The Oregon Department of Education released this online and offline lesson adaptation, as a part of the Distance Learning for All Erin's Law Toolkit for Districts. The lesson is an Advocates for Youth Rights, Respect, Responsibility (3Rs) Third Grade lesson entitled Being Smart Staying Safe Online. This lesson focuses on the core sexuality education topics: Healthy & Unhealthy Relationships, Bullying and Abuse Prevention, and Seeking Help, which are foundational to healthy relationships and bullying, violence, and child abuse prevention education. 3Rs Authors: Elizabeth Schroeder EdD MSW, Eva Goldfarb PhD, Nora Gelperin MEd
I made 5 lessons about cybersafety and cyberbullying that I used for my Girl Scout Gold Award project. These lessons incorporate a wide range of activities such as discussions, interactive games, poster making, and watching videos. I have also included scenarios about cyberbullying which should prompt some discussions about the topic. Each lesson takes about 30-45 minutes to teach and starts with an essential question which is what the students should be able to answer at the end of the lesson. I made these lessons because the world is becoming more and more technology-based and with that more and more kids are getting on the internet at a younger age.
This website is dedicated to teaching people how to be ethical and efficient users of the Internet. It includes games, activities, lessons, parent guides, posters and other programs that could be used to teach students how to safely and effectively use the Internet.
This lesson helps children to recognize that it is essential to tell a trusted adult if something online makes them feel angry, sad, or scared.
Students learn that other people can sometimes act like bullies when they are online. They will explore what cyberbullying means and what they can do when they encounter it. After reading a scenario about mean online behavior, students discuss what cyberbullying is, how it can make people feel, and how to respond. Finally, they use their knowledge to create a simple tip sheet on cyberbullying in their journal.
Students consider that while they are enjoying their favorite websites they may encounter messages from other kids that can make them feel angry, hurt, sad, or fearful. They explore ways to handle cyberbullying and how to respond in the face of upsetting language online.
Students discuss all the ways they use technology for communication and explore the similarities and differences between in-person and online communication. Students then brainstorm ways to respond to cyberbullying.
For more information, please visit: [r common-sense-media-power-of-words]
The objective of this unit is for students to be able to evaluate cyberbullying and know what to do if they witness it and or are a victim. We are going to touch on the bystander effect, THINK, the definition of cyberbullying, the signs of someone being cyber bullied, and how to handle cyberbullying in smart and effective ways. We want the students to be aware of the issue and know how to help and especially prevent it if they can by being smart digital citizens. This lesson will also show how to promote awareness of cyberbullying and how to show people the negative effects of it. This lesson will help the students develop an understanding of the issue and know many components of it.
Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber bullying crosses the line into unlawful or criminal behavior.
The most common places where cyber bullying occurs are:
Social Media, such as Facebook, Instagram, Snapchat, and Twitter
SMS (Short Message Service) also known as Text Message sent through devices
Instant Message (via devices, email provider services, apps, and social media messaging features)
WHERE IS CYBERBULLYING OCCURING ?
Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Research has identified basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications.
Cyberbullying involves repeated behavior with intent to harm.
Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group)
Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.
Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior, although not all cyberbullies maintain their anonymity. Text or instant messages and emails between friends can also constitute cyber bullying if what is said or displayed is hurtful to the participants.
The recent use of mobile applications and rise of smartphones have yielded to a more accessible form of . It is expected that cyber bullying via these platforms will be associated with bullying via mobile phones to a greater extent than exclusively through other more stationary internet platforms. In addition, the combination of cameras and Internet access and the instant availability of these modern smartphone technologies yield themselves to specific types of cyber bullying not found in other platforms. It is likely that those cyber bullied via mobile devices will experience a wider range of cyber bullying types than those exclusively bullied elsewhere.
This website is a comprehensive look at digital citizenship for K-12 students, parents and teachers. It covers a wide variety of topics including: online security, online relationships and cyberbullying, digital footprint, digital citizenship, the use of copyrighted information and much more.
This website is a comprehensive set of resources for students K-12, parents and teachers. The topics include online security, digital relationships and cyberbullying, digital footprint, digital citizenship, student data, copyright and maintaining a healthy balance of digital exposure.
Psychology is designed to meet scope and sequence requirements for the single-semester introduction to psychology course. The book offers a comprehensive treatment of core concepts, grounded in both classic studies and current and emerging research. The text also includes coverage of the DSM-5 in examinations of psychological disorders. Psychology incorporates discussions that reflect the diversity within the discipline, as well as the diversity of cultures and communities across the globe.Senior Contributing AuthorsRose M. Spielman, Formerly of Quinnipiac UniversityContributing AuthorsKathryn Dumper, Bainbridge State CollegeWilliam Jenkins, Mercer UniversityArlene Lacombe, Saint Joseph's UniversityMarilyn Lovett, Livingstone CollegeMarion Perlmutter, University of Michigan
Rowena S. Disini from the University of the Philippines Open University (UPOU) lectures on responsible use of technology tools (academic, social and lesson planning) and online resources. She also investigates cyberbullying and cyber threats and calls for institutions to have Acceptable Use Policies.