Cyberbullying-stalking.cowanc,paynek

advertisement
Cyberbullying & Cyberstalking
BY: CRESSIDA COWAN & KENDRA PAYNE
Cyberbullying
CRESSIDA COWAN
“There’s no safe place anymore. You can be bullied 24/7...even in the
privacy of your own bedroom.” (“Electronic Bullying”, 2009)
Cyberbullying
is bullying that
takes place
through the
use of
technology
Cressida Cowan
http://www.deal.org/content/images/stories/DEAL/Images/Webzine/2007/J
uly/cyberbullying2_05.jpg
Cyber bullying happens through the use of…..
– Cell phones (text messages)
– Email
– Instant messages
– Micro-blogging sites (Twitter)
– Chat rooms
– Social networking sites (Facebook, Myspace)
– Gaming sites/rooms
Cressida Cowan
Why does cyber bullying happen?
Because…….
• cyber bullying can be anonymous.
No consequences, no judgment, no face-to-face
confrontation
•Bullies can hide behind online aliases.
Gives them a sense of control and power.
•And in some cases, it gives the victim an opportunity
to become the bully.
Cressida Cowan
Where & When is it most likely to happen?
Bullies can…..
•send harassing email messages
•pass slandering messages in chat rooms and on discussion
boards
•create websites with a victim as the focal point of the
website by creating humiliating animations and posting
embarrassing pictures.
•Cyber bullying can take place anytime and anyplace
Especially when computer access is granted in an
area where peers have access to the same websites
and
Cressida
Cowantechnology.
Organizations & websites that want to
put a stop to cyber bullying
 National Center for Bullying Prevention: Kids
against bullying website

Encourages kids to “Speak up, reach out, be a friend”

It teaches students that its okay to speak up when someone
is being bullied

Reach out and be a friend to both the bully and the victim.
Cressida Cowan
Encourage students to……

Become friends with the victim.

Become friends with the bully.


Tell the bully to stop!
Tell an adult what is happening.
Cressida Cowan
Cressida Cowan
How to recognize this is
happening
http://www.thepunch.com.au/images/uploads/bully.jpg
Check the facts!
• Cyber bullying is more likely to happen around the
age 15.
• The victims are most likely bullied in other ways.
• Cyber bullying may be taking place if you notice this
in a student
• change in attitude about technology and anxiety
about social events
• avoiding cyber places that he/she
normally visits
Cressida Cowan
What Can YOU do about it?
Cressida Cowan
Knowing how to prevent bullying can
be tricky!
 As a teacher and a parent it is vital to be hands on in
these situations to make prevention even more
successful.
 Here are some preventative ways on reducing
bullying. Thus, creating a more secure and
comfortable environment for everyone.
Cressida Cowan
Cyberbullying Prevention

Talk about bullying (how does it make them feel)

Have expectations for your students (Bullying will not be
tolerated)

Create consequences

Create a trust system

Teach students how to prevent bullying.

