SlideShare a Scribd company logo
21st Century Bullying:
        Cyber-Bullying




  A Guide and Tutorial for Parents and
Educators on How to Recognize, Prevent,
      and Address Cyber-Bullying
Cyber Bullying
            A Statement of Goals




                                Tutorial Goals
1.Identify what constitutes cyber-bullying and review some examples.

2.Learn Preventative Cyber-Bullying Steps to Take.

3.Learn How to Address Cyber-Bullying.
Legal Definition of Cyber-Bullying
California Education Code 48900r: Engaged in an act of bullying. For purposes of this subdivision, the following
     terms have the following meanings:
             (1) "Bullying" means any severe or pervasive physical or verbal act or conduct, including
             communications made in writing or by means of an electronic act, and including one or more acts
             committed by a pupil or group of pupils as defined in Section 48900.2, 48900.3, or 48900.4,
             directed toward one or more pupils that has or can be reasonably predicted to have the effect of
             one or more of the following:
                           (A) Placing a reasonable pupil or pupils in fear of harm to that pupil's or those pupils'
                          person or property.
                          (B) Causing a reasonable pupil to experience a substantially detrimental effect on his
                          or her physical or mental health.
                          (C) Causing a reasonable pupil to experience substantial interference with his or her
                          academic performance.
                          (D) Causing a reasonable pupil to experience substantial interference with his or her
                          ability to participate in or benefit from the services, activities, or privileges provided
                          by a school.
             (2) "Electronic act" means the transmission of a communication, including, but not limited to, a
            message, text, sound, or image, or a post on a social network Internet Web site, by means of an
            electronic device, including, but not limited to, a telephone, wireless telephone or other wireless
            communication device, computer, or pager.
            (3) "Reasonable pupil" means a pupil, including, but not limited to, an exceptional needs pupil,
            who exercises average care, skill, and judgment in conduct for a person of his or her age, or for a
            person of his or her age with his or her exceptional needs.
What is Bullying?

                  Physical Bullying is when one person uses threatening physical
                  action or force in order to make another person comply with
                  them, scare them, intimidate them, or harm them.


Verbal Bullying is when one person uses verbal communication to
intimidate, harm, or threaten another into doing or acting how the
bully wants . This would also include verbal retaliation threats with
terms such as “snitch, narc, tattle, etc.” that are intended to keep the
victim from speaking out.



                 Gossiping or spreading rumors about another person is also a form
                 of bullying meant to hurt someone else’s feelings, intimidate them,
                 and /or harm them.
Adding Cyber to the Bullying
When the bullying is communicated or committed through an electronic device or an electronic
   transmission, it becomes cyber bullying. This would include threats, intimidation, gossip,
   rumors, or any other verbal or visual actions that are meant to harm another person.




                                 Cyber bullying can take place on cell phones, tablets,
                                 computers, laptops, etc. Cyber bullying messages can
                                 be transmitted via text messages, social media posts,
                                 images, pictures, and video.
Goal 1 Identifying Cyber Bullying
            Wrap-Up
How do parents and educators prevent
          Cyber Bullying?
Be Active… Be Vigilant
For parents, monitor, monitor, and monitor
your child’s use on the internet. Let them
know that you expect computer use to be
done in an open area of the house.

For educators, circulate, circulate, and keep
circulating around when students are on
the computer in your classroom or in the computer lab.


                           Give Expectations
                           Both parents and educators need to let kids know that if
                           you would not say something in person to someone, you
                           would not say it to them online in a post or text.
How do parents and educators prevent
           Cyber Bullying?
Utilize computer monitoring software
Parents can purchase or download software that can
monitor what sites children go to, block certain sites as
needed, and provide a way to see what kids are posting.

Educators should check with their local IT person to learn
what is software available at the school site, what is in
place, what its limitations are and how to use it.

                  Set up guidelines at home for social media use
                  Parents should talk to their child about rules for using social media
                  sites. One of the rules should be that parents have the passwords for
                  the child’s site in order to be able to check or access their account.

                  Educators should already have usernames and password
                  lists set up from their IT person for student use at school
How do parents and educators prevent
           Cyber Bullying?
Don’t be afraid to
terminate or block access.
Parents can always end their child’s
access to a computer, website, or
cell phone if the child is not
following the expectations laid out
or agreed upon. This can be a
temporary restraint or a permanent
one depending on the situation.

