SlideShare a Scribd company logo
 
Holli Kenley, M.A.
 Goal One: To acquire methods and strategies in protection
from cyber bullying.
 Goal Two: To acquire methods and strategies of intervention
with cyber bullying.
 Goal Three: To acquire methods and strategies in the
prevention of cyber bullying.
“…willful and repeated harm inflicted through the use of
computers, cell phones, and other electronic devices.”
(Hinduja & Patchin, 2009)
1. Cyber victim, pure victim, cyber bullied, cyber
victimized
2. Cyber bully
3. Cyber bully victim, cyber bullied victimized
4. Traditional bully
5. Bullicide
1. Synonyms for cyber bullying
2. Types of cyber bullying
3. Relationship to traditional bullying
4. Prevalence
 Protection – To safeguard against cyber risk and to address
low level cyber harm.
Assessment:
1. Role/s of client
2. Crisis intervention, protection, or both
 Educate adults and their children about safety measures.
1. Prepare children
2. Supervise and monitor children
3. Technological solutions
“Stop – Save – Share” (Hinduja & Patchin, 2012)
“ I DON’T PLAY” (Sutton, 2009)
 Educate adults and their children about safety measures.
4. Web sites:
www. Cyberbullying.us
www. Cyberbullyhelp.com
5. Blocking and Filtering Software
6. Report to Internet Service Provider (IPS) or Site
 Teach adults how to parent a high tech generation.
1. Family Internet Use Agreement (sample)
Personal Code of Conduct
2. Implement safety measures for cyber victim
Implement reasonable consequences for cyber bully
3. Net neighborhood (Coloroso, 2008)
4. Web buddies; peer helper programs
 Increase awareness of a cyber bullying culture and of the
roles/responsibilities of every individual.
Team Responsibility:
1. Parents
2. Youth
3. Schools
4. Community
5. Society (Trolley & Hanel, 2010)
 Team Responsibility:
6. Therapists and Clinicians:
Services
Groups
Advocacy
Newsletters or professional materials
 “A Whole Approach”
Safe environment
Anti –bullying program
Anti –bullying policy
Safe philosophy (Sullivan, 2011)
 Questions…
 Input…
 Other thinking…
 
(Spears, Slee, Ownes & Johnson, 2009)
 “Cyber bullying [is] an aggressive, intentional act, carried out
by a group or individual, using electronic forms of contact,
repeatedly and over time, against a victim who cannot easily
defend him or herself”.
(Smith, Mahdavid, Carvalho, and Tippett, 2006)
1. Instrumental aggression
2. Reactive aggression
3. Overt aggression
4. Covert aggression
5. Theories of aggression
(Bauman, 2011)
 Intervention – To identify role/s of clients, to assess level of
cyber harm, and to implement therapeutic strategies.
Assessment:
1. Role/s of clients
2. Crisis intervention, protection and TX
 To implement crisis interventions.
1. Cyber victim
2. Cyber bully
3. Cyber bully victim
 To implement treatment strategies given the role/s of
clients.
Cyber victim:
1. Profile
2. Needs/motivations
3. Relationship to technology
 To implement treatment strategies…
Cyber victim:
1. Protective measures in place; legal issues
2. Address victimization/empowerment
3. Goals of counseling
4. Address presenting or co-occurring disorders
5. Positive peer relationships/social skill building
6. Support groups
7. Work with parent/guardian (Campbell, 2007)
 To implement treatment strategies given the role/s of
clients.
Cyber bully:
1. Profile
2. Needs/motivations
3. Relationship to technology
 To implement treatment strategies…
Cyber bully:
1. Punishment (?)
2. Positive need fulfillment
3. Social skill building
4. Empathy building
5. Address presenting or co-occurring disorders
6. Group work
7. Work with parent/guardian; legal issues
 To implement treatment strategies given the role/s of
clients.
Cyber bully victim:
1. Profile, history, and relationship to both
2. Assess levels of danger to self and others
3. Assess underlying pathology or co-occurring disorders
4. Implement psychological, educational, and social
response
5. Work with parent/guardian; legal issues
 To implement treatment strategies…
Cyber victim, cyber bully, cyber bully victim:
1. Interpersonal approaches
2. Brief-solution focused therapy (low level)
Cog/Behavioral; Rational Emotive (high level)
3. Support groups
* Pikas “Shared Method of Concern”
4. Restorative justice (Bauman, 2011)
 To implement the “System’s Approach” or “Holistic
Approach” as it applies to treatment.
Parents - Youth - School - Community - Law Enforcement :
1. Psychological response
2. Educational response
3. Social response
 To implement “System’s Approach”…
IP Family (Relationship to technology)
Schools/Counselors/Therapists
Community/Support Systems/Legal
 To review role of support systems as they apply to
intervention.
Support systems:
1. Groups
2. Holistic Approach
 Questions…
 Input…
 Other thinking…
 
