You are on page 1of 6

TITLU

Casey loves playing games on his Xbox console,


especially since it allows him to link up to and compete
with other players across the world on Xbox Live. He
recently met one teenager in Russia named Boris while
playing Call of Duty: Advanced Warfare, and they
became fast friends because both enjoyed and excelled
at it. Together, they became almost unbeatable
whenever they competed as a team against other teams
online. At some point, though, Casey told Boris he had
found a better gaming partner and didnt want to play
with Boris anymore. Boris was outraged that he was
being dumped as a gaming partner for someone else,
and he began to tell other people on the gaming
network that Casey sucked at all video games and no
one should ever be his partner unless they wanted to
lose really badly. Soon after these statements started
circulating, Caseys new gaming partner dumped him,
and everyone else on the network started to reject him
(which was particularly crushing because online gaming
was a safe haven in his difficult life). When coupled with
recollections of other instances of rejection in his life,
this experience began to make Casey feel completely
hopeless. He then started to express suicidal intentions
to his sister.

WHAT IS
CYBERBULLYIG

Cyberbullyingistheactof
harmingorharassingvia
information technology
networksinarepeatedand
deliberatemanner.
AccordingtoU.S.Legal
Definitions,"cyber-bullying
couldbelimitedtoposting
rumorsorgossipsabouta
personintheinternet
bringingabouthatredin
othersminds;oritmaygo
totheextentofpersonally
identifyingvictimsand
publishingmaterials
severelydefamingand
humiliatingthem."[1]
AcrossEuropetheaverage
6%ofthechildren(916
yearsold)havebeenbullied
andonly3%ofthem
confessedtobeabully
(Hasebrinketal.,2011).
However,inanearlier
publicationofHasenbrinket
al.(2009),reportingonthe
resultsfromametaanalysis
fromEuropeanUnion
countries,theauthors
estimated(viamedian
results)thatapproximately
18%ofEuropeanyoung
peoplehadbeen
"bullied/harassed/stalked"
viatheinternetandmobile
phones.Cyber-harassment
ratesforyoungpeople
acrosstheEUmember
statesrangedfrom10%to
52%.Thedecreasing
numberscancausedby
developingincreasingly
specificmethods,dividing
thetasksintodifferent
variables.

TITLU

Can this example really be characterized as cyberbullying?

How would you handle this as a school administrator?

What should his sister do and how can schools equip her to respond
effectively to Caseys problems?

Karen is a very devout teenager who leads a prayer


meeting every morning by the high school flag pole. Many
boys and girls are simply drawn to Karen as a friend
because of her sweet nature and hopeful innocence. Other
girls in her school, however, feel threatened by Karens
piety and commitment to holy living, and they begin to
drum up ideas to expose her as a fraud. Specifically, they
begin to spread rumors via Instagram that Karen is
sleeping around with the boys track team. Karen is
alerted to the online rumors by a close friend and is
heartbroken. She tells her teachers and pastor, who then
contact the school administration.

What would

you do if you were the principal in this situation?

What would you do if you were Karen?

What would you do if you were Karens close friend and really
wanted to help?

How could those who spread the rumors understand how hurtful
their actions were?

TITLU

TITLU

WHAT TO DO

LEGISLATION

Complete the diagram below with what


you think someone which is cyberbullyed

1. EducateSincethe1990s,theUnitedKingdomand
yourself. To prevent

otherEuropeancountrieshavebeen
cyberbullying
from occurring you must

workingtosolveworkplacebullyingsince

understand
exactly what it is. Research
thereisnolegislationregulating

cyberbullying.Thepervasivenatureof
what constitutes
cyberbullying, as well as

technologyhasmadetheactofbullying

how and where


it is most likely to occur.
onlinemucheasier.A24-hourinternet

connectiongivesbulliesaneverending
Talk to your
friends about what they are
opportunitytofindandbullyvictims.

seeing andEmployersintheEuropeanUnionhave
experiencing.