Educators can follow suit by making
sure that they inform
the parent, administration, and the
IT person if a student
violates the school computer use
agreement.
Goal 2 Preventing Cyber Bullying
           Wrap-Up
Cyber Bullying has occurred.
    What do I do now?
Cyber Bullying has occurred.
    What do I do now?
Cyber Bullying has occurred.
  First step is determine and identify…
In the video we saw, it was a clear case of cyber-bullying
 and fulfills the legal requirements of Ed Code 48900r.
The steps to be taken are as follows:
1. An adult is informed by the student/child of the
     situation/event.
2. The adult confirms the good choice of the student
      in letting him/her know.
3. The adult reviews the electronic evidence of the
      cyber-bullying attack and if possible generates a
       hard copy.
4. The adult meets with the school administrator to review what has
      happened, who is involved, and what has been done.
5. School administrator can help determine if local law enforcement also
     needs to be contacted.

Now what?
Cyber Bullying has occurred.
   Second step is contact the school…
1. The administrator will take the cyber-bullying information
   and evidence and meet first with the alleged bully.
2. The administrator will determine the level of responsibility
   for the cyber-bullying by the bully and if any other
   participants are involved.
3. The administrator will then contact
   the parents of the bully and inform
   them of the situation and schedule
   a meeting. This is a meeting only
   between the parent’s of the bully
   and the administrator. The victim and
   victim’s parents are not there.
Cyber Bullying has occurred.
              Third step is resolution…
1. Consequences are determined and explained. In
     this situation a violation of CA EC 48900r carries
     a consequence of suspension. The amount of
     days the student is suspended will be
     determined based on the event and past
     discipline history, but will be between 1 and 5
     days. This is solely a school administration
     decision.
2. Depending on the severity or the frequency of the
     cyber-bullying, law enforcement may be
     contacted.
3. Any further participants related to this incident
     will be dealt with. Any record of the cyber-
     bullying will be removed and/or deleted.
4. Counseling and other follow-up services will be
     suggested/required for the victim and/or the
     bully.
Cyber Bullying has occurred.
                 Final step is outcome…




Reviewing the cycle of bullying, we can see that with our outcome, the victim has stood up
for herself; the bully has been identified and consequenced as well as any other participants
and/or supporters; parents have been informed, made aware, and been involved; the cyber-
bullying has been removed or deleted; and follow-up services have been established
including counseling. In this manner the cycle has been broken successfully.

This was all accomplished by the adults knowing how to identify cyber-bullying, how to
prevent it when possible, and how to address it successfully for both the victim and bully.
Review
Cyber Bullying Assessment
                                   (write down answers and turn in to proctor)
1)    True or False - Bullying is any severe or pervasive physical or verbal act or conduct that is intentionally harmful to another person?

2)    Which device could be used in a cyber-bullying situation? A) Cell Phone     B) Computer      C) Laptop    D) All of the above

3)    Which law is cyber-bullying prohibited by? A) EC 48900r     B) EC 5519x     C) PC 1229      D) PC 3451k

4)    Where should a parent allow their child to work on a laptop computer? A) At their desk in their room          B) At a friend’s house   C) In
      the dining room supervised D) All of the above

5)    What information should a parent have about their child’s social media site? A) The child’s friend list    B) The child’s username and
      password C) The child’s avatar D) The child’s permission

6)    Who has the final say on control of a cell phone or computer at home? A) The parent/guardian        B) The school      C) The Child    D) The
      government

7)    Who should an educator contact if a student violates the school computer use agreement? A) Another teacher              B) School
      administrator C) School secretary D) No one

8)    Who should the parent contact if cyber-bullying is suspected? A) Law enforcement         B) School psychologist     C) School nurse    D)
      School administrator

9)    True or False - A hard copy of what was stated or posted is strong evidence for a cyber bullying crime?

10)   Who should the school administrator involve with a suspected bully? A) The suspected bully’s parents           B) Law enforcement      C) The
      suspected bully’s teacher D) The school counselor

11)   True or False – The victim should be praised for standing up for themselves verbally and telling a trusted adult.

12)   What follow-up should be required for the victim and bully? A) Jail time     B) Apologies     C) Counseling     D) Expulsion

More Related Content

What's hot

Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
seswear9388
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
KhailingWong
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
Kate Gukeisen
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullying
jgrosenthal
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Point
yusko1rj
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Jason Hong
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
guest09fcd1
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
W200 final project
W200 final projectW200 final project
W200 final project
Taylor Morrison
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
Shreedeep Rayamajhi
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
ShSgh4
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
Kate Gukeisen
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
JaveriaZain1
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
OCTF Industry Engagement
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
Terri Stice
 

What's hot (16)

Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullying
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Point
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Social media policy
Social media policySocial media policy
Social media policy
 
W200 final project
W200 final projectW200 final project
W200 final project
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 

Viewers also liked

Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
amate1cl
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
AJ Tivol
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
Melissa
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
digitalworld12
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
Miriam Pananaliksik
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
Katie_Waters
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Joe Gauder
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
tackleglass54
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
atomikey
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
DefinetheLine
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
anniebee3509
 

Viewers also liked (20)

Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Nasilje na internetu
Nasilje na internetuNasilje na internetu
Nasilje na internetu
 

Similar to Aet 545 week 6 tutorial cyber bullying

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Cybercrime bullying report
Cybercrime bullying reportCybercrime bullying report
Cybercrime bullying report
Jonald Urcz
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
Chris483410
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Mi Ra Lavandelo
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
bullymodule1.docx
bullymodule1.docxbullymodule1.docx
bullymodule1.docx
waihonLam1
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
Al Rowell
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Christina Gagnier
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptx
RAKHI SAWLANI
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
Shamil Arfan Tuhin
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
Joyce Hirsh
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
alshaikhkhanzariarts
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
Oliver Mittl
 

Similar to Aet 545 week 6 tutorial cyber bullying (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cybercrime bullying report
Cybercrime bullying reportCybercrime bullying report
Cybercrime bullying report
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
bullymodule1.docx
bullymodule1.docxbullymodule1.docx
bullymodule1.docx
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptx
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
 

Recently uploaded

一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
atwvhyhm
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
FauzanHarits1
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
ashiquepa3
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
Bruce Bennett
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
SnapJob
 
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
pxyhy
 
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
pxyhy
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
Aditya Raghav
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
MuhammadWaqasBaloch1
 

Recently uploaded (20)

一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
 
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
一比一原版(UBC毕业证)不列颠哥伦比亚大学毕业证如何办理
 
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
一比一原版(SFU毕业证)西蒙弗雷泽大学毕业证如何办理
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
 

