SlideShare ist ein Scribd-Unternehmen logo
1 von 62
bullying
any questions?

 write / SMS / tweet your questions and we’ll try and
answer them at the end of the session
add #sc1011 to the tweet
SMS to 0434 xxx xxx
bullying



a couple of examples
Five types of bullying
        physical
         verbal
          social
      psychological
          cyber
Cyber-bullying: can
be anonymous, and
 in bulk, via digital
       media.
introduction


split into 6 groups
how would you deïŹne “bullying”?
see how you’d respond to one of the bullying scenarios
summarise ïŹndings; tweet or SMS them back
where to go?

Year 9-12 Boys - Auditorium
Year 9-12 Girls - Waratah meeting
Year 7-8 Boys - Waratah seminar
Year 7-8 Girls - Banksia meeting
Post-school men - Boronia
Post-school women - Banksia seminar
what did we come up with?



deïŹnition of bullying
Bullying
One person has more power than the
              other.
Bullying
Repeated actions over time
Bullying
Designed to cause the other person harm
              in some way.
What does the Bible
say about bullying?
Peacemakers
Blessed are the peacemakers, for they
     shall be called sons of God.
             Matthew 5:9
Live at peace with
          everyone
If possible, so far as it depends on you, live
              peaceably with all.
                Romans 12:18
when I’m bullied, is it just
     “discipline from God”?
   Heb 12:7 It is for discipline that you have to
endure. God is treating you as sons. For what son
  is there whom his father does not discipline?
Strive for peace with
          everyone
Strive for peace with everyone, and for the
holiness without which no one will see the
                   Lord.
                 Heb 12:14
Wisdom from God is
            peace-able
  17 But the wisdom from above is ïŹrst pure, then peaceable,
gentle, open to reason, full of mercy and good fruits, impartial
and sincere. 18 And a harvest of righteousness is sown in peace
                  by those who make peace.
                         James 3:17-18
A Christian leader can’t
          be a bully
   1 Tim 3:3 not a drunkard, not violent but gentle, not
             quarrelsome, not a lover of money.
Titus 1:7 For an overseer, as God’s steward, must be above
reproach. He must not be arrogant or quick-tempered or a
           drunkard or violent or greedy for gain,
what does a
      peacemaker do?
           not bullying others
acting to stop bullying when you see it.
Cyberbullying
why are there bullies?


people become bullies to get recognition and status with other people.
cyber bullies don’t see the effect their bullying is having on their victim, so it can
escalate much quicker than other types of bullying
social
                                  online            bullies
 friends               sites
                                  games
               SMS
                                            blogs
           phone           you
                                            chat & IM
            email
                     the web     facebook
family                                              strangers
social
                                  online            bullies
 friends               sites
                                  games
               SMS
                                            blogs
           phone           you
                                            chat & IM
            email
                     the web     facebook
family                                              strangers
social
                                  online            bullies
 friends               sites
                                  games
               SMS
                                            blogs
           phone           you
                                            chat & IM
            email
                     the web     facebook
family                                              strangers
social
                                  online            bullies
 friends               sites
                                  games
               SMS
                                            blogs
           phone           you
                                            chat & IM
            email
                     the web     facebook
family                                              strangers
Preventing cyber-bullying


keeping your personal information private
keep your computer safe from viruses
understand what you’re sharing
have a strong password and don’t share it
a password is like a
       toothbrush
Once you’ve shared it, you should never
             use it again.
a strong password


     letters, numbers, characters
     make it memorable to you, but hard to guess
     don’t write it anywhere
     don’t use the same password for every site
privacy settings
     Know your options
Set them the way you want.
facebook
facebook privacy settings


understanding how information is shared on FB
how much can a casual user who isn’t your friend ïŹnd out about you?
if you can understand the privacy settings on facebook, you can understand anything.
account settings
privacy homepage
basic information
proïŹle picture
relationships
education and work
likes and interests
contact information
privacy homepage
application privacy
information through friends
block lists
deactivate
removing a post
ïŹnding you on fb
SMS
SMS bullying

unwelcome messages
sexting
passing notes secretly
harrassment
threats
keeping yourself safe online

have an internet curfew - say, 10pm
keep your home computer in a public space
invite your parents to monitor your internet access (this is a good way to avoid
temptation)
want to keep a diary? keep one on paper.
keeping yourself safe online

don’t mention these kinds of details online
   your school
   any other groups you belong to
   your address, or any other place you’re going to be
don’t invite people you don’t know to meet you ofïŹ‚ine
don’t lie about your age to join facebook before you’re 13.
what to do when you see cyberbullying


