CYBER-BULLYING Kevin Cummins – www.edgalaxy.com

CYBER-BULLYING
Kevin Cummins – www.edgalaxy.com
What is cyber-bullying?
“Cyber-bullying involves the use of information and
communication technologies such as e-mail, cell phone and
pager text messages, instant messaging, defamatory personal
Web sites, and defamatory online personal polling Web sites,
to support deliberate, repeated, and hostile behaviour by an
individual or group, that is intended to harm others.”
(Bell Belsey, www.cyberbullying.ca )
How is cyber-bullying the same as face to
face (f2f) bullying?


It involves
• human relationships
• power
• control
• fear e.g. physical harm or social isolation
• victim feels worthless, weak or unwanted
• psychological pain
• humiliation
Victims are afraid to disclose
How is cyber-bullying different from face to
face (f2f) bullying?

Technology is the vehicle

24 / 7: It is ANYTIME and ANYWHERE

Bullies can hide behind anonymity

Bullying communications can reach a huge audience at great speed

The image is out there forever and keeps re-victimizing the person

Zero empathy for the victim
Vehicles for cyber-bullying













Email
IM – MSN
Social networking sites – Facebook, Twitter, Myspace, Bebo etc.
Bash boards, Chat rooms
Virtual learning environments – school work sites
Mobile phones, Camera phones
On line and interactive games
Blogs, Wikis
Bashing site – Rate My School
Internet polling – Doodle
Webcams
Video hosting sites – YouTube
Game sites
Direct cyber-bullying

Direct attack to the victim via email, IM, blog

Phishing email address or web site

Text war leading to huge bills and denial of service

Photoshop pictures sent or posted as real pics


Use a stolen password to lock out the rightful owner and then hijack the account for
nasty purposes
Create a poll, survey or bash board to vote on who is hot, ugly, stupid, gay, sexy or
a slut
Direct cyber-bullying



Tease or taunt
Impersonation: create a Facebook page to publish fake information, rumours or
stories
Insult or dissing

Threaten the victim or a member of the victim's family
Outing

Create and spread rumours (true or not)

Post clips on YouTube out of context

Secondary school, student to student cyberbullying examples

Repeating what a person said, or commenting on what a person wore or did in
school, leading to fear of being stalked

Threats of violence to the student or the family

Blackmail for sexual or monetary favours

Impersonation of a person, teacher, school web site or organization – phishing site

I know where you live!

Teens transmit pornographic pictures of themselves or their underage peers, from
their cell phones.
What educators can do

Investigate to see if the victim(s) of cyber-bullying need support from a professional.

Be sure that your school’s anti-bullying rules and policies include cyber-bullying.

Investigate reports of cyber-bullying immediately even if the cyber-bullying occurs
off-campus

Notify parents of victims and parents of known or suspected cyber-bullies.

Contact the police immediately if known or suspected cyber-bullying involves acts
such as:
◦ Threats of violence
◦ Extortion
◦ Obscene or harassing phone calls or text messages
◦ Harassment, stalking, or hate crimes
◦ Child pornography

http://www.stopbullyingnow.hrsa.gov
What schools must do

Put cyber-bullying prevention in the curriculum

Educate everyone about the consequences and ethics of cyber-bullying

Address the content and not the technology



Enforce clearly and publicly stated consequences of cyber-bullying up to
and including the pressing of criminal charges
Make the cyber bully accountable
◦ Rethink the effectiveness of zero tolerance, suspension, restitution,
restoration of trust
Include cyber-bullying in the school's code of behaviour
What we do here at (School Name)




We have an Internet User Agreement Policy – Co-signed
by Parents and Students.
We have an excellent filtering system that simply does
not allow for access to sites such as MSN, Facebook and
Myspace.
All 3 – 6 Students complete the internet safety and
awareness course on Superclubs Plus and we actively
encourage our students to use this to communicate with
friends as it is monitored by adults. - Mainly teachers.
Any cyber bullying issues that arise are treated exactly
the same as a face to face issue and we call upon our
existing school values and protocols in dealing with
cyber bullying.
We teach the students to:


