Cyberbullying in Online Higher Education: Best Practices Donna DiMatteo-Gibson, PhD, Paula Zobisch, PhD Andree Swanson, EdD.

Slides:



Advertisements
Similar presentations
Speakers: Denise Chilton, Sandra Smele, Christine Wong May 1, 2013
Advertisements

 Cyberbullying is when a child, preteen, or teen is tormented, harassed, threatened, or otherwise targeted by another child using the Internet, interactive.
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Robin L. Donaldson May 5, 2010 Prospectus Defense Florida State University College of Communication and Information.
Spring Garden Middle School September, 2013 Adapted from CommonSenseMedia.org Cyberbullying: Crossing the Line.
Intentional and repeated use of technology to harass, threaten, embarrass, or target another person.
Bullying Information and Prevention Information for Parents/Guardians/Caregivers.
BELL WORK Why do you think people are bullies?.
ICT Tahera Syeda.  Make sure you know who you are talking to  If you have made friends with someone you don’t know, tell your parents whether they know.
The ultimate guide to cyber- bullying.. Cyber-bullying is the use of electronic information and communication to bully or otherwise harass an individual.
Bullying & Cyber Bullying Presented by… Teresa Errickson, SMS Counselor A-L Stephanie Davis, SMS Counselor M-Z.
High School Safe Environment “Cyberbullying” Resources and Assessment Materials.
Can I really get in trouble for that post? Youth, Bullying, and Technology Jenn Capps, PhD, LPC Denise Mowder, JD, PhD.
Cyberbullying COM 160.
Cyberbullying Kassie McAninch.
By Hathiya Chea, Ashley Dorsey, & Timothy Maggio Shepherd University.
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
Nces.ed.gov Connecting Research, Policy and Practice Dr. Jack Buckley NCES Commissioner September 21, 2011 Student Reports of Bullying and Cyber-Bullying:
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Bullying Information and Prevention Information for Parents/Guardians/Caregivers.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Introduction Video Slide Content Links What is School Bullying? What to know about Cyberbulling Social Networking & the Effects of Cyberbullying FaceBook.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Rage Reaction: What do you know about cyber-bullying?
By: Zach Oltmanns.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
Alexis Pilkington, 17 Long Island Phoebe Prince, 15, Massachusetts.
A GUIDE FOR PARENTS, TEACHERS, AND STUDENTS Cyberbullying 101.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
Faculty Senate Information Technologies Committee May 13, 2008.
“REAL WORLD CRUSADES AGAINST CYBER BULLING” “This Ain’t No Bull”
Activity 2 Sharing Information Safely The Story of Amy & Emily.
4th Grade Stop Bullying Now! Lesson. Whip Around  Find a partner  Turn back-to-back  Answer question -True: Make a “T” with hands -False: Cross arms.
Socializing Online b Can help kids connect with friends and family b But you might share too much information b Or you might hurt someone’s feelings b.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
CYBER-BULLYING By Jesse Bolan The Effects, the Turmoil, the Destruction.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
Cyberbullying The “ Device ” Evil Cyberbullying Cyberbullying is the use of any electronic communication device to convey a message in any form (text,
Miller Middle School Counseling Department Presentation Deedra Grier-Jackson, Professional School Counselor Eundra Brown, Professional School Counselor.
Netiquette. APK Mrs. Batichon went to a restaurant with her children and they were NOT acting like they had good manners. Embarrassing for Mrs. Batichon.
Screen Out the Mean!! What can you do when someone is mean to you online?
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Faculty Perceptions on Applying Multiple Intelligence in Online Marketing Classrooms: Preliminary Exploratory Study Dr. Paula J. Zobisch and Dr. Andree.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
National Crime Prevention Council 2011
GOSSIP and CYBERBULLYING
Cyberbullying in a College Setting: Applying General Strain Theory
Carroll County Schools Advisement
Digital Citizenship Tech in TUSD.
Digital Citizenship Tech in TUSD.
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
GOSSIP and CYBERBULLYING
CYBERBULLYING References: Fund for Civility, Respect, and Understanding OK, Inc. Friends4Friends Campaign
Digital Citizenship Tech in TUSD.
ICT CyberSecurity Lesson 2:
Digital leaders Multimedia presentation
Quiz 3 Review.
What it is, how to spot it, and how to respond to it
Presentation transcript:

Cyberbullying in Online Higher Education: Best Practices Donna DiMatteo-Gibson, PhD, Paula Zobisch, PhD Andree Swanson, EdD

Sample from the Online Classroom

Post on the Discussion Board To another student, O I have had the same vague responses when I asked for help in this class. I requested clarification on why I was marked down for APA errors back in week 1. O In the feedback I received it stated "some APA errors contact me if you would like to learn about the errors". So I asked why I was marked down and the response I received was "analyze it yourself" then "what did you find" and "what was your overall score". O This is my 11th class with Ashford and I have not been marked down for APA citations so I do not know what I did wrong. I still do not know what I did wrong. I was hammered again on our last paper. O Student did have many APA errors O When the instructor responded to her questions… O Student did not reply

Why We Did the Study

O Much literature and legislation on K-12 O Researchers chose an online business school O Evaluate if faculty had an adequate understanding of: O cyberbullying, O netiquette, and O understanding of the similarities and differences between the two. O How to respond to cyberbullying and poor netiquette O How to report cyberbullying

List of Best Practices O Created a list of best practices for implementing procedures and conducting training on cyberbullying and netiquette.

