2. Who is the intended Audience?
• Cyber Bullying: A Prevention Curriculum for Grades
6-12 is designed for middle school and high school
students.
• Cyber Bullying: A Prevention Curriculum for Grades
3-5 is designed for elementary school students.
• This program would fit well within a health
education, communications, technology, or general
life skills curriculum.
Creighton 2
3. What is Cyber Bullying: A Prevention
Curriculum for Grades 6-12 and 3-5?
Cyber Bullying: A Prevention Curriculum for Grades 6-
12 and Grades 3-5; is a program that deals with
attitudes and behaviors associated with cyber
bullying.
* Grades 6-12: consists of eight-sessions
* Grades 3-5: consists of five-sessions
Creighton 3
4. What are the Goals of the Program?
• Raise students’ and parents’ awareness of what cyber
bullying is and why it is so harmful.
• Equip students with the skills and resources to treat
each other respectfully when they use cyber
technologies; and help students know how to get help
if they, or others they know, are being cyber bullied.
• Equip students with the skills to use cyber technologies
in positive ways. Creighton 4
5. Is this a Research-Based Program?
• Cyber Bullying is not a research-based program, but
it is based on the latest research in prevention and
on the topic of cyber bullying.
• Many of the lesson activities are patterned after
prevention models that research has shown to be
effective in decreasing negative student behavior,
and increasing student attitudes toward refraining
from negative behaviors.
Creighton 5
6. Curriculum Scope & Sequence
• Session 1:
What is Bullying?
• Define Bullying
• Identify examples of
bullying.
• Identify the roles students
play in the “Bully position”
• Identify rules against
bullying
Creighton 6
7. Curriculum Scope & Sequence
• Session 2:
What is Cyber Bullying?
• Define cyber bullying
• Identify the technologies
used in cyber bullying.
• Identify cyber bullying
situations.
Creighton 7
8. Curriculum Scope & Sequence
• Session 3:
How Does Cyber Bullying
Affect People?
• Identify the effects of cyber
bullying on the child who is
bullied, the bystanders, and
the child(ren) who bully.
• Identify how to use
technology in a positive
way.
Creighton 8
9. Curriculum Scope & Sequence
• Session 4:
Why Do People Cyber Bully
Others?
• Identify reasons why people
think they can get away
with cyber bullying others.
• State why they think cyber
bullying is unacceptable.
Creighton 9
10. Curriculum Scope & Sequence
• Session 5:
How Should You React to
Cyber Bullying?
• Identify what steps to take if
they are cyber bullied.
• Identify what steps to take if
they are cyber bullied.
• Identify what steps to take if
they know that someone
else is being cyber bullied.
Creighton 10
11. Curriculum Scope & Sequence
• Session 6:
Creating a Positive Cyber Site
Part I
• Describe how some social
networking sites began.
• Explain what social
networking sites do to curb
abuse.
• Describe the steps in
planning a social networking
site.
Creighton 11
12. Curriculum Scope & Sequence
• Session 7:
Creating a Positive Cyber Site
Part II
• Describe the components of
an effective presentation.
• Identify how they personally
will commit themselves to
stop or prevent cyber
bullying.
Creighton 12
13. Curriculum Scope & Sequence
• Session 8:
Creating a Positive Cyber Site
Part III
• Make a public commitment
to preventing cyber
bullying.
• Identify positive ways to use
social networking Web sites.
Creighton 13
14. Evaluation Process for Effectiveness
• Process Evaluation: examines whether the prevention
was carried out as planned.
• Impact Assessment: determine whether the
prevention has brought about a change.
• Outcome Evaluation: this is where the outcomes are
measured to see if the prevention was successful.
* Information gather through surveysCreighton 14
17. Cyber Bullying
• Describes forms of bullying using electronic devices
such as mobile phones and computers.
• Instead of bullying happening face-to-face, it
happens through the use of technology.
• It peaks around the end of middle school and the
beginning of high school.
Creighton 17
18. Forms of Cyber Bullying:
• Emails
• Text messaging
• Chat
• Instant messaging
• Websites
• Online Games
Creighton 18
19. My Space
• You join My space and create
a profile
• You invite your friends to join
My Space and search My
Space for your friends who
are already members. These
people become part of your
initial “Friend Space.”
• All of the people in your
friends’ Friend Space become
part of your network. You
now have connections to
more people than you did 15
minutes ago. Creighton 19
20. Online Social Networking and Gaming
• Webkins (younger children)
• My Space
• Facebook
• Bebo
• Second Life
Creighton 20
21. Second Life Social Networking
• Users pretend to be whomever or
whatever they want to be
• It has a virtual economy
• It is a complex environment filled
with potential risks and rewards.
Creighton 21
22. Signs of Being Cyber Bullied
• Unexpectedly stops using the computer
• Appears nervous and jumpy when receiving Instant
Messages and Emails
• Uneasy about going to school
• Appears angry, depressed, or frustrated when using
the computer
• Becomes abnormally withdraw from usual friends.
Creighton 22
23. Signs of Being the Cyber Bully
• Quickly closes screen or program when you walk by
• Uses the computer at all hours of the night
• Gets usually upset when he or she can’t get a computer
• Laughing excessively when using the computer
• Uses multiple online accountsCreighton 23
24. Rules against Cyber Bullying
• We will not cyber bully others.
• We will try to help students who are cyber bullied.
• We will include students who are easily left out.
• When we know somebody is being cyber bullied,
we will tell an adult at school and an adult at home.
Creighton 24
25. Thank you very much for your time & attention
Creighton 25
Hinweis der Redaktion
School Counselors could offer Cyber Bullying as part of a support group, counseling or education program, or it could be used in after-school, community, youth enrichment, or faith-based youth programs.
I was unable to locate any actual evaluation done on this prevention. However, based on choices of evaluations I selected the following three evaluation processes I felt would best examine and determine the effectiveness of the prevention. They are :
Now I will go through a mock session of Cyber Bullying Session 2
What is the definition of Cyber Bullying? Well it’s the,
If you notice in comparison to standard bullying the difference is added technology usage which is common in the youth everyday of operation.
So lets look at the typical website set up such as: My space
These are the most commons websites/social networks available such as:
And basically this is actually taking place while you think you are adding someone you think your really know.
These are some of the signs to sense a child is being bullied
These are some of the signs to sense the child is the bully
So repeat theses after me, please….
That’s the end of my presentation. I hope it was helpful for all of you to think of or refer to this program for a prevention method to ‘STOP Cyber Bullying.
Thank you