They also have teen assistants who have knowledge of both the technology and the students and their online activities.
They can be invaluable in the search for the real cyberbully. By stepping back and watching the chatter within Facebook school groups and triangulating it with what they can locate on the network servers, many cyberbullies can be found and confirmed without having to get subpoenas and go through legal process.
Always make sure that the network
administrators are part of the team created to address cyberbullying in
schools. They are an often overlooked expert resource.
Valerie Schmitz holds a double Ph.D. in
Instructional design and Technology Education, as well as a Masters in Educational
Leadership:
“School computer
network specialists are responsible for a variety of tasks ranging from simple
helpdesk calls to protecting the security of student records. While not always
professional educators themselves, these specialists are also being asked to
address student behaviors and interactions. Specifically, as our children have
brought bullying into the virtual world computer network specialists now must
implement tools to address cyberbullying.
Rather than wait
until a high-profile incident has occurred, schools must proactively collaborate
to implement procedures to address cyberbullying. While school personnel such
as guidance counselors, teachers, and administration can be proactive by
implementing awareness events, dialogue, or educational events, school network
administrators can also be proactive by implementing network secure access
restrictions.
Many educational
networks are not presently using an authentication system for Internet access.
This essentially means that when anyone accesses the Internet it is completely
anonymous. Individual teacher and student authentication accounts will require
users to "sign in" and take personal responsibility for their actions
online. This proactive effort ensures that anonymous cyberbullying is not an
option for our learners and that anyone who does choose to cyberbully will be
identified based on authentication logs.
While the problem of bullying and
cyberbullying is certainly vast and rooted in many causes, simple
authentication is one tool that school network administrators may choose to use
as a proactive tool.”
No comments:
Post a Comment
Parry Aftab is interested in hearing ideas and questions about digital safety, privacy and cybersense. Please do not advertise or promote services or products or include a link, video or image in your comment.
Now for the boring legal stuff:
We reserve the right to delete and/or moderate any comments at any time.
Note that Parry Aftab does not respond to legal questions and cannot address specific issues about reported abuse.She cannot be retained as legal counsel online, and any prospective client must sign a retainer agreement before becoming a legal client of Ms. Aftab. Any legal discussions are educational and informational only and anything submitted may be made public on this blog.
Ms.Aftab reserves the right to report any abuse, threats or harassment to the requisite authorities.