欢迎 歡迎 bem-vindo benvenuto welcome
and thank you!
Saturday, February 22, 2014
Users today, so far (rounded to the nearest ten). Interesting to see Russian readers so high. Olympic tourists? or Russians?
United States
|
2330
|
Russia
|
380
|
Ukraine
|
210
|
Canada
|
200
|
Poland
|
200
|
Moldova
|
150
|
France
|
120
|
China
|
110
|
Slovenia
|
110
|
United Kingdom
|
50
|
Friday, February 21, 2014
The Role of Guidance Counselors and Mental Health Professionals in Addressing Cyberbullying
Cyberbullying is a mental health issue, a lack of Internet literacy and technology skills issue, and a lack of impulse control, coupled with boredom, easy access to technology, and the need for their 15 megabytes of fame. All have to be addressed to prevent cyberbullying.
But once it starts, the most crucial professionals are the guidance
counselor and mental health professionals. They are the only ones capable of
putting the target humpty-dumpty back together again. They are the only ones
able to get peer counselors to step in and help put out the raging
cyberbullying fires that were set across the Internet. They can prevent serious
emotional scarring and keep students from seeing despair so deep that suicide
looks like an option.
Parry’s chiropractor told her that unless you treat whiplash within the
first 36 hours, the physical damage can be both painful and permanent. But
early treatment can relieve the pain and prevent serious physical damage. The
pain of being targeted by others in your class or school, a former best friend,
or boyfriend/girlfriend is often too hard to bear alone. Yet, students are
fearful or are embarrassed to share their plight. Gentle support and understanding
can be perhaps even more valuable than treating whiplash in the first day and a
half. If handled right, the target will be able to eventually put this in
perspective. If mishandled, there will be scars for life.
Suicides are increasing. We can no longer sit back and tell them that
“sticks and stones will break their bones, but words will never hurt them”—they
know better. Words do hurt and can wound them deeply and permanently.
Cyberbullying doesn’t make them stronger. It hurts.
Unless the guidance counselors and mental health professionals are
willing to step forward and lead in framing solutions to the problem as a whole
and to each victim of cyberbullying, we are all lost.
We’re counting on you! Don’t let us down.
Moldova and Iraq! Thank you to our new readers!
It is very rewarding to see so many new readers from so many diverse places in the world!
bun venit și vă mulțumesc
نرحب وشكرا لكم
bun venit și vă mulțumesc
نرحب وشكرا لكم
The Role of Network Admins in Addressing Cyberbullying
Frequently, the most talented technology
experts within a school system operate the networks.
They also have teen assistants who have knowledge of both the technology and the students and their online activities.
They can be invaluable in the search for the real cyberbully. By stepping back and watching the chatter within Facebook school groups and triangulating it with what they can locate on the network servers, many cyberbullies can be found and confirmed without having to get subpoenas and go through legal process.
They also have teen assistants who have knowledge of both the technology and the students and their online activities.
They can be invaluable in the search for the real cyberbully. By stepping back and watching the chatter within Facebook school groups and triangulating it with what they can locate on the network servers, many cyberbullies can be found and confirmed without having to get subpoenas and go through legal process.
Always make sure that the network
administrators are part of the team created to address cyberbullying in
schools. They are an often overlooked expert resource.
Valerie Schmitz holds a double Ph.D. in
Instructional design and Technology Education, as well as a Masters in Educational
Leadership:
“School computer
network specialists are responsible for a variety of tasks ranging from simple
helpdesk calls to protecting the security of student records. While not always
professional educators themselves, these specialists are also being asked to
address student behaviors and interactions. Specifically, as our children have
brought bullying into the virtual world computer network specialists now must
implement tools to address cyberbullying.
Rather than wait
until a high-profile incident has occurred, schools must proactively collaborate
to implement procedures to address cyberbullying. While school personnel such
as guidance counselors, teachers, and administration can be proactive by
implementing awareness events, dialogue, or educational events, school network
administrators can also be proactive by implementing network secure access
restrictions.
Many educational
networks are not presently using an authentication system for Internet access.
This essentially means that when anyone accesses the Internet it is completely
anonymous. Individual teacher and student authentication accounts will require
users to "sign in" and take personal responsibility for their actions
online. This proactive effort ensures that anonymous cyberbullying is not an
option for our learners and that anyone who does choose to cyberbully will be
identified based on authentication logs.
While the problem of bullying and
cyberbullying is certainly vast and rooted in many causes, simple
authentication is one tool that school network administrators may choose to use
as a proactive tool.”
The Role of Technology Educators in Addressing Cyberbullying
Many cases of cyberbullying result from a lack of technology skills or
Internet literacy skills. Students either fail to, or don’t know how to, use
security tools and practices, protect their personal information, and accounts
or understand the consequences of their tech actions.
They think that they are anonymous online. They don’t realize how long
what they post online stays online. Caching and archiving are beyond their
understanding. And without knowing how Google and other search tools find and
digest things online, they can’t appreciate what damage they can do with a few
careless clicks of the mouse.
Who will teach these skills? Technology educators, that’s who!
