Cyber Bullying

42
Cyber Bullying Level 6

description

Cyber Bullying. Level 6. Hey Everybody!. My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to be safe online. - PowerPoint PPT Presentation

Transcript of Cyber Bullying

Page 1: Cyber Bullying

Cyber Bullying

Level 6

Page 2: Cyber Bullying

Hey Everybody!My name is Tek.

I’m going to be your guide today! I’m a part of i-SAFE, and we are concerned with helping you to be safe online.

We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i-SAFE with others.

 

Page 3: Cyber Bullying

In this lesson, you will be completing a KEWL chart as a learning activity.

The Plan

Page 4: Cyber Bullying

KEWL

Stands for what we KNOW

Stands for Expanding our knowledge

Stands for What we want to learn

Stands for Leading others in Learning

Page 5: Cyber Bullying

KKnow

EExpand Knowledge

WWhat was Learned

LLead others in Learning

       

KEWL Chart – Cyber Security

This is what the chart looks like. You can copy it on your paper. You can also complete it as a class on an overhead

Page 6: Cyber Bullying

All Right – Let’s Get Started

First we brainstorm!!!

Page 7: Cyber Bullying

What do we know about Bullying? What is Cyber

Bullying?List your answers in the K column of the chart. This

column forms a foundation of what you currently know about bullying. Also list what you know about cyber bullying. Hopefully you are somewhat familiar with both and able to give basic information.

 Sample question and answer: Q. What is bullying? What is cyber bullying?A. Mean behavior, mean/harassing behavior online,

etc.

Page 8: Cyber Bullying

Ok – so now that we have figured out what we know

– time to find out what else we need to know!

This information goes in the E (expanding your knowledge)

column

Page 9: Cyber Bullying

Expand Your Knowledge

Where is your knowledge lacking? What more do you feel you should know about bullying and cyber bullying?

Sample questions to go in this column: 1. What are rules concerning bullying at school, in your

community? 2. How is cyber bullying different from other types of

bullying? 3. What types of actions online are considered bullying?

Page 10: Cyber Bullying

Great – Now let’s see what we can learn.

We’re going to take a look at the cyber bullying and netiquette fact sheets to learn more about both.

Page 11: Cyber Bullying

Let’s Take a Closer Look at the Bully Facts

Page 12: Cyber Bullying

"All cruelty springs from weakness.” (Seneca, 4BC-AD65)

Bullying has become an online event as well as a physical one. Intimidation online can be just as bad, and in some cases worse, than when bullying occurs in the physical community.

Page 13: Cyber Bullying

Bullying 

Bullies are those people who gain gratification (a sense of happiness) when they have provoked or tormented others.

They feel better by making others feel worse. Cyber bullies are those bullies who use the Internet to be mean to others.

Page 14: Cyber Bullying

Bullying 

E-mail provides one method of communication for these bullies.

Flame mail – mail designed to make another person mad – is used along with hate mail – mail that shows racism, sexism, or other prejudices.

Another way bullies use the Internet is through bulletin boards and chat sites to make their comments public.

Finally, some cyber bullies build websites devoted to making a person or persons feel bad.

Page 15: Cyber Bullying

Think About It!Do you think it’s a sign of

strength or weakness to use the Internet for bullying? Why?

Page 16: Cyber Bullying

Tell someone. Don’t keep this to yourself. Tell a trusted adult about the bullying.

Don’t open or read messages by Cyber bullies.

Tell the police if threatened.

Tell your Internet Service Provider.

Tell your school if it is school related. Schools have a bullying plan in place.

Don’t erase the messages – they may be needed to take action. Instead, put them in a folder unread.

Protect yourself – never agree to meet with the person or with anyone you meet online.

If bullied through chat or instant messaging, the “bully” can often be blocked. Tell someone!

Page 17: Cyber Bullying

Don’t give out private information such as passwords, pins, name, address, phone number, school name, or family and friends names. This information can be used by bullies and other harmful people on the Internet.

Use Netiquette. Be polite online and others will tend to do the same. If someone does get angry or bullies you, ignore them – online Cyber bullies want a reaction just like other bullies.

Don’t send a message when you are angry – it is hard to undo things that are said in anger.

Delete messages from people you don’t know or from people who seem angry or mean.

When something doesn’t seem right, it probably isn’t. Get out of the site, chat, etc.

