background preloader

Cyberbullying Resources for Educators

Facebook Twitter

Cybersafety. 10 Things Your Students Should Know About Their Digital Footprints. Building a digital legacy is an issue I believe doesn’t garner enough attention in our personal and professional lives. In fact, some of the heaviest users of online tools and social media are our young students, who are growing up as a generation of visual learners and visual attention seekers. This is in fact the Facebook and YouTube generation, and the reality is that many teens are unconcerned about the dangers of sharing personal information online. A highly respected education advocate, Kevin Honeycutt, once asked me if any of us from our generation (GenX and before), had ever made a mistake in puberty. He then asked if our mistakes are “Googleable.” The reality is that our mistakes from puberty are not “Googleable”. But our students’ mistakes are. “They’re on the record you see, ” Kevin continued, “so if they’re gonna do it (live online) anyway, I think it behooves us a educators to help our students shape and build a positive legacy.” 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

Good luck! How Apple and Amazon Security Flaws Led to My Epic Hacking | Gadget Lab. In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook. In many ways, this was all my fault. My accounts were daisy-chained together. Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location. Those security lapses are my fault, and I deeply, deeply regret them.

But what happened to me exposes vital security flaws in several customer service systems, most notably Apple’s and Amazon’s. This isn’t just my problem. I realized something was wrong at about 5 p.m. on Friday. Lulz. “Wait. “Mr. Helping Students Create Positive Digital Footprints - ASCD Annual Conference 2012. Christine Fisher When asked what words come to mind when they think about students posting to the Internet, many educators list words like danger and safety. But with the likes of Robert Nay—who created one of the most downloaded iPad apps of 2011 when he was just 14—and even Justin Bieber—who began his international superstardom as a YouTube sensation—as inspiration, students and teachers alike should know the positives that posting to the Internet can offer.

This was the message Steve Johnson, a technology skills teacher, parent, and author of two education books, shared during his Saturday session, "Digital Footprints: Your Students' New First Impression. " "The main idea we get from surveying teachers [about students posting online] is there [are] a lot of negative connotations," Johnson said, as he aimed to reverse these negative perceptions and encourage educators to promote student-produced online content in their classrooms.

"They are going to make mistakes," he said. How School Librarians Can Assist You:Internet Safety and Filtering. Insafe, a network of national nodes that coordinate Internet safety awareness in Europe makes the case for empowerment as the key to online safety. Safety risks are increased …”in the online environment by the fact that we can’t usually see whom we are communicating with, probably don’t know who provided the data we are accessing, and online content comes without any quality assurance from a reputable publisher or editor. In order to compensate for this, we need to develop our information literacy skills and behave in a more discriminating manner when online.”

The following resources for parents should help you to better understand the complexities of the online environment and provide you with the tools to keep your child safe when online. Bullying.org Center for Safe and Responsible Internet Use (CSRIU) This site hopes to mobilize educators, parents, students, and others to combat online social aggression. Children's Internet Protection Act CyberSmart! CyberSmart! Digizen.org InSafe. SEL and Bullying Prevention. Response. Cyberbullying. What does cyberbullying look like?

Children can cyberbully each other in a number of ways including: abusive texts and emails hurtful messages, images or videos imitating others online excluding others online nasty online gossip and chat Cyberbullying can happen to anyone, however often the children involved in cyberbullying are also involved in other kinds of bullying. One in 10 young people have experienced cyberbullying (Cross, 2009). Cyberbullying is the use of technology to bully a person or group. Bullying is repeated behaviour by an individual or group with the intent to harm another person or group. Cyberbullying can involve social, psychological and even, in extreme cases, physical harm. Because children and young people are often online it can be hard for them to escape cyberbullying. How teachers can help Research shows students often don’t tell adults about cyberbullying.

Responding to cyberbullying Safe schools address cyberbullying before it happens >Useful websites Bullying. Cyberbullying_teachers. How Public Schools Can Constitutionally Halt Cyberbullying: A Model Cyberbullying Policy that Considers First Amendment, Due Process, and Fourth Amendment Challenges – Wake Forest Law Review. Introduction Schoolyard bullying has been around for generations, but recently it has taken on a new, menacing face¾cyberbullying. Now adolescents use technology to deliberately and repeatedly bully, harass, hassle, and threaten peers. No longer does the bullying end once the school day ends. With the use of technology, groups of bullies can relentlessly and anonymously attack twenty-four hours a day for the whole world to witness.