(Hinduja & Patchin, 2012)
 Prevention – To address the causal factors of cyber bullying
and to implement healthy practices in our relationships with
technology and with others.
Causal factors – a review of current thinking:
1. Two social networking norms
2. Technology-induced conditioned responses
3. Profile of bully or bully victim
1. Causal factors – two social networking norms
Anonymity or pseudonymity
1. Detachment from real world
2. Distant from target
3. Disinhibition
Power differential
1. Ease
2. Expansion
3. Emboldened
2. Causal factors – technology-induced conditioned response
Habits of electronic communication reinforced by:
1. Disinhibition
2. Developmental factors
3. Reinforcement from self and from others
4. Repetition
5. Factors in cyber space
3. Causal factors -combine with profile of bully or bully victim
Attitudes, beliefs, and motivations:
1. Regard (lack of empathy)
2. Revenge
3. Relationship between victim (T or C) , cyber bully,
and traditional bully
“Technology use is an indirect form of contact and interaction
with society. A healthy balance of direct interaction with peers
and physical activities promotes good social skills, problem
solving abilities, and physical fitness.”
(Trolley & Hanel, 2008)
 To implement healthy practices in our relationships with
technology.
Cyber balance:
1. Family assessment
2. Education
3. Establish philosophy, guidelines and practices
4. Direct interaction, empathy building, serve others
5. Adults model healthy behaviors
 To implement healthy practices in our relationships with
others.
1. An enforceable policy in place
2. Peer support
3. Positive interdependent experiences
4. Individual and group accountability
5. Face to face interaction
6. Teach and model interpersonal skills
7. Group process (role play and build empathy)
“…restoring the use of technology within the family, particularly
by youth…allows you to experience the benefits of technology
while reducing the risks…cyber bullying is a symptom of being
out of balance with technology.”
(Trolley & Hanel, 2010)
 Celebrate being present
 Celebrate being available
 Celebrate our similar need for
respect, dignity & human regard
 
Holli Kenley

More Related Content

Viewers also liked

Child-sensitive social protection: policy and practice in South Asia - Keetie...
Child-sensitive social protection: policy and practice in South Asia - Keetie...Child-sensitive social protection: policy and practice in South Asia - Keetie...
Child-sensitive social protection: policy and practice in South Asia - Keetie...
Institute of Development Studies
 
Social Protection, Economic Growth, Poverty and Inequality in Brazil?
Social Protection, Economic Growth, Poverty and Inequality in Brazil?Social Protection, Economic Growth, Poverty and Inequality in Brazil?
Social Protection, Economic Growth, Poverty and Inequality in Brazil?
UNDP Policy Centre
 
hjc Turning Point 2010 - Social Media
hjc Turning Point 2010 - Social Mediahjc Turning Point 2010 - Social Media
hjc Turning Point 2010 - Social Media
Laisie Tu
 
Equitable Development: Untangling the Web of Urban Development Through Collab...
Equitable Development: Untangling the Web of Urban Development Through Collab...Equitable Development: Untangling the Web of Urban Development Through Collab...
Equitable Development: Untangling the Web of Urban Development Through Collab...
celey
 
Child protection and social protection ch prot & adol network meeting v2
Child protection and social protection ch prot & adol network meeting v2Child protection and social protection ch prot & adol network meeting v2
Child protection and social protection ch prot & adol network meeting v2
Mies Infa
 
Robert final conference 2012 UNICEF presentation
Robert final conference 2012   UNICEF presentationRobert final conference 2012   UNICEF presentation
Robert final conference 2012 UNICEF presentation
UNICEF Europe & Central Asia
 
Communication Strategies for Social Media
Communication Strategies for Social MediaCommunication Strategies for Social Media
Communication Strategies for Social Media
Hareesh Tibrewala
 
Child-sensitive social protection: policy and practice in South Asia - Disa S...
Child-sensitive social protection: policy and practice in South Asia - Disa S...Child-sensitive social protection: policy and practice in South Asia - Disa S...
Child-sensitive social protection: policy and practice in South Asia - Disa S...
Institute of Development Studies
 
