• Like
CYBERBULLYING
Upcoming SlideShare
Loading in...5
×

CYBERBULLYING

  • 678 views
Uploaded on

 

More in: Technology , Career
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
678
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
21
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Philippine Normal University College of Arts and SciencesTaft Avenue, Manila SY 2010-2011 CYBERBULLYINGOlweus (1993) “A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself."This definition includes three importantcomponents: 1. Bullying is aggressive behavior that involves unwanted, negative actions. 2. Bullying involves a pattern of behavior repeated over time 3. Bullying involves an imbalance of power or strength.”Bullying • Physical • Relational/Verbal • InternetOnline Harassment & Cyberbullying • Online harassment: aggressive behavior, “harm doing,” insults, denigration, impersonation, exclusion, outing, activities associated with hacking – stealing information, breaking into accounts, damaging websites, profiles etc. (Willard, 2006) • Cyberbullying: online harassment that is – repeated over timeReynante S. Tagum 1
  • 2. – Involves a power imbalance between a perpetrator and a victim. Power imbalance may be differences in online skills. • Other complicating factor -- perpetrators are also often victims, sometimes online, sometimes elsewhere. Internet bullying can be particularly hard to disentangle. (Willard, 2006)What makes online harassment & bullying different? • Technology is vehicle • Persistence of content – Editable, alterable • Distributability of content – Speed – Breadth • Dis-inhibition over computer- mediated communication • Invasive Cyberbullying "involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others. -Bill Belsey"Cyberbullying is being cruel to others by sending or posting harmful material orengaging in other forms of social aggression using the internet or other digitaltechnologies. Cyberbullying can takedifferent forms: • Flaming. Online fights using electronic messages with angry and vulgar language. Joe and Alec’s online exchange got angrier and angrier. Insults were flying. Joe warned Alec to watch his back in school the next day. • Harassment. Repeatedly sending nasty, mean, and insulting messages.Reynante S. Tagum 2
  • 3. Sara reported to the principal that Kayla was bullying another student. When Sara got home, she had 35 angry messages in her e-mail box. The anonymous cruel messages kept coming—some from complete strangers. • Denigration. “Dissing” someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships. Some boys created a “We Hate Joe” Web site where they posted jokes, cartoons, gossip, and rumors, all dissing Joe. • Impersonation. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships. Laura watched closely as Emma logged on to her account and discovered her password. Later, Laura logged on to Emma’s account and sent a hurtful message to Emma’s boyfriend, Adam. • Outing. Sharing someone’s secrets or embarrassing information or images online. Greg, an obese high school student, was changing in the locker room after gym class. Matt took a picture of him with his cell phone camera. Within seconds, the picture was flying around the phones at school. • Trickery. Talking someone into revealing secrets or embarrassing information, then sharing it online. Katie sent a message to Jessica pretending to be her friend and asking lots of questions. Jessica responded, sharing really personal information. Katie forwarded the message to lots of other people with her own comment, “Jessica is a loser.” • Exclusion. Intentionally and cruelly excluding someone from an online group. Millie tries hard to fit in with a group of girls at school. She recently got on the “outs” with a leader in this group. Now Millie has been blocked from the friendship links of all of the girls. • Cyberstalking. Repeated, intense harassment and denigration that includes threats or creates significant fear. When Annie broke up with Sam, he sent her many angry, threatening, pleading messages. He spread nasty rumors about her to her friends andReynante S. Tagum 3
  • 4. posted a sexually suggestive picture she had given him in a sex-oriented discussion group, along with her e-mail address and cell phone number.Impact of CyberbullyingIt is widely known that face-to-face bullying can result in long-term psychological harmto targets. This harm includes low self-esteem, depression, anger, school failure andavoidance, and, in some cases, school violence or suicide. It is possible that the harmcaused by cyberbullying may be greater than harm caused by traditional bullyingbecause . . . • Online communications can be extremely vicious. • There is no escape for those who are being cyberbullied— victimization is ongoing, 24/7. • Cyberbullying material can be distributed worldwide and is often irretrievable. • Cyberbullies can be anonymous and can solicit the involvement of unknown “friends.” • Teens may be reluctant to tell adults what is happening online or through their cell phones because they are emotionally traumatized, think it is their fault, fear greater retribution, or fear online activities or cell phone use will be restricted. A group of girls at Alan’s school had been taunting him through instant messaging, teasing him about his small size, daring him to do things he couldn’t do, suggesting that the world would be a better place if he committed suicide. One day, he shot himself. His last online message was “Sometimes the only way to get the respect you deserve is to die.” This is also a true story.PREVENTING CYBERBULLYINGThere are several important things thatyou can to do to avoid being a targetof cyberbullying: • Protect yourself. Never provide any information or images in electronic form that could be used against you.Reynante S. Tagum 4
