SlideShare a Scribd company logo
1 of 7
Lesson 1 – What is Cyber Bullying. - class group work online
1. Present students with a question – What is Bullying?
a. Students enter answer
2. Present students with the accepted definition of Bullying – sample below
Bullying Definition. Bullying is unwanted, aggressive behavior among school aged
children that involves a real or perceived power imbalance. The behavior is repeated, or has
the potential to be repeated, over time. Both kids who are bullied and who bully others may
have serious, lasting problems.
Stopbullying.gov
3. What is Cyber Bullying?
a. Students suggest an answer
4. Present students with a definition of Cyber Bullying – sample below
Cyberbullying is bullying that takes place using electronic technology. Electronic technology
includes devices and equipment such as cell phones, computers, and tablets as well as
communication tools including social media sites, text messages, chat, and websites.
5. Give some samples of Cyber Bullying
a. Students suggest an answer
6. Present students with a list of Bullying actions– sample below
 Mean text messages or emails,
 Rumors sent by email or posted on social networking sites
 Embarrassing pictures, videos, websites,
 Fake profiles.
 Cyberstalking
 Flaming
 Exclusion
 Outing
 Masquerading
 Warning Wars
 Changing someones online profile
7. Show video of Cyber Bullying – see below
https://www.youtube.com/watch?v=lN2fuKPDzHA
https://www.youtube.com/watch?v=dkG00Czb4ho&list=PLwJiMdrl2jxdW-
wtDlnsOiARWRCfbnBse&index=1
https://www.youtube.com/watch?v=A9Op2KZCb88&list=PLwJiMdrl2jxdW-
wtDlnsOiARWRCfbnBse&index=2
https://www.youtube.com/watch?v=GbutdD4FCQ8&index=3&list=PLwJiMdrl2jxdW-
wtDlnsOiARWRCfbnBse
8. Class Activity – Present all answers to the above questions to the class. Split class into
Groups, each group then ceates their own definition of both Cyber Bullying and Bullying.
Homework: find at a web resource that defines Cyber Bullying.
Lesson 2 – How to Identify Cyber Bullying. - classroom group activity online
9. Present students with a question – How do you identify if a friend is being cyber
bullies?
a. Students enter answer
10. Present students with a list of identifying signs – sample below
Your child is suddenly spends much more — or much less — time texting, gaming or using social-
networking websites. Any rapid change could be an alarm bell.
After texting or being online, he or she seems withdrawn, upset or outraged.
Your child asks to have a social-media or online account shut down.
He or she suddenly avoids formerly enjoyable social situations.
He or she blocks a number or an email address from his or her account.
Many new phone numbers, texts or email addresses show up on your child's phone, laptop or tablet.
He or she acts frustrated and impatient, or simply acts out more.
Your child notices that he or she is being gossiped about online, or that others are using "code words" in
place of his or her name.
Strangers have opened Facebook or other social-media accounts in your child's name
Cyberbullying may be happening to someone you know. Watch out for these signs.
Your friend suddenly avoids using their mobile device or computer, or they begin spending much more
time texting, gaming or using social networking sites.
They often seem upset, withdrawn or angry, especially after receiving emails, instant messages or text
messages.
Your friend becomes more secretive about their online activities and may avoid talking about their
computer or mobile device.
They're reluctant to leave the house; you stop seeing them at social events they used to enjoy.
Their grades are falling, and they're behind in their schoolwork.
Your friend doesn't even want to go to school, or they completely refuse to go.
They're not eating or sleeping well
Suddenly deleting a social networking profile and account.
A whole bunch of new texts, email addresses or phone numbers begin appearing on your friend's phone,
laptop or other device
11. Show video on how to identify Cyber Bullying – see below
Homework: find at a web resource that helps identify Cyber Bullying.
Lesson 3 – what to do. - classroom group activity online
12. Present students with a question – what do you do if you suspect a friend is being
cyber bullies?
a. Students enter answer
