Rogers, Vanessa - Cyberbullying - Activities To Help Children and Teens To Stay Safe in A Texting, Twittering, Social Networking World PDF
Rogers, Vanessa - Cyberbullying - Activities To Help Children and Teens To Stay Safe in A Texting, Twittering, Social Networking World PDF
of related interest
Bully Blocking
Six Secrets to Help Children Deal with Teasing and Bullying –
Revised Edition
Evelyn M. Field
ISBN 978 1 84310 554 1
Understanding 12–14-Year-Olds
Margot Waddell
ISBN 978 1 84310 367 7
The Tavistock Clinic – Understanding Your Child Series
Vanessa Rogers
www.jkp.com
All rights reserved. No part of this publication may be reproduced in any material form
(including photocopying or storing it in any medium by electronic means and whether or not
transiently or incidentally to some other use of this publication) without the written permission
of the copyright owner except in accordance with the provisions of the Copyright, Designs and
Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd,
Saffron House, 6–10 Kirby Street, London EC1N 8TS. Applications for the copyright owner’s
written permission to reproduce any part of this publication should be addressed to the
publisher.
Warning: The doing of an unauthorized act in relation to a copyright work may result in both a
civil claim for damages and criminal prosecution.
All pages marked may be photocopied for personal use within this programme, but may not
be reproduced for any other purposes without permission of the publisher.
INTRODUCTION
Understanding Cyberbullying
What is different about cyberbullying?
Cyberbullying methods
Different forms of cyberbullying
Key advice.
Online protocols
Ways to talk about cyberbullying
Warm Ups
Digital Technology Warm Up
Cyberbully Bag
Online Acronym Quiz
Cyberbullying: Agree or Disagree
Online Behaviour
Add a Friend
Pass It On
Online Pictures
Activities
What is Cyberbullying?
Online Community
Internet Safety Profile
Online Storyboard
Key Words
Dear Aunt Cyber
Reasons Not to Tell
Cyber Quiz
Online Friends
Private or Personal?
Say What You Mean!
Social Networking Today: Interview Tomorrow
How I Feel
Cyber Court
Reviews
Review Board
Think, Feel, Do
Evaluation Tags
Cyber Posters
Useful Websites
INTRODUCTION
The vast majority of children and young people are computer literate and
own mobile phones, providing them with almost unlimited access to
information and the ability to keep in touch around the globe. Whether at
home or in school, libraries or in Internet cafés, young people can utilize
a vast range of digital communication tools to share experiences and keep
in touch in a way that previous generations could only imagine.
However, there is a darker side to this shiny new digital world, defined
as ‘cyberbullying’. This is when technology is misused to threaten,
harass, humiliate or embarrass victims.
As access to digital communication grows, methods of cyberbullying
have become more sophisticated. From nuisance phone calls to bogus
websites, the victims of cyberbullies can be targeted with little effort and
minimal cost to the bully, leading to widespread concerns about how
children and young people can stay safe in a texting, twittering and social
networking world.
Cyberbullying methods
Text messages
These usually take the form of messages that are threatening, offensive or
persistent. The use of ‘pay as you go’ handsets makes it very hard to
trace individuals and the victim may never know the identity of her or his
bully.
Emails
The ease of setting up multiple email accounts makes it possible to send
threatening or bullying emails, using a pseudonym or somebody else’s
name, with little fear or expectation of getting caught.
Chatrooms
Used with all the site security measures in place, chatrooms provide an
excellent way for young people to communicate. However, if misused,
they can easily become a forum for menacing or targeting people. This
includes chatrooms on game sites, consoles and virtual worlds such as
Second Life.
Websites
Once again, the skills developed to successfully use web technology can
be misused to devastating effect. Bullies can set up defamatory blogs
(web logs) or create personal websites featuring their victim. They can
even set up an online polling site, using one of the many free websites
offering the service for legitimate reasons, but misused to create a poll
asking an unlimited number of questions about the target. Even
celebrities and politicians are not immune to this.
Key advice
1. Be alert to the young person seeming upset after using the
Internet or their phone. This might involve subtle comments or
changes in relationships with friends.
2. Consider where young people use the computer; it is harder to
be aware of online behaviour if it is always behind closed
doors.
3. Use parental controls on computers and keep passwords safe so
that young people cannot access inappropriate sites.
4. Encourage the victims of cyberbullying to keep the evidence of
any offending emails, text messages or online activity. They
could help identify the bully.
5. Advise children to resist the temptation to retaliate, no matter
how strong the desire to do so may be. Retaliation is likely to
make things worse and could lead the victim into breaking the
law.
6. Suggest that arguments from the real world should never be
carried into cyberland. It is much better to resolve the problem
face to face than mount an attack online.
7. Use the tools offered by the service provider, for example only
allowing personal profiles to be viewed by accepted ‘friends’
or reporting anything received that is offensive. In addition,
always be sure to turn on in-built computer security features,
including parental controls to help manage online activity.
8. Users of the Internet should not accept people as ‘friends’ on
sites like MySpace unless they know them in the real world.
9. Promote online responsibility and at all times offer the same
good manners and respect online as would be expected in the
real world.
10. Help young people identify someone trustworthy to talk to and
ask for support should they become the victim of a cyberbully.
11. Report any online bullying in social networking sites to the
service provider. Remember, they want to be known as a safe
environment for people to meet, not a bullying playground.
12. Report cyberbullying: contact the relevant person at the child’s
school if it involves another pupil. Most organizations will
have an anti-bullying policy and cyberbullying should be
included in this.
13. Contact the police when serious threats are made, particularly
if they include violence. Keep any evidence and get support
from a trusted adult. A criminal offence may have been
committed.