Students are sitting ducks for cyberbullies and everything else that can
go wrong online if they don’t know how to use some cyber self-defense. Their
passwords are easy to guess or hard to remember. They share them with anyone
who asks, except their parents. They rely on unreliable information, found on
whacky websites.
They download spyware, malware, and malicious code. They give
away their and their parents’ information to anyone who promises to give them
an iPod for catching the jumping frog. They share information with someone who
seems nice online, and believe that cute 14-year-olds really are what and who
they say they are.
Eighteen percent believe that they have closer friends online than off.
Thirty-four percent believe that an online friend can be as good a friend as
someone they know in real life.
Seventeen percent are meeting people in real
life that they had only known online.
Eighty-five percent have reported being
cyberbullied and 70% have reported cyberbullying others.
They are often
gullible, careless, and clueless. The technology teacher coupled with the
librarian and library media specialist have to set them straight.
The Role of Librarians and Library Media Specialists in Addressing Cyberbullying
Parry Aftab first wrote about her gratitude for librarians while still
an associate at a big Wall Street law firm. The corporate librarian had been
invaluable in her success, finding information that no one (pre-web) could find
and giving her pointers on information she had come across.
Her high esteem for librarians didn’t end there. Although she had
admired school librarians, she hadn’t learned about library media specialists until
a good friend, Della Curtis a Ph.D. in Library Media Information, introduced
her to these secret weapons.
They understand how the technology works and what is credible and what
isn’t. They have the best lists of trusted and reliable sites and understand
what students do there. They can find anything online in two seconds flat and
match it with other offline information that makes it relevant.
Parry even
created a Super Librarian graphic to reflect how she saw school librarians and
library media specialists. When Parry was asked to speak at the Free Speech
session for the ALA’s annual meeting many years ago, Della and other library
media specialists prepared her.
No WiredSafety school team can be created without either a school
librarian or library media specialist. When they speak, follow Parry’s lead—be
sure to listen and take careful notes!
The Role of Teachers in Addressing Cyberbullying
Teachers play two important roles in addressing cyberbullying in
schools. They are primarily educators and are expected to convey credible
information and approaches to the students. But perhaps even more importantly
when cyberbullying is implicated, teachers are often the “trusted adult”
students turn to when they are targeted by cyberbullying or learn of others
being targeted.
In addition to teaching students not to lend their efforts to aid the
cyberbully, teachers can help encourage their students to report cyberbullying
when they encounter it. While it is wonderful that teachers are trusted with
this crucial information, they are often unprepared to advise their students on
next steps. With good cause, they fear legal liability for mishandling any of
these reports and don’t know how to preserve the student’s confidence while
reporting the cyberbullying. Teachers may be reluctant to turn them over,
especially if they promised the students to keep their identity confidential.
If an anonymous tipline or tip box is created, teachers can remind their
students to use it. School administration and school policing staff can act on
these tips and take action quickly as necessary to shut down the site or
profile or stop the cyberbullying itself.
Education can help considerably in preventing and dealing with the
consequences of cyberbullying. The first place to begin an education campaign
is with the kids and teens themselves. These programs need to address ways they
can become inadvertent cyberbullies, how to be accountable for their actions,
and not to stand by and allow bullying (in any form) to be acceptable.
We need
to teach them not to ignore the pain of others.
Teaching kids to “Take 5!” before responding to something they encounter
online is a good place to start. Jokingly, we tell them to “Drop the mouse! And
step away from the computer! That way nobody will get hurt!”
Encourage them to “Take 5!” to help them calm down if something upsets
them online or offline to avoid their acting out online. This may include doing
yoga or deep-breathing. It may include running, playing catch, or shooting
hoops. It may involve taking a bath, hugging a stuffed animal, or talking on
the phone with friends. They can create a Take 5! Bulletin Board illustrating
their favorite Take 5! activities or discuss them with others in the class.
Each student has their own way of finding their center again. If they
do, they will often not become a cyberbully, even an inadvertent cyberbully.
This method even helps with offline bullying and impulse control in the
classroom.
There are several ways teachers can educate kids not to support
cyberbullying:
·
Teach
them that all actions have consequences;
·
Teach them
that cyberbullying hurts;
·
Teach
them that they are liable to being used and manipulated by the cyberbully;
·
Teach
them that the cyberbully and their accomplices often become the target of
cyberbullying themselves; and
·
Teach
them to care about others and stand up for what’s right.
We need to teach our children that silence, when others are being hurt,
is not acceptable. If they don’t allow the cyberbullies to use them to
embarrass or torment others, cyberbullying will quickly stop. It’s a tall task,
but a noble goal. In the end, our students will be safer online and offline. We
will have helped create a generation of good cybercitizens, controlling the
technology instead of being controlled by it.
The more teachers know about cyberbullying and how it works, the better
they can address and prevent it. Art Wolinsky, WiredSafety’s Director of
Technology Education has created professional development materials just for
teachers. Check them out at WiredSafety.org.
The Role of Principals in Addressing Cyberbullying
The schools have a valid concern and legal obligation to maintain discipline and protect their students while in their care. But in this tricky area, especially when damages for infringing on students’ rights can exceed the annual salary of much-needed teachers and other educational resources, schools cannot afford to guess. Until the law becomes better settled, the schools need to be careful before acting, seek knowledgeable legal counsel, plan ahead, and get parents involved early.