B009 Social Protection
B009 Social ProtectionB009 Social Protection
B009 Social Protection
avinashbhide
 
Social media and digital communication strategies for canada's public sector
Social media and digital communication strategies for canada's public sectorSocial media and digital communication strategies for canada's public sector
Social media and digital communication strategies for canada's public sector
Robert Cairns
 
Access of Children with Disabilities to Education, Health and Social Protecti...
Access of Children with Disabilities to Education, Health and Social Protecti...Access of Children with Disabilities to Education, Health and Social Protecti...
Access of Children with Disabilities to Education, Health and Social Protecti...
Meri Poghosyan
 
Social protection linking policy and strategic trajectories social capital ...
Social protection   linking policy and strategic trajectories social capital ...Social protection   linking policy and strategic trajectories social capital ...
Social protection linking policy and strategic trajectories social capital ...
Costy Costantinos
 
Green Infrastructure for Engaging Communities
Green Infrastructure for Engaging CommunitiesGreen Infrastructure for Engaging Communities
Green Infrastructure for Engaging Communities
UrbanSystemsCanada
 
Optimising_Social_Media_for_Public_Administrations_and_Institutions_PR
Optimising_Social_Media_for_Public_Administrations_and_Institutions_PROptimising_Social_Media_for_Public_Administrations_and_Institutions_PR
Optimising_Social_Media_for_Public_Administrations_and_Institutions_PR
John Shewell
 
Child sensistive social protection bappenas 9 mei 2012
Child sensistive social protection bappenas   9 mei 2012Child sensistive social protection bappenas   9 mei 2012
Child sensistive social protection bappenas 9 mei 2012
Febriansyah Soebagio
 
The Social Commons: Social Protection in the Age of Sharing, by Francine Mestrum
The Social Commons: Social Protection in the Age of Sharing, by Francine MestrumThe Social Commons: Social Protection in the Age of Sharing, by Francine Mestrum
The Social Commons: Social Protection in the Age of Sharing, by Francine Mestrum
Share The World's Resources
 
Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...
Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...
Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...
UNDP Policy Centre
 
Elsa Alfai presentation english
Elsa Alfai presentation englishElsa Alfai presentation english
Elsa Alfai presentation english
lucifer
 
From Protection to Production: Exploring the linkages and strengthening coor...
From Protection to Production: Exploring the linkages and strengthening coor...From Protection to Production: Exploring the linkages and strengthening coor...
From Protection to Production: Exploring the linkages and strengthening coor...
SIANI
 

Viewers also liked (19)

Child-sensitive social protection: policy and practice in South Asia - Keetie...
Child-sensitive social protection: policy and practice in South Asia - Keetie...Child-sensitive social protection: policy and practice in South Asia - Keetie...
Child-sensitive social protection: policy and practice in South Asia - Keetie...
 
Social Protection, Economic Growth, Poverty and Inequality in Brazil?
Social Protection, Economic Growth, Poverty and Inequality in Brazil?Social Protection, Economic Growth, Poverty and Inequality in Brazil?
Social Protection, Economic Growth, Poverty and Inequality in Brazil?
 
hjc Turning Point 2010 - Social Media
hjc Turning Point 2010 - Social Mediahjc Turning Point 2010 - Social Media
hjc Turning Point 2010 - Social Media
 
Equitable Development: Untangling the Web of Urban Development Through Collab...
Equitable Development: Untangling the Web of Urban Development Through Collab...Equitable Development: Untangling the Web of Urban Development Through Collab...
Equitable Development: Untangling the Web of Urban Development Through Collab...
 
Child protection and social protection ch prot & adol network meeting v2
Child protection and social protection ch prot & adol network meeting v2Child protection and social protection ch prot & adol network meeting v2
Child protection and social protection ch prot & adol network meeting v2
 
Robert final conference 2012 UNICEF presentation
Robert final conference 2012   UNICEF presentationRobert final conference 2012   UNICEF presentation
Robert final conference 2012 UNICEF presentation
 
Communication Strategies for Social Media
Communication Strategies for Social MediaCommunication Strategies for Social Media
Communication Strategies for Social Media
 
Child-sensitive social protection: policy and practice in South Asia - Disa S...
Child-sensitive social protection: policy and practice in South Asia - Disa S...Child-sensitive social protection: policy and practice in South Asia - Disa S...
Child-sensitive social protection: policy and practice in South Asia - Disa S...
 
