Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

37
Techno-Bullying: Techno-Bullying: Intervention and Prevention Intervention and Prevention Strategies Strategies for Managing Bullying for Managing Bullying by the Use of Technology by the Use of Technology Kimberly L. Mason, Ph.D. Kimberly L. Mason, Ph.D. Cleveland State University Cleveland State University [email protected] [email protected] June 29, 2005 June 29, 2005 American School Counselor Association American School Counselor Association Conference Conference

description

Techno-Bullying: Intervention and Prevention Strategies for Managing Bullying by the Use of Technology. Kimberly L. Mason, Ph.D. Cleveland State University [email protected] June 29, 2005 American School Counselor Association Conference. Techno-Bullying. Tragic story of Ryan Halligan. - PowerPoint PPT Presentation

Transcript of Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

Page 1: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

Techno-Bullying:Techno-Bullying: Intervention and Prevention Intervention and Prevention

StrategiesStrategiesfor Managing Bullyingfor Managing Bullying

by the Use of Technologyby the Use of Technology

Kimberly L. Mason, Ph.D.Kimberly L. Mason, Ph.D.Cleveland State UniversityCleveland State [email protected]@csuohio.edu

June 29, 2005June 29, 2005American School Counselor Association American School Counselor Association

ConferenceConference

Page 2: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

22

Techno-BullyingTechno-Bullying

Tragic story of Ryan HalliganTragic story of Ryan Halligan

Page 3: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

33

What is Techno-Bullying?What is Techno-Bullying?

Bullying by mobile, wireless, and Internet Bullying by mobile, wireless, and Internet technologies technologies

Sending or posting harmful/cruel text messages Sending or posting harmful/cruel text messages or imagesor images

Power, Control, & Human RelationshipsPower, Control, & Human Relationships– harassharass– degradedegrade– inflict harminflict harm– inflict fearinflict fear

Page 4: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

44

Forms of Techno-BullyingForms of Techno-Bullying

FlamingFlaming

HarassmentHarassment

CyberstalkingCyberstalking

Denigration (put-downs)Denigration (put-downs)

MasqueradeMasquerade

Outing and TrickeryOuting and Trickery

ExclusionExclusion

Page 5: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

55

Prevalence of Techno-BullyingPrevalence of Techno-Bullying

91% of 12 to 15 years old accessed the internet regularly 91% of 12 to 15 years old accessed the internet regularly (UCLA Center for Communication Policy, 2003) (UCLA Center for Communication Policy, 2003)

Almost 99% of all teens ages 16 to 18 surveyed stated Almost 99% of all teens ages 16 to 18 surveyed stated using the internet (UCLA Center for Communication Policy, using the internet (UCLA Center for Communication Policy, 2003) 2003)

50% of kids are alone online most of the time, and only 50% of kids are alone online most of the time, and only 16% stated they talk to their parents about what they do 16% stated they talk to their parents about what they do online (Media Awareness Network, 2004). online (Media Awareness Network, 2004).

Berson, Berson, and Ferron (2002), found 74% of girls ages Berson, Berson, and Ferron (2002), found 74% of girls ages 12 to 18 spent majority of their time online in chat rooms or 12 to 18 spent majority of their time online in chat rooms or sending instant messages and emailsending instant messages and email

Page 6: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

66

Prevalence of Techno-Bullying (cont)Prevalence of Techno-Bullying (cont)

One in every seventeen kids reported being One in every seventeen kids reported being threatened/harassed while using Internet (U.S. Department of threatened/harassed while using Internet (U.S. Department of Justice, 2001)Justice, 2001)

i-SAFE America found 57% of 4i-SAFE America found 57% of 4thth-8-8thth graders were bullied online graders were bullied online (MarketWire, 2004)(MarketWire, 2004)

25% students received material that said hateful things about 25% students received material that said hateful things about another person (Snider & Bordel, 2004 ) another person (Snider & Bordel, 2004 )

30% of 9 and 10 year olds, and over 70% of 15-17 year olds, 30% of 9 and 10 year olds, and over 70% of 15-17 year olds, visit chat rooms (Media Awareness Network, 2004)visit chat rooms (Media Awareness Network, 2004)

More than 45% of young Canadians use instant messaging More than 45% of young Canadians use instant messaging (Media Awareness Network, 2004) (Media Awareness Network, 2004)

Page 7: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

77

Why This Form?Why This Form?

