Cyberbully Module

  • 1,378 views
Uploaded on

learn about information about cyber bullying

learn about information about cyber bullying

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,378
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
29
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyberbullying:
    How will you prevent it in your classroom?
  • 2. What is cyberbullying?
    • Cyberbullyinghas many definitions but can be summed up as any inappropriate use of technology that is intended to harass, humiliate, stalk, threaten, terrorize, or slander others.
    • 3. It is not uncommon for cyberbullying to be prevalent in students ages 8-15 and
    beyond.
  • 4. Vehicles for Cyberbullying
  • Statistics
    • Approx. 160,000 children miss school because they fear bullying
    • 12. One in three teens (ages 12-17) have been victims of cyberbullying
    • 13. One in six pre-teens (ages 6-11) have been victims of cyberbullying
    • 14. Children are just as likely to receive threatening messages at school as they are at home
    • 15. The impact on the victims of bullying often include truancy, depression, poor academic performance, and sometimes suicide
  • Is it against the law?
    That depends…
    The biggest hurdle that prosecutors face in cyberbullying cases is the First Amendment right to freedom of speech.
    There have been numerous court cases concerning cyberbullying, however each is individual and rulings remain just as unique and difficult to predict.
  • 16. Is it against the law?
    That depends…
    Cases in which cyberbullies have been convicted have shown that they have abused this constitutional right to an extent that they be held accountable for their actions.
  • 17. Law
    • Fifteen states (including Illinois) have legislation requiring districts to create policies about cyberbullying.
    • 18. On this website, each state receives a letter grade based on the occurrences of cyberbullying cases and how they are handled. www.bullypolice.org
    • 19. Also in Illinois schools are required to provide a minimum of two hours of Internet safety instruction annually to their K-12 students.
  • Cyberbullying in the Classroom
    • There are numerous recent examples of court cases concerning cyberbullying incidences in school
    • 20. Cyberbullying can take place at school, however, instances of bullying that
    occurred at home can impact a
    student’s learning in the classroom
    as well.
    It is very difficult if not impossible for students to escape instances of cyberbullying.
  • 21. Challenges for Teachers
    • What constitutes an offense of cyberbullying?
    • 22. Is bullying that takes place at home able to be disciplined within the school?
    • 23. When do teachers step in?
    • 24. Can teachers determine the scope of a student’s right to freedom of speech?
  • Challenges for Teachers
    None of these questions can be answered definitively.
    Each case must be viewed individually, however, to shed some light on one important point, schools are allowed (in many cases) to take disciplinary action on incidences that occur in a student’s home as soon as a learning environment or student’s learning experience is compromised as a result.
  • 25. Creating a policy
    Be proactive, not reactive.
    Having a classroom technology policy can prevent problems from happening before they occur. It can also provide teachers with a set of fair and equal set of consequences for policy violations.
  • 26. Creating a policy
    Be proactive, not reactive.
    In order to create an effective policy, teachers and administrators must employ wording that is broad enough to cover as many instances as possible, while they must also be specific enough so that a document can uphold its integrity in a court of law if necessary.
  • 27. Creating a cyberbullying/technology policy for your classroom
    A good policy should:
    • be informative (defining cyberbullying and other terms that may be unfamiliar) and directed towards both parent(s)/guardian(s) and student
    • 28. show compliance and understanding by both parent(s)/guardian(s) and student (preferably by means of a signature) and returned to the teacher to be filed
    • 29. clearly state the goals the teacher
    intends to achieve and activities
    planned using said technology
  • 30. Creating a policy (Continued…)
    A good policy should:
    • state the teacher (and school) expectations of usage of said technology
    • 31. specify uses deemed inappropriate in school
    • 32. clearly outline consequences for violation of the policy on several levels
    • 33. some policies include different consequences for first, second, and third-time offenses
    • 34. some policies include a clause that allows
    for discretion on the part of administration
    as to the seriousness of the offense and the
    resulting punishment
  • 35. Creating a policy (Continued…)
    A good policy should:
    • refer parent(s)/guardian(s) to sources of additional information if they wish to access it
    • 36. provide the teacher and administrator’s contact information
    • 37. be thoroughly checked for correct spelling, grammar, and structure
    • 38. be approved by an administrator before being sent home with students (Some schools
    require this, others do not, but it’s
    still a good idea!)
  • 39. Prevent behavior: Start early
    • Educate students about the dangers of cyberbullying at an early age (as soon as they begin using the computer)
    • 40. Treat cyberbullying as we would the issues of lying, cheating, or stealing when students are young.
    • 41. If they become familiar with these values, they might be less likely to participate in these destructive behaviors.
  • Prevent behavior: Be proactive
    • Be proactive in presenting classroom expectations, outlining acceptable usages, and introducing policy early.
    • 42. Remind students of the policies in place frequently throughout the duration of a project or school year.
    • 43. Post your policy in the classroom or computer lab so students have no excuse for being unfamiliar with it.
  • Prevent behavior: Actively monitor
    • Actively monitor students at all times when using technology.
    • 44. Monitor computers and Internet history as well as student behavior in the classroom.
    Students know when they are being monitored closely, and chances of problems occurring in your classroom will be less if you are a constant, active presence.
  • 45. Complete the Activity:
    Locate the Cyberbullying Activity on WesternOnline. Read it carefully and complete it by the posted due date. Worth 40 pts.
    Don’t forget to review the rubric before starting!
  • 46. References
    Bully Police U.S.A. (2009). Retrieved from website: www.bullypolice.org
    Meyers, J. J. (2009). Censoring cyber speech on campus??? Unpublished manuscript. Presented September 29, 2009 at Western Illinois University.
    Meyers, J. J., & Carper, G. T. (2009). Cyberbullying: The legal challenge for educators. West’s Educational Law Reporter.
    Meyers, J. J., Carper, G. T., & Hemphill, L. S. (2009). Cyber Bullies Come to Campus: Are Administrators and Faculty Ready?
    Roskamp, T. J. (2009). Cyberbullying in Illinois public schools. Unpublished doctoral dissertation, Western Illinois University.