B009 Social Protection
B009 Social ProtectionB009 Social Protection
B009 Social Protection
 
Social media and digital communication strategies for canada's public sector
Social media and digital communication strategies for canada's public sectorSocial media and digital communication strategies for canada's public sector
Social media and digital communication strategies for canada's public sector
 
Access of Children with Disabilities to Education, Health and Social Protecti...
Access of Children with Disabilities to Education, Health and Social Protecti...Access of Children with Disabilities to Education, Health and Social Protecti...
Access of Children with Disabilities to Education, Health and Social Protecti...
 
Social protection linking policy and strategic trajectories social capital ...
Social protection   linking policy and strategic trajectories social capital ...Social protection   linking policy and strategic trajectories social capital ...
Social protection linking policy and strategic trajectories social capital ...
 
Green Infrastructure for Engaging Communities
Green Infrastructure for Engaging CommunitiesGreen Infrastructure for Engaging Communities
Green Infrastructure for Engaging Communities
 
Optimising_Social_Media_for_Public_Administrations_and_Institutions_PR
Optimising_Social_Media_for_Public_Administrations_and_Institutions_PROptimising_Social_Media_for_Public_Administrations_and_Institutions_PR
Optimising_Social_Media_for_Public_Administrations_and_Institutions_PR
 
Child sensistive social protection bappenas 9 mei 2012
Child sensistive social protection bappenas   9 mei 2012Child sensistive social protection bappenas   9 mei 2012
Child sensistive social protection bappenas 9 mei 2012
 
The Social Commons: Social Protection in the Age of Sharing, by Francine Mestrum
The Social Commons: Social Protection in the Age of Sharing, by Francine MestrumThe Social Commons: Social Protection in the Age of Sharing, by Francine Mestrum
The Social Commons: Social Protection in the Age of Sharing, by Francine Mestrum
 
Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...
Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...
Productive Inclusion in Brazil - Bolsa Familia and the Brazil without Extreme...
 
Elsa Alfai presentation english
Elsa Alfai presentation englishElsa Alfai presentation english
Elsa Alfai presentation english
 
From Protection to Production: Exploring the linkages and strengthening coor...
From Protection to Production: Exploring the linkages and strengthening coor...From Protection to Production: Exploring the linkages and strengthening coor...
From Protection to Production: Exploring the linkages and strengthening coor...
 

Similar to Triaging Cyber Bullying: Protection, Intervention & Prevention - CAMFT 48th Annual Conference

Cyber Bullying No More: Parent Education Workshop
Cyber Bullying No More: Parent Education WorkshopCyber Bullying No More: Parent Education Workshop
Cyber Bullying No More: Parent Education Workshop
Holli Kenley
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Alan Bruce
 
Successful and Practical Tips for Bully Prevention
Successful and Practical Tips for Bully PreventionSuccessful and Practical Tips for Bully Prevention
Successful and Practical Tips for Bully Prevention
Kathryn Tromblay PsyS, NCSP
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
Andy Jeter
 
BullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docxBullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docx
hartrobert670
 
Response-able digital storytelling
Response-able digital storytelling Response-able digital storytelling
Response-able digital storytelling
Daniela Gachago
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
Tph literature-scan
Tph literature-scanTph literature-scan
Tph literature-scan
Alanos Bendano
 
Addressing Cyberbullying In School Using The Quality Circle Approach
Addressing Cyberbullying In School Using The Quality Circle ApproachAddressing Cyberbullying In School Using The Quality Circle Approach
Addressing Cyberbullying In School Using The Quality Circle Approach
Joe Osborn
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
Bernajean Porter
 
Issues and challenges in participant recruitment: Using innovative technologi...
Issues and challenges in participant recruitment: Using innovative technologi...Issues and challenges in participant recruitment: Using innovative technologi...
Issues and challenges in participant recruitment: Using innovative technologi...
Center for Innovative Public Health Research
 
Running head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docx
Running head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docxRunning head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docx
Running head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docx
joellemurphey
 
Guidelines to case studies.pdf
Guidelines to case studies.pdfGuidelines to case studies.pdf
Guidelines to case studies.pdf
LizeVenterHorn
 
Child sexual abuse
Child sexual abuseChild sexual abuse
Indiana presentation ceipv
Indiana presentation ceipvIndiana presentation ceipv
Indiana presentation ceipv
Family Violence Prevention Project
 
Questionnaire for Teacher
Questionnaire for TeacherQuestionnaire for Teacher
Questionnaire for Teacher
Christopher Martin
 
Responding to bullying behavior - Section 4
Responding to bullying behavior - Section 4Responding to bullying behavior - Section 4
Responding to bullying behavior - Section 4
Verito Vera
 
