Tough Questions Linger in Wake of Bullying Tragedy - 0 views
-
School bullying is nothing new. But since Prince's suicide, it has taken on a much darker significance, one that prosecutors are taking seriously. On Monday, criminal charges were brought against the nine students who allegedly led the harassment. And parents and school administrators in South Hadley are under intense scrutiny as well. They face tough questions about what happened to Prince and whether they could have done more to prevent her death.
Cyber Bullying - School Policies? - 0 views
-
A punch in the eye seems so passé. Bullies these days are traveling in packs and using cyberspace to their humiliating messages online. Like the toughies of old, they are both boys and girls and they demand nothing less than total submission as the price of peace. It’s a jungle out there. For school districts, patrolling the hallways and adjacent grounds is just a start. In the 21st century, a new kind of vigilance is necessary—an expanded jurisdiction that serves to both stave off legal actions and ensure a safe and productive learning environment.
-
Today’s principals rely on district policy and practice to extend the presumed long arm of the law to off-campus incidents. Potentially, that could mean plunging headlong into the electronic frontier to rescue student victims and thwart cyberbullying classmates who thrive as faceless computer culprits.
-
A December 2009 study by Harvard University’s Berkman Center for Internet & Society found that students on the receiving end report greater emotional distress, are more likely to abuse substances, and are more frequently depressed.
- ...8 more annotations...
R U a Cyberbully? -Kids Say It's on the Rise - 0 views
-
In a survey of 45,000 children in middle school, 85 percent said they have been cyberbullied at least once, said Parry Aftab, executive director of the Internet safety group WiredSafety.org, based in Irvington, N.Y., about 20 miles northeast of New York. Just 5 percent admitted it at the high school level, she said.
-
A group of high school students said recently that cyberbullying is on the rise in their schools, just as it is nationally. Cyberbullying is loosely defined as using computers or cell phones to harass or bully another. It can happen by cell phone text messages, on social networking sites and even on online games that allow chatting. "It's growing and it's going to continue to grow," said Rich Horner, the police superintendent for North Franklin Township in Washington County, on the southwest side of Washington. "A lot of this stuff is kids being kids. There's always been bullying. Now, they have more avenues to do it. It's enough of a problem that the state attorney general's office created a video about cyberbullying and will launch it in May, said Diana Woodside, assistant director of education and outreach.
Risks, Rights, and Responsibilities in the Digital Age - 0 views
-
This week, Sonia Livingstone's latest book, Children and the Internet: Great Expectations and Challenging Realities, is being released by Polity. As with the earlier study, it combines quantitative and qualitative perspectives to give us a compelling picture of how the internet is impacting childhood and family life in the United Kingdom
-
An Interview with Sonia Livingstone (Part One). According to the study, UK Children Go Online, children were neither as powerful nor as powerless as the two competing myths might suggest. As the Myth of the Digital Generation suggests, children and youth were using the Internet effectively as a resource for doing homework, connecting with friends, and seeking out news and entertainment. At the same time, as the Myth of the Columbine Generation might imply, the adults in these kids' lives tended to underestimate the problems their children encountered online, including the percentage who had unwanted access to pornography, had received harassing messages, or had given out personal information....
Turning up heat on web harassment - 0 views
-
BACKYARD bullies have moved into cyberspace with such speed and aggression that police, governments and lawyers are testing new ways of slowing their spread.
Her teen committed suicide over 'sexting' - 0 views
-
The image was blurred and the voice distorted, but the words spoken by a young Ohio woman are haunting. She had sent nude pictures of herself to a boyfriend. When they broke up, he sent them to other high school girls. The girls were harassing her, calling her a slut and a whore. She was miserable and depressed, afraid even to go to school.
Jigsaw - 0 views
-
Most of the world lives in countries that censor the internet. uProxy, seeded by Jigsaw and owned by the University of Washington, provides people access to the free and open internet by letting anyone who lives in a repressive society share the connection of someone who lives in a country with open internet access. uProxy works on an internet browser, with the option to set up a cloud server to provide constant access to the open internet. Perspective is an API that uses machine learning to spot abuse and harassment online.
Words Wound Get Help | Words Wound - 10 views
Protecting Your Online Identity and Reputation - 0 views
-
Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
-
Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
-
Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
- ...6 more annotations...