Literature Review

Misawa and Rowland (2015) O Misawa and Rowland (2015) O highlighted the different forms of academic bullying within the realms of adult, higher, continuing, and professional education. O In higher education there appears to be an “intersection of racism and homophobia” (p. 4). O Faculty-to-faculty bullying is also evident in the forms of gender, race, and just being mean phenomena.

Morgan (2012) O Morgan (2012) presented information on cyberbullying in schools. O The use of the Internet allows otherwise cowardice individuals to become brave and threatening to others. O Need for educational leaders to strategically plan for the inevitable attack.

Rivituso (2014) O Conducted an interpretive phenomenological analysis on cyberbullying victimization among college students. O Using Bandura’s Theory of Tradic Reciprocal Determinism and the General Strain Theory as a framework for this study, six themes emerged from the results of the study.

Rivituso (2014) (Continued) O The six themes were: 1) repeated instances leading to feelings of vulnerability and fear; 2) distrust of technology and mistrust of people; 3) the value of friends in college and their impact on victim self-esteem 4) self-control in response to lack of control over cyberbullying instances; 5) feelings of stress, depression, and embarrassment; 6) frustration leading to self-blame. (Rivituso, 2014, para. Abstract)

Multiple Authors O Very few studies have been conducted that assess cyberbullying at the higher education online level O 50% of the faculty members surveyed had experienced some form of cyberbullying O 17% to 30% of faculty had experienced some type of cyberbullying. (Eskey, Taylor, & Eskey, Jr., 2014a; Eskey & Eskey, Jr., 2014b; Smith, Minor, & Brashen, 2012).

Methods to Reduce Cyberbullying O Institutional training of faculty to cope with cyberbullying as well as addressing cyberbullying in a student handbook (Eskey et al., 2014a; Eskey & Eskey, Jr., 2014b). O Faculty training O how to identify cyberbullying O how to react O How to report the incident

Washington (2015) O “To date, 18 states have laws to address cyberbullying, compared with 49 states, all except Montana, having laws to address bullying (Hinduja & Patching, 2013)” (Washington, 2015, p. 24).

Cyberbullying Legislation For higher education

Cyberbullying Legislation O California O Colorado O Iowa

Methodology and Data

Q2: Are you full-time or part- time online faculty? O Answered: 228 Skipped: 0

Q3: At what level do you teach? O Answered: 228 Skipped: 0

Q3: At what level do you teach? O Answered: 228 Skipped: 0

Q4: What is the highest degree that you have attained? O Answered: 228 Skipped: 0

Q5: How many years have you been teaching online? O Answered: 228 Skipped: 0

Q6: Gender O Answered: 228 Skipped: 0

Q7: The National Crime Prevention Council (2010) defined cyberbullying as “similar to other types of bullying, except that it takes place online and through text messages" (para. 1). Cyberbullying includes the use of the Internet, cell phones, or other devices to send or post text or images where the intent is to hurt or embarrass another person, such as an online instructor. Based on this definition, have you ever been cyberbullied by a student while teaching online? O Answered: 228 Skipped: 0

Q7: have you ever been cyberbullied by a student while teaching online? O Answered: 228 Skipped: 0

Q8: Within the classroom , a student s all students to complain about your teaching methodology. You learn of this by either receiving a copy of the or being notified by other students. I recognize this as cyberbullying. O Answered: 228 Skipped: 0

Q8: Within the classroom , a student s all students to complain about your teaching methodology. You learn of this by either receiving a copy of the or being notified by other students. I recognize this as cyberbullying. O Answered: 228 Skipped: 0

Q9: You receive a threatening or text directly from a student. I recognize this as cyberbullying. O Answered: 228 Skipped: 0

Q9: You receive a threatening or text directly from a student. I recognize this as cyberbullying. O Answered: 228 Skipped: 0

Q10: A student posts a question in the classroom. Before the faculty can answer the question, several students respond to the initial question and post responses that accelerate the issue. These responses may include students who post messages that accuse the faculty of never answering questions, providing brief or incomplete responses, or even accusing the faculty of not knowing what they are doing. I recognize this as cyberbullying. O Answered: 228 Skipped: 0

Q10: A student posts a question in the classroom. Before the faculty can answer the question, several students respond to the initial question and post responses that accelerate the issue. These responses may include students who post messages that accuse the faculty of never answering questions, providing brief or incomplete responses, or even accusing the faculty of not knowing what they are doing. I recognize this as cyberbullying. O Answered: 228 Skipped: 0

I recognize the improper use of netiquette and know how to report it at my institution.

Q14: I understand the difference between cyberbullying and netiquette issues.

Q15: I recognize cyberbullying and know how to RESPOND to it

Questions??