Never share passwords or log-in information except with their
teacher or a parent
If harassed they should
◦
◦
◦
◦
◦
◦


tell a trusted adult
leave the harassment location
never respond to harassing messages
save the harassing messages for the ISP or school
report it to the police if necessary
Stop, block, save and tell
Take a stand against bullying of all kinds
Know and adhere to the Acceptable Use Policy
◦
http://www.bewebaware.ca/english/CyberBullying.aspx
Signs Your Child May be a Victim of Cyberbullying






Unexpectedly stops using the computer
Appears nervous or jumpy when an instant message, text
message or email appears
Appears uneasy about going to school or outside in
general
Appears angry, frustrated, or depressed after using the
computer
Avoids discussions about what
they are doing on the computer
Becomes abnormally withdrawn
from usual friends or family
http://www.cyberbullying.us/cyberbullying_warning_signs.pdf
Signs a Child May be Cyberbullying Others






Quickly switches screens or closes programs when you
walk by
Uses computer at all hours of the night
Gets unusually upset if he/she cannot use the
computer
Laughs excessively while using the computer
Avoids discussions about what they are doing on the
computer
Uses multiple online accounts or uses an account that is
not their own
http://www.cyberbullying.us/cyberbullying_warning_signs.pdf
PART 2:
USE OF DIGITAL TECHNOLOGY IS
NOT WITHOUT
RISKS
Exposure to Inappropriate and Harmful
Content






Such as Pornography
Easily available on the Net - Australian Broadcasting Authority (ABA) study:
14million pornographic websites across the world – some carrying
pornographic images of children (Wellard 2001)
Promotes a demeaning view of women & men
Is addictive
Can be used to sexualise young children
Children games sites – known to have inappropriate games hidden
within the site or links to inappropriate sites
Unsafe Contacts or inappropriate
contacts


Predators in chat rooms/stalking/online grooming – pretending to
be someone else or not pretending (WA recently– man charged with
grooming a 12 year old girl for sex over the internet)
People know when you online – so invasion of privacy and easy
access

Cyber sex – yes they do do this

Exposure or engagement with inappropriate discussions/language
Racist/sexist/hate based text

Small extreme groups use the web for this purpose.
Some pose as churches, or other “acceptable”
groups. Some target children.

Exposure to other offensive material in the form of
photos, videos, or text of this nature

Links that take us to homophobic sites or racist cites
Inaccurate information




Fake sites
URL mimickers eg www.microdoft.com - known to be
done by using a word that young children commonly
misspell to have the child enter their site
Historical revisionist material
Inaccurate health information – a real problem
Invasion of privacy




Often advertising is masked as content on a site
Subtle request for information (games, auctions
competitions etc)
Collection of information is a net marketers dream
Information going out may relate to other members of
the family or the family address, phone, parents income,
movements etc
In opposition to your parenting values

Our children can easily access magazines, clips to
films or music on the internet that you may not allow
them to normally purchase or view in your home

Young siblings may gain exposure to material you
don’t want them to
Health risks

Addiction

Sedentary

Virtual world vs. real world

Loss of communication & other skills

Social isolation or loneliness

Lack of sleep – sms on mobiles at night
Wrongdoing by children could result in
serious long term consequences





Commonwealth Telecommunications laws make
certain misuse of mobile phones unlawful
Criminal offence eg: child pornography by
transmitting certain photos
Expulsion from school
Loss of friends/reputation
Legal action
Myths







If we ban it there will be no risk
It’s a normal part of adolescent behaviour
This one-off session will fix the risk problem
We had no problems until computer technology and mobile
phones became so popular
Its character building
It won’t happen to my child
My child will tell me we have an open relationship
(hopefully they will but they may not)
FACTS
Young people hold more power than any other group
in terms of their capacity to influence other young
people
Recent research shows that teenagers are less likely to tell
their parents (tell a friend or teacher first) if it occurs
because of fear parents will remove their access to
mobile/computers
WHEN A PARENT SAYS:
I don't tell you how to run your school,
you don't tell me how to run my house!
YES I CAN! …said the principal

When there is a nexus, convergence, meeting or intersection
between the school and the behaviour




