Search Results (15)

View
Selected filters:
  • Cyberbullying
Be Internet Awesome With Google
Conditions of Use:
Remix and Share
Rating

This website is dedicated to teaching people how to be ethical and efficient users of the Internet. It includes games, activities, lessons, parent guides, posters and other programs that could be used to teach students how to safely and effectively use the Internet.

Subject:
Applied Science
Education
Social Science
Material Type:
Activity/Lab
Game
Interactive
Lesson Plan
Reading
Teaching/Learning Strategy
Author:
MSDE Admin
andrew robertson
Date Added:
11/29/2018
Bully Proof Your Child: Become a Solution-Coach
Rating

Nicholas Carlisle, Executive Director of No Bully, works with parents of Alvarado Elementary School in San Francisco, California, to share information about bullying and to devise and practice strategies for bully-proofing their children.Mr. Carlisle begins by defining the repetitive nature of bullying and looks specifically at four different kinds of bullying: physical, verbal, social/relational, and cyberbullying. Identifies best practices and preventative measures to help prevent bullying.Mr. Broecker, principal, tells parents about a group at the school focused on addressing the subject of bullying at school. He urges parents to join teachers and staff at Alvarado Elementary working with a group called PEACE (Practicing Empathy and Caring with Everyone).Addressing the larger question of how parents might bully-proof their children is the focus of much of the discussion. Mr. Carlisle asks parents to become a solution-coach, balancing both the use of empathy and setting limits and establishing consequences so that students are better prepared to deal with bullying in their lives.In small groups, parents practice what they have heard by discussing bullying scenarios and how they would help their child in specific bullying situations. This is followed by group discussion where parents share ideas for certain scenarios.

Subject:
Arts and Humanities
Material Type:
Lesson Plan
Teaching/Learning Strategy
Provider:
Teaching Channel
Provider Set:
Teaching Channel
Date Added:
02/26/2013
Change Attitudes Toward Bullying: Be An Ally
Rating

Over the course of four years, Longfellow Middle School has changed its message to students from ŇDont be a bully!Ó to ŇBe an ally!Ó in an effort to change student attitudes toward bullying. Activities during the month of October are aimed at changing the school climate incrementally, one student at a time.October kicks off an anti-bullying campaign that focuses on the positive behaviors exhibited by student allies in combating the difficult situation of bullying. An eighth grade leadership team conducts a workshop with classes throughout the school focusing on the different roles of bullies, allies and bystanders and how each contributes to a given situation. Using skits and small group discussions, students share experiences and brainstorm possible actions that will reduce or stop instances of bullying.When students are not comfortable intervening, they are encouraged to get help from an adult. In these instances, counselors conduct mediation with involved students and seek to define specific roles as allies instead of contributing to a given problem. Mediation is followed up by a written agreement and the counselor checks in with each student to monitor the situation.

Subject:
Arts and Humanities
Material Type:
Lesson Plan
Teaching/Learning Strategy
Provider:
Teaching Channel
Provider Set:
Teaching Channel
Date Added:
02/26/2013
Cyberbullying
Conditions of Use:
Remix and Share
Rating

The objective of this unit is for students to be able to evaluate cyberbullying and know what to do if they witness it and or are a victim. We are going to touch on the bystander effect, THINK, the definition of cyberbullying, the signs of someone being cyber bullied, and how to handle cyberbullying in smart and effective ways. We want the students to be aware of the issue and know how to help and especially prevent it if they can by being smart digital citizens. This lesson will also show how to promote awareness of cyberbullying and how to show people the negative effects of it. This lesson will help the students develop an understanding of the issue and know many components of it.

Subject:
Arts and Humanities
Material Type:
Lesson Plan
Author:
Katie Jacobsen
Date Added:
12/03/2017
Cyberbullying And Imapcts of Cyberbullying
Rating

CYBER BULLING

Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber bullying crosses the line into unlawful or criminal behavior.

The most common places where cyber bullying occurs are:

Social Media, such as Facebook, Instagram, Snapchat, and Twitter
SMS (Short Message Service) also known as Text Message sent through devices
Instant Message (via devices, email provider services, apps, and social media messaging features)
Email.

WHERE IS CYBERBULLYING OCCURING ?

Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Research has identified basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications.

Cyberbullying involves repeated behavior with intent to harm.
Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group)
Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.

Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior, although not all cyberbullies maintain their anonymity. Text or instant messages and emails between friends can also constitute cyber bullying if what is said or displayed is hurtful to the participants.
The recent use of mobile applications and rise of smartphones have yielded to a more accessible form of . It is expected that cyber bullying via these platforms will be associated with bullying via mobile phones to a greater extent than exclusively through other more stationary internet platforms. In addition, the combination of cameras and Internet access and the instant availability of these modern smartphone technologies yield themselves to specific types of cyber bullying not found in other platforms. It is likely that those cyber bullied via mobile devices will experience a wider range of cyber bullying types than those exclusively bullied elsewhere.

Subject:
Computer Science
Material Type:
Homework/Assignment
Author:
Mounika
Date Added:
11/12/2017
Cyberbullying: What's Crossing the Line?
Rating

Middles school Social Studies teacher using contemporary issues to incorporate ELA CCSS into a lesson about cyberbullying. Students use factual information, a video and two case studies to consider and analyze different perspectives in specific cyberbullying incidents.Small group discussions allow students to both inform and support their opinions as they formulate ideas about the impact of the bullying and decisions resulting from particular incidents. Students grapple with different possibilities and consider the different perspectives of those involved in and affected by the bullying. Beginning first with students' ideas about bullying, Amy tries to find consensus in understanding when a line 'has been crossed' and actions become bullying. The class then watches a video to understand the impact that bullying has on one individual and discusses possible actions and outcomes for this situation. As students begin to grapple with different perspectives and ideas, they are asked to examine two case studies and answer questions that reflect multiple viewpoints about these two situations. Students reflect on the emotion involved when discussing bullying and recognize both the complexity and potential severity of the issue.

Subject:
Arts and Humanities
Material Type:
Lesson Plan
Teaching/Learning Strategy
Provider:
Teaching Channel
Provider Set:
Teaching Channel
Date Added:
02/26/2013
Growing Up Digital-Provided by Baltimore County Public Schools
Conditions of Use:
Remix and Share
Rating

This website is a comprehensive look at digital citizenship for K-12 students, parents and teachers. It covers a wide variety of topics including: online security, online relationships and cyberbullying, digital footprint, digital citizenship, the use of copyrighted information and much more.

Subject:
Education
Material Type:
Activity/Lab
Diagram/Illustration
Student Guide
Author:
MSDE Admin
andrew robertson
Date Added:
07/11/2018
Growing up Digital- Provided by Baltimore County Public Schools
Conditions of Use:
Remix and Share
Rating

This website is a comprehensive set of resources for students K-12, parents and teachers. The topics include online security, digital relationships and cyberbullying, digital footprint, digital citizenship, student data, copyright and maintaining a healthy balance of digital exposure.

Subject:
Applied Science
Education
Material Type:
Diagram/Illustration
Reading
Student Guide
Teaching/Learning Strategy
Author:
MSDE Admin
andrew robertson
Date Added:
07/11/2018
Psychology
Conditions of Use:
No Strings Attached
Rating

Psychology is designed to meet scope and sequence requirements for the single-semester introduction to psychology course. The book offers a comprehensive treatment of core concepts, grounded in both classic studies and current and emerging research. The text also includes coverage of the DSM-5 in examinations of psychological disorders. Psychology incorporates discussions that reflect the diversity within the discipline, as well as the diversity of cultures and communities across the globe.Senior Contributing AuthorsRose M. Spielman, Formerly of Quinnipiac UniversityContributing AuthorsKathryn Dumper, Bainbridge State CollegeWilliam Jenkins, Mercer UniversityArlene Lacombe, Saint Joseph's UniversityMarilyn Lovett, Livingstone CollegeMarion Perlmutter, University of Michigan

Subject:
Social Science
Psychology
Material Type:
Full Course
Provider:
Rice University
Provider Set:
OpenStax College
Date Added:
02/14/2014
Responsible Use of Technology Tools and Online Resources
Conditions of Use:
Remix and Share
Rating

Rowena S. Disini from the University of the Philippines Open University (UPOU) lectures on responsible use of technology tools (academic, social and lesson planning) and online resources. She also investigates cyberbullying and cyber threats and calls for institutions to have Acceptable Use Policies.

Subject:
Educational Technology
Material Type:
Lecture
Author:
Rowena S. Disini
Date Added:
06/08/2017