SlideShare a Scribd company logo
OUTLINE
The WITS Program
What is Bullying
What is Cyberbullying
Instructional Approaches
Resources
Pam Allyn – Huffington Post
CYBERBULLYING
“Today, bullying doesn’t even end at the school bell
– it can follow our children from the hallways to
their cell phones to their computer screens… We
have got to make sure our young people know that
if they’re in trouble, there are caring adults who can
help them” (U.S. President, BarackObama)
Flaming
Harassment
Denigration
Impersonation
Outing and trickery
Exclusion
Cyber stalking Willard 2006
FORMS OF CYBERBULLYING
- Happy slapping
- SextingKowalski et al., 2012
“When people use technology, there is a lack of tangible
feedback about the consequences of actions on others.”
Nancy Willard
[With] the Internet, you can really get away with a lot more because I don't think a lot
of people would have enough confidence to walk up to someone and be like, “I hate
you, you're ugly.” But over the Internet you don't really see their face or they don't see
yours and you don't have to look in their eyes and see they're hurt.
Student
Young Canadians in a Wired World, Phase III: Talking to Youth and Parents about Life Online
“What makes cyber bullying so dangerous is that anyone can practice it without
having to confront the victim. You don’t have to be strong or fast, simply equipped
with a cell phone or computer and a willingness to terrorize” (King, 2006)
• perpetrator may be anonymous
• if anonymous targets do not know who among their peers to
“watch out” for or respond to
• there is no safe “place”
Could feel more threatened than in a face to face encounter
Passive response
The victim, deletes or ignores an aggressive message as an attempt to
avoid cyberbullying and hopes that it will just go away.
Two Common Responses
Active Response
Responds to the situation in a way that may be more
successful in leading to resolution.
Two Common Responses
Bystanders
9% became involved in the bullying behaviour
32% watched but didn’t participate
14% voiced their objection to the person doing the bullying
21% tried to stop the bully
11% left the online environment
7% tried to befriend the bully, and
7% reported the bully to someone who could help.[3]
In general, the longer the bullying persists, the more likely it is that the number of
witnesses who are willing to join in will increase.
N. Willard, "Fostering Responsible Online Behaviour (Part 1)." For The Cybercitizen Awareness Program: Guidance Channel Ezine, June 2007.
BC Digital Literacy Competencies
Research and Information Literacy
Students apply digital tools to gather, evaluate, and use information.
Critical Thinking, Problem Solving, and Decision Making
Students use critical thinking skills to plan and conduct research, manage
projects, solve problems, and make informed decisions using appropriate digital
tools and resources.
Creativity and Innovation
Students demonstrate creative thinking, construct knowledge, and develop
innovative products and processes using technology.
Digital Citizenship
Students understand human, cultural, and societal issues related to technology
and practice legal and ethical behavior.
Communication and Collaboration
Students use digital media and environments to communicate and work
collaboratively, including at a distance, to support individual learning and
contribute to the learning of others.
Technology Operations and Concepts
Students demonstrate a sound understanding of technology
concepts, systems, and operations.
BC Ministry of Education
Safe digital communication– RCMP
Lessons and Activities
Identify The Line A Thin Line
Where to draw the line? That’s Not Cool
WITS Website Cyberbullying Resources
There is no silver
bullet
There is no one-size-fits-all solution for providing children
with every aspect of online child safety. It takes a
comprehensive “toolbox” from which parents, educators
and other safety providers can choose tools appropriate to
children’s developmental stages and life circumstances.
Any solution to online safety must be
holistic in nature and multi-dimensional in
breadth.
Youth Safety On The Living Internet, 2010
More information:
witsprograms.ca
fb.me/witsprograms
@witsprograms
pinterest.com/witsprograms/
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullying

More Related Content

What's hot

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
Anne Collier
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
Anne Collier
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Larry Magid
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
Bernajean Porter
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Larry Magid
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
amalgarn
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely
 
Parenting in the digital world 2012
Parenting in the digital world 2012Parenting in the digital world 2012
Parenting in the digital world 2012
Holly Gerla
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
ConnectSafely
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
Jim "Brodie" Brazell
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
IanMJB
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
bellla33
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
Wendinda
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
Katie_Waters
 
Teens and Technology
Teens and TechnologyTeens and Technology
Teens and Technology
Natalie Bidnick Andreas
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
LiftPotential
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
Nicastro Consultants
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 

What's hot (20)

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Parenting in the digital world 2012
Parenting in the digital world 2012Parenting in the digital world 2012
Parenting in the digital world 2012
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Teens and Technology
Teens and TechnologyTeens and Technology
Teens and Technology
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 

Similar to Using Your WITS To Deal With Cyberbullying

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
MediaSmarts | HabiloMédias
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
Donna Murray
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
CarolRusch1
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
bermandry
 
Cyber safety word for edmodo
Cyber safety word for edmodoCyber safety word for edmodo
Cyber safety word for edmodo
FolashadeOlaleye
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
bermandry
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
Pat Sine
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Joe Gauder
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Shelby Mitchell
 