tell an adult you trust
leave the area (maybe get a new account)
don’t respond to the remarks online
record the message
block the person
advise the relevant people (the site, your ISP or police)
what to do about physical bullying



know the bullying policy at the place you’re being bullied
get away from the situation
report it to the relevant authority
what to do about social bullying


know what it looks like
don’t participate
don’t ignore it
have the courage to talk to the bully, and let them know that their behaviour is
unacceptable
what to do when you see bullying



if you feel conïŹdent, try and stop what’s happening
report the bullying to the relevant authority
provide whatever comfort you can to the person being bullied.
if you say nothing, you leave the victim with the impression that you approve of the bullying.
Something surprising


a class where there are multiple people being bullied is better for everyone than one where only one
person is bullied (Salmivalli, 2010)
    when only one person is bullied, they assume it’s some fault of theirs that is the issue.
    when multiple people are bullied, it’s easier to see that it is the bullies that are to blame, not
    the victims
everyone suffers from bullying


victims of bullying often suffer long-term changes to their thinking
bullies are more likely to go on to be violent (and in trouble with the police) later in
life
people witnessing bullying will be anxious, wondering when they’ll be next
oh... and it may be illegal

NSW law means that acts of cyberbullying may be breaking a number of laws.

    repeated SMS may be considered stalking

    social media sites may be considered unlawful use of a “wire service”

    there’s even a special law for school-based cyber bullying

    if you’re bullying someone because of race or sexuality, there are libel and viliïŹcation laws that
    could be broken.
Summary


Christians should be peace-makers
Know how to recognise and resolve bullying
Know how to keep yourself safe online
and we’re done.
     David Phillips
  twitter: @cafedave
 http://cafedave.net/

Weitere Àhnliche Inhalte

Ähnlich wie Cyberbullying - surviving life online

Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kidsceiland
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for KidsRedDragon FRG
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyLeslie Witten
 
Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Melissa Halcott
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide WebTony L
 
Safetyquizkids
SafetyquizkidsSafetyquizkids
SafetyquizkidsRandy Rodgers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good Onecassielaut
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyst josephs
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingSerene Yee
 
cyberbullying and life on line
cyberbullying and life on linecyberbullying and life on line
cyberbullying and life on lineanna wood
 
Three Blind Mice
Three Blind MiceThree Blind Mice
Three Blind Micemlegan31
 
Life after school conference
Life after school conferenceLife after school conference
Life after school conferenceRay Brannon
 
Esafety Quiz
Esafety QuizEsafety Quiz
Esafety Quizguestbe8c8f
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 

Ähnlich wie Cyberbullying - surviving life online (20)

Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Electronic safety grade 2 3 1
Electronic safety grade 2 3 1
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Safetyquizkids
SafetyquizkidsSafetyquizkids
Safetyquizkids
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
cyberbullying and life on line
cyberbullying and life on linecyberbullying and life on line
cyberbullying and life on line
 
Three Blind Mice
Three Blind MiceThree Blind Mice
Three Blind Mice
 
Life after school conference
Life after school conferenceLife after school conference
Life after school conference
 
EsafetyQuiz
EsafetyQuizEsafetyQuiz
EsafetyQuiz
 
Esafety Quiz
Esafety QuizEsafety Quiz
Esafety Quiz
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 

KĂŒrzlich hochgeladen

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

KĂŒrzlich hochgeladen (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Cyberbullying - surviving life online

