Cyber bullying (What you want to know) &  Cyber threats Kelly Schermerhorn Model Schools August 17, 2010 Games in Education Symposium
Cyber bullying What it is, who is involved,  where it is,  and how it affects YOU! What we can do about it?
What is it? Cyber bullying   is the use of electronic means to torment, threaten, harass, humiliate, embarrass or otherwise target another person .
Where is it found? E-mails Instant messaging Text or digital imaging messages sent on cell phones Web pages, Web logs (blogs) Chat rooms or discussion groups Other information communication technologies Plus more…
Where is it found?  (continued) Significant amount occurs off-campus, but it is impacting student relationships on-campus Bypass Internet filter/proxy sites Use cell phones or other digital devices This raises liability concerns.
Some technologies Wikis are websites anyone can edit . If you can word process, you can use a wiki. Visitors can see a history of changes and revert to earlier versions. Example:  www.wikipedia.org Wikis/Podcasts Podcasts are blogs with audio or video. Podcasts are like Internet radio or TV shows. Anyone can be a producer. Podcasts are consumed on demand. Examples:  www.epnweb.org Blogs Web + Log = weblog, or we blog Blogs are easily created and easily updated sites. If you can email, you can blog. Blogs allow visitors to comment. Example:  www.weblogg-ed.com
Types of cyber bullying Flaming (sarcasm) Harassment Denigration (dissin’) Impersonation Outing (telling a secret) Trickery Exclusion (keep out of the loop) Cyber stalking Trash talking
1995-2010 2 million  children  accessed the Internet in 1995 (worldwide)  This number climbed to 4 million in 1996  The number exceeded 28 million in 2000; 45 million in 2002; 77 million in 2005-what do you think it is today?  56 % of youths have access in their bedroom now (2010-cyberbullying.us)
Terms of use Cyber bullying is a violation of the "terms of use" of most service providers –  Will respond by removing such harmful content and terminating the membership of the offending poster –  But educators, parents, and students must file a complaint File a complaint by providing the harmful messages and ask that the account be terminated and any harmful material be removed
Cyber threats Threats or distressing material General statements that make it sound like the writer is emotionally upset and may consider harming someone else, harming himself or herself, or committing suicide
 
 
 
Who are Cyber bullies? May be known to the victim or a online stranger May be anonymous and enlist others, including online “friends” May be related to fights about relationships May be based on hate or bias Some teens think cyber bullying is a game
Teenagers might think… They think they are invisible, so they think they can’t be punished No real harm has been caused online They should have free speech right to post whatever they want, regardless of the harm caused
Warning signs Sadness or anger after Internet use Withdrawal from friends and activities School avoidance, decline in grades, and depression Possible indicators that the child is being bullied at school
IT IS A CRIME!!! HARASSMENT Post something in public 3rd Degree Misdemeanor – 1 year in jail $2,500 fine STALKING Several  communications are sent directly to victim 1st Degree Misdemeanor – 5 Years in jail $10,000 fine
“Bullycide” A new word developed when a person commits suicide due to bullying 3 rd  leading cause of death among 15 to 25 year olds and 6 th  leading cause among 5 to 14 year olds Half of all bullying incidents go unreported
Some recent cyber bullying cases in the news Ryan Halligan – 13 yrs old,  Vermont Classmates spread rumors he was GAY Female befriended him for his secrets Posted to internet Committed suicide Ghyslain Raza – “Star Wars Kid”, Canada Overweight and slightly awkward teenager Video of himself playing with a play light saber Classmates found & posted to internet Finished school year in a psychiatric ward Internet’s most downloaded video for 2006 Phoebe Prince -15 yrs old, Massachusetts Moved from Ireland to Massachusetts last summer (2009) Nine teens are charged with her suicide Hung herself and still taunted after her death
Megan Meier Megan – 13yrs old, Missouri -  Suffered from depression and attention deficit disorder Met “Josh Evans”, 16 – cyber friend on her MySpace site Josh ended their friendship – heard she was “cruel” Electronic postings about her “fat”, “slut” Josh commented" This world would be better off without her ” Committed suicide Oct 16, 2006
Megan Meier Lori Drew – 49 yrs old, Mo AKA – “Josh Evans” with co-conspirators - Ashley Grills May 15, 2008 indicted – Federal Grand Jury One count conspiracy (5yrs) Three counts accessing protected computers without authorization (5yrs each count) Fraudulently use of an account to cause harm Violated MySpace “terms of Service” Grand Jury in Los Angeles, Ca – Jurisdiction Ashley Grills – granted immunity.
