NETWORK WORLD: Cyber Bullying, Digital Citizenship, and Learning. South Carolina CTE Conference Featured Session with Jim Brazell of Ventureramp.com on August 30, 2011. Topics: Cyber Bullying, Digital Citizenship, Digital Rights, Digital Ethics, Digital Culture, Digital Communication, STEM, TEAMS, STEAM, Digital Art and Digital Criticism. Jim Brazell, http://www.ventureramp.com, jimbrazell@ventureramp.com.
2. What is cyberbullying?
How are bullying in the physical world
and the online world connected,
similar, and/or different?
What is unique and challenging for
online bullying compared to traditional
bullying?
Audience Discussion-
Cyberbullying
Define it!
3. Cyberbullying Legislation and School Policies,
Where are the Boundaries of the
“Schoolhouse Gate”, in the New Virtual
World?
Web sites
• http://csriu.org
• http://cyberbully.org
• http://cyber-safe-kids.com
9. According to the Bureau of Labor
Statistics, 22% of jobs in USA are STEM
and 52% of STEM jobs are NIT.
As a group, these jobs are forecast to grow
more than twice as fast as the average for
all occupations in the economy.
http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf
29. • Turn to the person sitting next to you and
discuss how things have changed over the
past 20 years (1996-2011 and (1995-1965)?
– How are social norms changing?
– How are boundaries related to personal space
and privacy changing?
– Are we losing something or gaining something?
– What are the implications?
Audience Discussion-Cyberbullying
31. Bullying is "repeated oppression,
psychological or physical, of a less
powerful person by a more
powerful person.“
Farrington, D.P. (1993). Understanding and preventing
bullying. In M.Tonny and N. Morris (Eds ). Crime and
Justice, Vol 17, Chicago: University of Chicago Press.
32. Think Quest – Definition for students “cyberbullying”
1.Physical bullying includes any physical contact that would hurt or injure
a person like hitting, kicking, punching, etc.
2. Verbal bullying is name-calling, making offensive remarks, or joking
about a person's religion, gender, ethnicity, socioeconomic status, or the
way they look.
3. Indirect bullying includes spreading rumors or stories about someone,
telling others about something that was told to you in private, and
excluding others from groups.
4. Social alienation is when a bully excludes someone from a group on
purpose. It also includes a bully spreading rumors, and also making fun
of someone by pointing out their differences.
5. Intimidation is when a bully threatens someone else and frightens that
person enough to make him or her do what the bully wants.
http://library.thinkquest.org/07aug/00117/typesbullying.html
40. 1 2
Sender Receiver
Traditional Communications Model
1 2Channel/Medium
Noise
Message
Message
What makes cyberbullying unique?
Also, mass media model—radio, TV, print..
47. Cyberbullying Warning Signs
• Olweus – Bullying Prevention Program What are the Warning
Signs of Cyber/Bullying? A child may be experiencing cyber
bullying if he or she:
– appears sad, moody, or anxious
– avoids school
– withdraws from or shows a lack of interest in social
activities
– experiences a drop in grades or decline in academic
performance
– appears upset after using the computer or being online
– appears upset after viewing a text message on a cell phone
If a child shows any of these warning signs, it is important
to talk with the child and investigate his or her online
presence to determine whether cyber bullying is occurring
and to offer help when needed.
48. What is really different about cyber bullying?
• Anonymous – Veiled/Hidden/Deflecting
• Asynchronous - Time shifting
• Communication Technology - Signs,
messages and symbols
• Psychological influence – Emotion,
Attitude & Behavior
• Unjust use of power - intimidate, shame,
terrify and/or control the opponent/s.
49. What is really different about cyber bullying?
• Most adults do not occupy “cyberspace” with the
frequency or familiarity of many youth.
• Cyberspace represents 100’s of millions of dollars
of computing resources in the palm of our hands—
unprecedented ubiquity.
• Social institutions are struggling to keep pace with
the pace of technological change: Old world
organizational structures, processes and
operational tempo is embattled by new world
network structures, processes and operational
tempos.
50. If you really want to know what is different it is
organization and reach, range and maneuverability.
(1) Like Bees Attacking - converge & disperse
[pulsing]
(2) Converge from multiple axes [non-linear,
distributed]
(3) Speed of light operation in time
(4) Global R3
51. Swarming
Organization & Projection
(1) Like Bees Attacking - converge & disperse
[pulsing]
(2) Converge from multiple axes [non-linear,
distributed]
(3) Speed of light operation in time
(4) Global Reach, range and manuverability
Cyberbullying is a multiplier to physical bullying.
52. Cyber Bullying = Bullying.
Complexity & Challenge
• Top Down Control and Hierarchy vs.
• Cyber Citizenship – the character of an individual
viewed as a member of society in the context of
technology use, norms and behaviors including
duties, obligations, and functions of a citizen.
• Cyber Citizen - an inhabitant of a community
(city or town), especially one entitled to its
privileges or franchises.
53. Cyber Citizenship
• Cyber Citizenship – the
character of an individual
viewed as a member of
society in the context of
technology use, norms and
behaviors including duties,
obligations, and functions of a
citizen.
• Cyber Citizen -
an inhabitant of a community
(city or town), especially one
entitled to its
privileges or franchises.
Where do these topics exist in the
curricula in the P-20 system?
Rights, Freedom of expression,
Ethics, Rule of Law, Etiquette
Culture & Society
Social Change & Movements
Communication & Expression
Art & Media Criticism
Technology (STEM?)