Finally, try to keep communication open and encourage young people to
talk about the ways in which they are using the Internet and their mobile
phone. Victims need the language to be able to express what has
happened to them, to know that it’s wrong and to be able to tell someone.
Online protocols
Young people need to be very clear about what is and isn’t acceptable
behaviour online, especially if they are using equipment outside the home
– whether in a youth group or school.
If a number of young people are sharing a computer, one way of
opening up discussions about expectations and appropriate behaviour is
to devise an ‘online protocol’. Similar to ground rules or group contracts,
this provides clear boundaries so that everyone is clear about what is and
isn’t acceptable online and what will happen if any of the rules are
breached.
You may also want to go through any non-negotiable rules, for
example ‘no eating or drinking at the computer’, or explain about any
restricted access to websites.
These rules should be displayed in the computer area shared with
everyone who uses the computer. They will also be asked to sign up to it
before they gain computer access.
Alternatively, you could take the online protocol and set the young
people the task of designing a screensaver incorporating it as a reminder
to all online users.
Aim
This is a group warm-up exercise to introduce the concept of
cyberbullying.
How to do it
Split the group into two teams. Explain that this is a team game and that
the winning team will be the group that accumulates the most points
throughout the game.
Hand each group a piece of paper and a pen. Now ask each team to
make a list of as many different ways to communicate using digital
technology that they can think of. This should include:
text messages
mobile phone cameras
mobile phone calls
emails
chatrooms
instant messaging (IM)
websites.
Invite each team to count up their scores and congratulate the team with
the most points. Next, hand each team a red marker pen and ask them to
discuss and place a cross by any of their suggestions that they think could
be used to harass, humiliate, embarrass or target someone. Invite
feedback and conclude that these are all forms of cyberbullying.
CYBERBULLY BAG
Aim
To explore different types of cyberbullying and provoke discussion about
why people do it.
How to do it
In a seated circle, hand a Post-it note and a pen to each young person.
Ask everyone to write down a definition of the term ‘cyberbully’. If the
group seem slow to start, make a few suggestions. This could be
something like ‘someone who stalks someone else online’ or ‘someone
who threatens people by text’ or simply ‘emotional blackmail’.
Once everybody has finished, ask him or her to fold the note so no one
else can see what’s written on it and place it in the bag. Shake the bag so
that the slips get mixed up well.
Now pass the bag back around the circle in the opposite direction. As
each person takes the bag they should pull out a slip and read it.
Leave space for comments or a short discussion after each reading.
Are there any duplications or similar themes? What are the different
forms of bullying? Does it differ between genders? Why do people do it?
When are bullies most operational?
List the different forms of cyberbullying identified for later sessions.
ONLINE ACRONYM QUIZ
Aim
This is a quick quiz-style warm up based on text and online acronyms
that will help assess young people’s knowledge and preferred methods of
communication.
How to do it
Divide the young people into twos and hand each pair a quiz and pen. Set
them the challenge of correctly guessing the acronyms in the fastest time.
Allow about ten minutes for them to complete it and then go through
the answers, inviting comments as you go.
Each pair gets a point for each correct answer. Lead a round of
applause for the winners and then facilitate a short discussion that
considers why and how online and text speak has developed. Encourage
the young people to share their own favourites and more unusual
examples before closing.
2. FOFL _________________________________
3. ASLP _________________________________
4. BRB _________________________________
5. H&K _________________________________
6. 4GM _________________________________
7. W8AM _________________________________
8. POS _________________________________
9. NOYB _________________________________
Aim
Use the statements to explore values, review existing practice and discuss
staying safe online.
How to do it
Explain to the young people that you are going to read out a series of
statements and their task is to think about whether they ‘AGREE’ or
‘DISAGREE’ with what you say. Make sure you reinforce that it’s okay
not to know the answer or to be undecided.
Set up the room by sticking the ‘AGREE’ sheet on one side and
‘DISAGREE’ on the other. Designate an open space in between as a
‘NOT SURE’ zone.
Now read out the statements, inviting participants to move to the zone
that best reflects their opinions. Ask the young people to explain their
choices and allow discussion time between each round. Make sure you
remember to ask for feedback from people in the ‘NOT SURE’ zone as
often these responses provoke the best debates. After each short
discussion ask if anyone wants to change their mind about where they are
standing, and the reasons why.
Close the activity by drawing out any follow-up key issues for further
work.
Agree/disagree statements
1 There will always be people who bully – it’s human
nature.
Aim
This explores the difference between personal values and misconceptions
about what peers think. It encourages young people to challenge
assumptions and express their own opinions.
How to do it
Open with a quick discussion that introduces the idea that sometimes
what people think their peers are doing is not quite the same as the
reality. Give the example of how much alcohol they drink or the number
of young people who use illegal drugs. Conclude that assumptions made
are not always true.
Go on to suggest that this is possibly true in other areas too, including
online behaviour. Hand out the pens and the Online Behaviour exercise
and ask the young people to go through it, first scoring it with their own
opinions and then again to show what they think their peers’ opinions
might be.
Allow time for everyone to finish and then bring the group together to
reflect on the answers. Pull out areas for further debate, for example the
young people might falsely believe that their peers think it is okay to add
comments to jokes or online circulars, but actually this exercise may
show that they don’t. Suggest that this may be true for many things and
encourage them to consider ways that they could act upon what they
really think rather than acting upon what they think their friends want.
Online Behaviour
For each of the statements circle the numbers that correspond with your
opinion and then again with the opinion that you think is mostly held by
your peers.
Aim
This activity demonstrates the potential risks of accepting unknown
‘friends’ on social networking sites.