Page 18: Cyber Bullying

Time for Discussion

What are some ways that people could be bullied online: through e-mail, chatting, bulletin boards, websites, etc.

Has anyone in the class ever been bullied online?

Page 19: Cyber Bullying

Community

Today we are talking about the Online community and cyber bullying. However, you probably take part in many communities – your school community, your neighborhood community, etc.

Each community has its own rules and roles.

What types of rules and roles do you think the Online community has?

Page 20: Cyber Bullying

Netiquette

Let’s take a look at the Netiquette page.

How do you think Netiquette can prevent online bullying?

Page 21: Cyber Bullying

Use Meaningful Subject LinesTell the person what you are sending to them so they know what to expect when the message is opened.

Don't Type With ALL CAPSThis is known as online screaming, and is considered to be rude.

Think Before You Type It’s easy to be misunderstood in Cyberspace – be clear about what you want to say. Don’t send a message when you are angry – it’s hard to undo things that are said in anger.

Use Emoticons to help others understand what you mean.

E-mail Netiquette

Page 22: Cyber Bullying

Think About AttachmentsDon’t send something as an attachment if it can be copied and pasted into the email text. Don’t send really large attachments. Don’t send attachments with viruses. And…be careful of attachments you download.

Don't SpamDon’t send out messages that aren’t wanted!

Don't Pass Around E-HoaxesUse your favorite Internet Search engine to learn the truth about the latest e-hoaxes, urban myths, chain e-mail and pervasive riff-raff circulating on the Internet. Don’t mislead others and cause alarm or stress.

Don't Pass Around Chain LettersThey are annoying.

E-mail Netiquette

Page 23: Cyber Bullying

Chatroom and Instant Messaging

Many of the same conventions that apply to newsgroups and e-mail are also relevant in chatrooms. You're still just typing your thoughts and sending them to people, but in a chatroom, they're just a little quicker to respond.

Avoid Using ALL CAPSIt’s still considered yelling.

Decide What Tone the Conversation Has Before PostingDon't use offensive language or nicknames. Always avoid making personal attacks and calling names.

Page 24: Cyber Bullying

Chatroom and Instant Messaging

Don't "Flood" the ChatroomFlooding is repeating messages over and over, or filling the screen with gibberish, in order to impede communication in the chatroom.

Be Nice to NewbiesIf someone stumbles into your chat, who is obviously new to this medium, show them some patience and help them get the hang of it.

Page 25: Cyber Bullying

Most of these "netiquette rules" are really just common sense. Give people you meet online the same respect you would give someone in person.

Page 26: Cyber Bullying

:-) :-( :-( :-)

Emoticons stand for emotion icons. They are used to convey emotion in writing. When emailing, IMing, or Chatting, writers use emoticons to show when joking, upset, or angry. They are useful so that someone doesn’t take something written the wrong way.

Page 27: Cyber Bullying

Emoticons are made of a sequence of characters on your keyboard. The most common emoticon is the smile. It is used to tell people – don’t take what I said seriously or I meant it as a joke or in good humor.

A smile is made up of a colon for the eyes, a dash for the nose, and the right parenthesis for the smiling mouth.

Page 28: Cyber Bullying

Here are some Emoticons for you to use

:-) Standard Smiley – Shows you are kidding around or in a good mood.

:-( Frown – Shows you are upset about something

;-) Winking

:-D Laughing

:-/ Undecided or confused

:-Q Shows Confusion

:-O Shows surprise or realization of an error

Page 29: Cyber Bullying

I hope you learned something I know I did!

All right – Time for an Activity!!! Let’s put that Netiquette to good use!

You can do this as a whole class, in small groups, or as a race

Page 30: Cyber Bullying

Online Chat Aptitude

Your teacher will give you a worksheet called Online Chat Aptitude.

Correct this chat session! Its participants are making some netiquette mistakes. Can you find all of the errors in this session that aren’t very nice?? Also, add in fun emoticons to make sure the messages show the correct emotion.

When you’re finished we’ll go over it together!

Page 31: Cyber Bullying

Don’t Peek!!!The next few slides contain the

answers to the Online Chat Aptitude worksheet – so make sure

you have it finished!

As you go through the answer key – discuss the changes and

suggestions.

