Title: Cyber Bullying
1Cyber Bullying
2Hey Its Me Again!
- Im Tek your i-SAFE guide.
- Im a part of i-SAFE America.
- i-SAFE is concerned with teaching you how to be
safe online. - We want you to recognize and avoid dangerous,
destructive or unlawful online behavior. - Also, we hope to empower you to communicate what
you learn from i-SAFE with others.
3All right Lets talk Empowerment
- Remember - Empowerment means you own what you
learn and can use it to teach others and make a
difference.
4i-SAFE includes an empowerment activity in every
lesson. By completing the activity you may be
eligible for neat incentives and prizes. Check it
out at www.isafe.org Click on the
link to contests and Incentives.
- So not only are you learning and
sharing, you are getting rewarded for doing so!
Empowerment is the Key to Learning!
5In this lesson, you will be learning about
cyber bullying and netiquette. You will be
developing articles or brochures on the concepts
of being considerate online, etc.
The Plan
6All Right Lets Get Started
- Make sure you have a copy of the activity page
called The Cyber Bullying Fact Sheet - We will be using it to learn more about Cyber
Bullying.
7Time to Brainstorm
- What is bullying?
- Why do people act as bullies?
- What are some things that a bully might do?
- What are examples of things a cyber bully might
do? - Have any of you had incidents in which you were
bullied? - Have you had experiences with a cyber bully?
8Lets Take a Closer Look at the Cyber Bullying
Fact Sheet
9Cyber Bullying Factsheet
- "All cruelty springs from weakness. (Seneca,
4BC-AD65)
Bullying has become an online event as well as a
physical one. Intimidation online can be just as
bad, and in some cases worse, than when bullying
occurs in the physical community.
10Bullying
-
- Bullies are those people who gain gratification
(a sense of happiness) when they have provoked or
tormented others. They feel better by making
others feel worse. Cyber bullies are those
bullies who use the Internet to be mean to
others.
11Bullying
-
- E-mail provides one method of communication for
these bullies. - Flame mail mail designed to make another
person mad is used along with hate mail mail
that shows racism, sexism, or other prejudices. -
- Another way bullies use the Internet is through
bulletin boards and chat sites to make their
comments public. -
- Finally, some cyber bullies build websites
devoted to making a person or persons feel bad.
12Think About It!
- Do you think its a sign of strength or weakness
to use the Internet for bullying? Why?
13What to do if you are Cyber bullied
- Tell someone. Dont keep this to yourself. Tell
a trusted adult about the bullying. - Dont open or read messages by Cyber bullies.
- Tell the police if threatened.
- Tell your Internet Service Provider.
- Tell your school if it is school related.
Schools have a bullying plan in place. - Dont erase the messages they may be needed to
take action. Instead, put them in a folder
unread. - Protect yourself never agree to meet with the
person or with anyone you meet online. - If bullied through chat or instant messaging, the
bully can often be blocked. Tell someone!
14How to keep from being bullied online
- Dont give out private information such as
passwords, pins, name, address, phone number,
school name, or family and friends names. This
information can be used by bullies and other
harmful people on the Internet. - Use Netiquette. Be polite online and others
will tend to do the same. If someone does get
angry or bullies you, ignore them online Cyber
bullies want a reaction just like other bullies. - Dont send a message when you are angry it is
hard to undo things that are said in anger. - Delete messages from people you dont know or
from people who seem angry or mean. - When something doesnt seem right, it probably
isnt. Get out of the site, chat, etc.
Prevention
15The best defense to keep from being a bully
online Use Netiquette.
- Be polite online and others will tend to do the
same. If someone does get angry or bullies,
ignore them online bullies want a reaction. -
- Think about ways to apply E-mail netiquette to
the following - Subject lines Attachments
- Forwarded messages Spam
- Chain letters Hoaxes
- Your original messages
16Chatroom Netiquette
- Many of the same conventions that apply to
newsgroups and e-mail are also relevant in
chatrooms. You're still just typing your thoughts
and sending them to people, but in a chatroom
they're just a little quicker to respond.
17While chatting
- Avoid Using ALL CAPS - Its considered yelling.
- Decide What Tone the Conversation Has Before
Posting - Don't use offensive language or
nicknames. Always avoid making personal attacks
and calling names. - Don't "Flood" the Chatroom - Flooding is
repeating messages over and over, or filling the
screen with gibberish, in order to impede
communication in the chatroom. - Be Nice to Newbies - Remember your first chats?
If someone stumbles into your chat, who is
obviously new to this medium, show some patience
and help him or her get the hang of it.
18Resources for your Community
- What resources are available at your school
level? - What is your schools anti-bullying plan?
- What are resources in your community?
19Time for Group Work
- Your teacher will divide you into groups for the
next activity. - In your small groups, read the activity page and
follow the directions to complete it. - 1st - Read the letters you received. Some will
be from bullies and some from victims. - 2nd - Each group should then draft a response
letter advising one of the letter writers.
Incorporate information on local resources, help,
advice, etc. - 3rd - Once the responses are drafted, design an
advice article or informational brochure about
how to recognize and handle Cyber bullying.
20Presentation Time
- Present your advice letters and brochure/article
to the class. - Then Discuss
- How could you make a difference in other peoples
lives and help both cyber bullies and victims. - Refer to the Point to Ponder at the end of the
Activity page - If the problem of online bullying grows, what
might be some consequences to freedom on the
Internet? - How would those consequences affect you
personally?
21So How Do you Know When Youre Done???
- Have you
- 1. Covered all the reference sheets?
- 2. Discussed with your class what you have
learned? - 3. Completed the Online And Helpless
worksheet? - 4. Completed and shared your article or
brochure?
22It doesnt have to end here!
Find out about DRiVE!
23Take Action
Its Easy with the i-Mentor Training Network!
Visit the Kids and Teens section at www.isafe.org
to learn about the i-Mentor Training Network.
Its all online!
The i-Mentor Training Network has short
informative videos that will take you step by
step through the process of accomplishing any of
the i-SAFE Outreach activities you can do in your
school and community. To watch the videos go to
the i-Mentor Network located in the Kids and
Teens section of the i-SAFE website at
www.isafe.org.
24Take Action
Its Easy with the i-Mentor Training Network!
The i-Mentor Training Network videos were
produced for students like you, who care about
online safety and want to DRiVE the message to
other students, parents, and community members.
By watching the training videos you will become
a Certified i-Mentor and will be able to teach
students, conduct the i-SAFE assembly experience,
or be that important link to parents and
community leaders by presenting the i-Parent
Programs and Community Leaders Meetings.
25Get the recognition you deserve as an i-SAFE
Mentor
- Enroll online at www.isafe.org by clicking on
Create an Account. - Go to the Kids and Teens Section and Submit the
Online Mentor Menu. - Receive your own Student Toolkit and materials to
get started.
Take Action
www.isafe.org