Cyberbullying & Cyberstalking BY: CRESSIDA COWAN & KENDRA PAYNE Cyberbullying CRESSIDA COWAN “There’s no safe place anymore. You can be bullied 24/7...even in the privacy of your own bedroom.” (“Electronic Bullying”, 2009) Cyberbullying is bullying that takes place through the use of technology Cressida Cowan http://www.deal.org/content/images/stories/DEAL/Images/Webzine/2007/J uly/cyberbullying2_05.jpg Cyber bullying happens through the use of….. – Cell phones (text messages) – Email – Instant messages – Micro-blogging sites (Twitter) – Chat rooms – Social networking sites (Facebook, Myspace) – Gaming sites/rooms Cressida Cowan Why does cyber bullying happen? Because……. • cyber bullying can be anonymous. No consequences, no judgment, no face-to-face confrontation •Bullies can hide behind online aliases. Gives them a sense of control and power. •And in some cases, it gives the victim an opportunity to become the bully. Cressida Cowan Where & When is it most likely to happen? Bullies can….. •send harassing email messages •pass slandering messages in chat rooms and on discussion boards •create websites with a victim as the focal point of the website by creating humiliating animations and posting embarrassing pictures. •Cyber bullying can take place anytime and anyplace Especially when computer access is granted in an area where peers have access to the same websites and Cressida Cowantechnology. Organizations & websites that want to put a stop to cyber bullying National Center for Bullying Prevention: Kids against bullying website Encourages kids to “Speak up, reach out, be a friend” It teaches students that its okay to speak up when someone is being bullied Reach out and be a friend to both the bully and the victim. Cressida Cowan Encourage students to…… Become friends with the victim. Become friends with the bully. Tell the bully to stop! Tell an adult what is happening. Cressida Cowan Cressida Cowan How to recognize this is happening http://www.thepunch.com.au/images/uploads/bully.jpg Check the facts! • Cyber bullying is more likely to happen around the age 15. • The victims are most likely bullied in other ways. • Cyber bullying may be taking place if you notice this in a student • change in attitude about technology and anxiety about social events • avoiding cyber places that he/she normally visits Cressida Cowan What Can YOU do about it? Cressida Cowan Knowing how to prevent bullying can be tricky! As a teacher and a parent it is vital to be hands on in these situations to make prevention even more successful. Here are some preventative ways on reducing bullying. Thus, creating a more secure and comfortable environment for everyone. Cressida Cowan Cyberbullying Prevention Talk about bullying (how does it make them feel) Have expectations for your students (Bullying will not be tolerated) Create consequences Create a trust system Teach students how to prevent bullying. Encourage them to tell an adult. Cressida Cowan What parents should know. •This type of bullying is like other types of bullying (only there’s no escaping it). •Can cause suicidal thoughts, eating disorders, and has caused chronic illness in some cases. •Some children run away from home •Bullying can emotionally scar students for life. •Can have a negative effect on the academics and self-esteem •Continual bullying lasts beyond school years. Schools CAN’T tackle this problem alone. GET INVOLVED! Ask your school officials what they precautions they have set in place to handle Cyber bullying Cressida Cowan Facts about Cyber bullying • Cyber bullying can add unwanted tension to a classroom/school setting. • This type of bullying can happen anytime & anywhere. • Anyone can be targeted. Cressida Cowan More facts and review •Bullying can be anonymous over the internet. •The key to prevention is giving students the tools they need to stand up against bullying. •Schools may set up certain precautions to protect students against cyber bullying •blocking sites where cyber bullying is most likely to happen Cressida Cowan http://haroldskids.files.wordpress.com/2009/02/cyberbully. jpg Cyberstalking What is cyberstalking? According to D’ovidio, “Cyberstalking is defined as the repeated use of the Internet, e-mail, or related digital electronic communication devices to annoy, alarm, or threaten a specific individual or group of individuals.” Who are the most likely victims and Offenders of cyberstalking? Anyone can be a victim of cyberstalking. However, females are more likely to become