Cyberbullying Cybersmart topic area Cyberbullying Target age group Lesson duration Lower Secondary Lesson Overview This lesson is aimed at establishing an understanding of cyberbullying behaviour and its impact on others. The four activities provide practical strategies to assist young people to deal with cyberbullying behaviour and where to seek support. This lesson includes four short activities. Teachers can select a single activity or multiple activities to make up the recommended 45 minutes, depending on what they feel is appropriate to their class. Lesson outcomes Define and describe cyberbullying behaviour Assess the impacts of negative online behaviour Identify ways to manage and prevent cyberbullying behaviour Create a plan to act with resilience and self-awareness when online Australian Curriculum This lesson plan module supports a number of learning areas in the Australian Curriculum, including Health and Physical Education, Civics and Citizenship and Technologies. Activity 1 Page Subject focus Discussion/ Visual Activity 4 Identify positive online behaviour and act against cyberbullying behaviour Activity 2 Page Subject focus Multiple choice activity 5 Identifying cyberbullying behaviour, roles and responsibilities. Activity 3 Page Subject focus Visual Activity/Writing Activity 6 Demonstrating negative and positive behaviour online Duration Resources required Internet access to view Cyberslap. http://www.youtube.com/watch?v=x TLBQBYX2MQ Duration Resources required Worksheet 1 Duration Resources required Worksheet 2 or projection equipment, pen cybersmart@acma.gov.au Cyberbullying 2 Activity 4 Page Subject focus Visual Activity/ Discussion Activity 7 Identifying cyberbullying roles Duration Resources required Worksheet 3 External links included in lesson http://www.youtube.com/watch?v=xTLBQBYX2MQ Technology and Terminology referred to in this lesson Cyberbullying, bullying behaviour, bystander, target, online, post, text, email, message, social networking, block, report, trusted adult, harm. Visit http://www.cybersmart.gov.au/Schools.aspx for other lesson plans dealing with cyberbullying behaviour. This work is based on materials that constitute copyright of the Commonwealth of Australia and is licenced under a Creative Commons Attribution Non-Commercial Share Alike 2.5 Australia Licence. See whttp://cybersmart.acma.gov.au/About Cybersmart/Legal.aspx for more information. 3 Cyberbullying Background Cyberbullying is the use of online technology, such as computers and mobile phones, to bully a person or group. Bullying is repeated behaviour by an individual or group with the intent to harm another person or group. Young people can cyberbully each other in many ways. Sending hurtful texts or abusive emails, excluding individuals from online conversations, imitating someone online, posting inappropriate images and trolling are some of the ways people can cyberbully each other. Cyberbullying can happen to anyone and typically involves a person who perpetrates the bullying behaviour against a target – the person being bullied. In some instances there may also be bystanders involved – people who witness someone being cyberbullied. A positive bystander is someone who offers support to the target and does not ignore or participate in the bullying behaviour, such as forwarding on humiliating images. Cyberbullying is serious because it can be relentless and occur 24 hours a day, extending well beyond school grounds and into ‘safe’ spaces, such as in homes. Its effects can be damaging, making a person feel isolated, friendless, miserable and insecure. It is important to empower younger internet users with the knowledge of how to act responsibly and with resilience online, and equip them with the tools to know how to deal with cyberbullying behaviour. It is also crucial to demonstrate how others can be affected by their interactions online and what language and actions are considered appropriate in the online environment. cybersmart@acma.gov.au Cyberbullying 4 Activity 1: Bullying behaviour Activity 1 Page Subject focus Discussion /Visual Activity 4 Identify negative online behaviour and decide on acceptable behaviour Duration Resources required Internet access to view Cyberslap. http://www.youtube.com/watch?v=x TLBQBYX2MQ Teacher’s Tip: This activity should provide a great opportunity to introduce new high school students to the school’s policies surrounding cyberbullying, bullying and ICT use. Talk to your students about the kind of behaviour expected from now that they have made the transition to high school. Instructions 1. As a class, view the minute-long video Cyberslap. 2. Have students break away into small groups or run this as a class activity using the board. 3. Using the sentence ‘You don’t need a black eye to be bullied’, have the group/s establish a set of rules about acceptable and unacceptable behaviour online. 4. Ask students to compile a list of strong, positive verbs to use, such as trust, consider, respect, assist, prevent, provide etc. for acceptable behaviour. 5. Ask the students to compile a list of negative verbs and adjectives to use such as insulting, harm, upsetting, cruel, cowardly, demeaning, hurt etc. for unacceptable behaviour. 6. Write up the final key points from the class and display them prominently. Cyberbullying 5 Activity 2: Cyberbullying multiple choice Activity 2 Page Subject focus Multiple choice activity 5 Identifying cyberbullying behaviours, roles and responsibilities. Duration Resources required Worksheet 1 Answer key for teachers: Number Question Answers 1 Cyberbullying is: d. 2 The types of people who are cyberbullied are: d. 3 Cyberbullying is considered to be: b. 4 If I am being bullied on a social networking site I can: c. 5 A cyberbully is usually: d. 6 Ways to prevent cyberbullying include: d. 7 Talking to a trusted adult about cyberbullying is: a. 8 In a cyberbullying situation, a positive bystander is a person who: d.. Cyberbullying 6 Activity 2: Shifting Perspectives Activity 3 Page Subject focus Visual Activity/Writing Activity 6 Demonstrating negative and positive behaviour online Duration Resources required Worksheet 2 or projection equipment, pen Instructions 1. Divide students into pairs or small groups. 