How to do it
To prepare: copy and cut up a set of the Add a Friend cards. You will see
that apart from Syd and Shazza who are telling the truth, all other
potential ‘friends’ have false identities. This information will remain
secret until the part of the activity where the envelopes are opened. Put
one True Identity slip inside each envelope and stick the corresponding
Shared Profile onto the outside. Finally number the envelopes.
Divide the young people into eight groups and hand out an envelope to
each group. Explain that each group has a profile on a well-known social
networking site, and it is set to private. Each envelope represents an
application to become their ‘friend’. Their task, as a group, is to decide
whether to accept each person as a ‘friend’ on their profile, or not. Once
they have decided on the first application, they should write the number
of the envelope onto their paper and a ‘yes’ or ‘no’.
Circulate the envelopes until each group has seen every Shared Profile
and made a choice.
Then, choosing a group to start the process, ask them to call out the
number on the last envelope they looked at, read the Shared Profile, and
then give their vote. Ask the rest of the group to see who agreed or
disagreed with their decision. Then, invite a member of the group to open
the envelope and read out the True Identity inside.
Support discussion all through the unmasking process; are people
surprised? How many did teams get right? Why might people lie online?
Would telling a lie on a profile automatically disqualify someone from
being your friend? Pull out what helped or didn’t help people to make
their decision.
Then consider risks and guidelines for accepting someone as a friend
online. Make sure you comment on the competition some young people
feel to have as many ‘friends’ on their profile as possible. Pull out key
ideas and record them.
Age: 16 Age: 14
Age: 15 Age: 15
Age: 15 Age: 15
Age: 16 Age: 16
Age: 14 Age: 12
Interests: Online war games The facts: Lied about his age
and social networking. See if so he could sign up to join the
you can be a worthy opponent online war games he loves.
for me! Has cyber friends on all of
them who he plays against
regularly.
Age: 15 Age: 35
Age: 15 Age: 26
Age: 18 Age: 18
Aim
The aim of this activity is to demonstrate how quickly and widely
information can be shared online.
How to do it
Hand out three Post-it notes to each participant and ask them to write
their name and then something about themselves on each one. Stress that
this should be personal but not too revealing, but at this point don’t say
how the information will be shared.
Now, ask the young people to share information with the person next
to them, then take their partner’s Post-it notes and pass them to other
members of the group, without asking permission. Set a rule that there
can be no communication during this process.
Repeat until information has spread throughout the group. Stop and
reflect on how it felt to have people reading about you, without the
opportunity to say anything or explain yourself. Suggest that this is
similar to how information travels in cyberspace.
ONLINE PICTURES
Aim
To encourage young people to consider and understand the need for
permission to publish pictures online.
How to do it
Start the session by asking the young people to tell a partner about a
photo of themselves taken some time ago that they are embarrassed about
now. This could be a baby photo, or a photo of themselves wearing
clothes that they loved as a small child but hate or feel embarrassed about
now.
Still in pairs, ask the young people to consider how they would feel if
this photo was taken and pasted on to the Internet without their
permission. Take it a step further and ask them to consider how they
would feel if someone they knew then got hold of it and forwarded it to
everyone. Finally, ask them to consider how they would feel if the online
community found it so amusing that within three weeks several million
people around the globe had laughed at and mocked their photo.
Point out that this has happened in real life to some people and that
much hurt, anger and sadness has been caused both intentionally and
unintentionally.
As a whole group facilitate a short discussion that considers:
1. appropriate/inappropriate photos to upload
2. giving and receiving permission for photos to go online.
ACTIVITIES
WHAT IS CYBERBULLYING?
Aim
This activity encourages young people to think about the different types
of cyberbullying and consider the effects that it has on both the victim
and the bully.
How to do it
In two groups ask the young people to read the set of cards you are
handing out. Explain that both groups will have the same information on
their cards.
Ask the young people to assess each of the situations outlined on the
cards and as a group agree whether they depict a cyberbullying situation
or not. You will need to be sensitive to any young person within the
group that you suspect or know has been a victim of any bullying.
When the young people have had a chance to discuss the situations and
reach agreement, bring everybody together in a large group.
Read out each of the cards and ask the two groups what they decided.
Is it the same? Facilitate a discussion over each card; for example, why
do they think people become bullies? Discuss protective tactics and
strategies for being assertive in cyberbullying situations.
Make sure that the young people have information and contact
numbers for support. Parents may want to access this support by going
online to some of the websites listed in the back of the book.
I took a pretty personal picture of myself and My girlfriend dumped me by text and refuses
sent it to my boyfriend – now we’ve split up to speak to me about it.
and he has shown all his mates.
My English teacher put me on report for Me and my mates have got some cards made
something I didn’t do. I found out her home up with a picture of a lap-dancer on and the
phone number and plan to ring her then hang mobile number of this girl we hate. We plan
up all night. to stick them in public phone boxes all over
town.
My friend nicked my phone and sent loads of I know my mum’s password on Twitter and
dirty texts to this girl I really fancy. She have been sending out messages as her all
thinks it’s me! week!
I did something really stupid while drunk, This girl is stalking me – she keeps calling
and now this girl is threatening to send a me and sending texts all day and night.
video-clip from her phone to my boyfriend.
My mates and I dare each other to do things My best mate is putting pressure on me to
and then video it on our phones. get my dad’s bank passwords to get money.
Others in the group have done it and I helped
spend the cash they got.
I just got ‘tagged’ in a photo on Facebook – I My ex has uploaded a video of us having sex
hate the picture but my mate refuses to take on YouTube without my permission.
it down.
I just opened an email joke that is racist – it I am gay, but not ready to tell my family yet.
asks me to pass it on. Someone has threatened to ‘out’ me online.
