cyberbullying 11 16 07web

Information about cyberbullying 11 16 07web

Published on January 30, 2008

Author: Monica

Source: authorstream.com

Content

Cyberbullying Awareness Workshop:  Cyberbullying Awareness Workshop Presented by CTAP IV and AT&T Education Advocate Attribution-ShareAlike 3.0 Following the Thread:  Following the Thread Six Areas Covered on Poster and Website: 1. 2. 3. 4. 5. 6. Cyberbullying Workshop:  Cyberbullying Workshop Overview Educator Resources Discipline and Legal Issues Agenda Three breaks for questions Agree or Disagree :  Agree or Disagree Cyberbullying is most often a continuation of in-school bullying. Students most often involved in cyberbullying appear to be the “in-crowd” students. “Wannabes” appear to be the most frequent targets. It’s safe to assume that the student posting the harmful online material is the originator of the problem. Agree or Disagree :  Agree or Disagree Cyberthreats could be related to online role-playing gaming. Material posted online is often more of a “real” threat, than verbal threats. There are reports of cyberbullying leading to suicide, school violence, school failure, and school avoidance. The harm caused by cyberbullying may be far greater than traditional bullying. Slide6:  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. ^Bullying 2.0 :  ^Bullying 2.0 Examples Implications No escape (24/7) Wider dissemination of hurtful material. Anonymity Less likely to report to a parent. Lack of closure. Sending cruel, vicious, or threatening messages. •Creating web sites with stories, pictures,and jokes that ridicule others based on hatred or bias. •Breaking into an e-mail account and sending vicious or embarrassing material to others. Taking a picture in the locker room with a phone camera and sending it out. (Examples from Nancy Willard's website http://cyberbully.org) Cyber Slide8:  Assignment: Call out as many technologies as you can think of that could be used to cyberbully. Email, chat rooms, discussion forums, instant messaging, cell phones, text messaging, blogs, wikis, photo sharing sites such as Flickr or Webshots, online games, and social networking sites like MySpace.com and Facebook…… What’s YouTube’s Definition? Web 1.0 versus Web 2.0 Tools:  Web 1.0 versus Web 2.0 Tools Search & browse Talking with one friend on cell phone Netscape Content produced by few About companies Connecting computers Download culture Control Centralized Britannica Online Just technology Publish & subscribe Cell phone has multiple uses Google Content produced by many About communities Connecting people Remix culture Contribution Decentralized Wikipedia An attitude, not just a technology Web 2.0 Tools - How familiar are you?:  Web 2.0 Tools - How familiar are you? Web 2.0 Tools - How familiar are you?:  Web 2.0 Tools - How familiar are you? Welcome to Their World :  Welcome to Their World MacArthur Foundation Movie: Are Kids Different Because of Digital Media?” Slide13:  Don’t respond to or meet with a cyberbully. Save proof of the harassment like e-mail messages, screen shots, IM logs, blogs, etc. To-Dos: Remember to share guidelines with your students and use “teachable moments:” Slide14:  To-Dos (cont’d): Tell a trusted adult who can: File a complaint with the Internet Service Provider or send an email to the host of the web site where the abuse was posted. Contact the cyberbully’s parents. Contact an attorney or file a small claims action. Questions?? But we block it…:  But we block it… Classroom Resources:  Classroom Resources Found at the CTAP Cyber-bullying page --Educator, Parent, Student Resources www.ctap4.org/cybersafety/ Classroom Resources:  Classroom Resources Lesson plans and activity cards are provided for middle and high school. "Cyberbullying: You Can't Take It Back" Classroom Resources:  Classroom Resources Guided discussion questions help students understand the effects of bullying. ”K.B.’s Day: Webisode 5 Discipline & Legal Issues:  Discipline & Legal Issues Back to YouTube Video… Is there a legal duty for school administrators to protect the safety and security of students when they are in school and when they are using the Internet through the district system? Yes! Schools have an obligation to protect students and/or employees from harassing, threatening, or bullying conduct. Discipline & Legal Issues:  Discipline & Legal Issues That said, as you will see, balancing this obligation with the concurrent obligation to respect students’ speech rights often makes this quite difficult Tinker Standard Tinker v. Des Moines Independent School District, 1969 “Considered to be the high watermark of students’ First Amendment rights” Discipline & Legal Issues:  Discipline & Legal Issues Law Enforcement should be contacted if educator becomes aware of: Death threats or threats of other forms of violence to a person or property Excessive intimidation or extortion Threats or intimidation that involve any form of bias or discrimination Any evidence of sexual exploitation What Do You Think? :  What Do You Think? A common scenario recently has been students creating false online profiles of administrators and teachers. Students posted parody on MySpace.com claiming the principal smoked pot, kept beer at school and liked having sex with students. Principal suspended students and sued family for damaging his reputation. What do you think? The Verdict! :  The Verdict! Judge finds suspension of student for MySpace parody of school principal unconstitutional. “Hermitage School District violated the First Amendment free-speech rights of a student when it punished him for creating a parody profile of his principal on the MySpace.com website because the District failed to show that the profile - which was created off-campus - caused any disruption to the school day, a federal judge ruled late yesterday.” What Do Think? :  What Do Think? A website is created about a teacher that indicated “Why She Should Die” and solicited contributions for a “hit man.” Verdict guess? Here the court found there was substantial disruption, because the teacher was so upset she had to take leave. What Do Think? :  What Do Think? One student’s website depicted his assistant principal in a Viagra ad, as a cartoon character having sex, and as a participant in a Nazi book burning. Verdict guess? “Appalling and inappropriate,” the court conceded. But no disruption, no grounds for discipline. What Would You Do?:  What Would You Do? A parent brings the principal a disturbing posting she has found online posted by a student. It reads: Philosophy So that’s the only way to solve arguments with all you $%&*heads out there. I just kill you! God I cant wait till I can kill you people. Feel no remorse. No shame. I don’t care if I live or die in the shootout, all I want to do is to kill and injure as many of you pricks as I can, especially a few people. Like (name of student). What Would You Do?:  Ben reports seeing Tony using his cell phone in the locker room taking pictures of students while they are changing for PE. What Would You Do? What Would You Do?:  Sam, a high school student, has publicly acknowledged that he is gay. Jerry, another student, has created a profile that focuses on Sam. Jerry’s profile is entirely focused on condemning homosexuality. Sam and his parents have reported this site to the school and are demanding the school have the site taken down. Sam is now fearful when he comes to school as he has had some negative incidents that appear to be related to this site What Would You Do? Summing It Up:  Summing It Up “Substantial Disruption” is a high hurdle for schools. Whether or not you can impose formal discipline may end up being the least important question – Stopping the harm is the most important objective Schools can always educate. Schools should regulate with caution. Beef up your bullying policy to include cyberbullying. Cyberbullying Awareness Workshop:  Cyberbullying Awareness Workshop A video parable from NetSmartz Image from Microsoft Design Gallery Like feathers in the wind. Share a big take-away. Discuss your next steps. More Information:  More Information For Resources, Follow the Thread to: www.ctap4.org/cybersafety/ We appreciate your feedback. Please Complete Our Evaluation http://www.ctap4surveys.org/evaluation/0607/ Presented by Region IV School/Law Enforcement Partnership & CTAP Attribution-ShareAlike 3.0