Aet 545 week 6 tutorial cyber bullying

  • 1. 21st Century Bullying: Cyber-Bullying A Guide and Tutorial for Parents and Educators on How to Recognize, Prevent, and Address Cyber-Bullying
  • 2. Cyber Bullying A Statement of Goals Tutorial Goals 1.Identify what constitutes cyber-bullying and review some examples. 2.Learn Preventative Cyber-Bullying Steps to Take. 3.Learn How to Address Cyber-Bullying.
  • 3. Legal Definition of Cyber-Bullying California Education Code 48900r: Engaged in an act of bullying. For purposes of this subdivision, the following terms have the following meanings: (1) "Bullying" means any severe or pervasive physical or verbal act or conduct, including communications made in writing or by means of an electronic act, and including one or more acts committed by a pupil or group of pupils as defined in Section 48900.2, 48900.3, or 48900.4, directed toward one or more pupils that has or can be reasonably predicted to have the effect of one or more of the following: (A) Placing a reasonable pupil or pupils in fear of harm to that pupil's or those pupils' person or property. (B) Causing a reasonable pupil to experience a substantially detrimental effect on his or her physical or mental health. (C) Causing a reasonable pupil to experience substantial interference with his or her academic performance. (D) Causing a reasonable pupil to experience substantial interference with his or her ability to participate in or benefit from the services, activities, or privileges provided by a school. (2) "Electronic act" means the transmission of a communication, including, but not limited to, a message, text, sound, or image, or a post on a social network Internet Web site, by means of an electronic device, including, but not limited to, a telephone, wireless telephone or other wireless communication device, computer, or pager. (3) "Reasonable pupil" means a pupil, including, but not limited to, an exceptional needs pupil, who exercises average care, skill, and judgment in conduct for a person of his or her age, or for a person of his or her age with his or her exceptional needs.
  • 4. What is Bullying? Physical Bullying is when one person uses threatening physical action or force in order to make another person comply with them, scare them, intimidate them, or harm them. Verbal Bullying is when one person uses verbal communication to intimidate, harm, or threaten another into doing or acting how the bully wants . This would also include verbal retaliation threats with terms such as “snitch, narc, tattle, etc.” that are intended to keep the victim from speaking out. Gossiping or spreading rumors about another person is also a form of bullying meant to hurt someone else’s feelings, intimidate them, and /or harm them.
  • 5. Adding Cyber to the Bullying When the bullying is communicated or committed through an electronic device or an electronic transmission, it becomes cyber bullying. This would include threats, intimidation, gossip, rumors, or any other verbal or visual actions that are meant to harm another person. Cyber bullying can take place on cell phones, tablets, computers, laptops, etc. Cyber bullying messages can be transmitted via text messages, social media posts, images, pictures, and video.
  • 6. Goal 1 Identifying Cyber Bullying Wrap-Up
  • 7. How do parents and educators prevent Cyber Bullying? Be Active… Be Vigilant For parents, monitor, monitor, and monitor your child’s use on the internet. Let them know that you expect computer use to be done in an open area of the house. For educators, circulate, circulate, and keep circulating around when students are on the computer in your classroom or in the computer lab. Give Expectations Both parents and educators need to let kids know that if you would not say something in person to someone, you would not say it to them online in a post or text.
  • 8. How do parents and educators prevent Cyber Bullying? Utilize computer monitoring software Parents can purchase or download software that can monitor what sites children go to, block certain sites as needed, and provide a way to see what kids are posting. Educators should check with their local IT person to learn what is software available at the school site, what is in place, what its limitations are and how to use it. Set up guidelines at home for social media use Parents should talk to their child about rules for using social media sites. One of the rules should be that parents have the passwords for the child’s site in order to be able to check or access their account. Educators should already have usernames and password lists set up from their IT person for student use at school
  • 9. How do parents and educators prevent Cyber Bullying? Don’t be afraid to terminate or block access. Parents can always end their child’s access to a computer, website, or cell phone if the child is not following the expectations laid out or agreed upon. This can be a temporary restraint or a permanent one depending on the situation. Educators can follow suit by making sure that they inform the parent, administration, and the IT person if a student violates the school computer use agreement.
  • 10. Goal 2 Preventing Cyber Bullying Wrap-Up
  • 11. Cyber Bullying has occurred. What do I do now?
  • 12. Cyber Bullying has occurred. What do I do now?
  • 13. Cyber Bullying has occurred. First step is determine and identify… In the video we saw, it was a clear case of cyber-bullying and fulfills the legal requirements of Ed Code 48900r. The steps to be taken are as follows: 1. An adult is informed by the student/child of the situation/event. 2. The adult confirms the good choice of the student in letting him/her know. 3. The adult reviews the electronic evidence of the cyber-bullying attack and if possible generates a hard copy. 4. The adult meets with the school administrator to review what has happened, who is involved, and what has been done. 5. School administrator can help determine if local law enforcement also needs to be contacted. Now what?
  • 14. Cyber Bullying has occurred. Second step is contact the school… 1. The administrator will take the cyber-bullying information and evidence and meet first with the alleged bully. 2. The administrator will determine the level of responsibility for the cyber-bullying by the bully and if any other participants are involved. 3. The administrator will then contact the parents of the bully and inform them of the situation and schedule a meeting. This is a meeting only between the parent’s of the bully and the administrator. The victim and victim’s parents are not there.
  • 15. Cyber Bullying has occurred. Third step is resolution… 1. Consequences are determined and explained. In this situation a violation of CA EC 48900r carries a consequence of suspension. The amount of days the student is suspended will be determined based on the event and past discipline history, but will be between 1 and 5 days. This is solely a school administration decision. 2. Depending on the severity or the frequency of the cyber-bullying, law enforcement may be contacted. 3. Any further participants related to this incident will be dealt with. Any record of the cyber- bullying will be removed and/or deleted. 4. Counseling and other follow-up services will be suggested/required for the victim and/or the bully.
  • 16. Cyber Bullying has occurred. Final step is outcome… Reviewing the cycle of bullying, we can see that with our outcome, the victim has stood up for herself; the bully has been identified and consequenced as well as any other participants and/or supporters; parents have been informed, made aware, and been involved; the cyber- bullying has been removed or deleted; and follow-up services have been established including counseling. In this manner the cycle has been broken successfully. This was all accomplished by the adults knowing how to identify cyber-bullying, how to prevent it when possible, and how to address it successfully for both the victim and bully.
  • 18. Cyber Bullying Assessment (write down answers and turn in to proctor) 1) True or False - Bullying is any severe or pervasive physical or verbal act or conduct that is intentionally harmful to another person? 2) Which device could be used in a cyber-bullying situation? A) Cell Phone B) Computer C) Laptop D) All of the above 3) Which law is cyber-bullying prohibited by? A) EC 48900r B) EC 5519x C) PC 1229 D) PC 3451k 4) Where should a parent allow their child to work on a laptop computer? A) At their desk in their room B) At a friend’s house C) In the dining room supervised D) All of the above 5) What information should a parent have about their child’s social media site? A) The child’s friend list B) The child’s username and password C) The child’s avatar D) The child’s permission 6) Who has the final say on control of a cell phone or computer at home? A) The parent/guardian B) The school C) The Child D) The government 7) Who should an educator contact if a student violates the school computer use agreement? A) Another teacher B) School administrator C) School secretary D) No one 8) Who should the parent contact if cyber-bullying is suspected? A) Law enforcement B) School psychologist C) School nurse D) School administrator 9) True or False - A hard copy of what was stated or posted is strong evidence for a cyber bullying crime? 10) Who should the school administrator involve with a suspected bully? A) The suspected bully’s parents B) Law enforcement C) The suspected bully’s teacher D) The school counselor 11) True or False – The victim should be praised for standing up for themselves verbally and telling a trusted adult. 12) What follow-up should be required for the victim and bully? A) Jail time B) Apologies C) Counseling D) Expulsion