This girl at school has joined an online I uploaded all my holiday photos on to
dating site, pretending to be 23. Now she MySpace and now some man keeps leaving
plans to meet some of the men. me crude messages.
Aim
This art-based activity enables young people to explore the positive and
negative aspects of the Internet.
How to do it
Start the session by asking the young people call out the positive and not
so positive things about the Internet. For example, positive things may
include access to information, music and film. Not so positive things
could include things like access to unlicensed drugs, spam or
cyberbullying. Some things, such as instant messaging, may end up on
both lists!
Now divide the young people into groups of four or five and distribute
the paper and art materials. Their task is to design a poster that depicts ‘If
the Internet was a community’. Encourage them to use ideas from the
previous discussion and to add their own ideas as well to reflect their
knowledge and experience of being online.
Facilitate gallery time, where each group presents their poster and
gives a quick summary of their discussions.
Display the posters.
INTERNET SAFETY PROFILE
Aim
To highlight the need for security online and the dangers of giving out
personal information.
How to do it
Give each young person a sheet of paper and a pen and ask them to write
down their names and three statements about themselves. Two of the
statements should be true, and one statement must be false. Encourage
them to think of a false statement that is not too obvious to the rest of the
group.
Collect the papers into the box and shake to jumble them up a bit.
Invite a young person to choose a paper from the box and then read out
the name and three statements.
The rest of the group should vote which statement they think is false,
before the owner of the paper reveals if they guessed correctly.
Once all the papers have been read, ask the young people how easy it
was to know what was truth and what was fiction. Point out that even
though they could see the person they still couldn’t necessarily tell.
Suggest that this is even more difficult online, especially with cyber
friends that they may never have met in the real world. Online they have
no way of knowing whether the person is telling the truth, even if they
have been communicating with them for a long time.
Consider the differences between online and real-world relationships,
reinforcing the importance of not giving out personal information to
anyone. A simple guide is not to give any information that you wouldn’t
happily give a complete stranger you met in the street!
ONLINE STORYBOARD
Aim
This activity can be developed into a short piece of drama or a
storyboard. It considers consequences of online choices and promotes
safety.
How to do it
Divide the young people into groups of four or five. Hand each a set of
the Online Storyboard cards, cut up and placed in an envelope. Explain
that the task is to look through the Online
Storyboard cards and place the story in the order that they think it
happened. Stress that the story is not true but is based on collective true
experiences.
When they have completed this activity, facilitate a discussion about
what is happening in the story, the safety issues and what they would say
if the person involved was their friend who had asked their advice. One
major consideration in this story is age. How likely would this friendship
between a 14- and a 32-year-old be outside the online community?
Would it be easier or harder to meet in the real world? Point out that the
story is non-gender specific and the young person talking to James online
could be a young man or woman. Consider vulnerabilities from both
these perspectives.
Now hand out paper and pens. Each group should storyboard what
happens next. It is up to them if they want to develop a happy ending or
not.
These can be developed into short role plays or drama scenes to be
worked on in later sessions. Alternatively, invite each group to feed back
their ideas. Either way, make sure you reinforce the dangers of meeting
people from the online community in the real world and draw up some
safety guidelines, for example always taking someone with you the first
time you meet, and so on.
Finally, make sure information is available in case this session raises
any issues for individuals who may need further support.
It was just after my 14th birthday that I started talking to James. I was so happy!
In just days we got really close – he didn’t act or talk like a 32-year-old man.
We went from friends to best friends – I’ve never had someone who cares so much about me.
I stopped going out with my friends to stay in online with James. Sometimes we talked all
night – he was really interested in every bit of my life.
He sent me photos and I thought he looked like Johnny Depp with short hair. I sent him mine
so we could look at each other when we speak.
James asked me to use the web cam so he could see my school uniform. He says I am so
mature he can’t imagine me at school and needed proof!
Now every night I can kiss James goodnight on the web cam.
I have argued so much today with my mum. She treats me like a kid and never listens. James
agrees she is out of order and suggests that it would be really nice if we could be together all
the time. He is offering to meet me in town with his car.
KEY WORDS
Aim
The aim of this game-style activity is to develop awareness of the
dangers of not keeping passwords secure and open up discussions around
trust.
How to do it
Seat the group in a large circle and hand each participant eight paper
keys. Explain that these are precious and that they should be looked after.
Ask each person to write their name on all of their keys.
Now, distribute the dice as if you were dividing the circle in half.
Explain that those holding the dice will be playing the person opposite
them across the circle. At the shout of ‘go’ the players should throw the
dice. The person with the highest number wins a ‘key’ from their
opponent, and they then write their name on the back under the original
owner’s name. The winning player for that round then challenges another
member of the group to play again. Keep the pace fast so everyone gets a
go.
The aim is to hold on to as many of your own keys, while collecting as
many of your opponent’s keys, as you can. Any key can be exchanged if
you lose the throw, so it is important to win as many as possible. Each
time a key is passed on, the next player should write their name on the
back.
Call ‘time’; the winner is the player with the most keys. Two points are
awarded for own keys and one for a captured key.
Now, suggest that each key is a password to an email account. Invite
the young people to look on the back of the keys they have – how many
names are there? Remind them that this all started with a single dice
throw where one key was given to another player. It is rather like
confiding your password to a friend or leaving it written down where
others might see it, or choosing a password that is so obvious it is easy
for others to guess it correctly.
Ask the group to suggest what else passwords are used for online, for
example Internet shopping, social networking or to access bank details.
Facilitate a discussion that considers why people might let others know
or use their password. Point out that it is not about trust, but security and
keeping safe online. Also mention the dangers of storing a password
online in a ‘key chain’.
