Cyberbullying Margaret Park M.Ed, Ed.M, CAS Sarah Carpenter M.S, MA

Types of Tech Users

Digital Immigrants

Digital Natives

Screens, Tweens and Teens

(Common Sense Media, 2015)

(Common Sense Media, 2015)

Mobile Devices Dominate

Social Media

Communication

Identity

Cyber-Socializing

Cyber - Bullying

Psychosocial Factors

What is Cyberbullying? ● aggressive ● intentional ● repeated (1 or more) ● electronic

Technical Proficiency

Indirect

Invasive

Complex Bystander Roles

Frequency

Location

Reporting

Parent

Peer

Teacher

When Reported The Situation ... 44%

improved

11%

got worse

46 %

didn’t change

Cyberbullying: Definition and Characteristics

Indirect Behaviours ● Rumours ● Sending Pictures ● Impersonating ● Exclusion

Direct Behaviours ● Harassment ● Flaming ● Unwanted Sexting ● Sexual Behaviours

Victims

Bully

Characteristics

Power Bully

Mean Girls

Inadvertent Bully

Impact

No Escape

Embarrassment

Anger

Anxiety

Diminished Self Esteem

Depression

School Problems

Substance Abuse

Gender Differences

What Can We Do?

Strategic Leadership

School Policy

Awareness Campaigns School Personnel Students Parents

Build a “No Tolerance” Environment

Parent Support

Parents

Engage With Your Child

Model Tech Boundaries

Build Your Digital Skills

Know Where To Go For Help & Support

Student Strategies

Deal With Root Causes

Emphasize

Choice

Tap into Millennial Characteristics

Engage the Bystanders

Train Students As Leaders

Build Empathy

Develop Interpersonal Skills

Develop Intrapersonal Skills

Discussion Groups

Resources www.cyberbullying.org.nz www.commonsensemedia.org www.digizen.org www.netsafe.co.nz www.getcybersafe.gc.ca www.esafety.gov.au

ISCA Lisbon Cyberbullying Final (1).pdf

Page 3 of 35. Digital Natives. Screens, Tweens and Teens. Page 3 of 35. ISCA Lisbon Cyberbullying Final (1).pdf. ISCA Lisbon Cyberbullying Final (1).pdf. Open.

7MB Sizes 1 Downloads 363 Views

Recommend Documents

ISCA Lisbon Cyberbullying Final (1).pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. ISCA Lisbon Cyberbullying Final (1).pdf. ISCA Lisbon Cyberbullying Final (1).pdf. Open. Extract. Open with.

M 14 Final ISCA Guideline Answers.pdf
Technologies Ltd is a leading Company in the field of Software Development of ... with best practices for its different activities. ... a typical software development.

CA Final ISCA Notes for Chapter 7.pdf
organizes and integrates operation processes and information flows to make optimum. use of resources such as men, material, money and machine. ERP is a ...

cyberbullying esp.pdf
Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. cyberbullying esp.pdf. cyberb

Help Protect Kids from Cyberbullying
cyberbullying (or online bullying) opens the door to 24-hour harassment through ... comments or belittle the victim's friends on a blog. Pretend to befriend ...

Help Protect Kids from Cyberbullying
embarrassing pictures on a social website like Facebook, or share a humiliating ... an instant messaging (IM) buddy list or social networking page, for example.

Anti-Cyberbullying Policy.pdf
diaries), send text messages and images via mobile phones, have in game interactions,. message each other through IMs (instant messages), chat in chat ...

ISCA Answer Sheet.pdf
CACLUBINDIA.COM CS. TEJPAL SHETH. Page 3 of 10. Whoops! There was a problem loading this page. ISCA Answer Sheet.pdf. ISCA Answer Sheet.pdf.

Cyberbullying - 2015.pdf
Whoops! There was a problem loading more pages. Retrying... Cyberbullying - 2015.pdf. Cyberbullying - 2015.pdf. Open. Extract. Open with. Sign In. Main menu.

ISCA Chapter 3.pdf
communications that deliver the information from harm resulting from failures of confidentiality, integrity, and availability”. 2) For any organization, the security ...

ISCA Mock Test Paper.pdf
Business requirement for access control: To control access to information;. ♢ User access management: To prevent unauthorized access to information systems;.

2016-17 Lisbon MS Student Handbook 1.pdf
It is a basic handbook that guides and explains school policy and regulations. It is. subject to change, amendment, and interpretation by school administration ...

Comparing cyberbullying and school bullying among.pdf ...
123. Page 3 of 16. Comparing cyberbullying and school bullying among.pdf. Comparing cyberbullying and school bullying among.pdf. Open. Extract. Open with.

ISCA CHAPTER 6.pdf
Page 1 of 2. Stand 02/ 2000 MULTITESTER I Seite 1. RANGE MAX/MIN VoltSensor HOLD. MM 1-3. V. V. OFF. Hz A. A. °C. °F. Hz. A. MAX. 10A. FUSED.

ISCA NOTES PART 2.pdf
Page 1 of 23. 41 | ISCA Classes conducted at Adajan,Ghod D. CA Bhinang Tejani 9898054244/9016076035. 5.5.3 System Designing (Making a blue print like an architect makes it for building). After the completion of requirements analysis for a system, sys

ISCA chapter 1 my notes.pdf
Sales Net Assets Net Worth (NW). ROE = Profit Margin * Assets Turnover * Equity Multiplier. Alternative Formula,. ROE = EBIT * Sales * PAT. Sales Net Assets EBIT. ROE = Profit Margin * Assets Turnover * Financial Leverage. Note: (Fin. Leverage Formul

Cyberbullying (Span) 2015.pdf
... familia de Common Sense Media sobre el Acoso Cibernético (primaria). http://www.commonsensemedia.org/sites/default/files/k-5-familytip-cyberbullying.pdf.

100-055_Scout Law and Cybersafety Cyberbullying Agreenment.pdf ...
Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 100-055_Scout Law and Cybersafety Cyberbullying Agreenment.pdf. 100-055_Scout Law and Cy

Highly Noise Robust Text-Dependent Speaker ... - ISCA Speech
TIDIGITS database and show that the proposed HWF algorithm .... template is the 'clean' version of the input noisy speech, a column ..... offering a large improvement over the noisy and SS cases. Table 2: Speaker-identification accuracy (%) for 3 non