  • 2. any questions? write / SMS / tweet your questions and we’ll try and answer them at the end of the session add #sc1011 to the tweet SMS to 0434 xxx xxx
  • 4. Five types of bullying physical verbal social psychological cyber
  • 5. Cyber-bullying: can be anonymous, and in bulk, via digital media.
  • 6. introduction split into 6 groups how would you deïŹne “bullying”? see how you’d respond to one of the bullying scenarios summarise ïŹndings; tweet or SMS them back
  • 7. where to go? Year 9-12 Boys - Auditorium Year 9-12 Girls - Waratah meeting Year 7-8 Boys - Waratah seminar Year 7-8 Girls - Banksia meeting Post-school men - Boronia Post-school women - Banksia seminar
  • 8. what did we come up with? deïŹnition of bullying
  • 9. Bullying One person has more power than the other.
  • 11. Bullying Designed to cause the other person harm in some way.
  • 12. What does the Bible say about bullying?
  • 13. Peacemakers Blessed are the peacemakers, for they shall be called sons of God. Matthew 5:9
  • 14. Live at peace with everyone If possible, so far as it depends on you, live peaceably with all. Romans 12:18
  • 15. when I’m bullied, is it just “discipline from God”? Heb 12:7 It is for discipline that you have to endure. God is treating you as sons. For what son is there whom his father does not discipline?
  • 16. Strive for peace with everyone Strive for peace with everyone, and for the holiness without which no one will see the Lord. Heb 12:14
  • 17. Wisdom from God is peace-able 17 But the wisdom from above is ïŹrst pure, then peaceable, gentle, open to reason, full of mercy and good fruits, impartial and sincere. 18 And a harvest of righteousness is sown in peace by those who make peace. James 3:17-18
  • 18. A Christian leader can’t be a bully 1 Tim 3:3 not a drunkard, not violent but gentle, not quarrelsome, not a lover of money. Titus 1:7 For an overseer, as God’s steward, must be above reproach. He must not be arrogant or quick-tempered or a drunkard or violent or greedy for gain,
  • 19. what does a peacemaker do? not bullying others acting to stop bullying when you see it.
  • 21. why are there bullies? people become bullies to get recognition and status with other people. cyber bullies don’t see the effect their bullying is having on their victim, so it can escalate much quicker than other types of bullying
  • 22. social online bullies friends sites games SMS blogs phone you chat & IM email the web facebook family strangers
  • 23. social online bullies friends sites games SMS blogs phone you chat & IM email the web facebook family strangers
  • 24. social online bullies friends sites games SMS blogs phone you chat & IM email the web facebook family strangers
  • 25. social online bullies friends sites games SMS blogs phone you chat & IM email the web facebook family strangers
  • 26. Preventing cyber-bullying keeping your personal information private keep your computer safe from viruses understand what you’re sharing have a strong password and don’t share it
  • 27. a password is like a toothbrush Once you’ve shared it, you should never use it again.
  • 28. a strong password letters, numbers, characters make it memorable to you, but hard to guess don’t write it anywhere don’t use the same password for every site
  • 29. privacy settings Know your options Set them the way you want.
  • 31. facebook privacy settings understanding how information is shared on FB how much can a casual user who isn’t your friend ïŹnd out about you? if you can understand the privacy settings on facebook, you can understand anything.
  • 40.
  • 46.
  • 49.
  • 50. SMS
  • 51. SMS bullying unwelcome messages sexting passing notes secretly harrassment threats
  • 52. keeping yourself safe online have an internet curfew - say, 10pm keep your home computer in a public space invite your parents to monitor your internet access (this is a good way to avoid temptation) want to keep a diary? keep one on paper.
  • 53. keeping yourself safe online don’t mention these kinds of details online your school any other groups you belong to your address, or any other place you’re going to be don’t invite people you don’t know to meet you ofïŹ‚ine don’t lie about your age to join facebook before you’re 13.
  • 54. what to do when you see cyberbullying tell an adult you trust leave the area (maybe get a new account) don’t respond to the remarks online record the message block the person advise the relevant people (the site, your ISP or police)
  • 55. what to do about physical bullying know the bullying policy at the place you’re being bullied get away from the situation report it to the relevant authority
  • 56. what to do about social bullying know what it looks like don’t participate don’t ignore it have the courage to talk to the bully, and let them know that their behaviour is unacceptable
  • 57. what to do when you see bullying if you feel conïŹdent, try and stop what’s happening report the bullying to the relevant authority provide whatever comfort you can to the person being bullied. if you say nothing, you leave the victim with the impression that you approve of the bullying.
  • 58. Something surprising a class where there are multiple people being bullied is better for everyone than one where only one person is bullied (Salmivalli, 2010) when only one person is bullied, they assume it’s some fault of theirs that is the issue. when multiple people are bullied, it’s easier to see that it is the bullies that are to blame, not the victims
  • 59. everyone suffers from bullying victims of bullying often suffer long-term changes to their thinking bullies are more likely to go on to be violent (and in trouble with the police) later in life people witnessing bullying will be anxious, wondering when they’ll be next
  • 60. oh... and it may be illegal NSW law means that acts of cyberbullying may be breaking a number of laws. repeated SMS may be considered stalking social media sites may be considered unlawful use of a “wire service” there’s even a special law for school-based cyber bullying if you’re bullying someone because of race or sexuality, there are libel and viliïŹcation laws that could be broken.
  • 61. Summary Christians should be peace-makers Know how to recognise and resolve bullying Know how to keep yourself safe online
  • 62. and we’re done. David Phillips twitter: @cafedave http://cafedave.net/