Finally, invite some recommendations for protecting passwords and
record these for future reference. For example:
1. Always use numbers and words in a password to make it harder
to guess.
2. Don’t use the same password for everything.
3. Don’t store passwords on mobile phones, which could get stolen.
4. Don’t write your password on your hand.
DEAR AUNT CYBER
Aim
To enable young people to discuss and resolve online dilemmas and
issues in a way made familiar to them by the problem pages in
magazines.
How to do it
Explain to the young people the aims of the sessions and divide them into
smaller groups.
Hand each small group a Dear Aunt Cyber sheet, stressing that all
characters and situations are fictional and certainly do not relate to
anyone in the group. This should stop everyone trying to guess whose
‘problem’ they are really discussing!
When the young people have read their ‘problem’, ask them to discuss
the situation and what might happen, decide if the questioner is a victim
of cyberbullying, and then write a reply that will help resolve the issue.
When everyone is happy with the ‘advice’ the group is going to offer,
bring the whole group back together to share problems and suggested
solutions.
Display the Dear Aunt Cyber letters and responses to remind the
young people.
Aim
This is a sorting activity to promote discussion about why the victims of
cyberbullying might ask for help and to reinforce the support available.
How to do it
Set the scene for the activity by saying that victims of cyberbullying
often prefer to keep their unhappiness a secret. Explain that there are
many reasons for this, which you are going to explore. Then, continue by
stressing how important it is that anyone who is cyberbullied tells a
trusted person about what is happening and gets help.
Divide the young people into fours or fives and hand each group a set
of Reasons Not to Tell cards. The task is to read the cards and then rank
them in order of importance, from those they believe to be the main
barriers, through to those that they think aren’t so likely.
When every group has finished, take a ranking for each card from each
group and compare it to where other groups have placed the same card.
Encourage debate about the different reasons given and invite any
suggestions the group may have as to why someone might not tell.
Sum up the session by reinforcing the need to tell someone, advising
them to keep any evidence such as emails, photographs, and so on, and if
it happens in school or college use the anti-bullying policy to get support.
Distribute leaflets from any local support agency.
They are scared of They are ashamed of their own The thing they are being
making things worse for behaviour. cyberbullied about is true
themselves or for other and they don’t want
people. anyone to know,
especially parents or
carers.
They are scared that the They started the argument. They don’t know who to
cyberbully might hurt tell.
them physically.
They are hoping that if They feel too depressed to be able They think they have
they just ignore it, it will to do anything about the done something to
go away. cyberbullying. deserve it.
They are worried that They are being ganged up on by a They don’t think that
adults won’t believe them group and are too scared to tell anything will change
or be dismissive because anyone. even if they do tell
it ‘is only words’. someone.
Aims
This quiz is similar in style to those found in magazines, so should be
familiar to young people. It asks some basic questions in a fun way and
opens up discussions about safety.
How to do it
Hand each young person a quiz to complete without consulting anyone
else. Go through their answers raising the following points for discussion
after each question:
1. The potential dangers of posting personal information on the web
1. and the difficulties of retracting information that has gone
online.
2. The advantages of moderated chatrooms, using security settings
and the importance of being open and honest about online
activity.
3. The potential dangers of opening unsolicited email, ways of
reducing spam and avoiding viruses.
4. The importance of regarding chatroom contacts in the same way
as strangers in the real world, and the potential for exploitation
using web cams.
5. The potential vulnerability of open Facebook sites and the issues
around being truthful online. The dangers of meeting up and how
to reduce risk.
6. Issues of trust about photos taken and ways to block text
messages and report inappropriate use to service providers and
the police.
Cyber Quiz
Please look at the questions below about the Internet and mobile
technology and answer as honestly as you can.
Someone contacts you via Facebook and starts flirting with you –
their picture looks hot. Do you:
a) Ask if they want to meet up – there is no way you are giving up
the opportunity of being with someone this good looking!
b) Ask if they want to meet up with you and some friends in a public
place.
c) Ignore them – you don’t know them.
d) This would never happen as you have your Facebook profile set
to only receive messages from people you know.
You get sent some text photos of you with abusive messages from an
ex-boyfriend/girlfriend. Do you:
a) Delete them and forget it – you are glad you split up now.
b) Call the police, this is harassment.
c) Try to speak to them and explain how upset it has made you.
d) Speak to an adult and ask their advice.
ONLINE FRIENDS
Aim
This is a role-play activity to look at the differences between cyber and
face-to-face friends. It helps to demonstrate the need for rules to ensure
safety online.
How to do it
Divide the young people into pairs and seat them back-to-back to
simulate being online. Hand out the Cyber Online cards so that each
young person has one of the character cards from a pair.
The paired cards give an online scenario. The task for the young
people is to talk to their partner and role play what happens next, taking
into account all the online safety information you have already discussed
with them.
Make sure you stress that not all the scenarios are dangerous, but they
all have potential safety issues. Allow about ten minutes and then stop for
feedback. Was it easy to withhold information if it was asked for? Did
you believe what the other person said?
Conclude with some benefits and drawbacks to meeting someone that
you have met online. For example:
Benefits: You might make a new face-to-face friend and have a good time.
Drawbacks: You might not like one another. The other person might be very different to
what you were led to expect. If you do become face-to-face friends, you may lose out on
some of the benefits of anonymity. In some situations meeting a stranger could be
dangerous.
Jasmine is 15 and has lots of friends at Nicole is 15 and struggling to cope with her
school. recently diagnosed diabetes.