Challenging behaviour plus Adlerian Briefing
Challenging behaviour plus Adlerian BriefingChallenging behaviour plus Adlerian Briefing
Challenging behaviour plus Adlerian Briefing
Balrymes
 
Group 3 - Interactive Activity I - Integrative Project II
Group 3 - Interactive Activity I - Integrative Project IIGroup 3 - Interactive Activity I - Integrative Project II
Group 3 - Interactive Activity I - Integrative Project II
Jefferson Molina
 
Keeping an eye on the child: Key Capabilities and students as leaders in mult...
Keeping an eye on the child: Key Capabilities and students as leaders in mult...Keeping an eye on the child: Key Capabilities and students as leaders in mult...
Keeping an eye on the child: Key Capabilities and students as leaders in mult...
Iriss
 

Similar to Triaging Cyber Bullying: Protection, Intervention & Prevention - CAMFT 48th Annual Conference (20)

Cyber Bullying No More: Parent Education Workshop
Cyber Bullying No More: Parent Education WorkshopCyber Bullying No More: Parent Education Workshop
Cyber Bullying No More: Parent Education Workshop
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
 
Successful and Practical Tips for Bully Prevention
Successful and Practical Tips for Bully PreventionSuccessful and Practical Tips for Bully Prevention
Successful and Practical Tips for Bully Prevention
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
BullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docxBullyingIntroductionBullying is defined as any for.docx
BullyingIntroductionBullying is defined as any for.docx
 
Response-able digital storytelling
Response-able digital storytelling Response-able digital storytelling
Response-able digital storytelling
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Tph literature-scan
Tph literature-scanTph literature-scan
Tph literature-scan
 
Addressing Cyberbullying In School Using The Quality Circle Approach
Addressing Cyberbullying In School Using The Quality Circle ApproachAddressing Cyberbullying In School Using The Quality Circle Approach
Addressing Cyberbullying In School Using The Quality Circle Approach
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Issues and challenges in participant recruitment: Using innovative technologi...
Issues and challenges in participant recruitment: Using innovative technologi...Issues and challenges in participant recruitment: Using innovative technologi...
Issues and challenges in participant recruitment: Using innovative technologi...
 
Running head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docx
Running head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docxRunning head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docx
Running head CRIMINAL BEHAVIOR1CRIMINAL BEHAVIOR8.docx
 
Guidelines to case studies.pdf
Guidelines to case studies.pdfGuidelines to case studies.pdf
Guidelines to case studies.pdf
 
Child sexual abuse
Child sexual abuseChild sexual abuse
Child sexual abuse
 
Indiana presentation ceipv
Indiana presentation ceipvIndiana presentation ceipv
Indiana presentation ceipv
 
Questionnaire for Teacher
Questionnaire for TeacherQuestionnaire for Teacher
Questionnaire for Teacher
 
Responding to bullying behavior - Section 4
Responding to bullying behavior - Section 4Responding to bullying behavior - Section 4
Responding to bullying behavior - Section 4
 
Challenging behaviour plus Adlerian Briefing
Challenging behaviour plus Adlerian BriefingChallenging behaviour plus Adlerian Briefing
Challenging behaviour plus Adlerian Briefing
 
Group 3 - Interactive Activity I - Integrative Project II
Group 3 - Interactive Activity I - Integrative Project IIGroup 3 - Interactive Activity I - Integrative Project II
Group 3 - Interactive Activity I - Integrative Project II
 
Keeping an eye on the child: Key Capabilities and students as leaders in mult...
Keeping an eye on the child: Key Capabilities and students as leaders in mult...Keeping an eye on the child: Key Capabilities and students as leaders in mult...
Keeping an eye on the child: Key Capabilities and students as leaders in mult...
 

Recently uploaded

Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.GawadHemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
NephroTube - Dr.Gawad
 
RESPIRATORY DISEASES by bhavya kelavadiya
RESPIRATORY DISEASES by bhavya kelavadiyaRESPIRATORY DISEASES by bhavya kelavadiya
RESPIRATORY DISEASES by bhavya kelavadiya
Bhavyakelawadiya
 
Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...
Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...
Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...
ayushrajshrivastava7
 
Debunking Nutrition Myths: Separating Fact from Fiction"
Debunking Nutrition Myths: Separating Fact from Fiction"Debunking Nutrition Myths: Separating Fact from Fiction"
Debunking Nutrition Myths: Separating Fact from Fiction"
AlexandraDiaz101
 
Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.
Gokuldas Hospital
 
Helminthiasis or Worm infestation in Children for Nursing students
Helminthiasis or Worm infestation in Children for Nursing studentsHelminthiasis or Worm infestation in Children for Nursing students
Helminthiasis or Worm infestation in Children for Nursing students
RAJU B N
 
Osvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdf
Osvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdfOsvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdf
Osvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdf
Osvaldo Bernardo Muchanga
 
Recent advances on Cervical cancer .pptx
Recent advances on Cervical cancer .pptxRecent advances on Cervical cancer .pptx
Recent advances on Cervical cancer .pptx
DrGirishJHoogar
 
“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...
“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...
“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...
Université de Montréal
 
Introduction to British pharmacopeia.pptx
Introduction to British pharmacopeia.pptxIntroduction to British pharmacopeia.pptx
Introduction to British pharmacopeia.pptx
taiba qazi
 
Foundation of Yoga, YCB Level-3, Unit-1
Foundation of Yoga, YCB Level-3, Unit-1 Foundation of Yoga, YCB Level-3, Unit-1
Foundation of Yoga, YCB Level-3, Unit-1
Jyoti Bhaghasra
 
13. PROM premature rupture of membranes
13.  PROM premature rupture of membranes13.  PROM premature rupture of membranes
13. PROM premature rupture of membranes
TigistuMelak
 
All about shoulder Joint ..
All about shoulder Joint .. All about shoulder Joint ..
All about shoulder Joint ..
Aswan University Hospital
 
biomechanics of running. Dr.dhwani.pptx
biomechanics of running.   Dr.dhwani.pptxbiomechanics of running.   Dr.dhwani.pptx
biomechanics of running. Dr.dhwani.pptx
Dr. Dhwani kawedia
 
Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024
Torstein Dalen-Lorentsen
 
STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7
STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7
STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7
shruti jagirdar
 
Call Girls In Mumbai +91-7426014248 High Profile Call Girl Mumbai
Call Girls In Mumbai +91-7426014248 High Profile Call Girl MumbaiCall Girls In Mumbai +91-7426014248 High Profile Call Girl Mumbai
Call Girls In Mumbai +91-7426014248 High Profile Call Girl Mumbai
Mobile Problem
 
Travel Clinic Cardiff: Health Advice for International Travelers
Travel Clinic Cardiff: Health Advice for International TravelersTravel Clinic Cardiff: Health Advice for International Travelers
Travel Clinic Cardiff: Health Advice for International Travelers
NX Healthcare
 
Breast cancer: Post menopausal endocrine therapy
Breast cancer: Post menopausal endocrine therapyBreast cancer: Post menopausal endocrine therapy
Breast cancer: Post menopausal endocrine therapy
Dr. Sumit KUMAR
 
pharmacy exam preparation for undergradute students.pptx
pharmacy exam preparation for undergradute students.pptxpharmacy exam preparation for undergradute students.pptx
pharmacy exam preparation for undergradute students.pptx
AdugnaWari
 

Recently uploaded (20)

Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.GawadHemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
 
RESPIRATORY DISEASES by bhavya kelavadiya
RESPIRATORY DISEASES by bhavya kelavadiyaRESPIRATORY DISEASES by bhavya kelavadiya
RESPIRATORY DISEASES by bhavya kelavadiya
 
Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...
Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...
Full Handwritten notes of RA by Ayush Kumar M pharm - Al ameen college of pha...
 
Debunking Nutrition Myths: Separating Fact from Fiction"
Debunking Nutrition Myths: Separating Fact from Fiction"Debunking Nutrition Myths: Separating Fact from Fiction"
Debunking Nutrition Myths: Separating Fact from Fiction"
 
Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.Know the difference between Endodontics and Orthodontics.
Know the difference between Endodontics and Orthodontics.
 
Helminthiasis or Worm infestation in Children for Nursing students
Helminthiasis or Worm infestation in Children for Nursing studentsHelminthiasis or Worm infestation in Children for Nursing students
Helminthiasis or Worm infestation in Children for Nursing students
 
Osvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdf
Osvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdfOsvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdf
Osvaldo Bernardo Muchanga-GASTROINTESTINAL INFECTIONS AND GASTRITIS-2024.pdf
 
Recent advances on Cervical cancer .pptx
Recent advances on Cervical cancer .pptxRecent advances on Cervical cancer .pptx
Recent advances on Cervical cancer .pptx
 
“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...
“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...
“Psychiatry and the Humanities”: An Innovative Course at the University of Mo...
 
