble or danger, or damages that persons reputation or friendships Outing and Trickery: Sharing someones secret or embarrassing information online. Tricking someone into revealing secrets or embarrassing information which is then shared online Exclusion: Intentionally excluding someone from an on-line group, like a buddy list
{Nancy Willard, M.S., J.D., Director of the Center for Safe and Responsible Internet Use}
Cyber bullying typically starts at about 9 years of age and usually ends after 14 years of age; after 14, it becomes cyber or sexual harassment due to nature of acts and age of actors {Aftab} Affects 65-85% of kids in the core group directly or indirectly through close friends (Aftab)
90% of middle school students they polled had their feelings hurt online 65% of their students between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend 50% had seen or heard of a website bashing of another student 75% had visited a website bashing 40% had their password stolen and changed by a bully (locking them out of their own account) or sent communications posing as them Problems in studies: not assessing the real thing i.e. Only 15% of parent polled knew what cyber bullying was
Aftabs
statistics:
42% of kids have been bullied while online. 1 in 4 have had it happen more than once. 35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once. 21% of kids have received mean or threatening e-mail or other messages. 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once. 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. 58% have not told their parents or an adult about something mean or hurtful that happened to them online.
Based on 2004 i-SAFE survey of 1,500 students grades 4-8 http://www.isafe.org
School Limits: Schools have policies against bullying Civil Law Limits: Cyber bullying may also meet standards for institutional torts (wrongdoings)
Defamation Material that Constitutes an Invasion of Privacy
(1 st Amendment)
Death threats or threats of other forms of violence to a person or property Excessive intimidation or extortion Threats or intimidation that involve any form of bias or discrimination Any evidence of sexual exploitation
Conflicting decisions in regard to schools authority with respect to cases under state and federal jurisdictions School should seek legal consult often beyond regular school attorney (e.g., a constitutional or cyber-free speech lawyer)
Within School Authority Guidelines: Clear-cut threats Clearly disruptive of school discipline encouraged to visit website; student accesses or works on website in school School owned website or school-sponsored project website Any proof of in-school impact (e.g., materials on grounds; psychosocial, behavioral or academic impact on others) Proof the students website or harassment has had impact on staff (e.g., quits, leave of absence, medical TX for emotional issues)- otherwise seek outside legal recourse
Many cases of child cyber bullying, like adult counterparts of cyber-harassment, not criminal
Difference between annoying and dangerous communications How to investigate a cyber crime How to obtain information from an ISP
Zero Tolerance Policies Encourage Lockdown Environment in Schools(Fuentes, 2003) One Strike and Youre Out of School (Joiner, 2004) Youthful suicide, financial ruin, families torn apart for minor infractions.: How post Columbine hysteria is wrecking lives Every Child is Worth Saving (http://endzeroltolerance.com)
News (http://www.jlc.org/EZT/News/default/html?id=Jan05)
Children taught to not fight back Frequently have adults such as teachers protect them Those being bullied often want friends or are fearful so dont narc Having been bullied, may have poor self-esteem All involved in cyber bullying not caught, assessed or disciplined Adults may be seemingly unresponsive ..retaliation on-line
Summary
PROGRAM OFFERINGS:
Teenangels.org: trains teens & preteens to be part of solution WiredKids and WiredTeens programs for schools and communities Wiredsafety.org: one to one hotline and multiple resources Videos, Lesson Plans and Activities Parent and Community Programs Law enforcement training and briefings Local county level summits on cyber bullying Assistance on technological software & tools to help
(Willard, 2005)
Specific Step Wise Plan: 1 Engage in participatory planning {Integrate into Safe Schools. District Technology Awareness; Non-school Participants} 2 Conduct needs assessment {Assessment available at Center for Safe & Responsible Internet Use} 3 Ensure that an effective anti--bullying program in place {core not authoritarian values; predictive empathy; peer norms vs. bullying; peer intervention skills, effective administrative responses} 4 Review policies & Procedures {Monitoring, report box, internet & other technological pp} 5 Conduct Professional Development {key individual sophisticated in the area; all administrators, librarians, counselors and technology educators basic understanding; all other staff alerted to existence, how to detect} 6 Provide Parent Education {prevention, detection & intervention strategies; alert child to potential consequences of school discipline, loss of family account, civil litigation, criminal prosecution} 7 Evaluate {prevention & intervention programs}
ASSESSMENT TREE
{PEAS PROGRAM}
Cyber Bully Incident Report Complete report & collect evidence Assessment Methods Interview Collateral info Assess. Forms Standardized Instr. (SAVRY)
Therapeutic PEAS Program Family Support Ctr. Outside Counseling Residential Treatment
Ongoing Prevention
ASSESSMENT:
Interview & Evidence Gathering Collateral Information/Evidence Collection Cyber Bully Assessments Student Form School Counselor Form Standardized Instruments {SAVRY}
E-EDUCATIONAL:
Movie Documentary Book/Movie Review/Report Poem/Short Story/Song Writing a play/paper Watch Movie Inbox and discuss impact/develop program
Review of People in History who were bullied Mock trial regarding injustices/victimization Use/Misuses Safety Review Develop Positive Websites
Art
E-EDUCATIONAL:
Continued
Higher/lower grade reading, tutor Higher/lower grade play production Higher/lower grade cyber bully {recovered/charged} Pen Pals Extracurricular Activities (match cyber bullyer/ee) 3. SCHOOL ASSEMBLIES: High school student small group discussion on impact/consequences of cyber bullying/being cyber bullied Lawyer to discuss possible legal consequences/ Former student, possibly at the high school, involved in cyber bullying, and/or legally charged for cyber bullying Current Teacher/Administrator/Parent involved in cyber bullying
E-EDUCATIONAL:
Continued
5. PARENT EDUCATION:
Uses/Misuses of Technology Supervision Strategies
S-SOCIAL:
1. EXTRACURRICULAR/PROJECTS:
Intramural/Projects between Classes Beyond Sports Homework Completion & Pizza Party Fundraising & Award/Rewards School Socials Plays on Topic Art contest School/Community Newspaper article Visit to Foster care/geriatric settings Dress Code - Decrease Comparisons & Possibility of Deviant Dress Higher/lower grade reading, tutor Higher/lower grade play production Higher/lower grade cyber bully {recovered/charged} Pen Pals Extracurricular Activities (match cyber bullyer/ee)
CONCLUDING THOUGHTS
A Need For: A better understanding of what cyber bullying is Addressing appropriate computer protocol and specifically cyber bullying via the schools clearly defined and systematically implemented AUP so that schools can provide intervention even in instances that occur outside of school Clearer delineation of school responsibility in responding to incidents, especially off school grounds Clearer school policies and action plans; increased continuity in implementing school responses Increased assessment of incidents and those involved Decision making regarding the cyber bully and the individual being cyber bullied based on: A decision tree protocol Assessment process Systematic, therapeutic responses, not isolated disciplinary reactions Integration of educational, psycho-social interventions Inclusion of prevention measures that are comprehensive and systemic in approach Communication among students, counselors, teachers, administrators, parents & community Individualized responses, with understanding that a wide degree of variation exists in motivation Change needs to come from all levels and grades: Individual Classroom School culture Victimization often occurs with both the person being cyber bullied and the cyber bully Important to not throw the baby out with the bathwater Our children are not disposable!
THE END