Two Factors to consider:Two Factors to consider:

– EnvironmentalEnvironmental

– Motivational Motivational

Page 8: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

88

Why This Form? Why This Form? (Environmental)(Environmental)

Disinhibition Disinhibition – You don’t know meYou don’t know me

dissociative anonymity dissociative anonymity

experimentation with multiple identitiesexperimentation with multiple identities

– You can’t see me You can’t see me

illusion of invisibility illusion of invisibility

moral values and social expectationsmoral values and social expectations reduction of social and contextual cues and tangible reduction of social and contextual cues and tangible feedback feedback

different social expectations for different online different social expectations for different online environments environments

Page 9: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

99

Why This Form? Why This Form? (Environmental)(Environmental)

– It’s just a game It’s just a game

underdeveloped empathy skillsunderdeveloped empathy skills

lack of impulse controllack of impulse control

underdeveloped an internal behavior control underdeveloped an internal behavior control mechanismmechanism

ineffective problem solving skillsineffective problem solving skills

Page 10: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1010

Why This Form? Why This Form? (Motivational)(Motivational)

4 Types of Technobullies4 Types of Technobullies

– Vengeful AngelVengeful Angelsee as righting wrongssee as righting wrongsbecomes a bullybecomes a bullyworks aloneworks aloneinvolved in protecting friend/othersinvolved in protecting friend/others

– Power-Hungry or Revenge of the NerdPower-Hungry or Revenge of the Nerdpower and controlpower and controlusually needs an audienceusually needs an audienceneeds the reactionneeds the reactiontypically the victim of offline bullyingtypically the victim of offline bullyingone-to-oneone-to-onekeeps a secretkeeps a secret

Page 11: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1111

Why This Form? Why This Form? (Motivational)(Motivational)

4 Types of Technobullies (cont)4 Types of Technobullies (cont)

– The Mean GirlsThe Mean Girlsbored or to entertainbored or to entertainego-basedego-basedmost immaturemost immaturedone in group or planneddone in group or plannedrequires an audiencerequires an audience

– The Inadvertent TechnobullyThe Inadvertent Technobullydoes not think he/she is a bullydoes not think he/she is a bullynot intentionalnot intentional because I canbecause I canacts out role-playingacts out role-playingusually done alone or when accusedusually done alone or when accused

Page 12: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1212

What’s the Impact?What’s the Impact?

Low self-esteemLow self-esteem

DepressionDepression

AnxietyAnxiety

AngerAnger

School failureSchool failure

School avoidanceSchool avoidance

School violenceSchool violence

SuicideSuicide

Page 13: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1313

Ways Kids TechnobullyWays Kids Technobully

E-mailE-mail– electronic mail electronic mail – transmission of messages over communication transmission of messages over communication

networks networks – not realtime not realtime – broadcast a message/document to everyone in broadcast a message/document to everyone in

the group at oncethe group at once

2 Types 2 Types flame mailflame mailhate mailhate mail

Phishing - deceptive e-mailsSpoofing - when your e-mail isn't your e-mail

Page 14: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1414

Ways Kids TechnobullyWays Kids Technobully

Chat Rooms/Bash BoardsChat Rooms/Bash Boards

Internet Relay Chat (IRC)Internet Relay Chat (IRC) – live, real-time conversations with as many live, real-time conversations with as many

people at the same timepeople at the same time– conversation with a groupconversation with a group– stored in temporary memory stored in temporary memory – online bulletin boardonline bulletin board– write anonymously write anonymously – write anythingwrite anything

Page 15: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1515

Ways Kids TechnobullyWays Kids Technobully

Instant Messaging Instant Messaging – combines the live nature of chat rooms with combines the live nature of chat rooms with

the personalized contact of e-mail the personalized contact of e-mail – instant message exchanges messages in instant message exchanges messages in

realtime between two people realtime between two people – stored in temporary memorystored in temporary memory– buddy Listsbuddy Lists– steal passwords and assume identity steal passwords and assume identity – AOL's Instant Messenger (AIM), ICQ, AOL's Instant Messenger (AIM), ICQ,

Microsoft's MSN Messenger, Window Microsoft's MSN Messenger, Window Messenger, and Yahoo! Messenger, TrillianMessenger, and Yahoo! Messenger, Trillian

Page 16: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1616

Ways Kids TechnobullyWays Kids Technobully

– IM Lingo IM Lingo – AcronymsAcronyms

abbreviations, symbols, and acronymsabbreviations, symbols, and acronyms – BTW = By the way BTW = By the way – BRB = Be right back BRB = Be right back – AFK = Away from keyboard AFK = Away from keyboard – BBL = Be back later BBL = Be back later – >LOL> Laughing out loud>LOL> Laughing out loud– <BFN> Bye for now<BFN> Bye for now