So what’s a principal to do? Talk, educate, and mediate…it’s what they
do best. Bring in the students and parents. Create peer counseling and
mediation boards. Set policy. Create awareness programs. Principals shouldn’t
panic or react in a knee-jerk manner. I would suggest they take their lead from
a very experienced school superintendent in New Jersey.
A teenager in that high school, after getting angry with certain
teachers and administrators, lashed out by posting some pretty vulgar and
insulting things about them on a personal website. He wrote the site from home
and posted it online. It wasn’t posted on the school’s server, but was
available to everyone with Internet access once they had the URL. URLs of
classmates’ sites get passed around quickly, and many of the kids in the school
accessed the site from the school’s computers.
When the word got back to the teachers and administrators, they were
understandably furious. They sought help from the police, who threatened to
charge the teenager with harassment (but they wouldn’t have been able to make
that charge stick).
Everyone involved seemed to lose their head, but the superintendent
managed to keep his. He recognized that this wasn’t a school disciplinary
matter and that the parents needed to be involved. He called in the parents,
who were appalled and took this situation as seriously as they should have.
Together they worked out a suitable apology and a way to handle the case
without blowing it out of proportion. The press had a field day. This
superintendent stood firm against the anger of the teachers and the pressures
of the community. He was right.
Months later he shared something with Parry. He told her that he had met
the young teenager at a school event, and the student apologized once again. He
also thanked the superintendent for handling the situation with grace. The boy
had acted out in anger and hadn’t thought about the consequences of his anger.
Eventually, even the teachers came around. We could use many more like him.
This advice works just as well when cyberbullying or social-networking
use is discovered. A good principal sets the tone of the school, hopefully with
wisdom, kindness, consistency, and respect.
The Role of Schools in Addressing Cyberbullying
When schools try and get involved by disciplining the student for cyberbullying actions that took place off-campus and outside of school hours in the US, they are often sued for exceeding their authority and violating the student's right to free speech. They also often lose.
Schools can be very effective brokers in working with the parents to stop and remedy cyberbullying situations. They can also educate the students on cyberethics and the law. Parents can be educated as well in presentations and with newsletters and handouts.
What schools do best is educate and create
awareness. They can bring together all stakeholders and create a community-wide
approach to addressing the problem. Students can be involved in helping frame
solutions and creating programs and policies.
Schools are often the first to know and to know the
most about the student dynamics and what works and what doesn’t. Their early
knowledge is important to keep things getting out of control, fast! Anonymous
reportlines can be set up to encourage students to report what they see.
If schools are proactive, careful, and creative,
they can avoid the claim that their actions exceeded their legal authority for
off-campus cyberbullying actions.
We recommend that a provision is added to the
school's acceptable use policy reserving the right to discipline the student
for actions taken off-campus if they are intended to have an effect on a
student or they adversely affect the safety and well-being of student while in
school. This makes it a contractual, not a constitutional, issue.
Work with a team of parents, members of the school
community, law enforcement, and students to articulate the policy and determine
guidelines for enforcement. The more the policy is a result of this
collaborative process, the less likely it will be challenged or that a
challenge would be successful.
The cyberbullying programs must be top down (on
risk) and bottom up (on measures). All stakeholders must be involved and their
expertise and perspectives considered. Even when a program is in place and
working, it should always be adaptable, articulated, and communicated to all
stakeholder groups.
Cyberbullying - Don’t Support It…Report It!
Digital alerts are very helpful. But these miss cellphone bullying and game bullying entirely. They may also miss images that were photoshopped. For these and other less obvious attacks, you need real and solid intelligence. And that can come from only one source—the students.
Create old-fashioned suggestion boxes where students can anonymously
report cyberbullying when they find it. Create an online report form and
promise anonymity as well. Teach the students what constitutes cyberbullying so
they know what to report. Let them know what information you need and what will
happen to reports. Remind them that false reports will be acted on, to
discourage cyberbullying –by proxy when they report their target as the
cyberbully to have the school do their dirty work.
They need to understand that asking for help isn’t showing weakness, it
shows wisdom. The tattletale stigma should be addressed.
Then have the students promote a “report it, don’t support it” message.
They can do skits, posters, write and perform rap or pop songs, or shoot their
own PSAs. Have them look at the issue and define it their way. Get their help
in creating reporting methods too.
Devote lots of time to teaching them to tell and teaching the trusted
adults what to do if a student does confide in them. This may be the most
important tip we can give you. Cyberbullyinghas contributed to suicides when the target feels
alienated and faces it alone in the dark. The right response is crucial. So is
being trusted with their confidences.
Cyberbullying Spot Checks
The faster you can respond to any cyberbullying campaign, the faster it stops. In addition to setting Google Alerts, which Parry recommends throughout this StopCyberbullying Toolkit, you have to keep an eye out for school groups and networks online.
Create a profile in every one you can find. Ask students where they all are. Then just ask anyone on the list to let you in. Like buzzing a button at random at any apartment building you want to be allowed into, “buzz” the first one on the list and keep going until someone lets you in.
Sit quietly. Don’t comment or correct anyone’s grammar. But, every so
often, review the posts. Select students are random and review what they and
their friends are saying and follow the trail of cyber-breadcrumbs to friends
outside of the network.