There is simply no escape. Cyberbullying follows victims from their schools to their homes to their personal computer screens, with fresh injuries inflicted every time a new person clicks on an Internet site to witness or join in the bullying. Adolescents use Internet sites like YouTube, or social networking sites like Facebook and MySpace, to repeatedly mock others by creating web pages, videos, and profiles. Cyberbullying is one of the top challenges facing public schools.[3] There are many recurring legal problems confronting public schools.

I. A. Cyberbullying .:. WiredSafety. Cyberstalking and Cyberharassment In the early days of cyberabuse, when WiredSafety's volunteers first offered help to victims of cyberstalking and cyber-harassment in 1995, cyberstalking and cyberharassment were defined differently. Now cyberstalking and cyberharassment are lumped together along with any way adults use digital technology to torment, harass, intentionally annoy or set their victims up for attacks by unwitting third parties (like hate groups and violent individuals). While this short article summarizes cyberharassment, WiredSafety has more resources and more experience than any other online group on the issue of cyberharassment, cyberstalking and cyberbullying (minor-to-minor). Visit our tutorials, take a class or two online with us, visit our help channel or refer your case to our WiredPatrol Internet Response Team for help form our specially-trained volunteers.

Why Don't We Call Adult Cyberharassment "Cyberbullying"? Responding to Cyberharassment Working with police. What is cyberbullying? Cyberbullying occurs when a child or teen is embarrassed, humiliated, harassed, tormented or otherwise targeted by another person using the Internet or other form of digital communication. Understanding the motives of cyberbullies can assist parents and professionals in developing effective prevention and intervention strategies that are necessary to combat cyberbullying.

According to www.stopcyberbullying.org, there are generally five types of cyberbullies. seeks attention from peers maintains control by intimidating victim was cyberbullied or bullied in person in the past seeks revenge on bullies may be less popular, but usually has above average computer skills bullies for entertainment value and to alleviate boredom (e.g., at a slumber party) aims to increase her own popularity by putting others down seeks revenge on behalf of those who have been bullied or cyberbullied aims to protect friends doesn't see himself/herself as a cyberbully return to top of page. Cases and Codes. Cases citing this case: Supreme CourtCases citing this case: Circuit Courts TINKER v.

DES MOINES SCHOOL DIST., 393 U.S. 503 (1969) TINKER ET AL. v. DES MOINES INDEPENDENT COMMUNITY SCHOOL DISTRICT ET AL. Petitioners, three public school pupils in Des Moines, Iowa, were suspended from school for wearing black armbands to protest the Government's policy in Vietnam. 1. Dan L. Allan A. Charles Morgan, Jr., filed a brief for the United States National Student Association, as amicus curiae, urging reversal. [393 U.S. 503, 504] MR. Petitioner John F. In December 1965, a group of adults and students in Des Moines held a meeting at the Eckhardt home. The principals of the Des Moines schools became aware of the plan to wear armbands. On December 16, Mary Beth and Christopher wore black armbands to their schools. This complaint was filed in the United States District Court by petitioners, through their fathers, under 1983 of Title 42 of the United States Code.

In West Virginia v. In Meyer v. How U.S. kids are taught about cyberbullying, online safety. Illinois General Assembly - Illinois Compiled Statutes. Cybersafety. Jefferson Middle School 1115 S. Crescent Drive Champaign, IL 61821 Phone: (217) 351-3790 Fax: (217) 351-3754 7:50am - 2:35pm In partnership with our parents and community, we are committed to connecting students to their futures through academic excellence, developmental responsiveness and social equity. Corporate Sponsors:Body-n-SoleOld Time Meat and DeliPapa Murphy'sTCBY Jefferson Journal:02-28-14PBIS Matrix Jefferson Middle School gladly serves a culturally diverse student body while educating through a social justice lens. The Bully in the Backpack: There’s no limit to the cruelty of online bullies. Here’s what you can do.

What teachers, social workers and administrators should know.