13. Present students with a list of steps to take – sample below
List steps
14. Present students with a question – what do you do if you are being cyber bullied?
a. Students enter answer
15. Present students with a list of steps to take – sample below
List steps
16. Show video on what to do if you see Cyber Bullying and if you are being cyber
bullied – see below
Homework: find at a web resource that outlines what to do if you suspect cyber bullying and if you are
being bullied
Lesson 4 – Protection from Cyber bullying. - classroom group activity online
17. Present students with a question – What do you do to protect yourself from Cyber
bullying?
a. Students enter answer
18. Present students with a list of steps to take – sample below
How do you protect yourself from cyber bullying
An Ounce of Prevention...
Place / keep computer(s) with Internet access in an open, commonly used space
Never give out personal information or passwords, P.I.N. numbers etc..-Personal information includes
your name, the names of friends or family, your address, phone number, school name (or team name if
you play sports). Personal info also includes pictures of yourself and your e-mail address. Ask permission
before sharing any information with a Web site, a "chat buddy" and even when registering a product
purchased for your computer (like a game). Passwords are secrets Never tell anyone your password
except your parents or guardian.
Don't believe everything you see or read -Just because someone online tells you that they are 15 doesn't
mean they are telling the truth. Even adults can't tell when a male pretends to be a female or a 50 year
old pretends to be a 15 year old.
Use Netiquette -Be polite to others online just as you would off-line. If someone treats you rudely or
meanly - do not respond. Online bullies are just like off-line. ones - they WANT you to answer (don't give
them the satisfaction).
Don't send a message to someone else when you are angry -Wait until you have calmed down and had
time to think. Do your best to make sure that your messages are calmly and factually written. You will
usually regret sending a "Flame" (angry) to someone else later on. Once you've sent a message, it is
VERY hard to undo the damage that such "flames" can do.
Don't open a mesage from someone you don't know - If in doubt about it, ask your parents, guardian or
another adult.
If it doesn't look or feel right, it probably isn't -Trust your instincts and teach your kids to trust theirs. While
surfing the Internet, if you find something that you don't like, makes you feel uncomfortable or scares you,
turn off the computer and tell an adult.
You don't have to be "Always On" turn off, disconnect, unplug, try actual reality instead of virtual reality! -
Give yourself a break Don't stay online or connected too long. Spend time with your family and friends off
line.
Sign on the dotted line Make and print out an online contract with your parents or guardians. Ask your
parents to read the information for them on this Web site, so they will be informed about cyberbullying
and Internet safety issues.
19. Show video on how to protect yourself from Cyber Bullying – see below
Homework: find at a web resource that does how to protect against Cyber Bullying
Lesson 5 – who is responsible for eliminating cyber bullying. - classroom group
activity online
20. Present students with a question – What is the schools role in reducing cuber
bullying?
a. Students enter answer
21. Present students with a list of steps to take – sample below
When schools try and get involved by disciplining the student for cyberbullying actions
that took place off-campus and outside of school hours, they are often sued for
exceeding their authority and violating the student's free speech right. They also, often
lose. Schools can be very effective brokers in working with the parents to stop and
remedy cyberbullying situations. They can also educate the students on cyberethics and
the law. If schools are creative, they can sometimes avoid the claim that their actions
exceeded their legal authority for off-campus cyberbullying actions. We recommend that
a provision is added to the school's acceptable use policy reserving the right to discipline
the student for actions taken off-campus if they are intended to have an effect on a