Introduction to British pharmacopeia.pptx
Introduction to British pharmacopeia.pptxIntroduction to British pharmacopeia.pptx
Introduction to British pharmacopeia.pptx
 
Foundation of Yoga, YCB Level-3, Unit-1
Foundation of Yoga, YCB Level-3, Unit-1 Foundation of Yoga, YCB Level-3, Unit-1
Foundation of Yoga, YCB Level-3, Unit-1
 
13. PROM premature rupture of membranes
13.  PROM premature rupture of membranes13.  PROM premature rupture of membranes
13. PROM premature rupture of membranes
 
All about shoulder Joint ..
All about shoulder Joint .. All about shoulder Joint ..
All about shoulder Joint ..
 
biomechanics of running. Dr.dhwani.pptx
biomechanics of running.   Dr.dhwani.pptxbiomechanics of running.   Dr.dhwani.pptx
biomechanics of running. Dr.dhwani.pptx
 
Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024
 
STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7
STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7
STUDIES IN SUPPORT OF SPECIAL POPULATIONS: GERIATRICS E7
 
Call Girls In Mumbai +91-7426014248 High Profile Call Girl Mumbai
Call Girls In Mumbai +91-7426014248 High Profile Call Girl MumbaiCall Girls In Mumbai +91-7426014248 High Profile Call Girl Mumbai
Call Girls In Mumbai +91-7426014248 High Profile Call Girl Mumbai
 
Travel Clinic Cardiff: Health Advice for International Travelers
Travel Clinic Cardiff: Health Advice for International TravelersTravel Clinic Cardiff: Health Advice for International Travelers
Travel Clinic Cardiff: Health Advice for International Travelers
 
Breast cancer: Post menopausal endocrine therapy
Breast cancer: Post menopausal endocrine therapyBreast cancer: Post menopausal endocrine therapy
Breast cancer: Post menopausal endocrine therapy
 
pharmacy exam preparation for undergradute students.pptx
pharmacy exam preparation for undergradute students.pptxpharmacy exam preparation for undergradute students.pptx
pharmacy exam preparation for undergradute students.pptx
 

Triaging Cyber Bullying: Protection, Intervention & Prevention - CAMFT 48th Annual Conference