2. Distribute or project the image provided in Worksheet 2. 3. Ask students to write five negative comments about the image before writing five positive comments. 4. Ask each group what was easier to come up with – the negative or positive comments? 5. Now distribute or display the entire image, which shows the ‘whole story’. 6. As a whole class discussion, ask students if this changes their perspective and how they feel about the comments they made. 7. Finally ask the class if they think this constitutes cyberbullying behaviour. Teacher’s Tip: As well as prompting discussion about assumptions, incorrect conclusions and hurt arising from negative comments left on social networking sites, this exercise can be used to illustrate the benefits of thinking twice before posting images. Cyberbullying 7 Activity 4: Bullies, bystanders and defenders Activity 4 Page Subject focus Visual Activity/ Discussion Activity 7 Identifying cyberbullying roles Duration Resources required Worksheet 3 Sometimes, cyberbullying behaviour can take place in public forums like social networking and video hosting sites. Ask students to assess the screenshots on Worksheet 3 to identify the people doing the bullying behaviour, the bystanders and the defenders in each scenario. After these are identified, discuss what the intention might be from the content of a comment or post. As a group, discuss what motivates put-downs and abuse – is it to appear clever, funny or cool? Does it actually have that result? Model answers for worksheet 3 Workshop together and use it to discuss passive-aggressive language, motivations, and different kinds of abusive language. Have the class recognise that cyberbullying language can be much more subtle than direct insults, but just as damaging. Also, discuss with the class the possibility that some students might have made hurtful comments like these at times, and to interrogate their own motivations before posting. WORKSHEET 1: CYBERBULLYING MULTIPLE CHOICE Name: ____________________________________________________ 1. Cyberbullying is: a. b. c. d. Using online technology to deliberately and repeatedly bully someone. Using online technology to make someone feel insecure and miserable. Using online technology to make someone feel isolated and friendless. All of the above. 2. The types of people who are cyberbullied are: a. b. c. d. Trouble makers. Popular and outgoing. Shy and sensitive. Anyone can be cyberbullied. 3. Cyberbullying is considered to be: a. b. c. d. Not that serious – everyone gets bullied at school. Very serious – it makes people feel unsafe at home as well as at school. Fairly serious – but only because there is always evidence. Who wants to be serious? I only go online for fun. 4. If I am being bullied on a social networking site I can: a. b. c. d. Ask my friends to help me retaliate. Try to forget its happening. Use that site’s report function. Never go online again. 5. A cyberbully is usually: a. b. c. d. Big, mean, and obviously a bully. Sneaky, anonymous, and will never be found out. A particular kind of extremely bad person. Anyone, including my friends or I, if we aren’t careful about how we treat others online. 6. Ways to prevent cyberbullying include: a. Not replying to hurtful messages or posts. b. Using the block, report and privacy settings on the sites where cyberbullying behaviour is occurring. c. Collecting evidence of cyberbullying behaviour, such as nasty texts and reporting it to a trusted adult, like a parent or teacher. d. All of the above. 7. Talking to a trusted adult about cyberbullying is: a. b. c. d. A good idea. There’s no reason to suffer alone. Not worth it because it will make the person who is doing the bullying angrier. Never a good idea, it can only make things worse. A waste of time because they don’t understand. 8. In a cyberbullying situation, a positive bystander is a person who: a. b. c. d. Does not ignore what they see happening to someone else. Asks the person who is the target of the bullying behaviour if they are OK. Reports the behaviour to someone who can help, like a trusted adult. All of the above. WORKSHEET 2: SHIFTING PERSPECTIVES Figure 1 - The image shows two young people arm in arm What kinds of assumptions might we make about the situation in the picture above? Negative Positive Figure 2 - The image shows the same two young people from the image on the previous page, but now it is revealed that they are part of a larger group, five friends, all arm in arm. Consider the assumptions made previously. How do they change once we have the full picture? How might this relate to assumptions we make about people online? WORKSHEET 3: SOCIAL MEDIA ROLES In the following examples, indicate who is exhibiting bullying behaviour. Who is a ‘bystander’? Who is responding appropriately? For those who are communicating inappropriately, how could they have contributed differently? Re-write those comments that could make a more positive contribution. Example 1 – Social Networking Party Figure 3 - This image shows an exchange on a social networking site. The original post refers to a party, some comments suggest that not everyone should be invited, like the 'wannabes' and there is a request that photos of the party not be 'tagged' online. Example 2 – Social Networking Dress Figure 4 - This image shows comments from a social networking site regarding a post about a dress which someone is considering wearing to a formal event. Some comments are supportive, while others are insulting. Example 3 – Video Site Fight Figure 5 - This image shows an online video site and comments concerning a video titled "Ethan v Jackson at Middle Park West". The image of the video shows two boys who appear to be having a physical confrontation. Some comments are inflammatory, while some suggest that the video should be removed, and that reputations may be damaged.