Her friends know that Jasmine has diabetes Nicole and her friends are really sporty and
but can’t really understand what it feels like her social life revolves around matches and
to have this medical condition. the sports social club. She is terrified that her
Jasmine finds an online chatroom for young condition will mean that she can’t do this any
people with diabetes. Someone with the more and that her friends will drop her.
screen name ‘Nicole’ has joined the chat She finds an online chatroom for young
group, too. people with diabetes and starts talking to a
After discovering that Nicole’s birthday is young woman called ‘Jasmine’. They
near her own, Jasmine suggests they swap discover that they are both going to be 16
addresses so they can send birthday cards. next month.
Tom is 14 and really enjoys playing online Jason is 16 and enjoys playing an interactive
fantasy games. He uses the name ‘Hercules’ web game in which he creates his own
online and plays games that involve players character, ‘Troy’. The game involves players
from all over the world. from all over the world.
On his favourite site he often plays against Sometimes, while playing, he chats with
someone with the online name ‘Troy’ and other players, usually swapping game
they chat and swap game strategies. strategies. He frequently runs into one
‘Troy’ really reminds Tom of someone he particular player, who he recognizes by his
knows in the real world. He isn’t sure but he character, ‘Hercules’. Hercules plays at a
becomes convinced that he knows who it is. similar level to him and he enjoys pitting his
Determined to know the truth, he finally wits against such a skilled player.
decides to ask Troy some questions about his
life.
Sophie is 17 and loves going on Facebook. Hanif is 20 and has been using the ‘Flirting’
She thinks it is a great way to catch up with application on Facebook with great success.
friends and share music. She always posts As he doesn’t think he is very attractive he is
photos of herself and her mates after a night using a photo of a young Egyptian pop singer
out. One lot shows them all dressed as bunny on his profile. He can’t believe his luck; all
girls at Sophie’s birthday party. he has to do is send the photo and a few flirty
After adding the ‘Flirting’ application Sophie messages and he can get to talk with some
is excited to see that she has 26 messages really good-looking girls.
from men online who think she is ‘flirtable’. Tonight, he is messaging Sophie, and from
One in particular, ‘Hanif116’, catches her the photos on her site she looks ready for
attention; the photo he sent is buff! some fun. After lots of messages Hanif asks
She flirts back and looks forward to a night if she has a web cam so he can see more of
of messaging and flirting. her.
Millie is 14 and really fancies Joseph who is Laura is 14 and has an older brother called
two years above her at school. Joseph who is two years above her at school.
She is on the school intranet and is really She overheard a girl that she doesn’t like,
excited when she sees that he has left her an Millie, saying how much she fancies him.
email message. She didn’t think he had even Laura decides it will be really funny to send
noticed her! Millie messages, using her brother’s school
Millie sends a message back and feels so email address. When Millie sends a reply
happy when he responds. He sounds really Laura laughs out loud. How can Millie be
interested and seems to know lots about her. stupid enough to believe Joseph would ever
He must have asked around. Thrilled, Millie look at her? Sharing the joke with her
waits online hoping that Joseph will take it a friends, Laura composes a message from
step further and ask her out. ‘Joseph’ to ask Millie out. Hopefully Millie
will fall for it and everyone can have a laugh
watching Millie waiting for her non-existent
‘date’!
Jenna is 15 and arguing a lot with her mum. Stephen is 33 and enjoys chatting online as
She thinks her mum sets stupid rules that no ‘Shelley’ in teenage chatrooms. He tells
one else has to live by. himself that he only wants to talk and is not
She has been grounded for coming home late really doing any harm.
and spends time online in her bedroom Recently he has been talking to a young
instead of seeing her mates. For the last three woman, Jenna, who seems really lonely since
nights she has been pouring her heart out to arguing with her mum. Stephen encourages
‘Shelley’. Shelley doesn’t get on with her Jenna to share her feelings and tells her he
parents either and the girls have talked until understands, as he hasn’t got a very good
the early hours of the morning. relationship with his mother either.
After her mum nearly caught them chatting They have agreed to keep their friendship a
online ‘Shelley’ suggests that they keep their secret and Stephen looks forward to the day
friendship a secret. they can meet in the real world.
PRIVATE OR PERSONAL?
Aim
The aim of this activity is to help young people identify the difference
between private and personal information and enable them to make safe
choices online.
How to do it
Suggest that the Internet is a great place to learn, be entertained, explore
issues and try out new ideas. However, to get access to lots of sites there
is a requirement to give information. This information tends to fall into
two categories – private or personal. Explain that when setting up a
profile online it is a good idea to know the difference.
Now divide into small groups and ask each group to come up with two
lists. One should be headed ‘Private Identity Information’ and the other
‘Personal Identity Information’.
Private identity information should include:
full name and address
passwords
National Insurance/Social Security number
phone number
bank details.
Personal identity information includes:
name you wish to be called online
age
gender
favourite music
your opinion on issues.
Review the lists and discuss. Reinforce that personal information should
be things that you are happy for people you don’t know to view. This
means that you can safely explore the Internet, chat online and get
involved with groups who have similar interests, without the information
you give identifying you, your family or friends.
Suggest that before giving out information online it is worth asking
one question: ‘Would I give this information out to a stranger in the street
if they asked me?’
Conclude the session by outlining other security measures, such as
only allowing visitors to see a limited profile or keeping your webchat
groups exclusive to friends.
SAY WHAT YOU MEAN!
Aim
This whole group discussion enables young people to consider
responsibility when sending emails or texts.
How to do it
Open the session by asking the young people to think of an email or text
that they have sent and regretted. Invite examples and then move on to
suggest that research shows that people are even more likely to send
messages that they later wish they hadn’t after drinking alcohol.
In 2008 Gmail engineer Jon Perlow came up with an idea to help
resolve this problem. He called it Google Goggles, which made the user
take an easy maths test before allowing them to send a message. If they
failed the test the message would remain unsent.