Related presentations


Other presentations created by Monica

PORT WINE presentation
22. 01. 2008
0 views

PORT WINE presentation

Earth Science Life on Mars
25. 01. 2008
0 views

Earth Science Life on Mars

pmi quality notes
09. 01. 2008
0 views

pmi quality notes

Metamorphism 1
10. 01. 2008
0 views

Metamorphism 1

Cavemen
10. 01. 2008
0 views

Cavemen

Helen Chiu NZ 2001
14. 01. 2008
0 views

Helen Chiu NZ 2001

Meeting 21 5 2007 DEI
16. 01. 2008
0 views

Meeting 21 5 2007 DEI

0105
21. 01. 2008
0 views

0105

HongKong Nasopharyngeal
21. 01. 2008
0 views

HongKong Nasopharyngeal

DWARKA Krishnas city
22. 01. 2008
0 views

DWARKA Krishnas city

Lesson11
22. 01. 2008
0 views

Lesson11

PLE01 Show
22. 01. 2008
0 views

PLE01 Show

MacMillan Matrix
04. 02. 2008
0 views

MacMillan Matrix

abridged
10. 01. 2008
0 views

abridged

Class2
09. 01. 2008
0 views

Class2

06Firstladyintimacy
17. 01. 2008
0 views

06Firstladyintimacy

20070513a commitment in marriage
29. 01. 2008
0 views

20070513a commitment in marriage

A3 2 Cihangir
07. 02. 2008
0 views

A3 2 Cihangir

Slag Proj sum jmv
14. 02. 2008
0 views

Slag Proj sum jmv

Catalog Powerpoint
26. 02. 2008
0 views

Catalog Powerpoint

200632165149775
28. 02. 2008
0 views

200632165149775

WirelessChannels
24. 03. 2008
0 views

WirelessChannels

TecEcoKyotoOpportuni ties090605
12. 02. 2008
0 views

TecEcoKyotoOpportuni ties090605

PACIFICO1
28. 03. 2008
0 views

PACIFICO1

Cow Calf Assessment Data All
24. 01. 2008
0 views

Cow Calf Assessment Data All

553147
14. 04. 2008
0 views

553147

FINALSUSAppt
15. 04. 2008
0 views

FINALSUSAppt

scoresslam with poems
12. 02. 2008
0 views

scoresslam with poems

200832519533687
17. 04. 2008
0 views

200832519533687

waters fiona
22. 04. 2008
0 views

waters fiona

Part 1 Topic 3 LUBS1940
23. 04. 2008
0 views

Part 1 Topic 3 LUBS1940

get big fast lecture1
24. 04. 2008
0 views

get big fast lecture1

AIDS and Access A Summary
07. 05. 2008
0 views

AIDS and Access A Summary

pl311wittgensteinnot heory06 07
02. 05. 2008
0 views

pl311wittgensteinnot heory06 07

Thompson ACE dept sem 012607
23. 01. 2008
0 views

Thompson ACE dept sem 012607

PE2 U9 R
19. 03. 2008
0 views

PE2 U9 R

1877
11. 01. 2008
0 views

1877

visite multilingue
10. 01. 2008
0 views

visite multilingue

2 3pc
25. 01. 2008
0 views

2 3pc

2007 10 21 for website
05. 02. 2008
0 views

2007 10 21 for website

Dichronic Jewerly
09. 01. 2008
0 views

Dichronic Jewerly

fischer cap2007
16. 01. 2008
0 views

fischer cap2007

3p21
14. 01. 2008
0 views

3p21

katysat adcs update 2006 01 31
17. 01. 2008
0 views

katysat adcs update 2006 01 31