Cyberbullying

Picture
Learning Objectives 
At the end of this lesson, students will be able to:
• Demonstrate an understanding of cyber bullying
• Follow a few basic cybersecurity steps to secure their private information online.
• Understand the importance of privacy
• Understand the consequences of cyber bullying and the effect on the victim.
• Understand how to deal with cyber bullying and how to protect yourself 

Pre-test: Are you a cyberbully?

Picture
Please go to this website to take a test and assess if you are a cyberbully.
Attention: 
  • Write down your answers on a piece of paper while taking the test.
  • It's an anonymous self- test. 
  • You are the only one who knows your answer.
  • Just be truthful to yourself!
  • Don't tell anybody if you found out yourself a cyberbully :-P

Definition

What is Cyberbullying?

from Merriam Webster
"The electronic posting of mean-spirited messages about a person (as a student) often done anonymously."

Case Study

Picture
Questions for discussion:
  • Who is bullying in the beginning in this case?
  • What did Alan do when Jax emailed his picture to everyone?
  • What could Alan have done differently to protect himself?
  • What could Alan’s classmates have done differently to help and prevent the email from spreading more?
  • Write a short paragraph, what can you learn from this case study? How can you protect yourself from Cyberbullying?

Reflection

What are the characteristics of Cyberbullying?

  • Anonymity: As bad as the "bully" on the playground may be, he or she can be readily identified and potentially avoided. On the other hand, the child who cyber bullies is often anonymous. The victim is left wondering who the cyber "bully" is, which can cause a great deal of stress.
  • Accessibility: Most children who use traditional ways of bullying terrorize their victim at school, on the bus, or walking to or from school. Although bullying can happen elsewhere in the community, there is usually a standard period of time during which these children have access to their victims. Children who cyber bully can wreak havoc any time of the day or night.
  • Punitive Fears: Victims of cyber bullying often do not report it because of: (1) fear of retribution from their tormentors, and (2) fear that their computer or phone privileges will be taken away. Often, adults' responses to cyber bullying are to remove the technology from a victim - which in their eyes can be seen as punishment.
  • Bystanders: Most traditional bullying episodes occur in the presence of other people who assume the role of bystanders or witnesses. The phenomenon of being a bystander in the cyber world is different in that they may receive and forward emails, view web pages, forward images sent to cell phones, etc. The number of bystanders in the cyber world can reach into the millions.
  • Disinhibition: The anonymity afforded by the Internet can lead children to engage in behaviors that they might not do face-to-face. Ironically, it is their very anonymity that allows some individuals to bully at all.

What are the common forms of Cyberbullying?

  • Harassment: Repeatedly sending offensive, rude, and insulting messages
  • Denigration: Distributing information about another that is derogatory and untrue through posting it on a Web page, sending it to others through email or instant messaging, or posting or sending digitally altered photos of someone
  • Flaming: Online "fighting" using electronic messages with angry, vulgar language
  • Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post vicious or embarrassing material to/about others.
  • Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others
  • Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety (depending on the content of the message, it may be illegal)

After-class Activities

  • Please go to here and take a quiz on cyberbullying.
  • Please go to the Frontroom on this website to discuss about the scenarios.

Original Source

Disclaimer: This website is designed with material from different websites with the sole purpose of completing a class project on Mobile Learning. This is solely used for EDCT 793M class project. If you have questions any questions regarding this website please contact us at cipher1029@gmail.com or reuben.dlamini@gmail.com Once the project is complete the website will be accessed by log-in information.