The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of Cyberbullying
RRGraph Design
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
Anne Collier
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Donna Murray
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
Andrew Campbell
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
JaveriaZain1
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Ethan Wright
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
Grant Ward
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
BradyTrotman
 

Similar to Using Your WITS To Deal With Cyberbullying (20)

Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Cyber safety word for edmodo
Cyber safety word for edmodoCyber safety word for edmodo
Cyber safety word for edmodo
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of Cyberbullying
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 

Recently uploaded

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 

Recently uploaded (20)

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 

Using Your WITS To Deal With Cyberbullying

  • 1.
  • 2. OUTLINE The WITS Program What is Bullying What is Cyberbullying Instructional Approaches Resources
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Pam Allyn – Huffington Post
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. CYBERBULLYING “Today, bullying doesn’t even end at the school bell – it can follow our children from the hallways to their cell phones to their computer screens… We have got to make sure our young people know that if they’re in trouble, there are caring adults who can help them” (U.S. President, BarackObama)
  • 21.
  • 22. Flaming Harassment Denigration Impersonation Outing and trickery Exclusion Cyber stalking Willard 2006 FORMS OF CYBERBULLYING - Happy slapping - SextingKowalski et al., 2012
  • 23.
  • 24. “When people use technology, there is a lack of tangible feedback about the consequences of actions on others.” Nancy Willard
  • 25. [With] the Internet, you can really get away with a lot more because I don't think a lot of people would have enough confidence to walk up to someone and be like, “I hate you, you're ugly.” But over the Internet you don't really see their face or they don't see yours and you don't have to look in their eyes and see they're hurt. Student Young Canadians in a Wired World, Phase III: Talking to Youth and Parents about Life Online “What makes cyber bullying so dangerous is that anyone can practice it without having to confront the victim. You don’t have to be strong or fast, simply equipped with a cell phone or computer and a willingness to terrorize” (King, 2006)
  • 26. • perpetrator may be anonymous • if anonymous targets do not know who among their peers to “watch out” for or respond to • there is no safe “place” Could feel more threatened than in a face to face encounter
  • 27. Passive response The victim, deletes or ignores an aggressive message as an attempt to avoid cyberbullying and hopes that it will just go away. Two Common Responses
  • 28. Active Response Responds to the situation in a way that may be more successful in leading to resolution. Two Common Responses
  • 29. Bystanders 9% became involved in the bullying behaviour 32% watched but didn’t participate 14% voiced their objection to the person doing the bullying 21% tried to stop the bully 11% left the online environment 7% tried to befriend the bully, and 7% reported the bully to someone who could help.[3] In general, the longer the bullying persists, the more likely it is that the number of witnesses who are willing to join in will increase. N. Willard, "Fostering Responsible Online Behaviour (Part 1)." For The Cybercitizen Awareness Program: Guidance Channel Ezine, June 2007.
  • 30.
  • 31.
  • 32. BC Digital Literacy Competencies Research and Information Literacy Students apply digital tools to gather, evaluate, and use information. Critical Thinking, Problem Solving, and Decision Making Students use critical thinking skills to plan and conduct research, manage projects, solve problems, and make informed decisions using appropriate digital tools and resources. Creativity and Innovation Students demonstrate creative thinking, construct knowledge, and develop innovative products and processes using technology. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Communication and Collaboration Students use digital media and environments to communicate and work collaboratively, including at a distance, to support individual learning and contribute to the learning of others. Technology Operations and Concepts Students demonstrate a sound understanding of technology concepts, systems, and operations.
  • 33.
  • 34. BC Ministry of Education
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Safe digital communication– RCMP Lessons and Activities Identify The Line A Thin Line Where to draw the line? That’s Not Cool WITS Website Cyberbullying Resources
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. There is no silver bullet
  • 47. There is no one-size-fits-all solution for providing children with every aspect of online child safety. It takes a comprehensive “toolbox” from which parents, educators and other safety providers can choose tools appropriate to children’s developmental stages and life circumstances. Any solution to online safety must be holistic in nature and multi-dimensional in breadth. Youth Safety On The Living Internet, 2010