student or they adversely affect the safety and well-being of student while in school. This
makes it a contractual, not a constitutional, issue
22. Present students with a question – What is the parents role in reducing cyber
bullying?
a. Students enter answer
23. Present students with a list of steps to take – sample below
Parents need to be the one trusted place kids can go when things go wrong online and
offline. Yet they often are the one place kids avoid when things go wrong online. Why?
Parents tend to overreact. Most children will avoid telling their parents about a
cyberbullying incident fearing they will only make things worse. (Calling the other
parents, the school, blaming the victim or taking away Internet privileges.) Unfortunately,
they also sometimes underreact, and rarely get it "just right." (You can read more about
this in "Not Too Hot, Not Too Cold! Goldilocks and the CyberParents")
Parents need to be supportive of your child during this time. You may be tempted to give
the "stick and stones may break your bones, but words will never hurt you" lecture, but
words and cyberattacks can wound a child easily and have a lasting effect. These attacks
follow them into your otherwise safe home and wherevertheygo online. And when up to
700 million accomplices can be recruited to help target or humiliate your child, the risk of
emotional pain is veryreal, and veryserious. Don't brush it off.
Let the school know so the guidance counselor can keep an eye out for in-school
bullying and for how your child is handling things. You may want to notify your
pediatrician, family counselor or clergy for support if things progress. It is crucial that
you are there to provide the necessarysupport and love. Make themfeel secure. Children
have committed suicide after having been cyberbullied, and in Japan one young girl
killed another after a cyberbullying incident. Take it seriously.
Parents also need to understand that a child is just as likely to be a cyberbully as a
victim of cyberbullying and often go back and forth between the two roles during one
incident. They may not even realize that they are seen as a cyberbully. (You can learn
more about this under the "Inadvertent Cyberbully" profile of a cyberbully.)
We have a quick guide to what to do if your child is being cyberbullied: Your actions
have to escalate as the threat and hurt to your child does. But there are two things you
must consider before anything else. Is your child at risk of physical harm or assault?
And how are they handling the attacks emotionally?
If there is any indication that personal contact information has been posted online, or
any threats are made to your child, you must run.do not walk, to your local law
enforcement agency (not the FBI). Take a print-out of all instances of cyberbullying to
show them, but note that a print-out is not sufficient to prove a case of cyber-harassment
or cyberbullying. You'll need electronic evidence and live data for that. (You may want to
answer the questions on our checklist for helping spot the difference between annoying
communications and potentially dangerous ones. But remember, if in doubt, report it.)
Let the law enforcement agency know that the trained cyber-harassment volunteers at
WiredSafety.org will work with them (without charge) to help them find the cyberbully
offline and to evaluate the case. It is crucial that all electronic evidence is preserved
to allow the person to be traced and to take whatever action needs to be taken. The
electronic evidence is at risk for being deleted bythe Internet service providers
unless you reach out and notify them that you need those records preserved. The
police or volunteers at WiredSafety.org can advise you how to do that quickly. Using
a monitoring product, like Spectorsoft, collects all electronic data necessary to
report, investigate and prosecute your case (if necessary). While hopefully you will
never need it, the evidence is automatically saved by the software in a form useable
by law enforcement when you need it without you having to learn to log or copy
header and IP information
24. Show video on how school and patents can protect against cuber bullying – see
below
Homework: find at a web resource that helps identify Cyber Bullying