morelegalresponsibilitytotheir
2. Protect employeesthanothercountries.Since
your password. Safeguard your

employersdonottheabilitytofireorhire
anemployeeatwilllikeintheUnited
from prying
eyes. Never leave passwords
States,employersinEuropeareheldtoa
highstandardinhowtheiremployeesare
or other identifying
information where
treated.TheFrameworkAgreementon
others canHarassmentandViolenceatWorkisa
see it. Also, never give out this
lawthatpreventsbullyingoccurringinthe
information
to anyone, even your best
workplaceandholdsemployers
friend. If others
know it, take the time to
accountableforprovidingfairworking
conditionsr.Lawyerspursuing
change it now!
cyberbullyingcasesuseTheOrdinance
onVictimizationatWorklaw,sincethey
3. Keep photos PG. Before posting or
arenotanylawsspecificallycondemning
sending that
sexy image of yourself,
cyberbullying.
password and other private information

should do

consider ifIn1993,SwedenwasthefirstEuropean
its something you would want

Unioncountrytohavealawagainst
your parents,
grandparents, and the rest of
cyberbullying.TheOrdinanceon

the world to
see. Bullies can use this
VictimizationatWorkprotectedvictims
picture as from"recurrentreprehensibleordistinctly
ammunition to make life

negativeactionswhicharedirectedwhich

miserable aredirectedagainstindividualemployees
for you.

inanoffensivemannerandcanresultin
4. Never open
unidentified or unsolicited
thoseemployeesbeingplacedoutside

theworkplacecommunity".In2002,
FrancepassedtheSocialModernization
text messages,
Facebook messages, etc.)
Law,whichaddedconsequencestothe
FrenchLaborCodeforcyberbullyingsuch
from people you dont know, or from
asholdingemployersaccountablefor
known bullies.
Delete them without
theirinvolvementinharassment.The
legislationstates,"theemployercanbe
reading. They could contain viruses that
heldaccountableifitisdeemedbycourt
automatically
infect your device if opened.
oflawthattheconductdefilethe
employeeemotionallyorphysicalhealth
Also never click on links to pages that are
inanymanner".TheUnitedKingdom
sent from doesnothaveanti-bullyinglegislation.
someone you dont know. These
However,itdoeshavetheProtection
too could contain a virus designed to
FromHarassmentAct,ananti-stalking
collect your
personal or private
law.TheUnitedKingdomcourtshave
usedthislegislationinbullyingcases.In
information.
2007,theEuropeanUniondevelopedthe
FrameworkAgreementonHarassment
5. Log out of online accounts. Dont save
andViolenceatWork.Thelawdefines
passwordstheresponsibilitiesofanemployersuch
in form fields within web sites
asprotectinghisorheremployeesfrom
or your web browser for convenience, and
bulliesinaworkenvironmentandthe
dont stay psychologicalpainavictimfacesfrom
logged in when you walk away
bulliesduringbusinesshours.
from the computer or cell phone. Dont
messages. Never open messages (emails,

give anyone even the slightest chance to

you forget to log out of Facebook when


using the computer at the library, the next

TITLU

person who uses that computer could get


into your account and cause significant
problems for you.

WHAT TO DO

6. Pause before you post. Do not


post anything that may compromise
your reputation. People will judge
you based on how you appear to
them online. They will also give or
deny you opportunities (jobs,
scholarships, internships) based on
this.
7. Raise awareness. Start a
movement, create a club, build a
campaign, or host an event to bring
awareness to cyberbullying. While
you may understand what it is, its
not until others are aware of it too
that we can truly prevent it from
occurring.
8. Setup privacy controls. Restrict
access of your online profile to
trusted friends only. Most social
networking sites like Facebook and
Google + offer you the ability to
share certain information with
friends only, but these settings must
be configured in ordered to ensure
maximum protection.
9. Google yourself. Regularly

Lets play:

search your name in every major

all participants must write the


script of an online aggression .
Sheets are folded and randomly
draw one of them. Discuss whether
it is an act of cyberbulling or not. If
the answer is affirmative, role play
scenario, game participants
developing methods of intervention

search engine (e.g., Google, Bing,


Yahoo). If any personal information
or photo comes up which may be
used by aggressors to target you,
take action to have it removed
before it becomes a problem.
10. Dont be a cyberbully yourself.
Treat others how you would want to
be treated. By being a jerk to others
online, you are reinforcing the idea
that the behavior is acceptable.

TITLU

Realizati un produs media care


s[ reprezinte o modalitate de
interventie intr-un caz de cyberbullying.
Produsul poate fi:
Un mesaj Twiter
O postare pe facebook
Un poster pentru o campanie anti
cyberbullying
O reclama
Un articol
O stire

You might also like