What Parents Need to Know about Cyber-Bullying Megan E. Doyle, M.S. School Psychologist St. John’s University.

Slides:



Advertisements
Similar presentations
Internet Safety and Cyber Bullying All info came from
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
CYBER BULLYING An Overview CYBER BULLYING IS… The use of electronic communication technologies to intentionally engage in repeated or widely disseminated.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Cyberbullying: What Parents Need to Know. Technology is Here to Stay Technology has changed the world in many ways. Most of those changes have been positive;
Forms of Cyberbullying
Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying Simple Guidelines for Parents, Teachers, and Students January 17, 2007.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Online Aggression. Cyberbullying  Definition (Cyberbullying Research Center ) Willful and repeated harm inflicted through the use of computers, cell.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber- Bullying. CYBER-BULLYING Cyber-bullying is being cruel to others by sending or posting harmful materials using cell phone or internet.
Cyberbullying Internet Saftey: Information for H.S. Students.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Cyberbullying Online Social Aggression Guidelines for Educators.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Alexis Pilkington, 17 Long Island Phoebe Prince, 15, Massachusetts.
CYBER SAFETY & PREVENTION Jacquelyn M. Trejo Southmore Intermediate.
Cyberbullying The Digital World’s Ugly Reality Understanding the psychology behind it, the forms of it, and it’s prevention – a parent’s guide.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Aimee Mallen CNED 577. Using technology to bully or intentionally cause harm to others.
Cyberbullying Terms & Definitions Source:
Cyberbullying What it is, How to deal with it, and more.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
Cyber Bullying. What is Cyber Bullying Being cruel to others by sending or posting harmful material using technological means; an individual or group.
A PARENT’S GUIDE TO CYBER BULLYING BY: SHIRLEY JONES.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
What Parents and Students Need to Know Presented by Joan Reubens Pinellas County Schools, Prevention Office or Protect with.
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Cyber-Bullying How to stay safe What to do if it happens to you.
Do Now Pick up a handout in the front of the room and answer the four questions to the best of your ability.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Cyberbullying project
CYBER BULLYING.
If you see it don’t support it! RECOGNISE IT, REJECT IT, REPORT IT!
Cyberbullying Life Class Lessons – Week of May 9th -May 13th.
Pics, Flicks, and Sexting
Cyber Bullying 1. ONLINE.
Virtual Battles: Cyberbullies
Digital Citizenship Tech in TUSD.
Digital Citizenship Tech in TUSD.
CYBERBULLYING References: Fund for Civility, Respect, and Understanding OK, Inc. Friends4Friends Campaign
Digital Citizenship Tech in TUSD.
Life High school waxahachie
Issues With Internet in College
Cyberbullying: How Can I Protect My Child?
Presentation transcript:

What Parents Need to Know about Cyber-Bullying Megan E. Doyle, M.S. School Psychologist St. John’s University

What is Cyber-Bullying (CB)? Willful and repeated harm inflicted among minors through the medium of electronic text Willful and repeated harm inflicted among minors through the medium of electronic text Being ignored, disrespected, called names, threatened, picked on, made fun of, having rumors spread by others Being ignored, disrespected, called names, threatened, picked on, made fun of, having rumors spread by others CB mediums: CB mediums: Internet websites, blogs, chat rooms, , instant messaging (IM), text messaging, voic , camera phones, social networking websites (e.g., Facebook, Myspace) Internet websites, blogs, chat rooms, , instant messaging (IM), text messaging, voic , camera phones, social networking websites (e.g., Facebook, Myspace)

Forms of Cyber-bullying Flaming Flaming Online fights using angry and vulgar language Online fights using angry and vulgar language Harassment Harassment Sending mean and insulting messages over and over until the victim feels humiliated, embarrassed and fearful Sending mean and insulting messages over and over until the victim feels humiliated, embarrassed and fearful Denigration or Dissing Denigration or Dissing Posting rumors and gossip to hurt reputations or cause friendship problems Posting rumors and gossip to hurt reputations or cause friendship problems Outing Outing Sharing someone’s secrets such as passwords or embarrassing information Sharing someone’s secrets such as passwords or embarrassing information