Have you heard of.. Jeff Weise Pekka-Eric Auvinen Dillon Cossey Dylan Klebold & Eric Harris
How about now? Jeff Weise   - Red Lake-murdered 9, injured 5 @ Red Lake Indian Reservation in MN Pekka-Eric Auvinen  – Jokela-murdered 8, injured 12 in Finland Dillon Cossey  – Plymouth- Whitemarsh-accused of plotting a “Columbine-style” event (Mother bought rifle and gunpowder) Dylan Klebold & Eric Harris  – Columbine HS-murdered 13 students and 1 teacher-extensive planning
What can we do? We can not control the children – we must educate •  Balanced approach – policies may be too rigid •  Set rules and limits to Internet use •  Guide students to GOOD content/ethical usage •  Help teachers and parents educate children about safe, responsible uses of the internet •  Foster appropriate use of the internet among pre-schoolers and other young students
What else… Use the Internet for education-related activities, not recreational use or as a baby sitter • Use the Internet to communicate to the parents and students (websites, homework, e-mail) • Engage the community
Situation review Imminent Threat of Violence or Danger. • Gather evidence – screen shots, emails… • Violence or suicide assessment • Cyber bully assessment – can the school respond?
What can teachers do? Communicate with students •  Communicate with other educators / Lawyer •  Communicate with IT •  Communicate with the police •  Communicate with the parents Contact the Service provider •  Confront students who are behaving in irresponsible, inappropriate, or unsafe ways.  * Do not look the other way*
Student’s perspective Utah student creates video and wins “Predator” http://internetsafetyadvisor.squarespace.com/predators/
Resources http://www.stopbullyingnow.hrsa.gov/ http://www.cyberbully.org/ http://www.ncpc.org/cyberbullying http://www.cyberbullying.us/ http://123elearning.wikispaces.com/cyberbullying+presentation http://123elearning.wikispaces.com/onlinesafety http://www.ikeepsafe.org/iksc_kids/ http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/ http://www.cybersmartkids.com.au/ http://www.protectkids.com/ http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/kidz.htm   http://www.safesurf.com/ http://www.cybersmart.org/for/students.asp http://www.isafe.org/ http://www.webwisekids.org/ http://kidshealth.org/parent/positive/family/net_safety.html http://www.cyberbullying.us / http://www.cscic.state.ny.us

Cyberbullying class symposium

  • 1.
    Cyber bullying (Whatyou want to know) & Cyber threats Kelly Schermerhorn Model Schools August 17, 2010 Games in Education Symposium
  • 2.
    Cyber bullying Whatit is, who is involved, where it is, and how it affects YOU! What we can do about it?
  • 3.
    What is it?Cyber bullying is the use of electronic means to torment, threaten, harass, humiliate, embarrass or otherwise target another person .
  • 4.
    Where is itfound? E-mails Instant messaging Text or digital imaging messages sent on cell phones Web pages, Web logs (blogs) Chat rooms or discussion groups Other information communication technologies Plus more…
  • 5.
    Where is itfound? (continued) Significant amount occurs off-campus, but it is impacting student relationships on-campus Bypass Internet filter/proxy sites Use cell phones or other digital devices This raises liability concerns.
  • 6.
    Some technologies Wikisare websites anyone can edit . If you can word process, you can use a wiki. Visitors can see a history of changes and revert to earlier versions. Example: www.wikipedia.org Wikis/Podcasts Podcasts are blogs with audio or video. Podcasts are like Internet radio or TV shows. Anyone can be a producer. Podcasts are consumed on demand. Examples: www.epnweb.org Blogs Web + Log = weblog, or we blog Blogs are easily created and easily updated sites. If you can email, you can blog. Blogs allow visitors to comment. Example: www.weblogg-ed.com
  • 7.
    Types of cyberbullying Flaming (sarcasm) Harassment Denigration (dissin’) Impersonation Outing (telling a secret) Trickery Exclusion (keep out of the loop) Cyber stalking Trash talking
  • 8.
    1995-2010 2 million children accessed the Internet in 1995 (worldwide) This number climbed to 4 million in 1996 The number exceeded 28 million in 2000; 45 million in 2002; 77 million in 2005-what do you think it is today? 56 % of youths have access in their bedroom now (2010-cyberbullying.us)
  • 9.
    Terms of useCyber bullying is a violation of the "terms of use" of most service providers – Will respond by removing such harmful content and terminating the membership of the offending poster – But educators, parents, and students must file a complaint File a complaint by providing the harmful messages and ask that the account be terminated and any harmful material be removed
  • 10.
    Cyber threats Threatsor distressing material General statements that make it sound like the writer is emotionally upset and may consider harming someone else, harming himself or herself, or committing suicide
  • 11.
  • 12.
  • 13.
  • 14.
    Who are Cyberbullies? May be known to the victim or a online stranger May be anonymous and enlist others, including online “friends” May be related to fights about relationships May be based on hate or bias Some teens think cyber bullying is a game
  • 15.
