12. One in three teens (ages 12-17) have been victims of cyberbullying
13. One in six pre-teens (ages 6-11) have been victims of cyberbullying
14. Children are just as likely to receive threatening messages at school as they are at home
15.
16. Is it against the law? That depends… Cases in which cyberbullies have been convicted have shown that they have abused this constitutional right to an extent that they be held accountable for their actions.
17.
18. On this website, each state receives a letter grade based on the occurrences of cyberbullying cases and how they are handled. www.bullypolice.org
19.
20. Cyberbullying can take place at school, however, instances of bullying that occurred at home can impact a student’s learning in the classroom as well. It is very difficult if not impossible for students to escape instances of cyberbullying.
21.
22. Is bullying that takes place at home able to be disciplined within the school?
25. Creating a policy Be proactive, not reactive. Having a classroom technology policy can prevent problems from happening before they occur. It can also provide teachers with a set of fair and equal set of consequences for policy violations.
26. Creating a policy Be proactive, not reactive. In order to create an effective policy, teachers and administrators must employ wording that is broad enough to cover as many instances as possible, while they must also be specific enough so that a document can uphold its integrity in a court of law if necessary.
27.
28. show compliance and understanding by both parent(s)/guardian(s) and student (preferably by means of a signature) and returned to the teacher to be filed
29. clearly state the goals the teacher intends to achieve and activities planned using said technology
33. some policies include different consequences for first, second, and third-time offenses
34. some policies include a clause that allows for discretion on the part of administration as to the seriousness of the offense and the resulting punishment
38. be approved by an administrator before being sent home with students (Some schools require this, others do not, but it’s still a good idea!)
39.
40. Treat cyberbullying as we would the issues of lying, cheating, or stealing when students are young.
41.
42. Remind students of the policies in place frequently throughout the duration of a project or school year.
43.
44. Monitor computers and Internet history as well as student behavior in the classroom.Students know when they are being monitored closely, and chances of problems occurring in your classroom will be less if you are a constant, active presence.
45. Complete the Activity: Locate the Cyberbullying Activity on WesternOnline. Read it carefully and complete it by the posted due date. Worth 40 pts. Don’t forget to review the rubric before starting!
46. References Bully Police U.S.A. (2009). Retrieved from website: www.bullypolice.org Meyers, J. J. (2009). Censoring cyber speech on campus??? Unpublished manuscript. Presented September 29, 2009 at Western Illinois University. Meyers, J. J., & Carper, G. T. (2009). Cyberbullying: The legal challenge for educators. West’s Educational Law Reporter. Meyers, J. J., Carper, G. T., & Hemphill, L. S. (2009). Cyber Bullies Come to Campus: Are Administrators and Faculty Ready? Roskamp, T. J. (2009). Cyberbullying in Illinois public schools. Unpublished doctoral dissertation, Western Illinois University.