Encourage them to tell an adult.
Cressida Cowan
What parents should know.
•This type of bullying is like other types of bullying (only there’s no
escaping it).
•Can cause suicidal thoughts, eating disorders, and has caused
chronic illness in some cases.
•Some children run away from home
•Bullying can emotionally scar students for life.
•Can have a negative effect on the academics and self-esteem
•Continual bullying lasts beyond school years.
Schools CAN’T tackle this problem alone. GET INVOLVED! Ask your
school officials what they precautions they have set in place to handle
Cyber bullying
Cressida Cowan
Facts about Cyber bullying
• Cyber bullying can add unwanted tension to a
classroom/school setting.
• This type of bullying can happen anytime &
anywhere.
• Anyone can be targeted.
Cressida Cowan
More facts and
review
•Bullying can be anonymous
over the internet.
•The key to prevention is
giving students the tools
they need to stand up
against bullying.
•Schools may set up certain
precautions to protect
students against cyber
bullying
•blocking sites where
cyber bullying is most
likely to happen
Cressida Cowan
http://haroldskids.files.wordpress.com/2009/02/cyberbully.
jpg
Cyberstalking
What is cyberstalking?
 According to D’ovidio, “Cyberstalking is defined as
the repeated use of the Internet, e-mail, or related
digital electronic communication devices to annoy,
alarm, or threaten a specific individual or group of
individuals.”
Who are the most likely victims and Offenders
of cyberstalking?
 Anyone can be a victim of cyberstalking.
 However, females are more likely to become
victimized than males.
 Educational institutions are also a very likely
target for cyberstalking.
 Nearly 85 percent of the victims were white.
(Bocij,2005)
(Bocij,2005)
Where does cyberstalking occur?
 Email – In this form of cyberstalking, the
cyberstalker sends emails to the victim that may be
threatening, alarming, or anything of a harassing
nature. This is the most commonly used form of
cyberstalking.
Where does cyberstalking occur?
(cont’d)
 News Groups/ Message Boards - This type of
cyberstalking usually occurs when the offender post
threatening or defamatory statements that are
directed toward a specific group of people or an
individual.
Where does cyberstalking occur?
(cont’d)
 Internet Sites – In this form of cyberstalking, the
offender can post very alarming or threatening
comments to a web site. The cyberstalker could
also create a website that contains defamatory,
personal, and degrading things about a person.
Where does cyberstalking occur?
(cont’d)
 Chat rooms – In this form of cyberstalking, the
offender has the capability to send threatening
material directly to the victim and real time, and
anyone else in the chat room is allowed to view it.
Where does cyberstalking occur?
(cont’d)
 Third Party Instant Messages – This form of
cyberstalking occurs when the offender has
software that tracks when the victim logs onto a
messenger service, and then proceeds to harass the
victim in real time.
Where does cyberstalking occur?
(cont’d)
 Service User Profiles – This type of cyberstalking is
when a user creates a false profile pretending to be
the victim. The cyberstalker may post false
information and personal information such as,
phone numbers and addresses that directs unwanted
attention towards the victim.
(Bocij,2005)
What is the Law pertaining to cyberstalking?
 According to D’ovidio: “All 50 states and the
federal government have enacted statutes aimed at
protecting the victims of stalking.”
Tools helping detect cyberstalking:
 Private Investigators and law enforcement can be
hired to help detect and cease cyberstalking
 Some websites will allow the victim, to change or
delete their account information. They also may
delete any post about you that you say are
defamatory or untrue. User profiles that are created
pretending to
Tools helping preventing detection:
 Many sites are unwilling to allow law enforcements
to have any access to records. This may further
complicate investigations.
 The internet has created devices that ensure
anonymity for the cyberstalker, therefore they
cannot be traced.
Cyberstalking Works Cited
Bocij, P. (2005). Reactive stalking: a new perspective on victimsation. The British
Journal of Forensic Practice, 7(1),
D'ovidio, R. (2003). A Study on cyberstalking. FBI/Law Enforcement Bulletin,
1(2),
Grant, T. (2007). Is Cyberstalking different?. Psychology, Crime & Law, 13(6),
Meloy, J.R. (2007). Editorial stalking: the state of the science. Criminal
Behaviour and Mental Health, 1(7), Retrieved from
www.interscience.wiley.com doi: 10.1002?cbm.642
Tavani, H.T. (2005). Cyberstalking: harassing in the internet age and how to
protect your family. The Information Society, 7(2),
Cyber Bullying
References
Anderson, T., & Sturm, B. (2007). Cyberbullying: From playground to computer. Young Adult Library Services.
http://www.ala.org/ala/mgrps/divs/yalsa/yalsapubs/yals/toc5n2.cfm
Maher, D. (2008). Cyberbullying: An ethnographic case study of one Australian upper primary school class. Youth studies
Australia. Volume 27, Issue 4.
Mason, K. L. (2008) Cyberbullyinig: a preliminary assessment for school personnel. Wiley InterScience. Doi:
10.1002/pits.20301
Unknown. (2007). 11 Facts about Cyber-Bullying. Retrieved Nov 6, 2009, http://www.dosomething.org/tipsandtools/11facts-about-cyber-bullying.
Unknown. (2009). What is Cyber Bullying. Retrieved November 3, 2009, From
http://www.ncpc.org/topics/cyberbullying/what-is-cyberbullying.
Weber, Chris. What is Cyber-bullying. Retrieved November 3, 2009, from
http://www.cyberbullying.info/resources/downloads/ChrisWebster_WhatIsCyberbullying.pdf.
Electronic Bullying”, 2005, Dolly, April, Issue 414, page 90 from
http://www.cyberbullying.info/resources/downloads/ChrisWebster_WhatIsCyberbullying.pdf
Kids Against Bullying http://www.pacerkidsagainstbullying.org/
Images
tooth image http://www.deal.org/content/images/stories/DEAL/Images/Webzine/2007/July/cyberbullying2_05.jpg
21st c. bull http://www.thepunch.com.au/images/uploads/bully.jpg
youtube.com http://haroldskids.files.wordpress.com/2009/02/cyberbully.jpg
Download