Forms of Cyber-Bullying Impersonation Impersonation Pretending to be someone else and sending damaging messages as that person Pretending to be someone else and sending damaging messages as that person Trickery Trickery Tricking someone into disclosing secrets then sharing them online Tricking someone into disclosing secrets then sharing them online Exclusion Exclusion Purposefully and cruelly excluding another from an online group Purposefully and cruelly excluding another from an online group Cyberstalking Cyberstalking Repeated and intense harassment that includes threats and creates significant fear in the victim Repeated and intense harassment that includes threats and creates significant fear in the victim

Who are the bullies and victims? Cyber-bullies and victims are a new, little- known group Cyber-bullies and victims are a new, little- known group No differences for gender or race No differences for gender or race Grade Grade Peak in middle school Peak in middle school Bullies often become victims Bullies often become victims

Victims of Cyber-Bullying Nearly 3 out of 4 teens report being bullied online at least once in a 12-month period Nearly 3 out of 4 teens report being bullied online at least once in a 12-month period Only 1 out of 10 report being victimized to parents or other adults Only 1 out of 10 report being victimized to parents or other adults Teens fear parents will restrict internet access Teens fear parents will restrict internet access Often occurs at home with peers from school Often occurs at home with peers from school 73% know who was doing the bullying 73% know who was doing the bullying

Effects of CB Victimization Effects of CB Victimization Anger Anger Frustration Frustration Sadness Sadness Effects of traditional bully victimization Effects of traditional bully victimization Anger Anger Depression Depression Anxiety Anxiety School avoidance School avoidance Smoking Smoking Poor academic performance Poor academic performance Fewer friends Fewer friends Loneliness Loneliness Low self-worth Low self-worth Peer rejection Peer rejection Depression in adulthood Depression in adulthood

Signs Your Child is a CB Victim Appearing upset after using the computer or cell phone Appearing upset after using the computer or cell phone Withdrawing from social events with peers Withdrawing from social events with peers Spending less time on the internet or cell phone Spending less time on the internet or cell phone Irritability Irritability Sadness Sadness Withdrawal Withdrawal Lack of interest in activities Lack of interest in activities School refusal School refusal Change in grades Change in grades Change in eating/sleeping patterns Change in eating/sleeping patterns

What can parents do? Prevention Maintain open communication with children Maintain open communication with children Set time and content limits on computer use Set time and content limits on computer use Sign an internet usage agreement Sign an internet usage agreement pdf pdf pdf pdf Keep the computer in a public family area Keep the computer in a public family area Limit bells and whistles on cell phones Limit bells and whistles on cell phones

What can parents do? Prevention Ask questions Ask questions Do you have a profile? Do you have a profile? Where do you go online? Where do you go online? Ask them to teach you how to use the computer Ask them to teach you how to use the computer Partner with your children’s schools by supporting their policies Partner with your children’s schools by supporting their policies Search your child’s name Search your child’s name Remember! Remember! Children must earn your trust Children must earn your trust Your computer may have parental controls, but your neighbor’s may not Your computer may have parental controls, but your neighbor’s may not

What to look for... Social networking websites Social networking websites Myspace.com, Facebook.com Myspace.com, Facebook.com Used for building and maintaining peer relationships Used for building and maintaining peer relationships Video websites Video websites Youtube.com Youtube.com Used for self-expression Used for self-expression IM, text language IM, text language Used for communication Used for communication Netlingo.org Netlingo.org

What can parents do? Intervention Must find out: Must find out: Risk of physical assault Risk of physical assault Emotional effects of the CB7 Emotional effects of the CB7 Getting your reaction just right Getting your reaction just right They are afraid you will overreact by revoking computer privileges, telling other parents or the school, getting the bully in trouble They are afraid you will overreact by revoking computer privileges, telling other parents or the school, getting the bully in trouble But don’t “underreact,” for there are serious implications so there should be consequences But don’t “underreact,” for there are serious implications so there should be consequences It’s OK to say NO! It’s OK to say NO!

