12
CYBERBULLYING

CYBERBULLYING. Victims of Cyberbullying who eventually took their own lives

Embed Size (px)

Citation preview

CYBERBULLYING

Victims of Cyberbullying who eventually took their own

lives

What Does Cyberbullying Involve?(Chisholm, 2006)

Cyberbullying occurs via: chat rooms online bulletin boards e-mail instant messaging web sites cell phones on-line multiplayer video games

Cyberbullying involves: harassing humiliating intimidating sending derogatory insults or threats in messages teasing using inappropriate language

What Makes Cyberbullying Different From Traditional

Bullying Anonymity People often act in ways that they usually

would not act because the other person can’t physically see them (Mishna, Saini, & Solomon, 2009)

Rampant Distribution Something that is posted on the internet or

sent over text messages spreads very fast Around the Clock

There doesn’t have to be physical contact for cyberbullying to take place

Social Networking Sites and Cyberbullying

Breeding ground for rumors, derogatory comments, and threats Word meanings are often misunderstood when

they are only read Stolen passwords

Friends often share passwords or steal passwords which results in inaccurate posts- PROTECT YOUR PASSWORDS!

Exclusion Things can be said about a person without them

knowing. This isn’t fair because they are unable to defend themselves

Text Messaging and Cyberbullying

Using other’s phones Be careful to whom you lend your phone. You

never know what they are sending. You could get into some serious trouble.

Sending inappropriate pictures Sexting

It is against the law to take, send, and receive sexually explicit pictures of minors

The act of sexting becomes cyberbullying when the pictures are circulated without consent resulting in 2 serious offenses.

Types of Cyberbullies(Chisholm, 2006)

“Vengeful Angels” Those who are trying to “take up for” a friend who is getting picked

on. Don’t get in the middle of someone else’s cyberbullying situation. The

best advice you can give your friend is to stop communicating with the bully/bullies.

“Power Hungry” Those who pick on others only to make themselves feel powerful or

dominant. Be aware of these types of bullies. Try to avoid contributing to their

mission to gain power by taking their side.

“Inadvertent Cyberbully” Those who send a message that is misunderstood.

Be careful that what you say through the internet or text messaging is clear and cannot be misunderstood

“Mean Girls” Girls who gang up on other girls and try to exclude them or humiliate

them. Don’t be a part of the “gang”

Sticks and Stones May Break My Bones but Words Will Never Hurt

Me? NOT TRUE! Cyberbullying can cause

Emotional distress Academic problems Absenteeism Violence Suicide

Washington State Law

According to RCW § 9.61.260 it is a against the law to harass, intimidate, torment, or embarrass someone through electronic communications.

Arrests have been made in cases where cyberbullying led to tragedy

What Can YOU Do?• Be aware of the way that you communicate with

others through electronic means of communication

• Don’t jump in the middle of a Facebook/Myspace argument or bullying situation. Instead, tell an adult if it is a situation that has gotten out of hand

• Delete “friends” who constantly seem to be causing problems on social networking sites

• Tell the counselor or a teacher if you know of a situation in which someone that you know is being bullied*There are also instructions for reporting harassment in your student handbook

• Considering the consequences of cyberbullying

Any Questions?

References  American School Counseling Association. (2003). The ASCA national model: A framework for school counseling programs .

Alexandria, VA: ASCA. Auerbach, S. (2009). Screening out cyberbullies: Remedies for victims on the internet playground. Cardozo Law Review, 30(4),

1641-1675. Retrieved from Academic Search Complete database. Bakken, L., Gentes, C., & Solberg, N. (n.d.). Middle school cyberbullying curriculum. Seattle Public Schools. Retrieved from http://www.seattleschools.org/area/prevention/cbms.html Billitteri, T. J. (2008). Cyberbullying. CQ Researcher, 18 (17), 385-408. Retrieved April 3, 2010, from CQ Researcher Online, http://library.cqpress.com/cqresearcher/cqresrre2008050200. Chisholm, J. (2006). Cyberspace violence against girls and adolescent females. Annals of the New York Academy of Sciences,

1087(1), 74-89. doi:10.1196/annals.1385.022 Eckholm, E., Zezima. (2010, March). 6 teenagers are charged after classmate’s suicide. The New York Times. Retrieved from http://www.nytimes.com/2010/03/30/us/30bully.html?pagewant=all Gentile, C. (2009, February). Student fights record of 'cyberbullying'. New York Times. Retrieved from

http://ntserver1.wsulibs.wsu.edu:2067/us/lnacademic/auth/checkbrowser.do?rand Hinduja, S. & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant

Behavior, 29(2), 129-156. doi:10.1080/01639620701457816 Li, Q. (2006) Cyberbullying in schools. School Psychology International, 27(2), 157-170. Mishna, F., Saini, M., Solomon, S. (2009). Ongoing and online: Children and youth’s perceptions of cyber bullying. Children and

Youth Services Review, 31, 1222- 1228. doi: 10.1016/j.child youth.2009.05.004 Stone, C. (2009). School Counseling Principles: Ethic and Law (2ND ed.). Alexandria, VA: ASCA. Tokunaga, R. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization.

Computers in Human Behavior, 26, 277-287. Washington Revised Code RCW § 9.61.260 (2004). Retrieved from http://apps.leg.wa.gov/RCW/default.aspx?cite=9.61.260 Washington Revised Code § 28A 300-285 (2010). Retrieved from http://apps.leg.wa.gov/RCW/default.aspx?cite=28A.300.285 Willard, N. (2007). Cyberbullying legislation and school policies: Where are the boundaries of the “schoolhouse gate” in the virtual

world? Wiseman, R. (2009). Bullies without boundaries. ASCA Schoolcounselor 47(2) 23-27.