If you are aware of an offline bullying brewing, check those students
online. Forewarned is forearmed. In the same way you will spot check lockers,
backpacks, and bags brought into school or a school event, you need to do the
same spot checking online.
To make sure no student is unfairly targeted, work out a procedure for
spot checking and make sure everyone knows what and where to report
cyberbullying when they find it.
Get the guidance counselors involved too. If
students are at risk offline, they are especially at risk online. Teach them
how to keep an eye out for these students online. That’s where Googling them
comes in.
Talking the Cyberbullying Talk
What we have here is a failure to communicate! (With thanks to Cool Hand Luke.) Unless you understand the terminology you can never solve the problem. You are talking about one thing and students or parents think you are addressing something else.
When Parry was asked to be the only female speaker at Microsoft’s first
privacy and security event many years ago, she was thrilled and honored. When
they assigned her the task of creating the presentation on defining terms, she
was crushed. “Defining terms!,” she complained to one of her law partners who
was there. “Why? Because I am a lawyer? Because I am a woman?”
While she ranted
(quietly), her trusted sidekick and law partner, Nancy Savitt, explained. “You can’t solve anything unless you can plot your course. You have to
define the problem. To do that you need a common language. Think of people from
one country trying to solve a problem with those from another country when each
speak a different language and have no common basis of communication. This is
no different. You may think of 'privacy' as protecting personal information. I
may think of it as defining civil rights about what you can and can’t do in
your own home or bedroom. Someone else might think of it as seclusion. Unless
we know which 'privacy' we will be addressing, we’re wasting our time.”
As with most important matters, Parry listened to Nancy, enough to
include the “Talk the Talk” theme here.
Here are some of the most important terms you need to understand and use
consistently if we are going to work together towards the common goal of
stopping cyberbullying.
StopCyberbullying
Terms
Lots of terms apply to cyberbullying. It will help to come
up with common terms we can all use. These are helpful when discussing the
issue, so everyone understands what we are talking about.
“Accidental
Cyberbullies”: another term for “inadvertent cyberbullies,” this type of
cyberbully was careless or clueless and hurt the other person by accident. They
may have sent the message to the wrong person, left out a “jk” or “J”
or mis-communicated their message.
“Account takeovers”:
when someone takes over your account, changing your login/password or account
information so you can’t use it or access it.
“Click and Runs”:
this term describes cyberbullying that takes place when the cyberbully is bored
and looking for entertainment. They cyberbully someone for their reaction,
which is monitored online and offline.
“Cyberbullying or
cyber-harassment”: when someone uses technology as a weapon to hurt someone
else. When minors are involved, it’s called “cyberbullying.” When adults are
involved (18 and over) it’s called “cyber-harassment.”
“Cyberbullying-by-proxy
or cyber-harassment-by-proxy”: when someone does something to manipulate
others into doing their dirty work for them. (“Bullying refers to minors and
“harassment” is reserved for the same activities conducted by adults (18 and
over).)
“Cybering”: the
online equivalent of phone sex, but with the communications being typed instead
of spoken. If it involves sexual or nude images or videos, it is “sexting” or
“sexing”, not cybering.
“Cybermobs”:
large numbers of people who engage in mob behavior online by hacking,
harassing, attacking and spreading nasty messages. They are often the unwitting
victims of master manipulation by the abuser, who has orchestrated the
situation to do his or her dirty work. They are frequently also self-righteous
and believe that they are righting wrongs online. The damage they do can ruin
reputations permanently.
“Dupes”: for the
purposes of cyberbullying, “dupes” are people who have been manipulated into
cyberbullying others in a cyberbullying-by-proxy campaign. They engage in
harassment or cyberbullying activities after being convinced that they are
doing the right thing, giving someone something they deserve or believe that
the person they are targeting started it by harassing them first. The person is
being manipulated by the real cyberbully into falling for this. It’s a
cyberbullying-by-proxy campaign designed to get others to do their dirty work
and the “dupes” fall for it.
“Extortion” or “coercion”: for the purposes of cyberbullying, extortion
often takes the form of an online threat or a threat offline to do something
online. It includes when someone threatens to disclose secrets or embarrassing
images, puts an unreasonable amount of pressure on you, threatens to do
something to you, someone or something you care about or post something online,
takeover your accounts or attack you online in order to convince you or force
you to do something or not do something.
“Flamers” and “flaming”: nasty comments, insults and
rude communications posted online for various purposes, including anyone
holding opposing opinions or doing things they don’t approve. “Flamers” tend to
act alone in their attacks and are highly opinionated, attacking anyone with
other opinions or if they find them offensive in any way.
“Hacking”: a
commonly-used term to cover all non-consensual digital intrusions. For the
purposes of cyberbullying, “hacking” involves the use of technology to damage,
alter or destroy data, online accounts or digital devices or content of the
target.
“Inadvertent
Cyberbullies”: another term for
“accidental cyberbullies”, this type of cyberbully was careless or clueless and
hurt the other person by accident. They may have sent the message to the wrong
person, left out a “jk” or “J”
or mis-communicated their message.
