CYBERBULLYING - Гимназия 1567, первый

Download Report

Transcript CYBERBULLYING - Гимназия 1567, первый

Grammar school 1567
Moscow
LESSON IDEAS
Ramilia Tikhonova
Lisova Helena
E - SAFETY
INTERMEDIATE
WARM UP
ANSWER THE QUESTIONS
1. What is your favourite online
activity?
2. Do you use the Net for chatting?
3. What services do you use to chat
with people online?
4. Who has a camera phone?
5. Whose phone has Bluetooth?
WHAT ARE THE RISKS OF USING THE
NET and MOBILE PHONES?
THE RISKS OF THE NET
-
Inappropriate content
Unreliable information
Levels of violence in video games
Identity theft
Unwanted contacts by strangers
Internet addiction
Cyberbullying: A Victim’s Story
(http://news.bbc.co.uk/2/hi/uk_news/education/7006473.stm)
“Cruel abuse
She is an engaging and attractive girl , 17 years old, with curly brown hair who is good at judo
and teaches swimming at her local pool.
Yet she describes being the victim of the most cruel abuse from girls at her last school over
several years.
It started in the ordinary way, with taunts and shoves in the corridor. But then the bullies got
access to Julianne's web page on her social networking site.
"Cyberbullying is worse than face-to-face bullying because it's bolder," she says.
"If they are willing to put insults up where more people can see them, it means they are more
serious.
"If they say it to you in a playground, you can forget about it, but when it's posted in front of
you it's there for you to constantly see, it sinks in more and you feel more threatened."
When the bullies managed to get access to Julianne's instant messaging service, things took
on an even more frightening turn.
"When the message came up I thought it was a friend," explains Julianne.
Stab threat
"The conversation started normally and then they started saying the things they'd been
saying at school, calling me a slag and a slut and all those words.
"Then they started saying they were going to get me tomorrow and I was going to be stabbed
and my brothers and mum and dad would be hurt.“ Julianne printed the conversation and
took it to her father.
"He started shaking and crying," she remembers. "Then … “
WHAT HAPPENED THEN?
Answer the questions:
1. Describe Julianne.
2. When and how did she become a
victim of cyberbullying?
3. How did she feel?
4. Who did she share her worries with?
5. What could happen then?
6. What does Julianne say about being
bullied and cyberbullied?
Match the words in the left column with the
definitions in the right one:
1. abuse
2. victim
3. taunt
a) the use of ICT deliberately to upset someone
b) to push a knife into someone or something
c) rude or offensive things that someone says when
they are angry
4. shove
d) a remark or joke intended to make someone
angry or upset
5. bully
e) a strong push
6. insult
f) someone who uses their strength or power to
frighten or hurt someone who is weaker
7. stab
g) a remark or action that is offensive or deliberately
rude
8. cyberbullying h) someone who suffers because of something bad
that happens
Correct answers - Match the words in the left
column with the definitions in the right one:
1.
abuse
2.
victim
c) rude or offensive things that smn says when they are
angry
h) someone who suffers because of smth bad that happens
3.
taunt
d) a remark or joke intended to make smn angry or upset
4.
shove
e) a strong push
5.
bully
f) smn who uses strength or power to frighten or hurt smn
6.
insult
g) a remark or action that is offensive or deliberately rude
7.
stab
smn or smth
b) to push a knife into
8.
cyberbullying a) the use of ICT deliberately to upset smn
Definitions of:
- Bullying is behaviour by an individual or group,
usually repeated over time, that intentionally hurts
another individual or group either physically or
emotionally.
- Cyberbullying is the use of ICT, particularly
mobile phones and the Net, deliberately to upset
someone else (harassment, threats, insults).
WHAT’S THE DIFFERENCE BETWEEN BULLYING
AND CYBERBULLYING?
THE DIFFERENCE BETWEEN BULLYING AND
CYBERBULLYING:
• Cyberbullying can occur 24/7 and invade
personal space
• The audience can be very large and reached
rapidly
• Anonymity of people who cyberbully
• Cyberbullying can take both between peers
and across generations
• Some cyberbullying is unintentional
Video ‘Let’s Fight Together’
http://www.youtube.com/watch?v=fNumIY9D7uY
- take notes 1. What happened to Joe?
2. What types of technology have been used to
bully?
3. Who was involved in cyberbullying?
4. How did the other pupils react?
5. How was the problem solved?
After watching the video work in pairs, discuss
the questions and report to the class:
1. How did Joe face cyberbullying? How did he feel? What
sort of messages did he receive on his mobile?
2. What kind of threats are facing children online?
3. Did the boy`s mother help him to deal with bullying
online? In what way? Do you agree that parents should
take personal things of their kids without permission?
Give your reason.
4. We can see the boy`s mother rushed to school for help.
What can parents do to help keep their kids safe online?
5. What would you do if you were involved in such a
situation?
What happened then
(http://news.bbc.co.uk/2/hi/uk_news/education/7006473.stm)
“. . . we went to the police."
The police managed to track the bullies down and used
harassment orders to keep them away from Julianne and her
family.
It turns out Julianne did exactly the right thing. The government's
guidance on cyberbullying advises victims to gather evidence to
show to their head teachers, or if it's more serious to the police.
With the right information cyberbullies can generally be tracked
down.
But it's harder to tackle those who've taken part less directly.
They may be forwarding insulting texts or humiliating videos sent
to them by the bullies. They may be gathering round a computer
screen with their mates to laugh at material posted on the web.”
(By Kim Catcheside
Social affairs correspondent, BBC News)
QUESTIONS TO THE TEXT
1.
2.
3.
4.
What did Julianne and her father do?
What did the police do?
Who is difficult to tackle?
Do you think that there should be a new law
that could potentially make it illegal to
criticize or make fun of somebody online?
5. What should be done to prevent kids from
being cyberbullied online?
6. What can your school do to prevent on-line
harassment? Do we need to update our
school regulations?
Complete the sentences with these words and
expressions:
to track smb/smt down, harassment , to keep smb/smth away, it turns
out, to gather evidence, to tackle smb, humiliating
1. It took the police quite a while to……….the bully …………….., but they
eventually found him.
2. He had to apologize in front of everyone – it was so ……………………. .
3. If I were you, I'd ……………. ……………. from that area at night.
4. Many schools are now trying to ………………… the problem of on-line
abuse.
5. They had little difficulty in ……………….. abundant ………………. against
a cyberbully.
6. Passive …………………….. became more and more active.
7. As …….. …………. …………….. , friends sometimes become bystanders
or even cyberbullies.
Correct answers - Complete the sentences with
these words and expressions:
to track smb/smt down, harassment , to keep smb/smth away, it turns out, to
gather evidence, to tackle smb, humiliating
1. It took the police quite a while to track the bully down, but they eventually
found him.
2. He had to apologize in front of everyone – it was so humiliating.
3. If I were you, I'd keep away from that area at night.
4. Many schools are now trying to tackle the problem of on-line abuse.
5. They had little difficulty in gathering abundant evidence against a cyberbully.
6. Passive harassment became more and more active.
7. As it turns out , friends sometimes become bystanders or even cyberbullies.
Make a list of key advice to prevent
and respond to cyberbullying, don’t
forget to use modal verbs.
Key Advice to Prevent and Respond to
Cyberbullying
•
•
•
•
•
•
•
Always respect others
Think before you send
Treat your password like your toothbrush
Block the bully
Don’t retaliate or reply!
Save the evidence
Make sure you tell: - an adult you trust
- a provider of the service
- your school
Prepare a poster, leaflet or presentation on
SAFETY in the NET