Page 17: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1717

Ways Kids TechnobullyWays Kids Technobully

– IM Emoticons IM Emoticons (emotion + icon)(emotion + icon) express the emotion behind a word , phase express the emotion behind a word , phase or sentenceor sentence

;);):*(:*(

:P:P

Page 18: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1818

Ways Kids TechnobullyWays Kids Technobully

Small Text MessagesSmall Text Messages– short text messages (SMS) sent and short text messages (SMS) sent and

transmitted from a cell phone transmitted from a cell phone – use abbreviations and symbolsuse abbreviations and symbols – 140-160 characters140-160 characters– challenging for adults to monitorchallenging for adults to monitor

Page 19: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

1919

Ways Kids TechnobullyWays Kids Technobully

Small Text Messages (cont)Small Text Messages (cont)

f U do not undRstNd DIS sNteNc U nEd f U do not undRstNd DIS sNteNc U nEd 2 2

Lern txt lingoLern txt lingo

rofl lmao rofl lmao

Teenangels Chat TranslatorTeenangels Chat Translator

Page 20: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2020

Ways Kids TechnobullyWays Kids Technobully

Digital Cell PhonesDigital Cell Phones– camera enabled cell phonescamera enabled cell phones– nude and degrading pictures of other kids nude and degrading pictures of other kids – distributed throughout the school by email distributed throughout the school by email – placed on a Web site to mock and humiliateplaced on a Web site to mock and humiliate

Page 21: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2121

Ways Kids TechnobullyWays Kids Technobully

Web Sites/BlogsWeb Sites/Blogs– location on WWWlocation on WWW– blogs – online journalsblogs – online journals– mock, torment, and harass others mock, torment, and harass others – post other kids personal information and picturespost other kids personal information and pictures– ““RSS" stands for "really simple syndication”RSS" stands for "really simple syndication”

Blurty.com, Bloglines.com, Xanga.com, LiveJournal.com, DeadJournal.com, Diaryland.com, Newsisfree.com, StudentCenter.org, Bolt.com, HotorNot.com, Alloy.com, eCrush.com

Page 22: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2222

Ways Kids TechnobullyWays Kids Technobully

Voting/Polling BoothsVoting/Polling Booths– allows users to vote online allows users to vote online – Who’s Hot? Who’s Not?Who’s Hot? Who’s Not?– the fattiest, ugliest, dirtiest, etc.. boy or girl at the fattiest, ugliest, dirtiest, etc.. boy or girl at

schoolschool– www.freevote.comwww.freevote.com

Page 23: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2323

What Can Be Done?What Can Be Done?

Recognize the signsRecognize the signs– spending a lot of time on the computerspending a lot of time on the computer– a reluctance to use the computer or go to a reluctance to use the computer or go to

schoolschool– having trouble sleeping or having nightmareshaving trouble sleeping or having nightmares– crying without reasoncrying without reason– mood swingsmood swings– not feeling wellnot feeling well– becoming anti-socialbecoming anti-social– falling behind in school workfalling behind in school work

Page 24: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2424

What Can Be Done?What Can Be Done?Tell an adult you know and trust

Don't reply to messages

Do not erase or delete messages

Make of copy – SAVE EVERYTHING

Disable old address, names, passwordsDisable old address, names, passwords

Develop a new onesDevelop a new ones

Page 25: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2525

What Can Be Done? (cont)What Can Be Done? (cont)

Send warnings that it is an offense to use the mobile phone Send warnings that it is an offense to use the mobile phone in a harassing wayin a harassing way

If the bully is a student at your child’s school, meet with If the bully is a student at your child’s school, meet with school officials and ask for assistance in resolving the school officials and ask for assistance in resolving the situation. situation.

Enable “Block”, Ignore”, “Ban” featureEnable “Block”, Ignore”, “Ban” feature

Inform your Internet Service Provider (ISP) or cell phone/pager service provider (MSP)

Inform your local police

CyberLawEnforcement.org CyberLawEnforcement.org

Page 26: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2626

Who Can Help?Who Can Help?

Home, School, Peer, and Community InvolvementHome, School, Peer, and Community Involvement

Awareness Awareness

EducationEducation

TeachTeach– empathy skillsempathy skills– kindnesskindness– respectrespect– decision-making skillsdecision-making skills– problem-solving skillsproblem-solving skills

Page 27: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2727

What Can Parents Do?What Can Parents Do?