What can parents do? Intervention Don’t wait until you get the phone bill! Don’t wait until you get the phone bill! You are legally responsible for what your child does on your computer or cell phone You are legally responsible for what your child does on your computer or cell phone Computer seizure Computer seizure Loss of internet Loss of internet Criminal or civil charges Criminal or civil charges Enlist the help of your school Enlist the help of your school Contact authorities if a law has been broken Contact authorities if a law has been broken Threats Threats

What to Tell Your Children Never tell anyone your password Never tell anyone your password Save or print any harassing messages Save or print any harassing messages Change your screen name Change your screen name Block senders/restrict profiles Block senders/restrict profiles Don’t accept online “friendship” from strangers Don’t accept online “friendship” from strangers Never respond to a bully Never respond to a bully Tell a parent, teacher, or other adult Tell a parent, teacher, or other adult

What to tell your children No computer or cell phone is truly anonymous No computer or cell phone is truly anonymous Teachers, colleges, and employers check websites for inappropriate text and photos Teachers, colleges, and employers check websites for inappropriate text and photos Don’t post identifying information online Don’t post identifying information online Don’t post updates about your itinerary Don’t post updates about your itinerary Don’t give details about your interests or the activities you do Don’t give details about your interests or the activities you do Think before you type! Think before you type!

What can schools do? Monitor internet usage in school Monitor internet usage in school Set policies regarding internet usage in school Set policies regarding internet usage in school Set clear limits and enforce them Set clear limits and enforce them Implement a bullying prevention/intervention program Implement a bullying prevention/intervention program Periodically evaluate interventions Periodically evaluate interventions Educate students and faculty about cyber- bullying Educate students and faculty about cyber- bullying

Resources Wiredsafety.org Wiredsafety.org Stopcyberbullying.org Stopcyberbullying.org Cyberangels.org Cyberangels.org Netlingo.org Netlingo.org

References Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, Espelage, D.L. & Swearer, S.M. (2003). Research on school bullying and victimizaton: What have we learned and where do we go from here? School Psychology Review, Espelage, D.L. & Swearer, S.M. (2003). Research on school bullying and victimizaton: What have we learned and where do we go from here? School Psychology Review, Hodges, E.V.E.. & Perry, D.G. (1996). Victims of peer abuse: An overview. Journal of Emotional and Behavioral Problems, Hodges, E.V.E.. & Perry, D.G. (1996). Victims of peer abuse: An overview. Journal of Emotional and Behavioral Problems, Juvonen, J. (2008). Journal of School Health. Juvonen, J. (2008). Journal of School Health. Nansel, T.R., Overpeck, M., Pilla, R.S., Ruan, W.J., Simons-Morton, B., & Scheidt, P. (2001). Bullying behaviors among US youth: Prevalence and association with psychosocial adjustment. Journal of the American Medical Association, Nansel, T.R., Overpeck, M., Pilla, R.S., Ruan, W.J., Simons-Morton, B., & Scheidt, P. (2001). Bullying behaviors among US youth: Prevalence and association with psychosocial adjustment. Journal of the American Medical Association, Olweus, D. (1993). Bullying at school. Oxford, UK: Blackwell. Olweus, D. (1993). Bullying at school. Oxford, UK: Blackwell. Patchin, J.W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, Patchin, J.W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, Rodkin, P.C., & Hodges, E. (2003). Bullies and victims in the peer ecology: Four questins for psychologists and school professionals. School Psychology Review, Rodkin, P.C., & Hodges, E. (2003). Bullies and victims in the peer ecology: Four questins for psychologists and school professionals. School Psychology Review, Willard, N. (2006). Educator’s guide to cyber bulllying and cyber threats: Responding to the challenge of online social cruelty, threats, and distress. Center for Safe and Responsible Use of the Internet. Willard, N. (2006). Educator’s guide to cyber bulllying and cyber threats: Responding to the challenge of online social cruelty, threats, and distress. Center for Safe and Responsible Use of the Internet.