Cyber bullying


red line.gif
red line.gif
Essential Questions:
1. How is cyberbullying different from "schoolyard" bullying?
2. What steps can someone take if they are a victim of cyberbullying and/or see it happening to someone else?
3. Why do you think the amount of cyber bullying incidents are are on the rise?



running_ribbon.gif
running_ribbon.gif



Definition:


  • Cyberbullying is the use of technology to tease, humiliate, threaten and/or harass someone. It can take place through text messaging or social media. Cyberbullies might send mean comments, post embarrassing photos, or share private information about someone to humiliate or mock them online.

  • Even if your are not being cyberbullied, it is everyone’s job to do the best they can to try to prevent bullying.

















Cyberbullying: You Can't Take it Back" Video (http://www.nsteens.org/Videos/Cyberbullying)











-page 2 enter on sheets hanging up in the room.

Skits.. enter a summary in a journal entry..



Some Statistics on Cyber Bullying

  • students say this has happened more than once
  • 35% of kids have been threatened on line. Nearly 1 in 5 say this has happened more than once
  • 21% of kids received threatening email messages
  • 53% of kids say that someone has said mean things about them online
  • 58% have not told their parents
  • 16% say that they have cyber bullied others
From iSAFE – 2003-04 http://www.bullybeware.com/students/articles/103-cyber-bullying-what-kids-can-so-to-protect-themselves.html

STOP, BLOCK, TELL

  • STOP! Don't do anything. “Take Five!” to calm down.
  • BLOCK! Block the cyberbully or limit all communications to those on your buddy list.
  • TELL! Tell a trusted adult, you don't have to face this alone.

SEE, SAY, WALK AWAY

  • SEE a victim of cyberbullying and it could be you.
  • SAY something to a trusted adult.
  • WALK AWAY from the situation and do not give him or her the attention they are seeking.

Source: www.nationalsave.org

=


=

Possible signs of a person who is being cyber-bullied:


► Avoid using the Internet

► Seem stressed when getting an email, instant message, or text

► Withdraw from family and friends

► Resist attending school and social events

► Show signs of low self-esteem like depression or fear

► Have declining grades

► Stop eating or sleeping

► In serious cases, consider suicide


examples of Cyber Bullying your child might experience.
  • Cyber Stalking - The transmission of messages to intimidate and or threaten the victim resulting in a child to have concerns about their personal safety and well being.
  • Degradation - This would be the use of rumors and unfounded gossip in an attempt to break up the friendships the victim might have with others or to damage the kid's reputation.
  • Harassment - This is the constant and unrelenting sending of offensive, insulting, rude and harassing messages over the internet or cell phone to the Cyber Bullying Victim.
  • Impersonation - The taking on of a false identity pretending to be the victim and send or posts material to damage the child's reputation or get them into trouble.
  • Flaming - This a very aggressive and abrasive form of intimidation used by the aggressor using vulgar and angry language with the intent to start fights with the teenager or preteen.
  • Text Messaging - This is where they enlists friends to help send thousands of messages to the victim's cell phone running up their phone bill and getting them into trouble with parents.
  • Password Theft - Gaining access to the child's passwords used on the internet and uses it to log into the sites the child has and locks them out, also allowing other to hack the account.
  • Web Sites - The creation of web sites and/or pages filled with images, rumors, statements, and/or defamatory remarks to further humiliate and cause emotional distress for the victim.
  • Images or Photos - The posting of photos or images that are found that might be embarrassing in nature or the creation or altering of images to depict the boy or girl and cause humiliation.
  • PC Attack - Our children are very skilled in computer technology. Many can and have used to Cyber Bully another the sending of viruses, a Trojan and/or spyware to infect the boy's or girl's computer.
  • Proxy Attack** - It is not unusual for them to enlist their friends to assist them in the dirty work and to "join in on the fun" to further the humiliation and emotional damage caused the victim.
http://ezinearticles.com/?Types-of-Cyber-Bullying-and-Examples-of-Cyber-Bullying&id=4614885


Article Source: http://EzineArticles.com/4614885



Skit -Storyline idea
skit ideas.PNGskit 2.PNG




Additional Sources:
http://youtu.be/Jz-HwnyvUwY


MA Story - http://youtu.be/BKvXPM-EVDQ

http://www.netsmartz.org/RealLifeStories/6DegreesOfInformation
http://cdn.netsmartz.org/tipsheets/Cyberbullying_Unplugged_2014.pdf
http://cdn.netsmartz.org/pledges/IS_Rules_MSHS_Eng.pdf
http://cdn.netsmartz.org/activitycards/IS_HS_CB_CantTakeItBack.pdf

Skits:
http://nationalsave.org/who-we-are/chapters/chapter-access/internet-safety/ (click on lesson plans)
http://nationalsave.org/pdf/cyberactivity.pdf (skits pdf format)