1 / 29

Cyberbulling

Cyberbulling. Dr. Donna Herring Jacksonville State University. Definition .

fathia
Download Presentation

Cyberbulling

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbulling Dr. Donna Herring Jacksonville State University

  2. Definition • “Cyberbulling involves the use of information and communication technologies such as e-mail, cell phone, text messaging, instant messaging, defamatory personal Websites, and defamatory online personal polling websites, to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others.” (Belsey, 2004)

  3. Pew Internet Project • 87% of all youth • Ages 12-17 • Use the Internet • 21 million people • Studies show that 25-35% of school age children report being bullied in chat rooms, e-mail, and via text messages

  4. Two Goals • Increase awareness of types of risk • Unsupervised & uneducated manner • Offer solutions • One size does not “fit all” • Use your own judgment • Combination of interventions • Start with human solutions • Use technological solutions if necessary

  5. Human Precautions • Trusting & open relationship • Sharing online experience • Strategically place Internet connected computer

  6. Technological • Not a replacement for human intervention • Help children be knowledgeable (use/misuse) • Teach them to make good decisions • Help them police themselves & others (“off track”) • Effective secondary measure or backup

  7. Not Inherently Good or Evil!! • Computers, cell phones, mp3 players, PDA’s, Internet • Judge by impact • Bridge distance between family members

  8. Not Inherently Good or Evil!! To believe that every child is at risk by simply logging on is not accurate.

  9. Not Inherently Good or Evil!! • Most kids use technology to: • Interact with real friends • Smart to keep personal info private • They “get it”

  10. Not Strangers • Spill over from face-to-face • Jealousy

  11. Megan Meier In this Monday, Nov. 19, 2007 file photo, Tina Meier holds two pictures of her daughter Megan who committed suicide last October after receiving cruel messages on MySpace, in St. Charles, Mo. A federal grand jury in Los Angeles on Thursday, May 15, 2008, indicted a Missouri woman, Lori Drew of suburban St. Louis for her alleged role in perpetrating a hoax on the online social network MySpace against Megan Meier.

  12. Worse than Live Bullying • Seems to be worse the live bullying • Not bound by time and space • Audience much, much bigger • Significantly more cruel • Rich array of media • Sounds, altered graphics, text, video, slide shows, photos, avatars

  13. High Tech Bullying • Exclusion • Flaming • Outing • Cyberstalking • E-mail • Harassment

  14. High Tech Bullying • Instant Messaging (IM) • Websites or Blogs • Impersonation • Voting/Polling Booths • Hostile Takeover

  15. MMOG or MMO • Massively Multiplayer Online Gaming • 3D World Game • Can be whatever (brave, hero, etc.) • Social bridging—like hangouts of old • Runescape • Second Life • Teen Second Life

  16. Griefers • Close out the software • Turn off computer • Ignore them • Teleport or fly away • Mute them • Report them • Ban or eject them

  17. Suspicious Behaviors • Using computer late at night more than usual • Grades are declining • Misbehaving in school more than usual • Changes in ordinary daily activities (eating, sleeping, mood swings, etc.) • Appears to be upset after Internet use • Evidence that child is covering their online tracks

  18. What to Do…. • Maintain open communication • Don’t blame the victim • Vengeance will not help • Report to a trusted adult at school • Keep all records (chat transcripts, photos, website pages, e-mails (including full headers)

  19. What to Do…. • Inform perpetrator’s Internet Service Provider or cell phone provider • Communicate to the perpetrators and their parents • Explain “they are cyberbullying” and will be reported to the authorities if it continue

  20. LeetSpeak Respect VS Understanding • While it's important to respect your children's privacy, understanding what your teenager's online slang means and how to decipher it is important as you help guide their online experience. While it has many nicknames, information-age slang is commonly referred to as leetspeek, or leet for short. Leet (a vernacular form of "elite") is a specific type of computer slang where a user replaces regular letters with other keyboard characters to form words phonetically—creating the digital equivalent of pig Latin with a twist of hieroglyphics.

  21. LeetSpeak • See if you can “read” the following messages: • |-|0\/\/ r j00Z? • pH1/\/3, \/\/|-|47’5 UP \/\/17|-| j00Z? • /\/07 /\/\U(|-|. • 937 j00R |-|0/\/\3\/\/0R|< pH1/\/15|-|3D ‘/37? • ‘/35.

  22. Resources Addressing CyberBullying in Schools Communities Can Stop Bullying Cyberbullying: Instant Cruelty (PDF) Cyberbullying: Not Just Name-Calling Cyberbullying Presentation (PDF)

  23. Resources Cyberbullying Cyberbullying: Bullying with Technologies Cyberbullying Dealing with Online Bullies Let’s Fight it Together: A Cyberbullying Film NetBullies Stoptextbully Working to Halt Online Abuse (WHOA)

  24. Technological • Blockers—block net access to certain addresses deemed to contain objectionable material • Filters—block access based on the appearance of certain words or phrases in the data being downloaded Neither is Foolproof!!!!

  25. Technological • Pop-up Blockers • Google Toolbar • Yahoo Toolbar • Windows XP (Service Pack 2) • Pop-Up Stopper • www.popuptest.com (to test) • Filters • Blockers

  26. Technological • Filter Caution • May allow a picture from a pornographic site to appear before triggering a block • Porno sites purposely represent the words on an opening page with graphics to defeat word filter • Picture may be saved, printed, emailed or posted elsewhere on the NET (kid’s cell phone)

  27. Technological • CyberSitter • Block access to web sites (over 35 filter) • Record and view all web sites visited • Record both sites of a chat conversation • Block or limit access to dangerous services (MySpace or Facebook) • Set time restrictions for Internet use • Get activity reports by e-mail • Configure program by remote control

  28. Technological • Keylogging • Much more aggressive • Registers or records every keystroke a user types • Online attackers use • Used to snoop • lamBigBrother • PC Tattletale • eBlaster • Snoopstick • Guardian Monitor Pro

  29. Technological • Other Ways to Filter/Block • Parental controls on browser • Using your router • Child/Family friendly Internet Service Providers • Bookmarking • Set child’s favorite site to homepage • Create special folder in Bookmarks • Create webpage of approved sites • Browsers for children

More Related