Posts Tagged ‘cyberbullying’

Instagram AI and cyberbullying

https://www.npr.org/2019/10/03/766507832/instagram-now-lets-you-control-your-bullys-comments

Instagram announced a new anti-bullying feature called Restrict.

Fifty-nine percent of American teens have been bullied or harassed online, according to a 2018 survey by the Pew Research Center. Instagram is one of the most popular social media networks among teenagers and a likely place for teens to be bullied.

In a recent study, conducted by the investment bank Piper Jaffray, Instagram is the second most popular social media platform among teenagers. Thirty-five percent of teens surveyed said that Instagram is their favorite social media platform, compared with 41% who preferred Snapchat.

++++++++++++
more on cyberbullying in this IMS blog
https://blog.stcloudstate.edu/ims?s=cyberbullying

bullying victims Spain

“Let’s hope you kill yourself” – How Spain is failing bullying victims

Experts say that the authorities are doing little to help the growing number of young people who are dropping out of school and, in some cases, taking their own lives, because of abuse

https://elpais.com/elpais/2019/07/08/inenglish/1562600636_068148.html

 the crux of the matter, the reason why families and institutions are constantly clashing over school bullying
Madrid regional authorities claim that cases of school harassment are going down, but that is because it rejects most complaints: in the 2015-2016 academic school year, there were 573 complaints, of which only 179 were accepted.
In 2015, an 11-year-old boy named Diego killed himself and left a suicide note behind: “I can’t stand going to school anymore, and there’s no other way to stop going.” The child had been attending a religious school in Villaverde, in the Madrid region. The courts twice dismissed an investigation into his death, ruling out harassment of any kind.
“We are flooded with complaints, but school bullying is not listed in the criminal code. So other crimes have to be proven: physical injuries, crimes against moral integrity…,” says a spokesperson at the Madrid Juvenile Prosecution Service. In 2017 this department received 192 complaints and dismissed 81 because the individuals involved were under 14 and could not be held criminally liable.

+++++++++++
more on bullying in this IMS blog
https://blog.stcloudstate.edu/ims?s=bully

digital self harm

When Teens Cyberbully Themselves

April 21, 2018 JULI FRAGA https://www.npr.org/sections/health-shots/2018/04/21/604073315/when-teens-cyberbully-themselves

Recent research and clinical psychologists now suggest that some adolescents are engaging in a newer form of self-aggression — digital self-harm. They’re anonymously posting mean and derogatory comments about themselves on social media.

According to a survey published late last year in the Journal of Adolescent Health, teens are bullying themselves online as a way to manage feelings of sadness and self-hatred and to gain attention from their friends.

“We were alarmed to learn that 6 percent of the youth who participated in our study engaged in some form of digital self-harm,” says Sameer Hinduja, co-author of the study and a professor of criminology at Florida Atlantic University. He is also the co-director of the Cyberbullying Research Center.

“Because teens’ online and offline worlds overlap, digital self-harm is a concern for some youth, making online self-harm an emerging area of research,” says, Susan Swearer, a professor of psychology at the University of Nebraska, Lincoln

Because the advent of social media has changed the way many teens form and experience relationships, normal adolescent feelings of insecurity, anxiety and loneliness can become magnified as they scroll through their peers’ social media reels. Hinduja says some teens cope with that distress by turning their angst on themselves online.

++++++++++++++
more on cyberbullying in this IMS blog
https://blog.stcloudstate.edu/ims?s=cyberbullying

more on digital citizenship in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+citizenship

a twist in cyberbullying

A new twist on cyberbullying

By Cynde Reneau 1/17/2018 Digital citizenship Standards

Just as in the 1970s, when antidrug campaigns were scoffed at by the very people they were targeting, anti-bullying campaigns are also losing their effectiveness. I got a taste of this firsthand last year when I spoke about sexting, online safety and cyberbullying at an all-school assembly. When a student blurted out an obscenity during the sexting portion, the students went wild and didn’t listen to a thing I said. I was frustrated and discouraged. Later, I offered an iPad mini to the student who produced the best video and poster. Even that got little response.

The fact is, anti-bullying clichés have become a shut-off switch. What we really need to be doing is giving students actual skills to prevent bullying. To get that conversation going, I pose this question to students: “Will you accept the identity that others give you?”

+++++++++
more on cyberbullying in this IMS blog
https://blog.stcloudstate.edu/ims?s=cyberbullying

safe social media

Tips Toward a Safe and Positive Social Media Experience

By Stephen Spengler 06/01/17

https://thejournal.com/articles/2017/06/01/tips-toward-a-safe-and-positive-social-media-experience.aspx

Family Online Safety Institute recommends that parents engage in “7 Steps to Good Digital Parenting”

1. Talk with your children.

2. Educate yourself.

3. Use parental controls. Check the safety controls on all of the Android and Apple devices that your family uses. On the iPhone, you can tap SETTINGS > GENERAL> RESTRICTIONS and you can create a password that allows you enable/disable apps and phone functions. On Android devices, you can turn on Google Play Parental Controls by going into the Google Play Store settings

parental monitoring software such as NetNanny, PhoneSherriff, Norton Family Premier and Qustodio.