Page 32: Cyber Bullying

Jake: HiMallory: HiBeth: HEY Y’ALL, HOW YOU DOING? Don’t use all caps – it’s considered

shouting. 

Mallory: You idiot? Don’t you know better? Take some time to learn some netiquette. You should be nice to new chatters. Don’t be too critical – if joking using emoticons.

 

Jake: XDJFEWajskdfl;wijk Don’t type gibberish in chatsDiane: what was that?Jake: XDJFEWajskdfl;wijkJake: XDJFEWajskdfl;wijkMallory: Ok, that is just getting plain annoying.Jake: XDJFEWajskdfl;wijk 

Alex: As the moderator of this chat, I will be forced to kick you out if you keep this up. Moderators can kick you out of chats for not following netiquette. It is best to participate in moderated chats for safety reasons.

 

Page 33: Cyber Bullying

Diane: Jake, I got your email off your profile. Make sure you read what I sent you! 1. NEVER fill out a profile with personal information. This is dangerous. 2. Emailing people without permission can be considered spamming and is annoying.

 

Mallory: I read that email you sent me. What were you thinking? Do you really believe that junk? I mean who honestly WANTs to go to school all year? You find someone to agree with you and I’ll show you a real freak! This is an inflammatory statement and can lead to harassment, etc. Be careful of what you say and how you say it online. You can disagree without insulting. Use emoticons!

 

Beth: Look, I’m outta here. As a newbie I feel stomped upon. You guys should learn some manners. This new chatter is leaving after having others be rude and ignore. Remember to be considerate of new chatters.

 

Mallory: Yeah right, so says the dummy who didn’t know caps were shouting. Again, an inflammatory statement. If joking use emoticons.

 

Diane: Mallory you are so out there!Jake: DJSKFLWN K – bye gibberish!

Page 34: Cyber Bullying

Ok – Returning to our Chart

Hmmm, What comes next? Oh yes, What have we learned about Cyber

Bullying???

Page 35: Cyber Bullying

What have we learned?Now that we have covered Cyber Bullying, what

have you learned from your information sheets? Check the “what you want to know” questions to ensure you have answered them all!

Sample question and answer: Q. What do we know about cyber bullying now? A. Cyber bullying occurs when students write

harassing/flame emails, post negative websites, and are mean/cruel in instant messaging/ chat rooms.

Page 36: Cyber Bullying

Make Sure You have Covered:

1. Bullying means to use mean language or actions towards others

2. Bullies intend to cause fear or avoidance from others for their victims

3. Bullies are found in both the physical and cyber communities4. Online bullying can be just as intimidating as face-to-face

bullying5. Using netiquette is an effective way to prevent online bullying6. Resources for reporting bullying incidents include trusted

adults, the ISP provider, school personnel, and the police if it involves illegal activity, direct threats, etc.

Page 37: Cyber Bullying

And Last, but not LeastWe need to come up with some empowerment activities.

This means to brainstorm how we can help others learn about Cyber Bullying.

Page 38: Cyber Bullying

Leading Others in Learning

This section allows you to identify ways to own the knowledge you have learned. By spreading knowledge to others, you continue your own learning. In this column brainstorm ways to spread knowledge.

Sample questions and answers:Q. How can we spread what we have learned?A. Talk to parents about what learned. Give

presentations to others, design posters, incorporate peer-to-peer communication.

Page 39: Cyber Bullying

How Do you Know When You’re Done?

Have you:1. Covered all the reference sheets?2. Discussed with your class what

you have learned?3. Completed the Online Chat Aptitude worksheet?4. Completed the KEWL Chart?

Page 40: Cyber Bullying

It doesn’t have to end here!

Find out about DRiVE!

Page 41: Cyber Bullying

Take ActionTake Action It’s Easy with the i-Mentor Training Network!

The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community.

To watch the videos go to the i-Mentor Network located in the X-BLOCK of the i-SAFE website at www.isafe.org.

Visit the X-BLOCK at www.isafe.org to learn about the i-Mentor Training Network. It’s all online!

Page 42: Cyber Bullying

www.isafe.org

• Enroll online at www.isafe.org by clicking on Create an Account.

• Receive your own Student Toolkit and materials to get started.

Get the recognition you deserve Get the recognition you deserve as an i-SAFE Mentoras an i-SAFE Mentor

Take ActionTake Action