More Related Content

What's hot

Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine at McGill
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for StudentsKelgator
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying projectJoannaNieves
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 

What's hot (20)

Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying project
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 

Viewers also liked

Microsoft Power Point Bullying Lesson 6th Vc
Microsoft Power Point   Bullying Lesson 6th VcMicrosoft Power Point   Bullying Lesson 6th Vc
Microsoft Power Point Bullying Lesson 6th Vcjsmith3174
 
Anti Bully and prevention of bullying
Anti Bully and prevention of bullyingAnti Bully and prevention of bullying
Anti Bully and prevention of bullyingJess560960
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationdreamingmoi
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1itunaschool
 

Viewers also liked (7)

Microsoft Power Point Bullying Lesson 6th Vc
Microsoft Power Point   Bullying Lesson 6th VcMicrosoft Power Point   Bullying Lesson 6th Vc
Microsoft Power Point Bullying Lesson 6th Vc
 
Bullying
BullyingBullying
Bullying
 
Anti Bully and prevention of bullying
Anti Bully and prevention of bullyingAnti Bully and prevention of bullying
Anti Bully and prevention of bullying
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 

Similar to Draft summary of lessons

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
08 25 cyberbullying tips
08 25 cyberbullying tips08 25 cyberbullying tips
08 25 cyberbullying tipscaroline2012cox
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011Loreto Normanurst
 
Using Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parentsUsing Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parentsDonal O' Mahony
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 

Similar to Draft summary of lessons (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
08 25 cyberbullying tips
08 25 cyberbullying tips08 25 cyberbullying tips
08 25 cyberbullying tips
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Bullying
BullyingBullying
Bullying
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
 
Using Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parentsUsing Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parents
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 

More from Jon Synnott

Group working agreement group 3
Group working agreement   group 3Group working agreement   group 3
Group working agreement group 3Jon Synnott
 
E moderator guidelines
E moderator guidelinesE moderator guidelines
E moderator guidelinesJon Synnott
 
Cognitivism as a means to teach it in a healthcare environment, are there alt...
Cognitivism as a means to teach it in a healthcare environment, are there alt...Cognitivism as a means to teach it in a healthcare environment, are there alt...
Cognitivism as a means to teach it in a healthcare environment, are there alt...Jon Synnott
 
Storyboard development idealistics
Storyboard development idealisticsStoryboard development idealistics
Storyboard development idealisticsJon Synnott
 
Additional Storyboard information
Additional Storyboard informationAdditional Storyboard information
Additional Storyboard informationJon Synnott
 

More from Jon Synnott (6)

Group working agreement group 3
Group working agreement   group 3Group working agreement   group 3
Group working agreement group 3
 
E moderator guidelines
E moderator guidelinesE moderator guidelines
E moderator guidelines
 
Cognitivism as a means to teach it in a healthcare environment, are there alt...
Cognitivism as a means to teach it in a healthcare environment, are there alt...Cognitivism as a means to teach it in a healthcare environment, are there alt...
Cognitivism as a means to teach it in a healthcare environment, are there alt...
 
Storyboard development idealistics
Storyboard development idealisticsStoryboard development idealistics
Storyboard development idealistics
 
Personas
PersonasPersonas
Personas
 
Additional Storyboard information
Additional Storyboard informationAdditional Storyboard information
Additional Storyboard information
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Draft summary of lessons