4. Friend and follow your children on social media. Whether it’s musical.ly, Instagram or Twitter, chances are that your children use some form of social media. If you have not already, then create an account and get on their friends list.

5. Explore, share and celebrate.

6. Be a good digital role model.

7. Set ground rules and apply sanctions. Just like chore charts or family job lists, consider using a family social media or internet safety contract. These contracts establish ground rules for when devices are to be used; what they should and should not be doing on them; and to establish sanctions based on breaches of the family contract. A simple internet search for “family internet contract” or “family technology contract” will produce a wealth of available ideas and resources to help you implement rules and sanctions revolving around your family’s technology use. A good example of a social media contract for children can be found at imom.com/printable/social-media-contract-for-kids/.

Managing Your Digital Footprint

Your digital footprint, according to dictionary.com, is “one’s unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device.” Digital footprints can be either passive or active. The passive digital footprint is created without your consent and is driven by the sites and apps that you visit. The data from a passive digital footprint could reveal one’s internet history, IP address, location and is all stored in files on your device without you knowing it. An active digital footprint is more easily managed by the user. Data from an active digital footprint shows social media postings, information sharing, online purchases and activity usage.

  • Search for yourself online
  • Check privacy settings.
  • Use strong passwords
  • Update software.
  • Maintain your device.
  • Think before you post

Keep These Apps on Your Radar

  • Afterschool (minimum age 17) – The Afterschool App was rejected twice from the major app stores due to complaints from parents and educators. It is a well-known app that promotes cyberbullying, sexting, pornography and is filled with references to drugs and alcohol.
  • Blue Whale (minimum age 10) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a suicide challenge app that attempts to prod children into killing themselves.
  • BurnBook (minimum age 18) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a completely anonymous app for posting text, photos, and audio that promote rumors about other people. It is a notorious for cyberbullying
  • Calculator% (minimum age 4) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. This is one of hundreds of “secret” calculator apps. This app is designed to help students hide photos and videos that they do not want their parents to see. This app looks and functions like a calculator, but students enter a “.”, a 4-digit passcode, and then a “.” again.
  • KIK (minimum age 17) – This is a communications app that allows anyone to be contacted by anyone and it 100 percent bypasses the device’s contacts list.
  • Yik Yak (minimum age 18) – This app is a location-based (most commonly schools) bulletin board app. It works anonymously with anyone pretending to be anyone they want. Many schools across the country have encountered cyberbullying and cyberthreats originating from this app.
  • StreetChat (minimum age 14) – StreetChat is a photo-sharing board for middle school, high school and college-age students. Members do not need to be a student in the actual school and can impersonate students in schools across the country. It promotes cyberbullying through anonymous posts and private messaging.
  • ooVoo (minimum age 13) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. ooVoo is one of the largest video and messages app. Parents should be aware that ooVoo is used by predators to contact underage children. The app can allow users to video chat with up to twelve people at one time.
  • Wishbone (girls) & Slingshot (boys) (minimum age 13) – Both are comparison apps that allow users to create polls, including ones that are not appropriate for children. Many of the users create polls to shame and cyberbully other children, plus there are inappropriate apps and videos that users are forced to watch via the app’s advertising engine.

+++++++++++++++++++

Texas Teen May Be Victim in ‘Blue Whale Challenge’ That Encourages Suicide

Isaiah Gonzalez, 15, found hanging from his closet after an apparent suicide, as allegedly instructed by macabre online game

http://www.rollingstone.com/culture/news/texas-teen-latest-victim-in-challenge-that-promotes-suicide-w491939

Nationally, the Associated Press reports that educators, law enforcement officers and parents have raised concerns about the challenge, though these two back-to-back deaths mark the first allegations in the United States about deaths directly linked to the online game. Internationally, suicides in Russia, Brazil, and half a dozen other countries have already been linked to the challenge.

++++++++++++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

bullying at school

Resources to Fight Bullying and Harassment at School

http://www.edutopia.org/article/bullying-prevention-resources

visit the web site: http://www.edutopia.org/article/bullying-prevention-resources for more…

More about cyberbullying in this blog at

https://blog.stcloudstate.edu/ims/?s=cyberbul&submit=Search

Cyberbullying Increases as Students Get Older

Cyberbullying Increases as Students Get Older, Study Finds

http://blogs.edweek.org/teachers/teaching_now/2014/09/cyber_bullying_increases_as_students_get_older.html

The study also found that girls were more likely to experience verbal and cyberbullying while boys were more likely to experience physical bullying. my note: No news here.

“School-based interventions need to address the differences in perpetrator and victim experiences,” she said. “The key is to use individualized specific interventions for bullying, not a one-size-fits-all approach.”

Bullying is still a prevalent issue, although it has taken a new form by moving online. The two kinds of bullying are different in many ways. However, interventions can often be difficult, since many think cyberbullying is less harmful than traditional bullying, and therefore don’t report it.