56. Cyber Citizenship
• Cyber Citizenship – the
character of an individual
viewed as a member of
society in the context of
technology use, norms and
behaviors including duties,
obligations, and functions of a
citizen.
• Cyber Citizen -
an inhabitant of a community
(city or town), especially one
entitled to its
privileges or franchises.
Where do these topics exist in the
curricula in the P-20 system?
Rights, Freedom of expression,
Ethics, Rule of Law, Etiquette
Culture & Society
Social Change & Movements
Communication & Expression
Art & Media Criticism
Technology (STEM?)
57. An Answer
• Digital Citizenship
• Digital Rights
• Digital Ethics
• Digital Culture
• Digital Communication
• Digital Art
• Digital Criticism
Career and Technical
Education
STEM, IT and ARTS/AV
Academics
Cyber
59. In 1956, Benjamin
Bloom headed a
group of
educational
psychologists who
developed a
classification of
levels of
intellectual
behavior important
in learning.
Blooms
Taxonomy
64. CTE Arts,
A/V Tech
and
Communicati
ons and IT
Clusters Cultural &
Classical Arts
Act 1a. – First
integration
movement
RealW
orld
Problem,Issueor
Opportunity
Denton ISD Current and Emerging
Pattern Languages
65. CTE Arts,
A/V Tech
and
Communicati
ons and IT
Clusters Cultural &
Classical Arts
Act 1b. – The way
ahead from students.
Student lead and
defined mission.
STUDENT
LEADRERSHIP
Denton ISD Current and Emerging
Pattern Languages
66. CTE Arts,
A/V Tech
and
Communicati
ons and IT
Clusters
Cultural &
Classical Arts
Act 2. – Rearticulation of the whole. Arts-CTE
integration in Act 1 should impact a few academic
teachers and programs because of the natural
relationship among arts and academics. Use the
first success to define a next movement which
incorporates all three stakeholders ARTS-
ACADEMCIS-CTE.
Academic
disciplines
STUDENT
LEADRERSHIP
Denton ISD Current
and Emerging
Pattern Languages
67. Innovation Strategy
Platform for Transdisciplinary Programs of Study
Digital Media & Art
Digital Cinema & Photography
Digital Audio & Music
Digital Literacy & Storytelling
Digital Entrepreneurship & Marketing
68. Innovation Strategy
Transdisciplinary Program of Study
Digital Media & Art
Digital Cinema & Photography
Digital Audio & Music
Digital Literacy & Storytelling
Digital Entrepreneurship & Marketing
English
69. Innovation Strategy
Transdisciplinary Program of Study
Digital Media & Art
Digital Cinema & Photography
Digital Audio & Music
Digital Literacy & Storytelling
Digital Entrepreneurship & Marketing
Digital
Games
70. Innovation Strategy
Transdisciplinary Program of Study
Digital Media & Art
Digital Cinema & Photography
Digital Audio & Music
Digital Literacy & Storytelling
Digital Entrepreneurship & Marketing
Art
71. Innovation Strategy
Transdisciplinary Program of Study – Virtually an infinite number of
combinations of humanities, arts and other CTE programs with Digital
SCC Vision
Digital Media & Art
Digital Cinema & Photography
Digital Audio & Music
Digital Literacy & Storytelling
Digital Entrepreneurship & Marketing
Connectiondefinedbystudent
72. SCC Vision
Digital Media & Art
Digital Cinema & Photography
Digital Audio & Music
Digital Literacy & Storytelling
Digital Entrepreneurship & Marketing
Thesis/Portf
olio
Assessed
Entry
Juried Exit –
Performance,
exhibition and/or
capstone project.
Thesis/portfolio development “connecting the dots” through intensives,
online and normally scheduled activities.
Time
Connecting the dots
Connect to 1 or more
academic, art or other
CTE courses
Connect to 2 or more
academic, art or other
CTE courses
Entry Exit
73. National Endowment for
Science Technology and
the Arts
K-12 Schools
Bring computer science into the
National Curriculum as an
essential discipline.
Use video games and visual
effects at school to draw greater
numbers of young people into
STEM and computer science.
Encourage art-tech crossover
and work-based learning
through school clubs.
http://www.nesta.org.uk/home1/assets/features/next_gen
74. Of the two million U.S. arts jobs requiring
significant technology proficiency:
• 10% architects
• 11% artists, art directors and animators
• 7% producers and directors and
• 7% photographers
The products of these disciplines
represent 6.4% of the U.S. economy and
over $126 billion annually in revenue from
foreign trade. Read more at Arts in the
Workforce. http://www.nea.gov/research/ArtistsInWorkforce.pdf
88. How CyberPatriot works
• Multi-round competition
– Qualifying rounds are virtual and teams
compete simultaneously
– Teams download VMware images and attempt
to secure them over a given period of time
– Teams connected to centralized scoring
platform
– Teams graded against known solution sets
• Finals held in Orlando and
Washington DC
Cyber Patriot
highschoolcdc.com
98. Resources
• Center for Safe and Responsible Internet Use
www.csriu.org
• Connect Safely
www.connectsafely.org/other-resources.html
• Common Sense Media www.commonsense.org
• National Cyber Security Alliance: Stay Safe Online
www.staysafeonline.org
• NetSmartz www.NetSmartz.org
• My CTAP:
www.myctap.org/index.php/teaching-and-learning/cybersafety-res
• A Comprehensive Directory of Online Safety Resources
www.connectsafely.org/Directories/internet-safety-resources.html
“ For at least the past six years the US Department of Defense, nuclear laboratory sites and other sensitive US civilian government sites have been deeply penetrated, multiple times, by other nation states.