Writing on a Google blog, Mr Perlow said: ‘Sometimes I send
messages I shouldn’t send. Like the time I told a girl I had a crush on her
over text message. Or the time I sent a late night email to my ex-
girlfriend saying that we should get back together’ (Sky News,
Wednesday, 8 October 2008).
The facility is only available late at night and at the weekend, and you
can check it out by going to Mail Goggles (currently in a testing phase).
It can only be activated by Gmail users by clicking ‘Settings’ at the top
of a Gmail page and then going to the ‘Labs’ section.
Divide the main group into two and hand each an opposing discussion
point, and set them the task of formulating arguments to support that
view. Distribute flipchart paper and marker pens so they can make notes.
GROUP 1 This is ridiculous! People should be taught to think a bit more
carefully about the messages they send, drink less and take
responsibility for their actions.
GROUP 2 This is brilliant! It will stop people upsetting each other and saying
things that they don’t mean when they have had a few drinks. This
software should come as standard on every phone and email service.
Set up the room with half the chairs on one side and half on the other,
facing each other. Invite each group to sit behind their spokesperson(s)
and then in turn make their argument. Once both sides have been heard,
facilitate a debate that encourages questions and challenges any claims
made.
Finally, call time on the debate and explain that having heard both
sides of the debate you are putting it to the vote. Each person has two
votes: first for the argument that they think was presented best (this will
allow for them all to vote for themselves!) and second for the argument
that they support, having heard both sides.
SOCIAL NETWORKING TODAY:
INTERVIEW TOMORROW
Aim
This session uses an article as a prompt for young people to consider the
impact personal information they share on social network sites today can
have on prospective employers.
How to do it
Introduce the session by asking which members of the group have
MySpace, Facebook or Bebo accounts. Conclude that these sites offer a
great way to keep in touch, share pictures and build a personal profile
that reflects your personality.
Now read out the following quote, taken from a newspaper article by
David Randall and Victoria Richards in The Independent (Sunday, 10
February 2008).
A survey released by Viadeo said that 62 per
cent of British employers now check the
Facebook, MySpace or Bebo pages of some
applicants, and that a quarter had rejected
candidates as a result.
Working in pairs, ask the young people to go online (or do it from
memory if this is not possible) and have a look at their own social
network page. Using the paper and pens, they should list all the things
that they think a potential employer may find attractive. Ask them to
highlight anything that they think would really give them the edge over
other candidates if they were applying for a job.
They should then look again and note down anything they think
doesn’t give such a good impression. Once again, ask for examples. What
message does the information give about the person? How correct is this?
Invite feedback from the findings and discuss. Conclude by
considering the rights and wrongs of employers using this method to find
out about people. How does this fit with corporate equal opportunity
policies? Is it an invasion of privacy or a perfectly justifiable way of
finding out what someone is really like?
End by asking the young people if there is any information they will
withhold now they know that some employers look.
HOW I FEEL
Aim
This activity focuses on the emotions that might be felt in cyberbullying
situations and offers information about support networks.
How to do it
Give each young person an A6 piece of card numbered 1 to 10 down the
left-hand side. Explain that you will be reading a scenario for each
number. Against each number they should write down how they think
they would feel if this scenario happened to them. These are not all
bullying situations and they may provoke more than one emotion. For
example, number 9 might provoke embarrassment, but it might also
produce anger. Stress that all feelings are valid and that no names are
required.
Cyber situations
1. You go online and find that half your ‘friends’ have deleted
you as a ‘friend’ on Facebook.
2. You join in sending threatening texts to someone you’ve
argued with.
3. You get 5000 hits on your band’s MySpace profile after a
gig.
4. The person you fancy asks you out on MSN.
5. You gave your number to somebody special last night and
they promised to call – you are still waiting.
6. You post your holiday pictures on Bebo and someone
comments that you look fat.
7. You design a website and everyone says how good it is.
8. You see friends making fun of someone in a chatroom for
getting good grades at school.
9. You have a serious wardrobe malfunction that your friend
videos and Bluetooths to everyone you know.
10. Someone sets up an online poll called WE ALL HATE
[your name].
Collect the anonymous cards in. Write 1 to 10 on the flipchart and write
down every feeling that was mentioned against each number. If there are
duplicates tally them up.
Go through these feelings with the group, reinforcing that it is okay to
feel this way but it is also okay to tell someone how you are feeling. This
is true for good and bad experiences.
Make sure that the young people are clear about the support available
if they need it.
CYBER COURT
Before you consider this activity you need to be aware of the dynamics
within the group you plan to work with. It may not be appropriate for
someone who has either been a recent victim or perpetrator of
cyberbullying.
Aim
This activity offers young people the opportunity to explore
cyberbullying from different perspectives and consider consequences.
How to do it
This is a role-play activity to work through issues highlighted during the
Cyber Court. There are no correct responses as the young people direct
the role play and come up with answers. The facilitator’s job is to set the
scene, make sure that no one is feeling uncomfortable and that any issues
raised are resolved.
Ask the group to form a circle and then read the following, changing
the gender to suit your group.
You have not told anyone You are angry because You don’t think that you
what is happening, you feel you don’t think you have should be here at all – you just
embarrassed, ashamed and done anything wrong. It went along with your friend,
scared. These girls used to be was just a joke that got a none of it was your idea.
your friends and you just wish bit out of hand – what is Everyone always blames you;
things could go back to the all the fuss about? it’s not fair.
way they were before.
You don’t think it is right that You feel really bad You know what has happened
someone is being picked on, because you know what but you are scared about what
but the other girls are your has been happening and will happen to you if you say
friends and you don’t want to joined in at first. You something. The other girls
fall out with them. have tried to support the have made it clear that you
victim, but it has been will be next if you ‘grass’.
hard to gain her trust.