Editor's Notes

  1. Introduction of Brett, myself.Questions to ask: 1. Experience in working with youth 2. Experience in working/teaching in the classroom
  2. Pose the question to the audience and generate answers
  3. This is especially important in clearly communicating this with parents who may need clarification on the definition.
  4. Intervention programs include BC’s Provincial ERASE Bullying strategy. The program usually involves a reporting mechanism for children to report an incident.
  5. This approach deals with the issues before they happen. Opening conversations, dialogue and learning experiences to explore the issue and determine best strategies to minimize occurrence.
  6. Intentionally simple.
  7. Peer victimization is more objective language to describe people hurting people – without the labels.
  8. Aimed at elementary schools in order to build a set of skills that they can use for the rest of their life.
  9. Source from Pam
  10. Pose the question to the audience
  11. In Slide: “Today, bullying doesn’t even end at the school bell – it can follow our children from the hallways to their cell phones to their computer screens… We have got to make sure our young people know that if they’re in trouble, there are caring adults who can help them” (U.S. President, Barack Obama) OR“What makes cyber bullying so dangerous is that anyone can practice it without having to confront the victim. You don’t have to be strong or fast, simply equipped with a cell phone or computer and a willingness to terrorize” (King, 2006)I think we should include at least one of these quotes. What do you think?Possible video clip: http://www.youtube.com/watch?v=T6r-D-GGaM0Differentiated from traditional bullying:Technology, anonymity (potential), accessibility (difficult to escape abuse – 24/7)NOTES:Increasing access and use of technology  concerns over cyber bullyingPew Internet and American Life Project (2010)Majority of teens (12-17) spent time online 36% go online multiple times a day 75% had their own cell phone, 1/3 send 100 texts a day! Texting more common instant messaging currently- Social networking sites very popular among youth, particularly FacebookMore than 800 million active usersPeople spend over 700 billion minutes a month on Facebook (across all users)
  12. In Slide: “Today, bullying doesn’t even end at the school bell – it can follow our children from the hallways to their cell phones to their computer screens… We have got to make sure our young people know that if they’re in trouble, there are caring adults who can help them” (U.S. President, Barack Obama) OR“What makes cyber bullying so dangerous is that anyone can practice it without having to confront the victim. You don’t have to be strong or fast, simply equipped with a cell phone or computer and a willingness to terrorize” (King, 2006)I think we should include at least one of these quotes. What do you think?Possible video clip: http://www.youtube.com/watch?v=T6r-D-GGaM0Differentiated from traditional bullying:Technology, anonymity (potential), accessibility (difficult to escape abuse – 24/7)NOTES:Increasing access and use of technology  concerns over cyber bullyingPew Internet and American Life Project (2010)Majority of teens (12-17) spent time online 36% go online multiple times a day 75% had their own cell phone, 1/3 send 100 texts a day! Texting more common instant messaging currently- Social networking sites very popular among youth, particularly FacebookMore than 800 million active usersPeople spend over 700 billion minutes a month on Facebook (across all users)
  13. - IN SLIDE:Willard (2006) Types of Cyber Bullying:1) Flaming2) Harassment3) Denigration4) Impersonation5) Outing and trickery6) Exclusion7) Cyber stalkingAdditional types (Kowalski et al., 2012)1) Happy slapping2) SextingNOTES:Can be done through a variety of mediums (chat rooms, social networking, email, text messaging)
  14. - IN SLIDE:Willard (2006) Types of Cyber Bullying:1) Flaming2) Harassment3) Denigration4) Impersonation5) Outing and trickery6) Exclusion7) Cyber stalkingAdditional types (Kowalski et al., 2012)1) Happy slapping2) SextingNOTES:Can be done through a variety of mediums (chat rooms, social networking, email, text messaging)
  15. NOTES:- Cyclical relationships – victims  bullies and vice versa - Potentially large numbers of bystanders online
  16. NOTES:“THINK BEFORE YOU TYPE!”Don’t have to witness victim’s reactionCan say things they wouldn’t normally say in person Lack of empathy
  17. Combine this quote in the previous slide?
  18. - I will discuss these when I discuss how cyber bullying is different than traditional bullying  I can re-iterate the key points here
  19. Telling someone about it  not always effective because individuals informed do not know how to help them A 3rd common response is confronting the bully or trying to get revenge (REACTIVE response)
  20. NOTES:- Other aspects of bystander behavior important to consider  my research … perceptions of the victim
  21. Pose this question to the audience. Small group discussion- then large group discussion
  22. Small group discussion – large group discussion
  23. Small group discussion – large group discussion
  24. Tour each of these websites. Take a more extensive tour of the WITS site includingFYI-Spotting The SignsLessons -ConnectED -Grade 5-Cyberbullying and harassmentEnd with the Cyberbullying Poster
  25. Pose this to the audience to discuss in small groups.Emphasize the escalating stop measure. Stop does not just mean turn of the device it may mean - deactivating online accounts - changing your phone number - stop the social engagement and look for alternate healthier social experiences
  26. As part of using the equipment children should understand how to record any interaction that may be deemed hurtful or unsafe. As teachers what is necessary in order to record interactions. - screenshots - copies of audio - an understanding that all browser history is to be recorded
  27. Understanding how tools work to ensure safety. - filters - report mechanismsFacebook blocks https://www.facebook.com/help/116326365118751#Que-faire-en-cas-d%27attaque-sur-FacebookInstagram Blocks http://help.instagram.com/426700567389543
  28. Often texting and posting escalates to a point of hurting someone. How to diffuse situations before a pattern of hurtful communication develops.
  29. Last slide
  30. - First reported case of cyber bullying: http://www.youtube.com/watch?v=HFsfDLCkfQU- Another possible clip: http://www.youtube.com/watch?v=rALek3hI_0s