Hinweis der Redaktion

  1. \n
  2. \n
  3. 7:35-7:50\n(examples from my life)\n\nCyberbullying tends to peak around 13-14yo. An angry sibling could use your fb password to offend all your friends in one hit! \nNetalert study 2007: 16% of 13-17yo have been bullied online. Aust covert bullying study 2009: 10% of years 4-7. \nUpcoming study: 20% of 12-18yo have been victims of cyber bullying, 13% have bullied. Girls and boys c-bully at equivalent rates. \nOnly 7% of those bullied tell a parent, 10% a teacher, 60% a friend. Worried that if they tell, they will lose their online devices.\n
  4. \n
  5. http://www.communicatejesus.com/2010/06/so-many-ways-to-communicate/\nvia\nhttp://www.communicatejesus.com/2010/07/resources-how-to-protect-our-children-online/\n\n
  6. 7:30-7:45pm\n
  7. \n
  8. 8:40-8:55\n
  9. http://www.graphicshunt.com/images/cat_bullying_another_cat-14332.htm\n
  10. http://www.graphicshunt.com/images/cat_bullying_another_cat-14332.htm\n
  11. http://www.graphicshunt.com/images/cat_bullying_another_cat-14332.htm\n
  12. 7:55-8:25 Main Session\nhttp://www.wesleychapel.org/OurMinistries/WesleyWednesdays/Weswedclassdetailinfo/tabid/119/Default.aspx\n
  13. image found via http://kottke.org/10/11/birds-still-angry\n
  14. http://www.flickr.com/photos/alicepopkorn/4883065712/\n
  15. http://www.flickr.com/photos/duaneschoon/3935553091/\nbeing bullied doesn’t mean that God has abandoned you.\ngoing through a time of suffering can strengthen your character, but this doesn’t mean you need to put up with bullying.\n\n
  16. http://www.flickr.com/photos/pmtorrone/23362393/\n\n
  17. Wisdom from God is about making peace - the reward of people living God’s way is that they get along. \nBullying gets in the way of this.\nhttp://www.flickr.com/photos/florin_mogos/2523984446/\n\n
  18. http://www.flickr.com/photos/andrewrennie/5207163798/\n\nIf you’re violent or a bully, you can’t be a leader.\nIf you see a Christian leader involved in bullying, this is something that will need to be resolved.\n
  19. http://www.flickr.com/photos/trixer/3531445744/sizes/l/in/photostream/\n
  20. http://highdefinitionphotosandwallpapers.blogspot.com/2010/12/hd-tron-legacy-hd-tron-legacy-pictures.html\n\n
  21. It’s seeking something good in a destructive way.\n\n
  22. Your digital life has touchpoints when you go to any number of places, or devices\n
  23. When the people you have contact with are family and friends, your digital life is a safe, encouraging place.\n
  24. but it only takes a little bit of bullying before it starts to feel like a hostile, unpleasant place\n
  25. Worse, strangers with bad intentions can use the information that they find from your digital life to find you in real life.\n
  26. \n
  27. http://www.flickr.com/photos/ektogamat/2952129288/\n\nAn angry sibling could use your password to offend all your siblings in 10 minutes!\n
  28. \n
  29. http://au.reachout.com/find/articles/cyberbullying\n
  30. http://st-eutychus.com/2010/visualising-facebook-friendships-around-the-globe/\nhttp://www.facebook.com/note.php?note_id=469716398919&id=9445547199\n\n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. Some people go so far as to deactivate their FB profile when they’re not logged in. This is extreme, but would work to avoid a lot of potential cyberbullying attacks.\n
  46. \n
  47. \n
  48. \n
  49. \n
  50. http://www.flickr.com/photos/catmachine/3826156707/sizes/o/in/photostream/\nthis was drawn in 1974\n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. Bullying and the peer group: A review Christina Salmivalli ⁎\nAggression and Violent Behavior 15 (2010), pp112-120\nChristina Salmivalli\n\nhttp://www.sciencedirect.com/science?_ob=PublicationURL&_tockey=%23TOC%236059%232010%23999849997%231619119%23FLA%23&_cdi=6059&_pubType=J&_auth=y&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=6b146d2d95e39b07e71f3bdd6acae4a5\n\n
  59. http://www.bullying.com.au/school-bullying/\nhttp://www.ncab.org.au/Page.aspx?ID=92\n\n
  60. http://eprints.qut.edu.au/31602/1/c31602.pdf\nhttp://www.caslon.com.au/stalkingnote.htm\nhttp://www.caslon.com.au/cyberbullyingnote6.htm\n\nhttp://au.answers.yahoo.com/question/index?qid=20100603030044AAfuwHY\n
  61. \n
  62. \n