They also have teen assistants who have knowledge of both the technology and the students and their online activities.
They can be invaluable in the search for the real cyberbully. By stepping back and watching the chatter within Facebook school groups and triangulating it with what they can locate on the network servers, many cyberbullies can be found and confirmed without having to get subpoenas and go through legal process.
Always make sure that the network administrators are part of the team created to address cyberbullying in schools. They are an often overlooked expert resource.
Valerie Schmitz holds a double Ph.D. in Instructional design and Technology Education, as well as a Masters in Educational Leadership:
“School computer network specialists are responsible for a variety of tasks ranging from simple helpdesk calls to protecting the security of student records. While not always professional educators themselves, these specialists are also being asked to address student behaviors and interactions. Specifically, as our children have brought bullying into the virtual world computer network specialists now must implement tools to address cyberbullying.
Rather than wait until a high-profile incident has occurred, schools must proactively collaborate to implement procedures to address cyberbullying. While school personnel such as guidance counselors, teachers, and administration can be proactive by implementing awareness events, dialogue, or educational events, school network administrators can also be proactive by implementing network secure access restrictions.
Many educational networks are not presently using an authentication system for Internet access. This essentially means that when anyone accesses the Internet it is completely anonymous. Individual teacher and student authentication accounts will require users to "sign in" and take personal responsibility for their actions online. This proactive effort ensures that anonymous cyberbullying is not an option for our learners and that anyone who does choose to cyberbully will be identified based on authentication logs.
While the problem of bullying and cyberbullying is certainly vast and rooted in many causes, simple authentication is one tool that school network administrators may choose to use as a proactive tool.”
Post a Comment
Parry Aftab is interested in hearing ideas and questions about digital safety, privacy and cybersense. Please do not advertise or promote services or products or include a link, video or image in your comment.
Now for the boring legal stuff:
We reserve the right to delete and/or moderate any comments at any time.
Note that Parry Aftab does not respond to legal questions and cannot address specific issues about reported abuse.She cannot be retained as legal counsel online, and any prospective client must sign a retainer agreement before becoming a legal client of Ms. Aftab. Any legal discussions are educational and informational only and anything submitted may be made public on this blog.
Ms.Aftab reserves the right to report any abuse, threats or harassment to the requisite authorities.