Get involved and be awareGet involved and be aware

ListenListen

Learn everything about the Internet and what your kids are Learn everything about the Internet and what your kids are doing online doing online

Encourage your kids to come to you if they are victims of Encourage your kids to come to you if they are victims of techno-bullying techno-bullying

Encourage your child to develop his or her own moral code Encourage your child to develop his or her own moral code

Emphasize your expectation that he or she do what is right in Emphasize your expectation that he or she do what is right in accord with your family’s values accord with your family’s values

Negotiate an online agreement with your kids Negotiate an online agreement with your kids

Page 28: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2828

What Can Parents Do? (cont)What Can Parents Do? (cont)

““Google” your childGoogle” your child

Watch out for signs that your child is being technobullied Watch out for signs that your child is being technobullied

Report any incident Report any incident

Involve all partiesInvolve all parties

Install Monitoring/Filtering ProgramsInstall Monitoring/Filtering Programs– SpectorSoftSpectorSoft– eBlastereBlaster– NetNannyNetNanny– SpyAgentSpyAgent– SoftProbeSoftProbe– ActivityLoggerActivityLogger

Page 29: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

2929

What Can Schools Do?What Can Schools Do?

Conduct an audit of its technology uses and needs Conduct an audit of its technology uses and needs

Integrate curriculum-based anti-bullying programs into Integrate curriculum-based anti-bullying programs into classroomsclassrooms

Make sure all school faculty and staff, students, parents, Make sure all school faculty and staff, students, parents, and the community are educated and the community are educated

Change the bullying policyChange the bullying policy

Update computer Acceptable Use PolicyUpdate computer Acceptable Use Policy– Parents and students sign itParents and students sign it

Page 30: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3030

What Can Schools Do? (cont)What Can Schools Do? (cont)

Offer counseling services to the victims, bullies, Offer counseling services to the victims, bullies, and their familiesand their families

Establish Anonymous reporting boxesEstablish Anonymous reporting boxes

Provide warning to cyberbullies and their parents Provide warning to cyberbullies and their parents of possible negative consequences.of possible negative consequences.

Ask students for their input or suggestionsAsk students for their input or suggestions

Be attentive to free speech standardsBe attentive to free speech standards

Page 31: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3131

What Can Kids Do?What Can Kids Do?

Seven Rules of Dealing with BulliesSeven Rules of Dealing with Bullies– don’t respond or engagedon’t respond or engage– keep all abusive emails, instant messages, etc.keep all abusive emails, instant messages, etc.– understand technobullyingunderstand technobullying– get helpget help– become alert to provocationbecome alert to provocation– become an observerbecome an observer– prepare to take action/take a stand with peersprepare to take action/take a stand with peers

Page 32: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3232

What Can Kids Do? (cont)What Can Kids Do? (cont)

Never give out password, PIN, or personal informationNever give out password, PIN, or personal information

Only communicate with people you trust (buddy list)Only communicate with people you trust (buddy list)

Never accept a file or download from someone you do Never accept a file or download from someone you do not know/trustnot know/trust

Choose a screen name that does not give personal Choose a screen name that does not give personal informationinformation

Don’t configure IM for automatic logonDon’t configure IM for automatic logon

Don’t post screen name Don’t post screen name

Page 33: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3333

What Can Kids Do? (cont)What Can Kids Do? (cont)

Use Netiquette

Use hard to guess passwords

Think B4U click

Take five

Google themselves

Page 34: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3434

What Can the Community Do?What Can the Community Do?

BusinessesBusinesses

Community agencies Community agencies

Mental health professionals Mental health professionals

NeighborhoodNeighborhood

Church Church

Page 35: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3535

Legislature SupportLegislature Support

Rep. Jimmy Stewart, a Republican from Athens, OH

Sponsor of a bill that would require Ohio schools to develop anti-bullying policies.

He states, “ I would be willing to consider a provision that deals with technobullying. He's skeptical about how effective it would be.

“In the end, a policy is effective only if teachers, parents and students are aware of it.”

Page 36: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3636

Techno-BullyingTechno-Bullying

It is everyone’s business and the It is everyone’s business and the best response to combat it is a best response to combat it is a

pro-active or preventive one from pro-active or preventive one from school administrators, teachers, school administrators, teachers,

counselors, students, parents, and counselors, students, parents, and the community. the community.

Page 37: Kimberly L. Mason, Ph.D. Cleveland State University kim.mason@csuohio June 29, 2005

3737

Questions?Questions?