By amy smith - Asotin - Anatone School District / Overview
Download
Report
Transcript By amy smith - Asotin - Anatone School District / Overview
CYBERBULLYING
Victims of Cyberbullying who
eventually took their own lives
What Does Cyberbullying Involve?
(Chisholm, 2006)
Cyberbullying occurs via:
chat rooms
online bulletin boards
e-mail
instant messaging
web sites
cell phones
on-line multiplayer video games
Cyberbullying involves:
harassing
humiliating
intimidating
sending derogatory insults or threats in messages
teasing
using inappropriate language
What Makes Cyberbullying Different
From Traditional Bullying
Anonymity
People often act in ways that they usually would
not act because the other person can’t physically
see them (Mishna, Saini, & Solomon, 2009)
Rampant Distribution
Something that is posted on the internet or sent
over text messages spreads very fast
Around the Clock
There doesn’t have to be physical contact for
cyberbullying to take place
Social Networking Sites and
Cyberbullying
Breeding ground for rumors, derogatory
comments, and threats
Word meanings are often misunderstood when they
are only read
Stolen passwords
Friends often share passwords or steal passwords
which results in inaccurate posts- PROTECT YOUR
PASSWORDS!
Exclusion
Things can be said about a person without them
knowing. This isn’t fair because they are unable to
defend themselves
Text Messaging and
Cyberbullying
Using other’s phones
Be careful to whom you lend your phone. You never
know what they are sending. You could get into some
serious trouble.
Sending inappropriate pictures
Sexting
It is against the law to take, send, and receive sexually
explicit pictures of minors
The act of sexting becomes cyberbullying when the
pictures are circulated without consent resulting in 2
serious offenses.
Types of Cyberbullies
(Chisholm, 2006)
“Vengeful Angels”
Those who are trying to “take up for” a friend who is getting picked on.
Don’t get in the middle of someone else’s cyberbullying situation. The
best advice you can give your friend is to stop communicating with the
bully/bullies.
“Power Hungry”
Those who pick on others only to make themselves feel powerful or
dominant.
Be aware of these types of bullies. Try to avoid contributing to their
mission to gain power by taking their side.
“Inadvertent Cyberbully”
Those who send a message that is misunderstood.
Be careful that what you say through the internet or text messaging is
clear and cannot be misunderstood
“Mean Girls”
Girls who gang up on other girls and try to exclude them or humiliate
them.
Don’t be a part of the “gang”
Sticks and Stones May Break My
Bones but Words Will Never Hurt Me?
NOT TRUE!
Cyberbullying can cause
Emotional distress
Academic problems
Absenteeism
Violence
Suicide
Washington State Law
According to RCW § 9.61.260 it is a against
the law to harass, intimidate, torment, or
embarrass someone through electronic
communications.
Arrests have been made in cases where
cyberbullying led to tragedy
What Can YOU Do?
• Be aware of the way that you communicate with
•
•
•
•
others through electronic means of communication
Don’t jump in the middle of a Facebook/Myspace
argument or bullying situation. Instead, tell an adult
if it is a situation that has gotten out of hand
Delete “friends” who constantly seem to be causing
problems on social networking sites
Tell the counselor or a teacher if you know of a
situation in which someone that you know is being
bullied
*There are also instructions for reporting
harassment in your student handbook
Considering the consequences of cyberbullying
Any Questions?
References
American School Counseling Association. (2003). The ASCA national model: A framework for school counseling programs. Alexandria, VA:
ASCA.
Auerbach, S. (2009). Screening out cyberbullies: Remedies for victims on the internet playground. Cardozo Law Review, 30(4), 1641-1675.
Retrieved from Academic Search Complete database.
Bakken, L., Gentes, C., & Solberg, N. (n.d.). Middle school cyberbullying curriculum. Seattle Public
Schools. Retrieved from http://www.seattleschools.org/area/prevention/cbms.html
Billitteri, T. J. (2008). Cyberbullying. CQ Researcher, 18 (17), 385-408. Retrieved April 3, 2010,
from CQ Researcher Online, http://library.cqpress.com/cqresearcher/cqresrre2008050200.
Chisholm, J. (2006). Cyberspace violence against girls and adolescent females. Annals of the New York Academy of Sciences, 1087(1), 7489. doi:10.1196/annals.1385.022
Eckholm, E., Zezima. (2010, March). 6 teenagers are charged after classmate’s suicide. The New York
Times. Retrieved from http://www.nytimes.com/2010/03/30/us/30bully.html?pagewant=all
Gentile, C. (2009, February). Student fights record of 'cyberbullying'. New York Times. Retrieved from
http://ntserver1.wsulibs.wsu.edu:2067/us/lnacademic/auth/checkbrowser.do?rand
Hinduja, S. & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant
Behavior, 29(2), 129-156. doi:10.1080/01639620701457816
Li, Q. (2006) Cyberbullying in schools. School Psychology International, 27(2), 157-170.
Mishna, F., Saini, M., Solomon, S. (2009). Ongoing and online: Children and youth’s perceptions of cyber bullying. Children and Youth
Services Review, 31, 1222- 1228.
doi: 10.1016/j.child youth.2009.05.004
Stone, C. (2009). School Counseling Principles: Ethic and Law (2ND ed.). Alexandria, VA: ASCA.
Tokunaga, R. (2010). Following you home from school: A critical review and synthesis of
Computers in Human Behavior, 26, 277-287.
Washington Revised Code RCW § 9.61.260 (2004). Retrieved from
Washington Revised Code § 28A 300-285 (2010). Retrieved from
http://apps.leg.wa.gov/RCW/default.aspx?cite=28A.300.285
Willard, N. (2007). Cyberbullying legislation and school policies: Where are the boundaries of the “schoolhouse gate” in the virtual world?
Wiseman, R. (2009). Bullies without boundaries. ASCA Schoolcounselor 47(2) 23-27.
research on cyberbullying victimization.
http://apps.leg.wa.gov/RCW/default.aspx?cite=9.61.260