victimized than males. Educational institutions are also a very likely target for cyberstalking. Nearly 85 percent of the victims were white. (Bocij,2005) (Bocij,2005) Where does cyberstalking occur? Email – In this form of cyberstalking, the cyberstalker sends emails to the victim that may be threatening, alarming, or anything of a harassing nature. This is the most commonly used form of cyberstalking. Where does cyberstalking occur? (cont’d) News Groups/ Message Boards - This type of cyberstalking usually occurs when the offender post threatening or defamatory statements that are directed toward a specific group of people or an individual. Where does cyberstalking occur? (cont’d) Internet Sites – In this form of cyberstalking, the offender can post very alarming or threatening comments to a web site. The cyberstalker could also create a website that contains defamatory, personal, and degrading things about a person. Where does cyberstalking occur? (cont’d) Chat rooms – In this form of cyberstalking, the offender has the capability to send threatening material directly to the victim and real time, and anyone else in the chat room is allowed to view it. Where does cyberstalking occur? (cont’d) Third Party Instant Messages – This form of cyberstalking occurs when the offender has software that tracks when the victim logs onto a messenger service, and then proceeds to harass the victim in real time. Where does cyberstalking occur? (cont’d) Service User Profiles – This type of cyberstalking is when a user creates a false profile pretending to be the victim. The cyberstalker may post false information and personal information such as, phone numbers and addresses that directs unwanted attention towards the victim. (Bocij,2005) What is the Law pertaining to cyberstalking? According to D’ovidio: “All 50 states and the federal government have enacted statutes aimed at protecting the victims of stalking.” Tools helping detect cyberstalking: Private Investigators and law enforcement can be hired to help detect and cease cyberstalking Some websites will allow the victim, to change or delete their account information. They also may delete any post about you that you say are defamatory or untrue. User profiles that are created pretending to Tools helping preventing detection: Many sites are unwilling to allow law enforcements to have any access to records. This may further complicate investigations. The internet has created devices that ensure anonymity for the cyberstalker, therefore they cannot be traced. Cyberstalking Works Cited Bocij, P. (2005). Reactive stalking: a new perspective on victimsation. The British Journal of Forensic Practice, 7(1), D'ovidio, R. (2003). A Study on cyberstalking. FBI/Law Enforcement Bulletin, 1(2), Grant, T. (2007). Is Cyberstalking different?. Psychology, Crime & Law, 13(6), Meloy, J.R. (2007). Editorial stalking: the state of the science. Criminal Behaviour and Mental Health, 1(7), Retrieved from www.interscience.wiley.com doi: 10.1002?cbm.642 Tavani, H.T. (2005). Cyberstalking: harassing in the internet age and how to protect your family. The Information Society, 7(2), Cyber Bullying References Anderson, T., & Sturm, B. (2007). Cyberbullying: From playground to computer. Young Adult Library Services. http://www.ala.org/ala/mgrps/divs/yalsa/yalsapubs/yals/toc5n2.cfm Maher, D. (2008). Cyberbullying: An ethnographic case study of one Australian upper primary school class. Youth studies Australia. Volume 27, Issue 4. Mason, K. L. (2008) Cyberbullyinig: a preliminary assessment for school personnel. Wiley InterScience. Doi: 10.1002/pits.20301 Unknown. (2007). 11 Facts about Cyber-Bullying. Retrieved Nov 6, 2009, http://www.dosomething.org/tipsandtools/11facts-about-cyber-bullying. Unknown. (2009). What is Cyber Bullying. Retrieved November 3, 2009, From http://www.ncpc.org/topics/cyberbullying/what-is-cyberbullying. Weber, Chris. What is Cyber-bullying. Retrieved November 3, 2009, from http://www.cyberbullying.info/resources/downloads/ChrisWebster_WhatIsCyberbullying.pdf. Electronic Bullying”, 2005, Dolly, April, Issue 414, page 90 from http://www.cyberbullying.info/resources/downloads/ChrisWebster_WhatIsCyberbullying.pdf Kids Against Bullying http://www.pacerkidsagainstbullying.org/ Images tooth image http://www.deal.org/content/images/stories/DEAL/Images/Webzine/2007/July/cyberbullying2_05.jpg 21st c. bull http://www.thepunch.com.au/images/uploads/bully.jpg youtube.com http://haroldskids.files.wordpress.com/2009/02/cyberbully.jpg