Cyberbullying Class


Published on

This presentation can be used with students/parents/teachers.

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyberbullying Class

  1. 1. Cyber bullying & Cyber threats Kelly Schermerhorn Model Schools November 3, 2009
  2. 2. Cyber bullying What it is, who is involved, where it is, why do we care, and how it affects YOU! What we can do about it!
  3. 3. What is it? <ul><li>Cyber bullying is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass or otherwise target another person. </li></ul>
  4. 4. Where is it found? E-mails Instant messaging Text or digital imaging messages sent on cell phones Web pages, Web logs (blogs) Chat rooms or discussion groups Other information communication technologies Plus more…
  5. 5. Where is it found? Significant amount occurring off-campus. – But is impacting student relationships on-campus. • It is highly likely students are using the school’s Internet system or personal cell phones to engage in cyber bullying. – Bypass Internet filter/proxy sites. – Use cell phones or other digital devices. – This raises liability concerns.
  6. 6. The technologies Wikis are websites anyone can edit . If you can word process, you can use a wiki. Visitors can see a history of changes and revert to earlier versions. Example: Wikis/Podcasts Podcasts are blogs with audio or video. Podcasts are like Internet radio or TV shows. Anyone can be a producer. Podcasts are consumed on demand. Examples: Blogs Web + Log = weblog, or we blog Blogs are easily created and easily updated sites. If you can email, you can blog. Blogs allow visitors to comment. Example:
  7. 7. Types of cyber bullying <ul><li>Flaming (sarcasm) </li></ul><ul><li>Harassment </li></ul><ul><li>Denigration (dissin’) </li></ul><ul><li>Impersonation </li></ul><ul><li>Outing (telling a secret) </li></ul><ul><li>Trickery </li></ul><ul><li>Exclusion (keep out of the loop) </li></ul><ul><li>Cyber stalking </li></ul><ul><li>• Trash talking </li></ul>
  8. 8. Informational video <ul><li>Wired Safety’s Cyber bullying Part I & II video </li></ul><ul><li>Parry Aftab-lawyer and spokesperson for </li></ul>
  9. 9. 1995-2005 <ul><li>2 million children accessed the Internet in 1995 (worldwide). </li></ul><ul><li>This number climbed to 4 million in 1996. </li></ul><ul><li>The number exceeded 28 million in 2000; 45 million in 2002; 77 million in 2005-what do you think it is today? </li></ul><ul><li>35 % of 12-15 yr olds have access in their bedroom now (Oct 7, </li></ul>
  10. 10. Internet usage stats <ul><li> </li></ul>
  11. 11. Cyber bullying survey
  12. 12. Cyber bullying survey
  13. 13. Cyber bullying survey
  14. 14. Cyber bullying survey
  15. 15. Cyber bullying survey
  16. 16. Who are Cyber bullies? <ul><li>May be known to the victim or a online stranger. </li></ul><ul><li>May be anonymous and enlist others including online “friends”. </li></ul><ul><li>May be related to fights about relationships. </li></ul><ul><li>May be based on hate or bias. </li></ul><ul><li>Some teens think cyber bullying is a game! </li></ul>
  17. 17. Teenagers might think… <ul><li>They think they are invisible, so they think they can’t be punished. </li></ul><ul><li>No real harm has been caused online. </li></ul><ul><li>They should have free speech right to post whatever they want, regardless of the harm caused. </li></ul>
  18. 18. Virtual world-real harm <ul><li>Communication can be vicious and occur 24/7. </li></ul><ul><li>Damaging material can be widely disseminated. </li></ul><ul><li>Impossible to retrieve or remove. </li></ul><ul><li>Can lead to suicide and violence. </li></ul><ul><li>Teens reluctant to tell adults. </li></ul><ul><li>Great emotional harm. </li></ul>
  19. 19. Cyber bullying can make you feel… <ul><li>SAD ANGRY UPSET </li></ul><ul><li>DEPRESSED VIOLATED </li></ul><ul><li>HATED ANNOYED </li></ul><ul><li>HELPLESS EXPLOITED </li></ul><ul><li>STUPID </li></ul><ul><li>PUT DOWN </li></ul>
  20. 20. Warning signs <ul><li>Sadness or anger after Internet use. </li></ul><ul><li>Withdrawal from friends and activities. </li></ul><ul><li>School avoidance, decline in grades, and depression. </li></ul><ul><li>Indications the child is being bullied at school. </li></ul>
  21. 21. IT IS A CRIME!!! <ul><li>HARASSMENT </li></ul><ul><li>Post something in public </li></ul><ul><li>3rd Degree Misdemeanor – 1 year in jail $2,500 fine </li></ul><ul><li>STALKING </li></ul><ul><li>Several communications are sent directly to victim </li></ul><ul><li>1st Degree Misdemeanor – 5 Years in jail $10,000 fine </li></ul>