  • 2.  Goal One: To acquire methods and strategies in protection from cyber bullying.  Goal Two: To acquire methods and strategies of intervention with cyber bullying.  Goal Three: To acquire methods and strategies in the prevention of cyber bullying.
  • 3. “…willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.” (Hinduja & Patchin, 2009)
  • 4. 1. Cyber victim, pure victim, cyber bullied, cyber victimized 2. Cyber bully 3. Cyber bully victim, cyber bullied victimized 4. Traditional bully 5. Bullicide
  • 5. 1. Synonyms for cyber bullying 2. Types of cyber bullying 3. Relationship to traditional bullying 4. Prevalence
  • 6.  Protection – To safeguard against cyber risk and to address low level cyber harm. Assessment: 1. Role/s of client 2. Crisis intervention, protection, or both
  • 7.  Educate adults and their children about safety measures. 1. Prepare children 2. Supervise and monitor children 3. Technological solutions “Stop – Save – Share” (Hinduja & Patchin, 2012) “ I DON’T PLAY” (Sutton, 2009)
  • 8.  Educate adults and their children about safety measures. 4. Web sites: www. Cyberbullying.us www. Cyberbullyhelp.com 5. Blocking and Filtering Software 6. Report to Internet Service Provider (IPS) or Site
  • 9.  Teach adults how to parent a high tech generation. 1. Family Internet Use Agreement (sample) Personal Code of Conduct 2. Implement safety measures for cyber victim Implement reasonable consequences for cyber bully 3. Net neighborhood (Coloroso, 2008) 4. Web buddies; peer helper programs
  • 10.  Increase awareness of a cyber bullying culture and of the roles/responsibilities of every individual. Team Responsibility: 1. Parents 2. Youth 3. Schools 4. Community 5. Society (Trolley & Hanel, 2010)
  • 11.  Team Responsibility: 6. Therapists and Clinicians: Services Groups Advocacy Newsletters or professional materials
  • 12.  “A Whole Approach” Safe environment Anti –bullying program Anti –bullying policy Safe philosophy (Sullivan, 2011)
  • 14.   (Spears, Slee, Ownes & Johnson, 2009)
  • 15.  “Cyber bullying [is] an aggressive, intentional act, carried out by a group or individual, using electronic forms of contact, repeatedly and over time, against a victim who cannot easily defend him or herself”. (Smith, Mahdavid, Carvalho, and Tippett, 2006)
  • 16. 1. Instrumental aggression 2. Reactive aggression 3. Overt aggression 4. Covert aggression 5. Theories of aggression (Bauman, 2011)
  • 17.  Intervention – To identify role/s of clients, to assess level of cyber harm, and to implement therapeutic strategies. Assessment: 1. Role/s of clients 2. Crisis intervention, protection and TX
  • 18.  To implement crisis interventions. 1. Cyber victim 2. Cyber bully 3. Cyber bully victim
  • 19.  To implement treatment strategies given the role/s of clients. Cyber victim: 1. Profile 2. Needs/motivations 3. Relationship to technology
  • 20.  To implement treatment strategies… Cyber victim: 1. Protective measures in place; legal issues 2. Address victimization/empowerment 3. Goals of counseling 4. Address presenting or co-occurring disorders 5. Positive peer relationships/social skill building 6. Support groups 7. Work with parent/guardian (Campbell, 2007)
  • 21.  To implement treatment strategies given the role/s of clients. Cyber bully: 1. Profile 2. Needs/motivations 3. Relationship to technology
  • 22.  To implement treatment strategies… Cyber bully: 1. Punishment (?) 2. Positive need fulfillment 3. Social skill building 4. Empathy building 5. Address presenting or co-occurring disorders 6. Group work 7. Work with parent/guardian; legal issues
  • 23.  To implement treatment strategies given the role/s of clients. Cyber bully victim: 1. Profile, history, and relationship to both 2. Assess levels of danger to self and others 3. Assess underlying pathology or co-occurring disorders 4. Implement psychological, educational, and social response 5. Work with parent/guardian; legal issues
  • 24.  To implement treatment strategies… Cyber victim, cyber bully, cyber bully victim: 1. Interpersonal approaches 2. Brief-solution focused therapy (low level) Cog/Behavioral; Rational Emotive (high level) 3. Support groups * Pikas “Shared Method of Concern” 4. Restorative justice (Bauman, 2011)
  • 25.  To implement the “System’s Approach” or “Holistic Approach” as it applies to treatment. Parents - Youth - School - Community - Law Enforcement : 1. Psychological response 2. Educational response 3. Social response
  • 26.  To implement “System’s Approach”… IP Family (Relationship to technology) Schools/Counselors/Therapists Community/Support Systems/Legal
  • 27.  To review role of support systems as they apply to intervention. Support systems: 1. Groups 2. Holistic Approach
  • 29.   (Hinduja & Patchin, 2012)
  • 30.  Prevention – To address the causal factors of cyber bullying and to implement healthy practices in our relationships with technology and with others. Causal factors – a review of current thinking: 1. Two social networking norms 2. Technology-induced conditioned responses 3. Profile of bully or bully victim
  • 31. 1. Causal factors – two social networking norms Anonymity or pseudonymity 1. Detachment from real world 2. Distant from target 3. Disinhibition Power differential 1. Ease 2. Expansion 3. Emboldened
  • 32. 2. Causal factors – technology-induced conditioned response Habits of electronic communication reinforced by: 1. Disinhibition 2. Developmental factors 3. Reinforcement from self and from others 4. Repetition 5. Factors in cyber space
  • 33. 3. Causal factors -combine with profile of bully or bully victim Attitudes, beliefs, and motivations: 1. Regard (lack of empathy) 2. Revenge 3. Relationship between victim (T or C) , cyber bully, and traditional bully
  • 34. “Technology use is an indirect form of contact and interaction with society. A healthy balance of direct interaction with peers and physical activities promotes good social skills, problem solving abilities, and physical fitness.” (Trolley & Hanel, 2008)
  • 35.  To implement healthy practices in our relationships with technology. Cyber balance: 1. Family assessment 2. Education 3. Establish philosophy, guidelines and practices 4. Direct interaction, empathy building, serve others 5. Adults model healthy behaviors
  • 36.  To implement healthy practices in our relationships with others. 1. An enforceable policy in place 2. Peer support 3. Positive interdependent experiences 4. Individual and group accountability 5. Face to face interaction 6. Teach and model interpersonal skills 7. Group process (role play and build empathy)
  • 37. “…restoring the use of technology within the family, particularly by youth…allows you to experience the benefits of technology while reducing the risks…cyber bullying is a symptom of being out of balance with technology.” (Trolley & Hanel, 2010)
  • 38.  Celebrate being present  Celebrate being available  Celebrate our similar need for respect, dignity & human regard