Disruption of school environment
Negatively impacts the learning environment
Negatively impacts the mental or physical well being of others
Schools are taking on the role of parents to students.
Eric M. Roher, LLP, Toronto, Ontario
Take responsibility





Predominantly the problem is cultural – damage is borne out of a
culture that permits or condones (directly or indirectly)
Understand that young people are the most powerful source of
influence on other young people
Inaction can be as damaging as the behavior itself
Value the proper use of the technology – mentor this
Everyone has a right to feel safe
STRATEGIES AND SUPPORTS
2 Main Principles
Parents are primary educators in safety and
values for their children – You must be proactive
in this
1)
A Multi facet approach is necessary.
2)



A Technical Approach
Parental Ownership
Education and reinforcement at school.
The solutions are not rocket science




There are no miracle answers or solutions
It’s about using the basic parenting skills and
strategies that work with you know so well
Its about working alongside other stakeholders
Each person taking responsibility makes a
difference
Educate yourself
 Spend
some time learning about cyber tech
 Get involved with your children’s online activities,
validate their skills and learn from them
 Get on the internet and mobile phone and learn how it
works. Ask your children to show you
 Research and follow up anything that has interested
you tonight.
 Work with the school on an awareness raising project
with the students leading it
Build a positive culture within the community
 let
others know that you take it seriously
 encourage others to be proactive and prepared to
keep children safe in cyber use
 talk to the school about the subject
 Talk to each other about it
Be a role model

Model appropriate and responsible use of digital
technology (time in front of the computer; circulating
photos, emails, SMS etc). eg: Don’t sit at a computer
for 12 hrs at night.
Be prepared






Know where to get help and support if you have any concerns
Know where to report any inappropriate material or contact
Know what to do if your child, or another child, discloses - do the
following. Use the 2 R’s:
Reassure
Report (or seek assistance) to the appropriate
persons/authority
Remedy
Implement safe tools now - habitual
 Have
the computer in a place that you can see it (not
hidden away in child’s bedroom)
 Choose products with parental controls
 Have a suitable filter on the computer to stop
inappropriate material or sites
 Ensure you as the parent has access rights to your
children’s computers and passwords
Set rules for use in your family

(social contract – sample in package). Include







Statement of what you value eg: social interaction,
Clear rules for amount of use (when, and how long)
Clear rules of what you can and cannot do on the internet
Have a ‘Netiquette’ – expectations on how they treat others
Let them know you as parent will check the computer
Be clear about consequences if they misuse it
(Use language that is consistent with home and school
and community)
Bridge the gap





Talk to your children about it. Let them know you value the
internet and mobile but you also value social interaction (healthy
balance)
Learn Cyber tech language and use it with your children
Let your children know you want them to use the tech safely and
responsibly.
Ask your child what they did on the net or who they spoke with
today just as you would ask them this about school
Ask older children to mentor safe practices with younger siblings
Make it a permissible topic in your home




Engage in discussion with your children on this – so its not an
awkward topic if they need to seek your help. Let them know if
they were hurt by cyber misuse you would not take away their
use of it
Give them ideas of who else they could go to for help if they
needed to and didn’t come to you (give them the kids help
contacts)
Talk to them and their friends about it
Tell them what your concerns are and ask them for their ideas
and views (and listen to them)
How to Keep Your Child
Safe Online







Create an Internet Use Contract
If you can’t beat them, join them
Know who your child is communicating with
Be aware of what your teens are posting
Blocking/Parental Controls
Lead by example
Cyberbullying.us
Some Filtering Options
There are no more free options from the Australian
Government as of 31 Dec 2008 but...
 www.netnanny.com.au Around $30 for solid
protection for kids online.
 Both Mcafee, Kapersky and Norton offer complete
antivirus options for around $50 - $100.
 My personal pick is Mcafee total Protection $95.00
for all internet threats.
Pick 3 things strategies you will do in the
next month …


Put them in your diary
Tell someone what you are doing
Going further

http://cyberbullying.us/

http://www.netsmartz.org/

http://www.stopcyberbullying.org/

http://stopbullyingnow.hrsa.gov/index.asp

http://www.wiredsafety.com/

http://www.ncpc.org/cyberbullying