Digital Identity and Digital Citizenship

5 Excellent Videos to Teach Your Students about Digital Citizenship ~ Educational Technology and Mobile Learning

bibliography:

Ramspott’s blog entry best written for my personal taste, but here is a long list of additional and similar opinions:

Bramman, R. (n.d.). Digital Identity Essentials: Understanding Online Etiquette and the Rules Social Media Engagement. Research Personal Branding. Retrieved October 3, 2013, from http://www.reachpersonalbranding.com/digital-identity-essentials-understanding-online-etiquette-and-the-rules-social-media-engagement/

Braunstein, D. (2013, March 20). Digital Identities: Who Are You When You’re Online? Huffington Post. Retrieved from http://www.huffingtonpost.com/danya-braunstein/digital-identities-who-ar_b_2904211.html
Dalton, J. C., & Crosby, P. C. (2013). Digital Identity: How Social Media Are Influencing Student Learning and Development in College. Journal of College and Character, 14(1), 1–4. doi:10.1515/jcc-2013-0001
Death and the Social Network: The Persistence of Digital Identity. (n.d.). Jed Brubaker. Retrieved October 3, 2013, from http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/
Digital identity. (2013, October 3). In Wikipedia, the free encyclopedia. Retrieved from http://en.wikipedia.org/w/index.php?title=Digital_identity&oldid=575355398
Digital Identity – Social Media and You. (n.d.). Altan Khendup. Retrieved October 3, 2013, from http://altankhendup.com/altankhendupblog/2013/6/6/digital-identity-social-media-and-you
Digital Identity and Social Media CFC. (n.d.). Liquid Learning. Retrieved October 3, 2013, from http://warburton.typepad.com/liquidlearning/2009/09/digital-identity-and-social-media-cfc.html
Digital Identity, Social Media, Privacy, Balance, and Being Radical. (n.d.). Retrieved October 3, 2013, from http://eduniverse.org/digital-identity-social-media-privacy-balance-and-being-radical
fsubeccaramspott. (n.d.). 2013: The Year of Digital Identity Development in Higher Education. CASE Blog. Retrieved October 3, 2013, from http://blog.case.org/2013/01/15/2013-the-year-of-digital-identity-development-in-higher-education/
Higher Ed Live – Digital Identity Development. (n.d.). Higher Ed Live. Retrieved October 3, 2013, from http://higheredlive.com/higher-ed-live-digital-identity-development/
Manage Your Digital Identity | Inside Higher Ed. (n.d.). Retrieved October 3, 2013, from http://www.insidehighered.com/blogs/gradhacker/manage-your-digital-identity
News: Social Media Thought Leader Eric Stoller to Speak About Digital Identity and Higher Education at Kent State, Feb. 14. (n.d.). Kent State University. Retrieved October 3, 2013, from http://www.kent.edu/news/newsdetail.cfm?newsitem=CAB2045F-0159-B0DC-526E15EFB8C5A416
Stewart, B. (n.d.). Digital Identities: Six Key Selves of Networked Publics. The Theoryblog. Retrieved October 3, 2013, from http://www.reachpersonalbranding.com/digital-identity-essentials-understanding-online-etiquette-and-the-rules-social-media-engagement/
Stroller, E. (n.d.). Digital Identity and Social Media // Speaker Deck. Retrieved October 3, 2013, from https://speakerdeck.com/ericstoller/digital-identity-and-social-media
Warburton, S., & Hatzipanagos, S. (Eds.). (2012). Digital Identity and Social Media: IGI Global. Retrieved from http://www.igi-global.com/book/digital-identity-social-media/63892

++++++++++++++++++++++++++++++++++++++++

Teach Digital Citizenship with … Minecraft

http://askatechteacher.wordpress.com/2013/10/03/teach-digital-citizenship-with-minecraft/

In the summer, there was an article about physics professor using Minecraft, but that’s not new because an MIT physics professor was using rap in the down of podcasting to teach physics and then another one later on was using Second Life. All of them gone by now…

From: Ewing, M Keith
Sent: Monday, September 30, 2013 4:43 PM
Subject: Eric Stoller on Digital Identity

A couple of interesting links to comments by Eric Stoller on “digital identity” – which he defines as “made up of their online interactions and exchanges.”

Character Clearinghouse – Interview with Eric Stoller, 2013 Jon C. Dalton Institute on College Student Values, Keynote Speaker

https://characterclearinghouse.fsu.edu/index.php/jon-c-dalton-institute-on-college-student-values/keynote-speakers/925-stoller

Digital Identity Keynote at Curry College (full video is about 63 minutes; includes transcript of the Twitter stream about his talk)

http://ericstoller.com/blog/2013/06/21/digital-identity-keynote-at-curry-college/

Eric might make a good speaker to students (and faculty) …

my (Plamen) note: Keith’s email and his suggestions for readings, e.g.

http://www.degruyter.com/view/j/jcc.2013.14.issue-1/jcc-2013-0001/jcc-2013-0001.xml

connects with “contemplative computing” and Turkle’s disconnect, so I am entering as tags