Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lesson 5-6. Bell Ringer Open your Unit 5 Student Journal from the Health folder: Page 11, Lesson 4 Journal Entry Describe all the ways you use communication.

Similar presentations


Presentation on theme: "Lesson 5-6. Bell Ringer Open your Unit 5 Student Journal from the Health folder: Page 11, Lesson 4 Journal Entry Describe all the ways you use communication."— Presentation transcript:

1 Lesson 5-6

2 Bell Ringer Open your Unit 5 Student Journal from the Health folder: Page 11, Lesson 4 Journal Entry Describe all the ways you use communication technology in your day-to-day life. Think about home, school, and interactions with friends. How would your life be different without this technology? How does technology affect the way you communicate with or relate to your family, friends, and others? In what ways does it make it easier or better? In what ways does it make it harder or open the door for misunderstandings?

3 Scenario One night, Rita and her friend Kelsey were texting back and forth about this guy Rita liked. The next day at school, some other friends started teasing Rita and saying they were going to send him everything she’d written. Rita hadn’t told anybody but Kelsey about her feelings so she knew that Kelsey must have shared the texts with some of their friends. How do you think Rita felt? Do you think it was OK for Kelsey to share Rita’s text message with others? Why or why not?

4 Survey – last night’s homework Take out Teens & Communication Technology Surveys How many teens did you survey? How many answered yes and how many answered no Tally up results for the whole class – use master 2 Let’s see how the national survey compares to our class survey results… see next slide

5

6 Ask & Discuss How did the national survey results compare to our class survey results? Were you surprised by any of these facts?

7 Explain Communication technology in itself isn’t good or bad. It makes certain things possible. The things that happen through the use of technology are the result f the choices the people using that technology make. Whether it is being used to help or harm people.

8 Understanding Cyberbullying Cyberbullying happens when people use power of technology to intentionally threaten, express hostility or inflict emotional and social harm to others. Takes place via cell phone, computer or digital device. It includes: Put downs, threats or comments, harassing, embarrassing, spreading lies, deliberately excluding or pretending to be someone else online, in a text or on a social networking site.

9 Bullying Review Bullying – person uses any form of power to intentionally and repeatedly hurt or injure another person in a physical, verbal, or emotional way. Bullying is never an accident or mistake. It’s intentional harm in which the goal is clearly to hurt another person. Bullies repeatedly target the same person or target different people in the same ways. Bullies get satisfaction out of what they do. This could be a feeling of power, popularity, status, property, or even enjoying the feeling of fear and humiliation they cause to their targets. Bullies also victimize bystanders and others who live in fear of being next. Bullies can work alone or with others. They can hurt one person or groups of people.

10 Explain What you know about traditional bullying can help you understand the problem of cyberbullying. Sometimes teens fool themselves into believing that doing hurtful things through the use of technology isn’t the same as bullying. But, like traditional bullying, cyberbullying is done with the intent to harm another person. So there are many similarities. There are also some important differences.

11 Activity Small groups of 3-4 Half the group brainstorms similarities between bullying and cyberbullying. The other half brainstorms differences. 3-4 minutes to list your ideas!!! Write bullying and cyberbullying on the board with two columns – Same and Different. Review ideas as a class

12 Similarities Both kinds of bullying are intentional. Both kinds of bullying can cause emotional hurt. Both kinds of bullying have a target and a perpetrator; often there are also bystanders. Both kinds of bullies get some kind of satisfaction out of their bullying actions, such as a feeling or power, status, or enjoying the hurt they cause. There can be secondary victims in both kinds of bullying.

13 Differences Cyberbullies don’t have to be more physically powerful than their targets. The technology is their main source of power. Cyberbullies don’t have to repeatedly harass their targets. Hurtful or harassing messages and images can take on a life of their own as they get passed on electronically and can’t be taken back. The work of a single incident of cyberbullying can last for years online. Bullies can strike only when they are their targets are in the same place. Cyberbullies can strike at any time or at a distance. Bullies can hurt their targets physically. Cyberbullies are restricted to using written words and images to inflict emotional and social harm. Cyberbullies don’t act in person or see the immediate results of their actions. Many cyberbullies are people who wouldn’t risk hurting or harassing another person in a face-to- face situation. Because their actions are less direct, some cyberbullies don’t see themselves as bullies. They may think of themselves as vigilantes – people who act in the interests of justice to punish a crime – who are protecting or retaliating on behalf of a friend who’s been under attack.

14 Consequences of Cyberbullying (Targets) Emotional pain (anxiety, depression) Social isolation (rejection) Being a target 7 days a week, 24 hours a day Facing embarrassing information that goes viral or spreads quickly Feeling helpless, hopeless and depressed Feeling that they can’t tell anyone about the abuse Worrying that telling will lead to their technology being taken away Having text or images used to bully them resurface months or years later Suicide attempts or suicide Becoming cyberbullies themselves as a way to fight back or get revenge

15 Consequences of Cyberbullying (Perpetrator) Loss of access to their technology as punishment when they get caught Facing criminal charges if they’ve downloaded or posted illegal content Closure of their online accounts and/or banishment from social network sites Becoming victims themselves Being embarrassed or losing the respect of peers when the bullying is traced back to them Regret about messages or posts that they can’t take back Being suspended or expelled from school Future consequences when schools and employers search for and find out about their online activities

16 Explain What a person does online can be traced back to him or her. When people communicate online or through other technology, they can essentially create a permanent record of what they’ve written or posted. The “digital footprint” left by online activities can come back to haunt someone years later.