“Mean Girl
Cyberbullies”: Always mean but not always girls, this type of cyberbully
attacks reputations and engages in cyberbullying designed to socially exclude
or humiliate their target.
“Photoshopping”:
named for the Photoshop™ software tool that allows photos to be altered or
edited, this involves teens manipulating the real photo of someone else to make
it appear that they were doing something they hadn’t really done, such as
putting their head on someone else’s naked body or replacing the bottle of soda
they were holding in a photo with a bottle of alcohol.
“Posing”: when someone pretends to be someone else
online, either through setting up a new account while pretending to be that
person, using an account with a screen name similar to theirs (using a
lowercase “L” instead of a “1” in the name), communicating anonymously or
taking over someone else’s account for the purposes of hurting that person.
“Power Hungry
Cyberbullies”: this type of cyberbully is often also an offline bully. They
use threats or physical force in real life and threats and fear tactics online.
There is a subset of this type of cyberbullying, called “Revenge of the Nerds.”
“Privacy Invasions”:
for the purposes of cyberbullying, include misuse of someone’s passwords that
had been voluntarily provided to the abuser, unauthorized use of passwords and
online accounts, digital surveillance, stalking or monitoring (“spying”),
unauthorized access of someone’s digital accounts, devices, activities, content
and communications, coerced or pressured access to friends, digital
communications, photos and videos, private messages, profiles and game
accounts, text messages and cell phone call logs, public sharing of private
facts, intrusion into someone’s private space or time and “hacking” for data
access purposes.
“Revenge of the
Nerds”: this type of cyberbully is a special online profile of a power
hungry cyberbully. They too want to see their victims sweat and use threats and
fear tactics. But they are often the victim of power hungry bullies in real
life and unable to fulfill their physical threats. They aren’t a “tough guy,”
just playing one online.
“Set-Up”: when
someone poses as someone else and communicates with the target to see what they
would do, using it to teach them a lesson or test them.
“Sexting”: taking
and sending sexual, sexually provocative or nude images to someone via any
digital device including a cell phone (such as a webcam, online or
using a photo-sharing (such as Flickr) or video-sharing (such as YouTube)
network). Typed communications are not “sexting.” They are “cybering.”
“Spying” or “digital
surveillance”: using technology to monitor someone else’s digital
communications, such as spyware or physically reviewing cell phone, text or
other digital communications without the permission of the person whose account
is being monitored or reviewed. It also includes audio or video surveillance.
“Trolls”: are
people who like to stir up trouble online and see what happens. A juicy rumor
campaign can “feed the trolls,” allowing them to act out and giving them the
attention they crave, especially in virtual worlds and interactive games.
Cyberbullying is More Than Just Another Medium for Bullying
Experts who understand schoolyard bullying often misunderstand cyberbullying, thinking it is just another method of bullying. However, the motives and the nature of cyber communications, as well as the demographic and profile of a cyberbully, differ from their offline counterparts about 50% of the time.
One of the biggest problems Parry encounters is with traditional
bullying experts who don’t truly understand cyberbullying but provide advice
anyway (which is often very wrong).
They tell victims and their parents to use
printouts to help prove the cyberbullying (which is utterly worthless given the
ease in which typed communications can be altered).
They often tell young
victims to stand up for themselves when dealing with a cyberbully (which works
offline, but only provokes more cyberbullying online).
While cyberbullying is a tactic used by some traditional bullies, most
cyberbullying is very different. Only two of the types of cyberbullies have
something in common with the traditional schoolyard bully and may slip from
offline to online and vice versa. These are Mean Girls (always mean, but not
always girls) and Power-Hungry (the ones who are the thugs of the schoolyard).
Cyberbullying is more about impulse control, technology tricks, and
investigative forensics than about interpersonal behavior. It’s often less
about conflict resolution than about getting their 15 megabytes of fame. Unless
we recognize and accept this, we will not be able to effectively address the
problem.
Parry Aftab and WiredSafety volunteers have been working on
cyberbullying and cyberharassment cases since 1995. No one has done it longer
or more than they have. We’re all unpaid volunteers. If you’re not sure whom to
trust, ask us.
A Quick Overview of the K-12 Cyberbullying Risk Areas
Cyberbullying starts early. WiredSafety is seeing it start as early as second grade, peaking in fourth grade, leveling off, and then peaking again in seventh and eighth grade. Part of the problem is defining it. When students hear “cyberbullying” they often think different things. Some think it means a death threat, others think it’s a fake Facebook profile set up to humiliate others. Some think it’s using lewd language or posting mean images. (You can learn more about this in Parry's Talk the Talk article.
It starts when
kids start using mobile interactive technologies, such as cellphones, DSi and
PSPs, and instant messaging. It continues through high school (although high
school students hate admitting that they can be bullied and deny it continues
through high school). It often follows their journey from technology to
technology, as they develop and their interests and relationships change. The
more they mature, the less they cyberbully. At the same time, the cyberbullying
attacks become more dangerous and better targeted to hurt their victims.
Their methods and
motives change with age. Fourth graders tend to blackmail others, middle
schoolers use social exclusion, and high school students tend to sexually
harass their former romantic partners. This tracks their offline bullying
trends, but for some reason surprises people when they look at it from the
cyberspace perspective.