-
Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
1. Remember that nothing is temporary online
2. Mark your profile as private.
3. Safeguard your passwords and change them regularly.
4. Don't post inappropriate or sexually provocative pictures or comments.
5. Don't respond to inappropriate requests
6. Take a breather to avoid "flaming."
7. Learn about copyrights.
8. Check your digital footprint.
9. Take it offline.
Internet troll claims authorship of Megan Meier blog - 0 views
-
Trolls use the Internet to emotionally upset someone they don't know. They typically pick people or issues that, in their view, need to be ridiculed. They don't use their real names and attempt to inflame online discussions by posting outrageous and hurtful comments just to see who will take the bait.Fortuny told the newspaper he created the blog to question the public's hunger for remorse and to challenge the enforceability of cyberspace harassment laws like the one passed in Dardenne Prairie, where 13-year-old Meier had lived. She killed herself in October 2006.
-
The person behind the inflammatory blog "Megan Had it Coming" is a 32-year-old information technology freelancer who lives near Seattle, according to a story about Internet trolls that ran Aug. 3 in The New York Times. Jason Fortuny had no connection with events in Missouri surrounding the 2006 death of Megan Meier. As some had suspected, he is an Internet troll.
The Newest Breed of Bully, the Cyberbully - 0 views
-
While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
-
Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
-
Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
- ...1 more annotation...
-
Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Cybersafety Assembly causes controversy on first day of high school - 0 views
-
John Gay, a police officer for the Cheyenne Police Department in Wyoming, volunteered at the request of Windsor High School principal Rick Porter to speak to students at two assemblies about the dangers of predators surfing social networking Web sites such as MySpace and Facebook.Gay shared how he could pull pictures off of Windsor High School students who had their own MySpace and Facebook pages. Nordic’s daughter, Shaylah, was one of the students Gay singled out to the point where Shaylah left the auditorium in tears.
-
Shaylah said Gay showed the other students her phone number, read her blogs and comments out loud.
-
He kept on picking at her and picking at her and picking at her and everyone said, ‘That’s harassment,’ ” Weakland said.
- ...2 more annotations...
-
Ty Nordic understands the need to inform kids about the dangers of sexual predators on the Internet. But when his 16-year-old daughter was targeted during an assembly at Windsor High School on the first day of school Tuesday afternoon, Nordic was left with plenty of unanswered questions for the presenter whom he said used inappropriate language during the assembly and singled out specific students.
Governor Signs Law To Educate Children On Internet Safety [Illinois] - 0 views
-
he new law takes effect January 1st and provides that the Internet safety curriculums in schools will begin with the 2009-2010 school year. The bill allows the age-appropriate unit of instruction to be incorporated into the current courses of study regularly taught in the districts’ schools.
-
Illinois’ partnership with the Netsmartz national Internet safety program was a Governor’s initiative that was launched in 2006.
-
Earlier this week, Governor Blagojevich signed into law the state’s new Cyberbullying law. It clarifies the definition of harassing someone by using electronic communication such as the Internet and text messaging and enables the prosecution of someone who anonymously bullies in this capacity.
-
Governor Rod Blagojevich Thursday signed Senate Bill 2512 legislation to help protect children from the dangers of the Internet. SB 2512 requires school districts, beginning in the 2009-2010 school year, to incorporate an "age-appropriate Internet safety unit of instruction in the current course of study regularly taught in the district's schools," beginning in third grade.
Humiliation and gossip are weapons of the cyberbully - 0 views
-
ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
-
Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
-
The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
- ...1 more annotation...
Teaching Teenagers About Harassment - 0 views
-
This month, three teenage girls, students at Greensburg Salem High School in Greensburg, Pa., were charged with disseminating child pornography. They had sent nude pictures of themselves by cellphone to their teenage boyfriends, who were charged with possessing child pornography.\n\nThe legal consequences in this case may have been unique, but the behavior is not. About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
10 tips for dealing with game cyberbullies and griefers - 0 views
-
Griefers are the Internet equivalent of playground bullies, who find fun in embarrassing and pushing around others.
-
Typical griefer behavior includes: taunting others, especially beginners; thwarting fellow teammates in the game; using inappropriate language; cheating; forming roving gangs with other griefers; blocking entryways; luring monsters toward unsuspecting players; or otherwise using the game merely to annoy a convenient target or to harass a particular player who has reacted to their ill will.
-
, griefers have some gaming companies concerned about losing subscribers. As a result, many game sites and providers are becoming less tolerant of griefers and are employing new methods to police for them and otherwise limit their impact.
Bullying: Declining or Just Moving Online? - 1 views
-
Also, bullying and harassment via interactive technology, such as social-networking sites, text-messaging and other media, is still a major problem that may not be fully reflected in the study; some students may simply be taking their aggressions online
« First
‹ Previous
41 - 60 of 67
Next ›
Showing 20▼ items per page
Harassment and humiliation take on new forms in Cyberspace. Learn about the consequences, actions and reactions of using cell phones, the Internet and other digital devices to bully one's peers. This unit explores cyberbullying and the offline consequences for online actions. The graphics are Nickelodeon style. A short quiz assesses understanding. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml