 Holli Kenley, M.A.
 Goal One: To acquire methods and strategies in protectionfrom cyber bullying. Goal Two: To acquire methods and strategi...
“…willful and repeated harm inflicted through the use ofcomputers, cell phones, and other electronic devices.”(Hinduja & P...
1. Cyber victim, pure victim, cyber bullied, cybervictimized2. Cyber bully3. Cyber bully victim, cyber bullied victimized4...
1. Synonyms for cyber bullying2. Types of cyber bullying3. Relationship to traditional bullying4. Prevalence
 Protection – To safeguard against cyber risk and to addresslow level cyber harm.Assessment:1. Role/s of client2. Crisis ...
 Educate adults and their children about safety measures.1. Prepare children2. Supervise and monitor children3. Technolog...
 Educate adults and their children about safety measures.4. Web sites:www. Cyberbullying.uswww. Cyberbullyhelp.com5. Bloc...
 Teach adults how to parent a high tech generation.1. Family Internet Use Agreement (sample)Personal Code of Conduct2. Im...
 Increase awareness of a cyber bullying culture and of theroles/responsibilities of every individual.Team Responsibility:...
 Team Responsibility:6. Therapists and Clinicians:ServicesGroupsAdvocacyNewsletters or professional materials
 “A Whole Approach”Safe environmentAnti –bullying programAnti –bullying policySafe philosophy (Sullivan, 2011)
 Questions… Input… Other thinking…
 (Spears, Slee, Ownes & Johnson, 2009)
 “Cyber bullying [is] an aggressive, intentional act, carried outby a group or individual, using electronic forms of cont...
1. Instrumental aggression2. Reactive aggression3. Overt aggression4. Covert aggression5. Theories of aggression(Bauman, 2...
 Intervention – To identify role/s of clients, to assess level ofcyber harm, and to implement therapeutic strategies.Asse...
 To implement crisis interventions.1. Cyber victim2. Cyber bully3. Cyber bully victim
 To implement treatment strategies given the role/s ofclients.Cyber victim:1. Profile2. Needs/motivations3. Relationship ...
 To implement treatment strategies…Cyber victim:1. Protective measures in place; legal issues2. Address victimization/emp...
 To implement treatment strategies given the role/s ofclients.Cyber bully:1. Profile2. Needs/motivations3. Relationship t...
 To implement treatment strategies…Cyber bully:1. Punishment (?)2. Positive need fulfillment3. Social skill building4. Em...
 To implement treatment strategies given the role/s ofclients.Cyber bully victim:1. Profile, history, and relationship to...
 To implement treatment strategies…Cyber victim, cyber bully, cyber bully victim:1. Interpersonal approaches2. Brief-solu...
 To implement the “System’s Approach” or “HolisticApproach” as it applies to treatment.Parents - Youth - School - Communi...
 To implement “System’s Approach”…IP Family (Relationship to technology)Schools/Counselors/TherapistsCommunity/Support Sy...
 To review role of support systems as they apply tointervention.Support systems:1. Groups2. Holistic Approach
 Questions… Input… Other thinking…
 (Hinduja & Patchin, 2012)
 Prevention – To address the causal factors of cyber bullyingand to implement healthy practices in our relationships with...
1. Causal factors – two social networking normsAnonymity or pseudonymity1. Detachment from real world2. Distant from targe...
2. Causal factors – technology-induced conditioned responseHabits of electronic communication reinforced by:1. Disinhibiti...
3. Causal factors -combine with profile of bully or bully victimAttitudes, beliefs, and motivations:1. Regard (lack of emp...
“Technology use is an indirect form of contact and interactionwith society. A healthy balance of direct interaction with p...
 To implement healthy practices in our relationships withtechnology.Cyber balance:1. Family assessment2. Education3. Esta...
 To implement healthy practices in our relationships withothers.1. An enforceable policy in place2. Peer support3. Positi...
“…restoring the use of technology within the family, particularlyby youth…allows you to experience the benefits of technol...
 Celebrate being present Celebrate being available Celebrate our similar need forrespect, dignity & human regard
 Holli Kenley
Upcoming SlideShare
Loading in...5
×

Triaging Cyber Bullying: Protection, Intervention & Prevention - CAMFT 48th Annual Conference

172

Published on

In order to address the issue of cyber bullying, research supports that it must be met with a systemic approach. Within that response, it is most effective to utilize a triage approach: protection, intervention, and prevention.

Published in: Health & Medicine
1 Comment
0 Likes
Statistics
Notes
  • I hope that school authorities strengthen ties with students as well as parents in making sure that bullying issues are lessened and eventually be gone.As a way of helping everyone especially the parents, who find it quite hard to manage time, I found this great Safety Service which featured a safety app which gets me connected to a Safety Network or escalate my call to the nearest 911 when needed, it has other cool features that are helpful for your kids with just a press of a Panic Button. #SafekidZone, Check it here: http://bit.ly/ZjYchC
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
172
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Triaging Cyber Bullying: Protection, Intervention & Prevention - CAMFT 48th Annual Conference"

  1. 1.  Holli Kenley, M.A.
  2. 2.  Goal One: To acquire methods and strategies in protectionfrom cyber bullying. Goal Two: To acquire methods and strategies of interventionwith cyber bullying. Goal Three: To acquire methods and strategies in theprevention of cyber bullying.
  3. 3. “…willful and repeated harm inflicted through the use ofcomputers, cell phones, and other electronic devices.”(Hinduja & Patchin, 2009)
  4. 4. 1. Cyber victim, pure victim, cyber bullied, cybervictimized2. Cyber bully3. Cyber bully victim, cyber bullied victimized4. Traditional bully5. Bullicide
  5. 5. 1. Synonyms for cyber bullying2. Types of cyber bullying3. Relationship to traditional bullying4. Prevalence
  6. 6.  Protection – To safeguard against cyber risk and to addresslow level cyber harm.Assessment:1. Role/s of client2. Crisis intervention, protection, or both
  7. 7.  Educate adults and their children about safety measures.1. Prepare children2. Supervise and monitor children3. Technological solutions“Stop – Save – Share” (Hinduja & Patchin, 2012)“ I DON’T PLAY” (Sutton, 2009)
  8. 8.  Educate adults and their children about safety measures.4. Web sites:www. Cyberbullying.uswww. Cyberbullyhelp.com5. Blocking and Filtering Software6. Report to Internet Service Provider (IPS) or Site
  9. 9.  Teach adults how to parent a high tech generation.1. Family Internet Use Agreement (sample)Personal Code of Conduct2. Implement safety measures for cyber victimImplement reasonable consequences for cyber bully3. Net neighborhood (Coloroso, 2008)4. Web buddies; peer helper programs
  10. 10.  Increase awareness of a cyber bullying culture and of theroles/responsibilities of every individual.Team Responsibility:1. Parents2. Youth3. Schools4. Community5. Society (Trolley & Hanel, 2010)
  11. 11.  Team Responsibility:6. Therapists and Clinicians:ServicesGroupsAdvocacyNewsletters or professional materials
  12. 12.  “A Whole Approach”Safe environmentAnti –bullying programAnti –bullying policySafe philosophy (Sullivan, 2011)
  13. 13.  Questions… Input… Other thinking…
  14. 14.  (Spears, Slee, Ownes & Johnson, 2009)
  15. 15.  “Cyber bullying [is] an aggressive, intentional act, carried outby a group or individual, using electronic forms of contact,repeatedly and over time, against a victim who cannot easilydefend him or herself”.(Smith, Mahdavid, Carvalho, and Tippett, 2006)
  16. 16. 1. Instrumental aggression2. Reactive aggression3. Overt aggression4. Covert aggression5. Theories of aggression(Bauman, 2011)
  17. 17.  Intervention – To identify role/s of clients, to assess level ofcyber harm, and to implement therapeutic strategies.Assessment:1. Role/s of clients2. Crisis intervention, protection and TX
  18. 18.  To implement crisis interventions.1. Cyber victim2. Cyber bully3. Cyber bully victim
  19. 19.  To implement treatment strategies given the role/s ofclients.Cyber victim:1. Profile2. Needs/motivations3. Relationship to technology
  20. 20.  To implement treatment strategies…Cyber victim:1. Protective measures in place; legal issues2. Address victimization/empowerment3. Goals of counseling4. Address presenting or co-occurring disorders5. Positive peer relationships/social skill building6. Support groups7. Work with parent/guardian (Campbell, 2007)