Anonymity plays an
important role in the rapid growth of cyberbullying. More than 65% of
cyberbullying occurs anonymously, by masquerading as the victim or posing as
someone else. This drives cyberbullying by making it harder to identify the
cyberbully and allows the cyberbully to avoid having to face the real harm
their actions are causing.
Public School Regulation of Student Speech on the Internet
Overview of the US Case Law
School districts across the
nation are grappling with difficult decisions regarding their ability to
regulate or discipline cyber expression by students. While there are
well-established guidelines for regulating student speech, lower courts are
struggling to apply pre-Internet legal standards to student speech on the
Internet.
The U.S. Supreme
Court has not ruled regarding the limits of regulating student cyber
expression. However, several Supreme Court cases set the general guidelines for
regulating student speech. While none of these cases involved the Internet, the
principles set forth in them still guide the analysis regarding all student
speech, including cyber speech. The standards established by these cases are as
listed below:
•
As a general rule, public schools can
punish student speech only when it causes, or is reasonably anticipated to
cause, a material and substantial disruption of the school environment or if it
interferes with the rights of others.[1]
This general rule is subject to the following exceptions:
o
A school can punish lewd, vulgar, or
offensive student speech.[2]
o
A school may regulate speech for
legitimate pedagogical concerns where the speech is school-sponsored or others
might reasonably believe that the speech bears the school’s imprimatur – such
as a student newspaper.[3]
o
Where speech occurs off-campus, but at a
school sponsored event, a school can restrict student speech at a school event
when it is reasonably viewed as promoting illegal drug use.[4]
With
no precedential guidance regarding disciplining cyber expression from the
Supreme Court, the lower state and federal courts have been issuing conflicting
decisions regarding the issue. In February 2010, two panels of the 3rd U.S. Circuit
Court of Appeals delivered contradictory decisions on the very same day. Both
cases appeared to involve substantially similar facts and identical issues. The
students created the profiles off-campus, using non-school computers, during
non-school hours; however, the courts reached opposite conclusions.
In Layshock v. Hermitage, the court found that school officials
could not suspend a student for creating a derogatory fake Internet profile of
his principal. The court reasoned that even though the student and several
fellow classmates accessed the internet posting from school computers during
school hours, there was an insufficient nexus between the off campus speech and
any alleged disruption of the school environment.[5]
In J.S. v. Blue Mountain, the court upheld a 10-day suspension
of a student who posted a profile on MySpace that showed a photo of the
principal and described him as a pedophile and sex addict. In contrast to Layshock, the court held that the
likelihood of such an act significantly disrupting school activities warranted
the school’s disciplinary actions.[6]
In accordance with Blue Mountain, the 2nd Circuit applied
the Tinker standard to off-campus
speech concluding that school officials could regulate off-campus Internet
speech where it was reasonably foreseeable that the acts could substantially
disrupt the school environment.[7]
The
uncertainty of the courts and these conflicting rulings have left school
officials guessing about where the lines have been drawn. Unfortunately,
there is currently a legal grey area regarding the regulation of cyber
expression. Because of this lack of clarity, educators must turn to the
standards identified by the courts in analyzing these situations. However, as
highlighted by the inconsistent 3rd Circuit rulings, the factual analysis in determining whether or not an
activity materially or substantially interfered with the school’s operations is
highly subjective and unpredictable.
While
the law is still evolving, there are general guidelines that schools can
follow. As a general rule, if the speech was created and distributed using
school equipment, during school hours and/or on campus, schools may discipline students for
inappropriate expression subject to the Tinker
standard. The guidelines set out in Tinker
are that public schools can punish student speech only when it causes, or is
reasonably anticipated to cause, a material and substantial disruption of the
school environment or if it interferes with the rights of others. On the other
hand, if the activity occurred using the student’s own computer or mobile
device, outside of school hours, and off campus, schools have very limited authority to
regulate or discipline that activity, because such expression is generally
constitutionally and statutorily protected. However, such speech may be subject
to discipline under existing legislation if it is deemed harassment or poses a true
threat.
[1]
Tinker v. Des Moines Indep. Cmty. Sch. Dist., 393 U.S. 503, 509 (1969).
[2]
Bethel Sch. Dist. No. 403 v. Fraser, 479 U.S. 675, 678 (1986).
[3]
Hazelwood Sch. Dist. V. Kuhlmeier, 484 U.S. 260, 271-273 (1988).
[4]
Morse v. Frederick, 551 U.S. 393 (2007).
[5]
Layshock v. Hermitage Sch. Dist., 593 F.3d 249 (3d Cir. 2010).
[6]
J.S. v. Blue Mountain Sch. Dist., 593 F.3d 286 (3d Cir. 2010).
[7]
Doninger v. Niehoff, 527 F.3d 41 (2d Cir. 2008); Wisnewski v. Bd. of Educ., 494
F.3d 34 (2d Cir. 2007).
How worried are we that our kids will be targeted by a cyberbully?
It happen. It happens more often than most adults know. And, rightfully we worry that our kids will be cyberbullying's next target.
But there are things you can do to minimize that risk, now, before it starts.
Don't be afraid, be prepared instead.
But there are things you can do to minimize that risk, now, before it starts.