  • 5. • Examine how you are communicating. If you find that people are frequently attacking you, look closely at how you are communicating with them. You might be communicating in a way that is irritating others or hurting their feelings. • Find some new friends. If you are trying to fit into a group of people who are treating you badly, it might be easier to simply find some nicer friends. Life’s too short to waste time trying to be friends with mean people.Discipline and Legal Issues An article entitled, “Senate billseeks to stop bullying in schools”written by Kimberly Jane T. Tan ofGMA news said that Senator MiriamDefensor-Santiago submitted SenateBill No. 2677. The bill mandates allschools, whether public or private,including colleges and universities, tocraft policies that will address theproblem of bullying in their respectiveinstitutions. “Sen. Antonio Trillanes IV andCong. Rodel Batocabe have come upwith their respective Anti-bullying bills in a bid to break this vicious cycle and create aschool environment that is truly child-friendly”, as said in the article “School Bullies,Beware!: Anti-Bullying Bills to the Rescue” in the Manila Bulletin. Batocabe’s House Bill 2361 or the Anti-Bullying Act criminalizes bullying andcyberbullying, and penalizes bullies who are minor (below 18) and their parents. Trillanes’ Anti-bullying Act (SBN 413), on the other hand, requires school districtsto adopt policies prohibiting harassment, intimidation and bullying.What We Can Do1 De La Salle UniversityPsychology professor Anton SimonPalo says the solution to bullyingshould be a preventive policy, not areactive one. This, he adds, is bestachieved not just in school but in thecommunity level. Marlon Era, a sociologist andprofessor at DLSU, states that childrenReynante S. Tagum 5
  • 6. who resort to bullying may be seeking recognition in some other way. They may alsohave the wrong role models at home. “All the basic things in life we learn that from the family, from the parents. Even ifgood laws are implemented on this issue, if the family orientation is bad, you still cannotaddress the program. We are developing the country’s future leaders here so it isimportant to teach the right values to our children. We should teach them that its betterto be friendly and caring so they would gain more friends,” Era stresses. For Palo, the best solution is toempower the students to have aunified effort to stop the bullies; toteach proper counseling techniques toteachers and guidance counselors; toinvolve the parents in the treatment ofthe child; and to set up communitypsychosocial centers that play anactive role in educating people andchildren on bullying.Submitted to:PROF. SYLVIA T. CABERIOCounseling Theories and Practice 1Submitted by:MR. REYNANTE S.TAGUMM.A. in Education Major in Guidance and Counseling1 Really, What Constitutes Bullying? by Rachel C. Barawid, November 10, 2010Reynante S. Tagum 6
  • 7. http://mb.com.ph/articles/286812/really-what-constitutes-bullyingReferenceOnline ArticlesA new menace: cyberbullyinghttp://opinion.inquirer.net/inquireropinion/columns/view/20100716-281552/A-new-menace-cyberbullyingCyber bully victims hit with depression—surveyhttp://newsinfo.inquirer.net/breakingnews/infotech/view/20100922-293654/Cyber-bully-victims-hit-with-depressionsurveyCyber Parenting (How it could work)http://www.mb.com.ph/articles/235379/cyber-parenting-how-it-could-workGay student in alleged webcam bullying commits suicidehttp://newsinfo.inquirer.net/breakingnews/infotech/view/20101001-295328/Gay-student-in-alleged-webcam-bullying-commits-suicideHave you been a victim of cyber-harassment?http://showbizandstyle.inquirer.net/you/2bu/view/20091016-230461/Have-you-been-a-victim-of-cyber-harassmentHeart in cyberspacehttp://opinion.inquirer.net/inquireropinion/columns/view/20080619-143480/Heart-in-cyberspaceIn Cyber Bullying, Depression Hits Victims Hardesthttp://www.depnet.ph/uni0/news/newsitem/3381/default.aspxParents still crucial vs. online riskshttp://newsinfo.inquirer.net/breakingnews/infotech/view/20090602-208452/Parents-still-crucial-vs-online-risksResearch on cyber bullying, technical issues expose dangershttp://www.manilatimes.net/national/2008/aug/17/yehey/top_stories/20080817top4.htmlS. Koreas Cyworld touts privacy in battle with Facebookhttp://newsinfo.inquirer.net/breakingnews/world/view/20101216-309307/SKoreas-Cyworld-touts-privacy-in-battle-with-FacebookSchool Bullies, Beware!: Anti-Bullying Bills to the Rescuehttp://mb.com.ph/articles/286811/school-bullies-beware-antibullying-bills-rescueSenate bill seeks to stop bullying in schoolsReynante S. Tagum 7
  • 8. http://www.gmanews.tv/story/213952/senate-bill-seeks-to-stop-bullying-in-schools#The Facebook Generationhttp://showbizandstyle.inquirer.net/sim/sim/view/20101113-303030/The-Facebook-GenerationTougher law vs cyber bullying pushedhttp://www.journal.com.ph/index.php/national/20804-tougher-law-vs-cyber-bullying-pushed.htmlPDF FileEducator’s Guide to Cyberbullying and Cyberthreats by Nancy Williard, 2007PowerPoint FileBullying, Cyberbullying, Murder and Bullycide by Rick Shawwww.awareity.comCyberbullying by Adrienne DeWolfeCyberbullying: What the research is telling us…Amanda LenhartPew Internet & American Life Projecthttp://www.pewinternet.orgTech etiquettewww.SmallTalkBigResults.comReynante S. Tagum 8