17 Who are the bystanders to cyberbullying? Anyone who reads hurtful or negative postings or texts about a target is a bystander of cyberbullying. Consequences of Bystanders Feeling helpless because they don’t know what to do Feeling afraid, angry, frustrated on behalf of the target Worrying that they might be the next target Feeling guilty if they do nothing Putting themselves at risk of being cyberbullied themselves if they come to a target’s defense Becoming a part of the bullying by passing on or even just reading or following the hurtful message and postings

18 Dangers of One troublesome trend among teens is the use of technology for sexting, or sending sexual images or messages via texting Sometimes sexting is part of cyberbullying Sometimes it is done between dating partners or friends Many teens don’t know that sexting is illegal Anyone who produces, distributes, or possesses sexual images of someone who’s under 18 can be arrested and sent to jail and have to register as a sex offender

19 Consequences of Sexting Once you send a sexual image or text message you can’t get it back, and you have no control over what happens to it or where it ends up. Even if you intend it just for one other person, such as a girlfriend or boyfriend, it can easily be passed on to others or even posted on the Internet. Sometimes when dating relationships or friendships end badly, the sexy photos shared during a relationship can become ammunition for revenge and cyberbullying. Safest choice… never participate in sexting and immediately delete any sexts you receive.

20 Explore Views to Prevent Cyberbullying At the beginning of class, we talking about how technology affected your communication and relationships with others. How do you think a person’s feelings or behaviors toward other people can change as a result of using technology to communicate? Now let’s think about thoughts, beliefs, and attitudes people might have around technology that could contribute to the problem of cyberbullying. Make a list of these ideas on the board.

21 How Technology Contributes To Cyberbullying The online world isn’t the same as the real world Nobody knows who you really are online It’s easy to share something with all of my online “friends” You can get even with someone without having to face him or her down “I didn’t start it, I just passed it on” There are no rules online, you can’t get caught or get in trouble Don’t take a picture if you don’t want it shared with everyone If you don’t like it, you can just delete it

22 Create Let’s examine this list of ideas, beliefs, and attitudes about technology that can contribute to cyberbullying and come up with some new beliefs, attitudes, and actions that can help prevent it. Use TE pg. 70 to help prompt the discussion

23 Solution Everything I do online or off can have real effects on real people. My online activities can be traced back to me. I don’t do anything I wouldn’t want my family or friends to know about. The messages I create and share with friends can be shared with their friends, and with others whom I may not know or want to share with. When I have problems with someone, I deal with them honestly, fairly, and in person. I am responsible for everything I choose to do online. I live in a real world with rules and laws, where I can face real consequences if I get caught. Everyone is entitled to his or her privacy. I think carefully before I send a message or pass something on. I treat others the way I would want to be treated.

24 FWISD code of Conduct on Cyberbullying Cyber Bullying Students are prohibited from sending or posting electronic messages that are abusive, obscene, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. This prohibition applies to conduct off school property if it results in a substantial disruption to the educational environment. Any person taking, disseminating, transferring, or sharing obscene, sexually oriented, lewd, or otherwise illegal images or photographs will be disciplined according to the Student Code of Conduct and may, in certain circumstances, be reported to law enforcement. Students and parents should also know it is a crime to, without permission, impersonate someone in creating a website or sending a message on a social networking site. The penalty for this offense is increased if the message threatens harms or intimidates someone.

25 Avoid Being A Target Beware of sharing private information or images in a text or online that other could use to hurt or embarrass you Block communication with a cyberbully. If you have to, get a new cell phone number, change your email address or leave a social networking site. Report any cyberbullying immediately to a trusted adult and encourage your friends to do the same Report online cyberbullying to your Internet provider Talk to law enforcement and press charges if needed Keep all evidence of cyberbullying. You’ll need it to press charges Don’t strike back in anger and become a cyberbully yourself

26 What Bystanders Can Do Refuse to pass on negative messages or embarrassing pictures of others Don’t be friends in person or online with anyone who cyberbullies others Report any cyberbullying immediately to a trusted adult and encourage your friends to do the same Report online cyberbullying to your Internet provider Keep evidence of cyberbullying that could help a friend press charges Don’t strike back on a friend’s behalf and come a cyberbully yourself

27 Summarize It can be particularly hurtful when you or others are cyberbullied by someone you used to think of as a friend But remember that cyberbullying, or harassing a person using technology, is violent and wrong,. You should report it and follow these actions no matter who the bully is.

28 Sources of Help for Cyberbullying It’s important to report cyberbullying to people who can help you deal with the problem. Friends and peers can give you support, but often you may need a trusted adult’s help to stop the problem. You could talk to your parents, a teacher, counselor, or school nurse. There are also agencies that deal with violence, including bullying, that can help. If the kind of cyberbullying you are experiencing or having witnessed is a criminal act, you may need to seek help from law enforcement.

29 Close Share one thing you learned during this lesson that made sense to you about dealing with the problem of cyberbullying.


Download ppt "Lesson 5-6. Bell Ringer Open your Unit 5 Student Journal from the Health folder: Page 11, Lesson 4 Journal Entry Describe all the ways you use communication."

Similar presentations


Ads by Google