    Teenagers might think…They think they are invisible, so they think they can’t be punished No real harm has been caused online They should have free speech right to post whatever they want, regardless of the harm caused
  • 16.
    Warning signs Sadnessor anger after Internet use Withdrawal from friends and activities School avoidance, decline in grades, and depression Possible indicators that the child is being bullied at school
  • 17.
    IT IS ACRIME!!! HARASSMENT Post something in public 3rd Degree Misdemeanor – 1 year in jail $2,500 fine STALKING Several communications are sent directly to victim 1st Degree Misdemeanor – 5 Years in jail $10,000 fine
  • 18.
    “Bullycide” A newword developed when a person commits suicide due to bullying 3 rd leading cause of death among 15 to 25 year olds and 6 th leading cause among 5 to 14 year olds Half of all bullying incidents go unreported
  • 19.
    Some recent cyberbullying cases in the news Ryan Halligan – 13 yrs old, Vermont Classmates spread rumors he was GAY Female befriended him for his secrets Posted to internet Committed suicide Ghyslain Raza – “Star Wars Kid”, Canada Overweight and slightly awkward teenager Video of himself playing with a play light saber Classmates found & posted to internet Finished school year in a psychiatric ward Internet’s most downloaded video for 2006 Phoebe Prince -15 yrs old, Massachusetts Moved from Ireland to Massachusetts last summer (2009) Nine teens are charged with her suicide Hung herself and still taunted after her death
  • 20.
    Megan Meier Megan– 13yrs old, Missouri - Suffered from depression and attention deficit disorder Met “Josh Evans”, 16 – cyber friend on her MySpace site Josh ended their friendship – heard she was “cruel” Electronic postings about her “fat”, “slut” Josh commented" This world would be better off without her ” Committed suicide Oct 16, 2006
  • 21.
    Megan Meier LoriDrew – 49 yrs old, Mo AKA – “Josh Evans” with co-conspirators - Ashley Grills May 15, 2008 indicted – Federal Grand Jury One count conspiracy (5yrs) Three counts accessing protected computers without authorization (5yrs each count) Fraudulently use of an account to cause harm Violated MySpace “terms of Service” Grand Jury in Los Angeles, Ca – Jurisdiction Ashley Grills – granted immunity.
  • 22.
    Have you heardof.. Jeff Weise Pekka-Eric Auvinen Dillon Cossey Dylan Klebold & Eric Harris
  • 23.
    How about now?Jeff Weise - Red Lake-murdered 9, injured 5 @ Red Lake Indian Reservation in MN Pekka-Eric Auvinen – Jokela-murdered 8, injured 12 in Finland Dillon Cossey – Plymouth- Whitemarsh-accused of plotting a “Columbine-style” event (Mother bought rifle and gunpowder) Dylan Klebold & Eric Harris – Columbine HS-murdered 13 students and 1 teacher-extensive planning
  • 24.
    What can wedo? We can not control the children – we must educate • Balanced approach – policies may be too rigid • Set rules and limits to Internet use • Guide students to GOOD content/ethical usage • Help teachers and parents educate children about safe, responsible uses of the internet • Foster appropriate use of the internet among pre-schoolers and other young students
  • 25.
    What else… Usethe Internet for education-related activities, not recreational use or as a baby sitter • Use the Internet to communicate to the parents and students (websites, homework, e-mail) • Engage the community
  • 26.
    Situation review ImminentThreat of Violence or Danger. • Gather evidence – screen shots, emails… • Violence or suicide assessment • Cyber bully assessment – can the school respond?
  • 27.
    What can teachersdo? Communicate with students • Communicate with other educators / Lawyer • Communicate with IT • Communicate with the police • Communicate with the parents Contact the Service provider • Confront students who are behaving in irresponsible, inappropriate, or unsafe ways. * Do not look the other way*
  • 28.
    Student’s perspective Utahstudent creates video and wins “Predator” http://internetsafetyadvisor.squarespace.com/predators/
  • 29.
    Resources http://www.stopbullyingnow.hrsa.gov/ http://www.cyberbully.org/http://www.ncpc.org/cyberbullying http://www.cyberbullying.us/ http://123elearning.wikispaces.com/cyberbullying+presentation http://123elearning.wikispaces.com/onlinesafety http://www.ikeepsafe.org/iksc_kids/ http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/ http://www.cybersmartkids.com.au/ http://www.protectkids.com/ http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/kidz.htm http://www.safesurf.com/ http://www.cybersmart.org/for/students.asp http://www.isafe.org/ http://www.webwisekids.org/ http://kidshealth.org/parent/positive/family/net_safety.html http://www.cyberbullying.us / http://www.cscic.state.ny.us