  • 1. Lesson 1 – What is Cyber Bullying. - class group work online 1. Present students with a question – What is Bullying? a. Students enter answer 2. Present students with the accepted definition of Bullying – sample below Bullying Definition. Bullying is unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Both kids who are bullied and who bully others may have serious, lasting problems. Stopbullying.gov 3. What is Cyber Bullying? a. Students suggest an answer 4. Present students with a definition of Cyber Bullying – sample below Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. 5. Give some samples of Cyber Bullying a. Students suggest an answer 6. Present students with a list of Bullying actions– sample below  Mean text messages or emails,  Rumors sent by email or posted on social networking sites  Embarrassing pictures, videos, websites,  Fake profiles.  Cyberstalking  Flaming  Exclusion  Outing  Masquerading  Warning Wars  Changing someones online profile 7. Show video of Cyber Bullying – see below https://www.youtube.com/watch?v=lN2fuKPDzHA
  • 2. https://www.youtube.com/watch?v=dkG00Czb4ho&list=PLwJiMdrl2jxdW- wtDlnsOiARWRCfbnBse&index=1 https://www.youtube.com/watch?v=A9Op2KZCb88&list=PLwJiMdrl2jxdW- wtDlnsOiARWRCfbnBse&index=2 https://www.youtube.com/watch?v=GbutdD4FCQ8&index=3&list=PLwJiMdrl2jxdW- wtDlnsOiARWRCfbnBse 8. Class Activity – Present all answers to the above questions to the class. Split class into Groups, each group then ceates their own definition of both Cyber Bullying and Bullying. Homework: find at a web resource that defines Cyber Bullying.
  • 3. Lesson 2 – How to Identify Cyber Bullying. - classroom group activity online 9. Present students with a question – How do you identify if a friend is being cyber bullies? a. Students enter answer 10. Present students with a list of identifying signs – sample below Your child is suddenly spends much more — or much less — time texting, gaming or using social- networking websites. Any rapid change could be an alarm bell. After texting or being online, he or she seems withdrawn, upset or outraged. Your child asks to have a social-media or online account shut down. He or she suddenly avoids formerly enjoyable social situations. He or she blocks a number or an email address from his or her account. Many new phone numbers, texts or email addresses show up on your child's phone, laptop or tablet. He or she acts frustrated and impatient, or simply acts out more. Your child notices that he or she is being gossiped about online, or that others are using "code words" in place of his or her name. Strangers have opened Facebook or other social-media accounts in your child's name Cyberbullying may be happening to someone you know. Watch out for these signs. Your friend suddenly avoids using their mobile device or computer, or they begin spending much more time texting, gaming or using social networking sites. They often seem upset, withdrawn or angry, especially after receiving emails, instant messages or text messages. Your friend becomes more secretive about their online activities and may avoid talking about their computer or mobile device. They're reluctant to leave the house; you stop seeing them at social events they used to enjoy. Their grades are falling, and they're behind in their schoolwork. Your friend doesn't even want to go to school, or they completely refuse to go. They're not eating or sleeping well Suddenly deleting a social networking profile and account. A whole bunch of new texts, email addresses or phone numbers begin appearing on your friend's phone, laptop or other device
  • 4. 11. Show video on how to identify Cyber Bullying – see below Homework: find at a web resource that helps identify Cyber Bullying. Lesson 3 – what to do. - classroom group activity online 12. Present students with a question – what do you do if you suspect a friend is being cyber bullies? a. Students enter answer 13. Present students with a list of steps to take – sample below List steps 14. Present students with a question – what do you do if you are being cyber bullied? a. Students enter answer 15. Present students with a list of steps to take – sample below List steps 16. Show video on what to do if you see Cyber Bullying and if you are being cyber bullied – see below Homework: find at a web resource that outlines what to do if you suspect cyber bullying and if you are being bullied Lesson 4 – Protection from Cyber bullying. - classroom group activity online 17. Present students with a question – What do you do to protect yourself from Cyber bullying? a. Students enter answer 18. Present students with a list of steps to take – sample below How do you protect yourself from cyber bullying
  • 5. An Ounce of Prevention... Place / keep computer(s) with Internet access in an open, commonly used space Never give out personal information or passwords, P.I.N. numbers etc..-Personal information includes your name, the names of friends or family, your address, phone number, school name (or team name if you play sports). Personal info also includes pictures of yourself and your e-mail address. Ask permission before sharing any information with a Web site, a "chat buddy" and even when registering a product purchased for your computer (like a game). Passwords are secrets Never tell anyone your password except your parents or guardian. Don't believe everything you see or read -Just because someone online tells you that they are 15 doesn't mean they are telling the truth. Even adults can't tell when a male pretends to be a female or a 50 year old pretends to be a 15 year old. Use Netiquette -Be polite to others online just as you would off-line. If someone treats you rudely or meanly - do not respond. Online bullies are just like off-line. ones - they WANT you to answer (don't give them the satisfaction). Don't send a message to someone else when you are angry -Wait until you have calmed down and had time to think. Do your best to make sure that your messages are calmly and factually written. You will usually regret sending a "Flame" (angry) to someone else later on. Once you've sent a message, it is VERY hard to undo the damage that such "flames" can do. Don't open a mesage from someone you don't know - If in doubt about it, ask your parents, guardian or another adult. If it doesn't look or feel right, it probably isn't -Trust your instincts and teach your kids to trust theirs. While surfing the Internet, if you find something that you don't like, makes you feel uncomfortable or scares you, turn off the computer and tell an adult. You don't have to be "Always On" turn off, disconnect, unplug, try actual reality instead of virtual reality! - Give yourself a break Don't stay online or connected too long. Spend time with your family and friends off line. Sign on the dotted line Make and print out an online contract with your parents or guardians. Ask your parents to read the information for them on this Web site, so they will be informed about cyberbullying and Internet safety issues. 