  21. 21.  To implement treatment strategies given the role/s ofclients.Cyber bully:1. Profile2. Needs/motivations3. Relationship to technology
  22. 22.  To implement treatment strategies…Cyber bully:1. Punishment (?)2. Positive need fulfillment3. Social skill building4. Empathy building5. Address presenting or co-occurring disorders6. Group work7. Work with parent/guardian; legal issues
  23. 23.  To implement treatment strategies given the role/s ofclients.Cyber bully victim:1. Profile, history, and relationship to both2. Assess levels of danger to self and others3. Assess underlying pathology or co-occurring disorders4. Implement psychological, educational, and socialresponse5. Work with parent/guardian; legal issues
  24. 24.  To implement treatment strategies…Cyber victim, cyber bully, cyber bully victim:1. Interpersonal approaches2. Brief-solution focused therapy (low level)Cog/Behavioral; Rational Emotive (high level)3. Support groups* Pikas “Shared Method of Concern”4. Restorative justice (Bauman, 2011)
  25. 25.  To implement the “System’s Approach” or “HolisticApproach” as it applies to treatment.Parents - Youth - School - Community - Law Enforcement :1. Psychological response2. Educational response3. Social response
  26. 26.  To implement “System’s Approach”…IP Family (Relationship to technology)Schools/Counselors/TherapistsCommunity/Support Systems/Legal
  27. 27.  To review role of support systems as they apply tointervention.Support systems:1. Groups2. Holistic Approach
  28. 28.  Questions… Input… Other thinking…
  29. 29.  (Hinduja & Patchin, 2012)
  30. 30.  Prevention – To address the causal factors of cyber bullyingand to implement healthy practices in our relationships withtechnology and with others.Causal factors – a review of current thinking:1. Two social networking norms2. Technology-induced conditioned responses3. Profile of bully or bully victim
  31. 31. 1. Causal factors – two social networking normsAnonymity or pseudonymity1. Detachment from real world2. Distant from target3. DisinhibitionPower differential1. Ease2. Expansion3. Emboldened
  32. 32. 2. Causal factors – technology-induced conditioned responseHabits of electronic communication reinforced by:1. Disinhibition2. Developmental factors3. Reinforcement from self and from others4. Repetition5. Factors in cyber space
  33. 33. 3. Causal factors -combine with profile of bully or bully victimAttitudes, beliefs, and motivations:1. Regard (lack of empathy)2. Revenge3. Relationship between victim (T or C) , cyber bully,and traditional bully
  34. 34. “Technology use is an indirect form of contact and interactionwith society. A healthy balance of direct interaction with peersand physical activities promotes good social skills, problemsolving abilities, and physical fitness.”(Trolley & Hanel, 2008)
  35. 35.  To implement healthy practices in our relationships withtechnology.Cyber balance:1. Family assessment2. Education3. Establish philosophy, guidelines and practices4. Direct interaction, empathy building, serve others5. Adults model healthy behaviors
  36. 36.  To implement healthy practices in our relationships withothers.1. An enforceable policy in place2. Peer support3. Positive interdependent experiences4. Individual and group accountability5. Face to face interaction6. Teach and model interpersonal skills7. Group process (role play and build empathy)
  37. 37. “…restoring the use of technology within the family, particularlyby youth…allows you to experience the benefits of technologywhile reducing the risks…cyber bullying is a symptom of beingout of balance with technology.”(Trolley & Hanel, 2010)
  38. 38.  Celebrate being present Celebrate being available Celebrate our similar need forrespect, dignity & human regard
  39. 39.  Holli Kenley
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×