- Digital self-defense, where you are careful about choosing passwords and sharing them, is where you start.
- Then, you need to make sure that they are using privacy settings and not inviting in friends they don't know in real life.
- Teach them not to provoke fights online and treat others with respect.
- If someone says something mean to them, make sure they stop, block and tell! (Stop and not answer back, block the person or message and tell a trusted adult.)
- Keep them off sites that are designed for older teens or adults and teach them not to lie about their age. It invites trouble.
- And, if they are in a frenemy dispute and engaged in digital drama with someone, change their passwords to make sure no one gets in, and keep them occupied offline in things they enjoy.
Don't be afraid, be prepared instead.
Kenya! how exciting!
Digital communications are so important to Africa, form devices that connect from distant villages to micro development of apps. Thanks so much for visiting Parryaftab.blogspot.com
Thursday, February 20, 2014
Who Is a Typical Cyberbullying Target?
Any child, preteen, or teen is a potential cyberbullying target. They don’t need to have home Internet access, a cellphone, or any cyber-connection. The cyberbullies are perfectly happy to have technology do their dirty work in destroying reputations or creating offline responses to online provocation.
Obviously, when friends have a falling out or romance takes a bad turn,
cyberbullying is a viable option to settle scores and share hurt feelings.
Seventy percent of cyberbullying comes from friends or acquaintances.
Bigotry, hate, and intolerance are big
motivators, as well. Anyone who has been the target of offline bullying or is
more vulnerable to it is a likely target, too. Jealousy plays a powerful role
in motivating cyberattacks by those involved and their friends.
The more a student shares personal and private information, gets
involved in heated online debates, or has an offline problem, the more likely
they are to be targeted. The less careful they are, the fewer security settings
and tools they use, and the less care they take in their communications, the
more likely they will be targeted.
And, if their password is vulnerable, so are they. Eighty-five percent
of grammar school students and 70% of middle and high school students have shared
their passwords with at least one other person.
The
more Internet and technology literate the students are, the less vulnerable
they will be. Many leave themselves open to attack, hacking, and having their
personal information misused by cyberbullies. An easy mark is far more obvious
online than offline.
Cyberbullying starts early and continues to adulthood if things don’t
play themselves out or if they don’t learn how to protect themselves.
What Ages Are Impacted by Cyberbullying?
Cyberbullying typically starts at about 7 years-of-age (younger in very
connected communities) and usually ends (as “cyberbullying”) around 15. After
then, the cyberharassment continues, but it changes. It usually becomes sexual
harassment or is done for revenge against a former boyfriend, girlfriend, or
former friend.
It is interesting to note that high school students deny that
cyberbullying exists in high school.
Because high school students insist that “cyberbullying” is for middle
schoolers and something that happens before they mature into high schoolers,
Parry doesn’t call it “cyberbullying” in high school. She calls it
“cyberharassment” or "digital drama" instead.
Many cases of cyberbullying also occur right after a child receives
their first IM or cellphone account when they often try to see what they can
get away with. Some don’t appreciate the consequences of their actions. (Many
stop when they understand the consequences or how much their actions are
hurting others, which points to the need for early education.)
Password theft and misuse and the theft of points or game “gold” from
their friend’s game account are often the earliest forms of cyberbullying among
6- to 7-year-olds. Interestingly, the younger kids use extortion as their
preferred method of traditional cyberbullying.
Parry is seeing a peaking of cyberbullying in fourth to fifth grade and then
again in seventh to eighth grade.
Cyberbullying has been trending younger and younger as the kids are
using these technologies at earlier ages than ever before. Virtual worlds, such
as Webkinz Jr. and Disney’s Club Penguin and Fairies, become popular with kids
as young as three or four. PBS and other trusted kid-brands are getting
involved with kid-social worlds, too.
At the same time we are seeing cyberbullying trend downward in age, it
is also trending upwards as a result of the growth of social networking sites
and texting.
There have even been cases in law school. (As defined,
remember that cyberbullying is only between or among minors, and technically
this would fall into the “cyberharassment” category. Cyberharassment of adults
by adults began before children had access to the Internet and continues to
grow.)
Why Do Students Cyberbully Each Other?
Who knows why students do anything? When it
comes to cyberbullying, they are often motivated by anger, revenge, or
frustration. Sometimes they do it for entertainment or because they are bored
and have too much time on their hands and too many tech toys available to them.
Many do it for laughs or to get a reaction. They may do it because they think
it’s fun.
A growing number do it to make a point to others, to improve their
profile’s popularity or video’s page views, or to get attention for their “15
megabytes of fame.” And sometimes underlying issues of conflict, hate, revenge, bias, jealousy and contempt turn into cyberbullying.
Each of the four types of cyberbullies (and the one sub-type) does it
for their own particular motive:
·
The
Power-Hungry cyberbullies do it to torment others and to enhance their view of
themselves as being in charge.
·
Revenge
of the Nerd cyberbullies (a sub-type of Power-Hungry cyberbullies) may start
out defending themselves from traditional bullying only to find that they enjoy
being the tough guy or gal.
·
Mean
Girl cyberbullies do it to help bolster or remind people of their own social
standing.
