Blog
Internet Research, Cyber Safety and Social Media
- November 29, 2023
- Posted by: The Teachers Academy
- Category: All Blog Postings Classroom Activities Educator Resources / News Online Courses
How does the Internet work? How do you protect your students/children from cyberbullies? How do you know you are about to purchase something from a reputable website? I am sure we’ve all heard stories of people getting scammed or people believing false information they read on the Internet. (I read a story online about how chocolate can be used to cure hair-loss, seriously, what? I wish!) Many major corporations have been hacked and held for ransom by “bad actors” who shut down their access to clients, patients, students, until a certain price has been paid. Cyber-bullies can hide behind their computers as they relentlessly attack the vulnerable. These days, the Internet can be an extremely dangerous place. It is important to understand these dangers so we can teach our students how to use the Internet securely and with confidence knowing how to avoid misinformation and other dangers
Here is a quick clip from our course: Internet Research, Cyber Safety and Social Media:
Introduction
In the previous section, you learned that the Internet is a network of computers. Anyone can access this network and anyone can create Websites and add to the Internet. It is a vast resource of information, communication outlets, commerce, entertainment and much more. You also learned that computers on this vast network have been assigned an IP address: A numerical name that identifies the computer. The great design of decentralization that allows the Internet to function so efficiently is also why it is so difficult to manage and regulate. Minimal regulation is only part of the infinite security issues the Internet presents for minors. The other is anonymity. Anyone can build a Website and anyone can access it. Chat room patrons can hide behind false identities; a child can become an adult; a married person can become single and a pedophile can become a child. As a result of this managerial nightmare known as the Internet, Internet crimes are rampant and growing.
Cyber Bullying
Bullying exists in schools and can be so detrimental to a student’s psyche that in extreme cases, victims of bullying have turned to suicide. Research shows that most bullied kids rarely tell adults or seek help. The advent of electronics has simply provided a bully with additional “upgraded” means of harassing students. Any form of harassment using electronics such as cell phones, chat rooms, Facebook, Twitter, other social media outlets, email, etc. is considered a new form of bullying: Cyber Bullying. Some forums such as Chat rooms allow for anonymity. Exclusion from online groups and vulgar language is also considered a form of cyber bullying. As educators, it is our responsibility to create a safe environment for learning and that includes enforcing a zero tolerance for bullying. Even more difficult, we must be on the lookout for signs of bullying. Electronics makes it easier to hide the harassment.
Cyber Bullying must include participation of minors to be considered bullying. If adults are involved, the terminology shifts to Cyber Harassment or Cyberstalking. When the perpetrator is an adult posing as a teen and luring into sexual situations, this is not cyber bullying, this is exploitation of a minor and a Federal crime.
Typical cyber bullying tactics include but are not limited to:
- Posting or making a website with rumors or compromising information/pictures about someone.
- Sending hateful messages via text or Twitter.
- Claiming to be another person and acting as him online in chat rooms, on Facebook, Twitter or other Social Media Outlets.
- Impersonating a friend to trick and get personal information.
- Bombarding with text messages, potentially running up a large bill.
- Hacking into computers and spreading viruses.
- Harassing and negative peer pressure via Social Media.
- Excluding someone from online groups.(Cyber Safety for Kids, n.d.)
Prevention and Solutions of Cyber Bullying
Like all things educational, finding the motivator will help resolve the problem. All bullies have a reason. It may be boredom and time and access to technology tools; revenge; establishing their social status; feed their egos; or perhaps they believe that they are standing up for someone who cannot defend themselves. Whatever the reason, there is no computer program out there that can do what a teacher or parent can do: Find out why the child feels compelled to engage in bullying and start there.
Depending on the severity of the harassment and the motivation of the child, educating them on the consequences of their actions is one method to help stop the bullying. What are his or her consequences of the actions? This is determined by the school officials. Knowing the penalties may be enough deterrent for some bullies to stop.
Every school must implement a bully-free safe zone and perhaps a zero-tolerance for bullying incidences. This however has been proven in court to hold up only on the school campus and while school is in session. As we know, text messages and social media are prevalent outside of school hours and when cyber bullying is most prevalent. Schools have lost previous law suits when trying to enact rules outside of their time and jurisdiction. Citing an abuse of power on the side of the school. It is recommended that a school includes in their Acceptable Use Policy a referendum on Cyber Bullying. It should note that if the bullying takes place off campus, but affects the safety or behavior of a student on campus, the schools have the right to enforce consequences. This has been the most successful contractual agreement that has allowed schools to enforce their bullying policy outside of school hours. (Stop Cyber Bullying.org, n.d.)
The Parent’s Role in Cyberbullying Prevention
Parents play the greatest role in preventing (and believe it or not-aiding) cyber bullying. Often a child will not go to the parent for help because they don’t feel safe. Parents either over-react (taking away privileges, calling other parents, calling the school, risking the child’s social well-being) or underreact (ignoring the message since it is not physically threatening, expecting the child to deal on their own as it is a part of growing up, or being offended by vulgarity and not the emotional meaning behind it).
Be present. The number one reason kids fall victim or become a cyber-bully is due to the lack of parental presence while on the Internet.
While online, parents should be with their children- particularly when the “tween” is just learning how to navigate the Internet, making accounts for games, and creating user names.
A child should be taught to never give real or full information. This lesson should be accompanied by an explanation of “Why.” Address the issue before it becomes an issue. If you mention to your child that you are aware of mean people out there on the Internet, they will be more likely to turn to you when it happens. The family computer should be in a common area of the house and never in the privacy of the child’s bedroom. A family Acceptable Use Policy (AUP) for Internet use should be created together, signed and posted as a reminder of what is expected when on the Internet. There will be more on AUPs in the next section.
If the harassment includes impersonation, stealing identities, stealing passwords, or posting of personal information, it is illegal and must be handled by the local authorities. Save all electronic correspondence as they will serve as evidence. Take the evidence (make a copy) to the local law enforcement agency. There are also private companies and non-profit organizations such as www.wiredsafety.org created to help and support parents and their children in this very situation.
For severe threats, it would be wise to contact your local ISP. Ask them how to locate certain IP addresses and preserve data. Have them on your side from the beginning so that they are aware of potential cyber harassment and have the means to assist you. (Sameer Hinduja, 2018) (Cyber Bullying Research Center, 2018)
For more information check out our course: Internet Research, Cyber Safety and Social Media.
About The Teacher’s Academy
The Teacher’s Academy is a small company of teachers serving teachers. Our courses provide teachers with a variety of resources, activities and ideas for making their classrooms a safe, fun place for students to succeed. Browse our Course Catalog for more professional development options. The Teacher’s Academy courses are accepted in over 22 states nationwide. PA, TX, AZ, CO, MI, NC, GA, TN are just a few of the state that accept online professional development hours from The Teacher’s Academy. We are approved to provide IACET CEUs for our teachers in states like AZ, MI and CO. We provide ACSI credits for our Christian school teachers. Find Your State for more information on state professional development and requirements for maintaining your educator license.