19. Show video on how to protect yourself from Cyber Bullying – see below Homework: find at a web resource that does how to protect against Cyber Bullying Lesson 5 – who is responsible for eliminating cyber bullying. - classroom group activity online
  • 6. 20. Present students with a question – What is the schools role in reducing cuber bullying? a. Students enter answer 21. Present students with a list of steps to take – sample below When schools try and get involved by disciplining the student for cyberbullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right. They also, often lose. Schools can be very effective brokers in working with the parents to stop and remedy cyberbullying situations. They can also educate the students on cyberethics and the law. If schools are creative, they can sometimes avoid the claim that their actions exceeded their legal authority for off-campus cyberbullying actions. We recommend that a provision is added to the school's acceptable use policy reserving the right to discipline the student for actions taken off-campus if they are intended to have an effect on a student or they adversely affect the safety and well-being of student while in school. This makes it a contractual, not a constitutional, issue 22. Present students with a question – What is the parents role in reducing cyber bullying? a. Students enter answer 23. Present students with a list of steps to take – sample below Parents need to be the one trusted place kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online. Why? Parents tend to overreact. Most children will avoid telling their parents about a cyberbullying incident fearing they will only make things worse. (Calling the other parents, the school, blaming the victim or taking away Internet privileges.) Unfortunately, they also sometimes underreact, and rarely get it "just right." (You can read more about this in "Not Too Hot, Not Too Cold! Goldilocks and the CyberParents") Parents need to be supportive of your child during this time. You may be tempted to give the "stick and stones may break your bones, but words will never hurt you" lecture, but words and cyberattacks can wound a child easily and have a lasting effect. These attacks follow them into your otherwise safe home and wherevertheygo online. And when up to 700 million accomplices can be recruited to help target or humiliate your child, the risk of emotional pain is veryreal, and veryserious. Don't brush it off. Let the school know so the guidance counselor can keep an eye out for in-school bullying and for how your child is handling things. You may want to notify your pediatrician, family counselor or clergy for support if things progress. It is crucial that you are there to provide the necessarysupport and love. Make themfeel secure. Children
  • 7. have committed suicide after having been cyberbullied, and in Japan one young girl killed another after a cyberbullying incident. Take it seriously. Parents also need to understand that a child is just as likely to be a cyberbully as a victim of cyberbullying and often go back and forth between the two roles during one incident. They may not even realize that they are seen as a cyberbully. (You can learn more about this under the "Inadvertent Cyberbully" profile of a cyberbully.) We have a quick guide to what to do if your child is being cyberbullied: Your actions have to escalate as the threat and hurt to your child does. But there are two things you must consider before anything else. Is your child at risk of physical harm or assault? And how are they handling the attacks emotionally? If there is any indication that personal contact information has been posted online, or any threats are made to your child, you must run.do not walk, to your local law enforcement agency (not the FBI). Take a print-out of all instances of cyberbullying to show them, but note that a print-out is not sufficient to prove a case of cyber-harassment or cyberbullying. You'll need electronic evidence and live data for that. (You may want to answer the questions on our checklist for helping spot the difference between annoying communications and potentially dangerous ones. But remember, if in doubt, report it.) Let the law enforcement agency know that the trained cyber-harassment volunteers at WiredSafety.org will work with them (without charge) to help them find the cyberbully offline and to evaluate the case. It is crucial that all electronic evidence is preserved to allow the person to be traced and to take whatever action needs to be taken. The electronic evidence is at risk for being deleted bythe Internet service providers unless you reach out and notify them that you need those records preserved. The police or volunteers at WiredSafety.org can advise you how to do that quickly. Using a monitoring product, like Spectorsoft, collects all electronic data necessary to report, investigate and prosecute your case (if necessary). While hopefully you will never need it, the evidence is automatically saved by the software in a form useable by law enforcement when you need it without you having to learn to log or copy header and IP information 24. Show video on how school and patents can protect against cuber bullying – see below Homework: find at a web resource that helps identify Cyber Bullying