·
Vengeful
Angel cyberbullies think they are righting wrongs and standing up for others.
·
Inadvertent
cyberbullies never meant to hurt anyone, but because they were careless hurt
them by accident.
While the tactics may differ, most are motivated by anger, lack of
impulse control, frustration, ego-boosting, revenge, jealousy, the need to
teach someone a lesson, the desire to impress others, to make a point, to be
funny or become more popular, to draw attention to their online posts and
presence, by boredom, or by being careless, thoughtless, and typing without
thinking.
cibersecuridad en espanol
Bienvenido a mi blog. Perdona mi español, pero este es un maravilloso recurso en español sobre cybersafety de FTC de los EE.UU. Varios de nosotros nos ayudó a escribirlo.
http://www.alertaenlinea.gov/
http://www.alertaenlinea.gov/
Tons of new readers in Hungary, Ukraine, Canada, India, Chile, Indonesia, Philippines, UK and Australia! Thank you!
It is so inspiring to see how much interest there is globally in child protect and digital best practices. I am very honored to see how many new readers are visiting parryaftab.blogspot.com
Understanding Cyberbullying
Cyberbullying is a growing problem. It affects at least
85% of the 45,000 middle schoolers I polled in person last year, yet only 5% of
them will tell their parents. In a smaller poll, 70% of students admitted to
having cyberbullied others.
It has become a silent epidemic, stalking our children
on social networks, instant messaging, interactive games and cell phones. While
the more dramatic stories have made the headlines, from Megan Meier’s suicide following
harassment by a neighborhood mom posing as a cute sixteen year old on MySpace,
to cheerleaders beating one of their own
on video, most cases are less newsworthy, but no less painful .
Cyberbullying has many stakeholders, from families
whose lives are shattered by the loss of teens who chose suicide rather than
face repeated torment, to students who are afraid to check their e-mail, to
teachers being attacked online by students, mental health professionals trying
to stay ahead of their patients, to the media trying to grapple with covering a
story without further exploiting the victims, to regulators who are seeking answers and the industry who
is struggling in its effort to identify and manage risks while attempting to
herd cats. More, perhaps, than any other single issue, cyberbullying takes a
village to address. In this first ever international cyberbullying conference,
every member of the village will have a voice. Together we can fashion
solutions and encourage change. And by the end of the two days, all
stakeholders will know about being part of the solution, instead of part of the
problem.
What do we need to know to address the problem and help
frame meaningful solutions? What is the role of the Internet industry, media,
government, advocacy groups and schools? Over two concentrated days, WiredSafety will
help all stakeholders understand the problem better and find manageable
solutions and collaborations. It will give community participants a chance to
be heard, and the industry, media, advocacy groups and regulators a chance to
listen and share their own viewpoints.
Internet Sexual Predators and how they operate - overview for industry, school network admins and everyone
Minors are targeted by traditional sexual predators online
and through the use of digital technologies more often than many people
realize. The number of reported cases vastly underestimates the real problem,
as young people often fail to report victimization or attempted victimizations.
They do this out of fear, shame or feeling that it was somehow their fault that
this occurred.
In addition to traditional sexual predators, young people are
frequently targeted by their peers, either following a break-up, as part of a
sexual harassment cyberbullying campaign or through “sextortion” (when someone
uses sexual images created by the victim voluntarily to blackmail them into
performing sexual acts or taking more images against their will).
Network administrators and moderators are often in the best
position to spot risky behavior, grooming or inappropriate contact. You are an
important part of the team when protecting minors from sexual exploitation and
predation.
The kinds of sexual exploitation risks that exist online:
Direct grooming of minors for
offline meetings: Most have heard about cases where adult sexual predators
contact minors online, seeking to create friendships, trusted relationships or
romance with a minor. Dateline’s Chris Hansen’s “To Catch a Predator”and
similar television series highlight the range of predators willing to show up
at a minor’s home expecting sex.
When these cases started, in the
late 90s, the predators often posed as another minor to get in under the young
person’s “stranger danger radar.” They would be a cute teen (glossy photos and
all) and convince the minor that they were their long sought-for soulmate.
Later they may confess to being slightly older, expressing concern that their
“soulmate” might reject them for their white lies about their age, professing
that it was done merely out of love.
If done correctly, the victim would
protest that “there is nothing [they] could do to cause them to stop loving
them,” and forgive them within a short period of time. They would often even be
flattered that an “older” lover would be interested in them (making them feel
more attractive and mature). They are often additionally flattered that someone
would go to such lengths to earn their love, even by lying about their age.
While they may confess to being
older, they rarely confess to their true age initially. They may claim to be 23, and
really be 41 (such as in the case of Katie Tarbox who was sexually molested by
an investment banker from Los Angeles posing as a 23-year-old.)
More recent trends show that the
teens (and preteens) are almost as willing to engage with someone who admits to
being an adult at the start of the grooming process. These teens (and preteens)
may otherwise be at risk (such as broken homes, special needs,
self-destructive, facing a family or personal crisis) and see this as a way
out, diversion or a path to love and security offered by a “caring” adult.
Sometimes these at-risk teens and preteens actively solicit relationships or
sexual encounters with adults for the same reasons or merely for attention.
Subscribe to:
Posts (Atom)