3. Topic of this workshop
● Cyberbullying
Workshop’s aims
● to increase participants’ awareness of the concept of cyberbullying in our students’
daily life
● to be able to identify different types of cyberbullying and of bullies
● to share good paractices from the Romanian school
● to explore some resources created by the Romanian partener to be used in class
with students
● to show the results of the survey about using internet and social networks by the
Romanian students aged 10-14 years old.
4. Activities to check your understanding
about this concept of cyberbullying
1. https://www.menti.com/6ibgd5z99s
2. https://create.kahoot.it/share/erasmus-ka2-
wows/038fce59-e38a-44cd-8a0f-1f736c3981ac
5. Bullying - NOT in my class! Creating safe learning
environments for students-MOOC by
SchoolEducation Gateway
6. Learning objectives of the MOOC:
● Understand (cyber)bullying
● Identify the profile of a bully, a bully-victim, a witness and a
bystander
● Identify different types of (cyber) bullying
● Recognize the impact of bullying on students
● Develop strategies to prevent and combat bullying at your
school
7. Cyberbullying is often defined as bullying using electronic
forms of contact such as email, chat rooms, blogs, websites,
social networking sites, virtual learning environments, mobile
phones etc. for repeatedly deliberate and hostile behaviour by
an individual or group aiming at hurting another individual
(Smith, Mahdavi, Carvalho, Fisher, Russell, & Tippett, 2008;
Slonje, et al., 2013).
How to spot a cyber bully
https://www.wikihow.com/Stop-Cyber-Bullying#Identifying-Signs-of-Cyber-Bullying_sub
8.
9.
10. The world of technology and
social media generates not only
new norms and behaviours, but
also new words.
-fraping (facebook + rape) is the
action of hijacking someone’s
Facebook page when they are
still logged in, but not present.
11. Cyberbullying effects:
It aims at :
-embarrassing /publicly humiliating a person through the online posting of
sensitive, private or embarrassing information without their consent.
-it can cause real psychological damage to the people involved.
12. Educating the students on preventing such a scenario is part of the e-safety education. Ensuring
social media accounts are always logged off after using them on laptops and desktops, setting up
‘stand-by’ passwords on the devices to prevent access if the machine is left unattended, and
knowing how to react if something like this has happened .
The Solution is
13. Types of bystanders
Hurtful bystanders, for instance, are those who instigate the bullying by probing the
bully to begin, or by cheering and making comments that further stimulate the bully.
Bystanders of this category may even join in the bullying once it has begun. Other
forms of hurtful bystander just passively accept bullying incidents by watching and
doing nothing. This silent acceptance or this uncovered endorsement encourages
bullies to continue their hurtful behaviour.
Helpful bystanders, on the other hand, take the decision to directly intervene by
discouraging the bully, defending the victim or redirecting the situation away from
bullying. Other helpful bystanders take action and get help by asking support from
peers to stand up against bullying or by reporting the bullying to adults.
14. How to avoid cyberbullying?
● Setting your anti-bullying school policy
● Training: making sure that students, school staff and parents are aware of this policy
and are frequently updated on new risks and challenges related to the topic is required.
● Create an inclusive classroom climate: the class syllabus should recognize the need
for accommodations and the course content should consider that the perspectives of
diverse groups are being represented.
● Setting ground rules for class discussions: create an inclusive atmosphere and
signal that you are open to the ideas of your students, that’s a key to their engagement
in learning.
● Working with parents
19. Useful resources to use with your students
https://learningapps.org/display?v=p0wbbkyu219
https://www.netiquette.lu/index_EN.html
http://enable.eun.org/implementing_enable