  22. 22. Some recent cyber bullying cases in the news <ul><li>Ryan Halligan – 13yrs old, VT </li></ul><ul><li>Classmates spread rumors he was GAY </li></ul><ul><li>Female befriended him for his secrets </li></ul><ul><li>Posted to internet </li></ul><ul><li>Committed suicide </li></ul><ul><li>Ghyslain Raza – “Star Wars Kid”, Canada </li></ul><ul><li>Overweight and slightly awkward teenager </li></ul><ul><li>Video of himself playing with a play light saber </li></ul><ul><li>Classmates found & posted to internet </li></ul><ul><li>Finished school year in a Psychiatric ward </li></ul><ul><li>Internets most downloaded video 2006 </li></ul>
  23. 23. Megan Meier <ul><li>Megan – 13yrs old, Missouri </li></ul><ul><li>- Suffered from depression and attention disorder </li></ul><ul><li>Met Josh Evans 16 – Cyber friend on her MySpace site </li></ul><ul><li>Josh ended their friendship – heard she was cruel </li></ul><ul><li>Electronic postings about her “fat”, “slut” </li></ul><ul><li>“ This world would be better off without her” </li></ul><ul><li>Committed suicide Oct 16, 2006 </li></ul>
  24. 24. Megan Meier <ul><li>Lori Drew – 49 yrs old, Mo </li></ul><ul><li>Aka – Josh Evans with co-conspirators - Ashley Grills. </li></ul><ul><li>May 15, 2008 Indicted – Federal Grand Jury </li></ul><ul><li>One count conspiracy. (5yrs) </li></ul><ul><li>Three counts accessing protected computers without authorization. (5yrs ea count) </li></ul><ul><li>Fraudulently use of an account – to cause harm. </li></ul><ul><li>Violated MySpace “terms of Service”. </li></ul><ul><li>Grand Jury in Los Angeles, Ca – Jurisdiction </li></ul><ul><li>Ashley Grills – granted immunity. </li></ul>
  25. 25. Terms of use <ul><li>Cyber bullying is a violation of the </li></ul><ul><li>&quot;terms of use&quot; of most service providers. </li></ul><ul><li>– Will respond by removing such harmful content and terminating the membership of the offending poster. </li></ul><ul><li>– But educators, parents, and students must file a complaint. </li></ul><ul><li>File a complaint by providing the harmful messages and ask that the account be terminated and any harmful material be removed. </li></ul>
  26. 26. Cyber threats <ul><li>Threats or distressing material. </li></ul><ul><li>General statements that make it sound like the writer is emotionally upset and may consider harming someone else, harming himself or herself, or committing suicide. </li></ul>
  27. 27. Have you heard of.. <ul><li>Jeff Weise </li></ul><ul><li>Pekka-Eric Auvinen </li></ul><ul><li>Dillon Cossey </li></ul><ul><li>Dylan Klebold & Eric Harris </li></ul>
  28. 28. How about now? <ul><li>Jeff Weise - Red Lake </li></ul><ul><li>Pekka-Eric Auvinen - Jokela </li></ul><ul><li>Dillon Cossey – Plymouth - Whitemarsh </li></ul><ul><li>Dylan Klebold & Eric Harris - Columbine </li></ul>
  29. 29. What can we do? <ul><li>We can not control the children – we must educate. </li></ul><ul><li>• Balanced approach – policies may be too rigid. </li></ul><ul><li>• Set rules and limits to Internet use. </li></ul><ul><li>• Guide students to GOOD content/ethical usage. </li></ul><ul><li>• Help Teachers and Parents educate children abut safe, responsible uses of the internet. </li></ul><ul><li>• Foster appropriate use of the internet among preschoolers and other young students </li></ul>
  30. 30. What else… <ul><li>Use the Internet for education-related activities and not recreational use or as a baby sitter. </li></ul><ul><li>• Use the Internet to communicate to the parents and students. (websites, homework, e-mail) </li></ul><ul><li>• Engage the community. </li></ul>
  31. 31. Situation review <ul><li>Imminent Threat of Violence or Danger. </li></ul><ul><li>• Gather evidence – screen shots, emails.. </li></ul><ul><li>• Violence or suicide Assessment. </li></ul><ul><li>• Cyber bully Assessment – can the school respond? </li></ul>
  32. 32. What can teachers do? <ul><li>Communicate with students </li></ul><ul><li>• Communicate with other educators / Lawyer </li></ul><ul><li>• Communicate with IT </li></ul><ul><li>• Communicate with the police </li></ul><ul><li>• Communicate with the parents </li></ul><ul><li>Contact the Service provider </li></ul><ul><li>• Confront students who are behaving in </li></ul><ul><li>irresponsible, inappropriate, or unsafe </li></ul><ul><li>ways. * Do not look the other way* </li></ul>
  33. 33. Student’s perspective <ul><li>Utah student creates video and wins </li></ul><ul><li>“predator” </li></ul>
  34. 34. Resources <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>