Aim
To review learning and create a series of reminders to be referred to in
later sessions.
How to do it
Divide the young people into pairs and organize access to a computer for
each pair.
Tell them to open a document in PowerPoint and set up a landscape
page. Set each pair the task of devising six questions about cyberbullying
that they know the answers to. Then create 12 slides: six questions,
followed by six answers. Print as a handout with six slides per page. The
questions will be on one sheet and the answers on another.
Take the question sheet and carefully cut round three sides, leaving the
top, to create a flap.
Now, place the question sheet on top of the answer sheet and glue the
top edges, making sure that the top sheet doesn’t get glued down
anywhere else. Check by lifting the flap; you should be able to see the
answers.
Finally, invite the young people to swap Review Boards. They should
try to answer the questions set, checking their answers by looking
underneath if they need to.
These can be displayed for other young people to see and used later as
recorded outcomes to document learning.
THINK, FEEL, DO
Aim
This review encourages young people to come up with solutions to
cyberbullying scenarios.
How to do it
Divide the young people into groups of three to five. Hand each group
one or two of the cyberbullying scenarios to read.
They should then divide their paper into three columns: Think, Feel
and Do. After discussion they should write under the Think and Feel
headings and then, under the Do heading, provide their best solution for
dealing with the problem.
Invite each group to present their solution, and facilitate a short
discussion after each round. The discussion papers provide recorded
outcomes for the session.
Think, feel, do
1. A student shows you a website he has made about another
student.
2. You get an email showing a picture of someone you know doing
something silly and asking you to forward it to your friends.
3. A friend shows you a text she has received from another girl
saying that she is going to make her sorry for stealing her
boyfriend.
4. You are in a chatroom and your friends are gossiping about
another friend who is not online.
5. Someone at school suggests emailing untrue allegations to the
headteacher about a teacher to get back at them for putting the
class in detention.
6. You hear online of a plan for a big fight in town – there might be
knives involved.
7. Two girls wrote a song with abusive lyrics about another girl,
which they plan to upload onto YouTube.
EVALUATION TAGS
Aim
To encourage young people to reflect on the learning that has taken place,
and make a pledge to do one thing as a result of it.
How to do it
To prepare for the activity, clear and mark off a wall space to use as a
display area. Hand each young person a string luggage tag and a pen. On
one side they should write their name. On the other they should think
about the session they have taken part in and write down one thing that
they are going to do now. This should be something achievable, for
example looking on one of the anti-bullying websites listed at the end of
this book to find out more, or asking to see their school or college policy.
When everyone has made their ‘pledges’ give out drawing pins/thumb
tacks and invite them to stick the tag up in the display area. Display the
tags name side up and leave them to refer back to over the next sessions
to see who has kept their pledges.
As tasks are completed, take the tags down and ask young people to
write about fulfilling their pledge. These can then be used as recorded
outcomes of learning.
CYBER POSTERS
Aim
This activity creates a visual review of learning that can also inform other
young people.
How to do it
In advance, on small pieces of paper, write some poster titles that relate
to the session you have just facilitated. Example titles for posters are:
What is Cyberbullying?
Who is a Cyberbully?
Types of Cyberbullying
Someone to Tell
Our Cyber Policy.
Divide the young people into small groups and then explain that the task
for each group is to design a poster from the title they are given. The
rules for the task are:
1. Everyone should take part.
2. Each poster should have at least five important points on it.
3. Each group will present their poster.
4. Posters will be displayed to remind participants of the session and
inform other young people.
Hand out a title, paper and marker pens to each group and allow 15
minutes for them to complete the task.
Invite each group to present their poster, leading a round of applause
after each and encouraging questions and debate.
Display the posters where they can be seen.
USEFUL WEBSITES
These websites contain cyberbullying information and are useful for
updating legislation and knowledge. However, the author can take no
responsibility for the contents, and the views expressed are not
necessarily shared or endorsed because they are included.
www.anti-bullyingalliance.org.uk
The Alliance brings together over 60 organizations onto one website with
the aim of reducing bullying.
www.bbc.co.uk/switch/surgery/advice/your_world/bullying/bullying_
are_you_a_bully
www.bbc.co.uk/switch/surgery/advice/your_world/bullying/bullying_
are_you_being_bullied
Web pages from the BBC with resources and information on
cyberbullying and how to combat it.
www.bullying.co.uk
Young people’s website based in the UK offering information and
support.
www.chatdanger.com
The site is all about the potential dangers of using interactive services,
such as chat, games and email.
www.childnet.com
Advises on Internet safety and has a range of leaflets for children and
parents.
www.cyberbullying.org
This is a Canadian-based site set up to advise and support young people
on preventing and taking action against cyberbullying.
www.cyberbullying.us
Cyberbullying Research Center provides information about
cyberbullying among adolescents. It offers fact sheets, cases, research
and stories to help stop online cruelty.
www.cybermentors.org.uk
This UK website is all about young people helping and supporting each
other online.
www.digizen.org
A website to support and showcase young people’s positive social
engagement and participation online.
www.stopcyberbullying.org
This US website has been set up by Parry Aftab, a cyberspace lawyer and
child advocate. It offers support and guidance to young people and
parents about how to stay safe online.
www.stoptextbully.com
An interactive website that helps young people tackle mobile phone and
online bullying and prevent it ever happening to them. There’s also
advice for pupils, parents, carers and teachers.
www.thinkuknow.co.uk
Information from the Child Exploitation and Online Protection Centre
about how to stay safe online.
www.websafecrackerz.com
A website for children and young people, focusing on cyberbullying and
how to deal with phone abuse.