Custom Search

Thursday, April 8, 2010

CYBERBULLYING


Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as: hitting or punching (physical bullying), teasing or name-calling (verbal bullying), or intimidation through gestures or social exclusion. In recent years, technology has given children and youth a new means of bullying each other.
Cyberbullying, which is sometimes referred to as online social cruelty or electronic bullying, can involve:
  • Sending mean, vulgar, or threatening messages or images
  • Posting sensitive, private information about another person
  • Pretending to be someone else in order to make that person look bad
  • Intentionally excluding someone from an online group (Willard, 2005)
Children and youth can cyberbully each other through:
  • Emails
  • Instant messaging
  • Text or digital imaging messages sent on cell phones
  • Web pages
  • Blogs
  • Chat rooms or discussion groups
  • Other information communication technologies

How Common Is Cyberbullying?

Although little research has been conducted on cyberbullying, recent studies have found that:
  • 18% of students in grades 6-8 said they had been cyberbullied at least once in the last couple of months; and 6% said it had happened to them 2 or more times (Kowalski et al., 2005).
  • 11% of students in grades 6-8 said they had cyberbullied another person at least once in the last couple of months, and 2% said they had done it two or more times (Kowalski et al., 2005).
  • 19% of regular Internet users between the ages of 10 and 17 reported being involved in online aggression; 15% had been aggressors, and 7% had been targets (3% were both aggressors and targets) (Ybarra & Mitchell, 2004).
  • 17% of 6-11 year-olds and 36% of 12-17-year-olds reported that someone said threatening or embarrassing things about them through email, instant messages, web sites, chat rooms, or text messages (Fight Crime: Invest in Kids, 2006).
  • Cyberbullying has increased in recent years. In nationally representative surveys of 10-17 year-olds, twice as many children and youth indicated that they had been victims and perpetrators of online harassment in 2005 compared with 1999/2000 (Wolak, Mitchell, & Finkelhor, 2006).

Who Are The Victims and Perpetrators of Cyberbullying?

In a recent study of students in grades 6-8 (Kowalski et al., 2005):
  • Girls were about twice as likely as boys to be victims and perpetrators of cyber bullying.
  • Of those students who had been cyberbullied relatively frequently (at least twice in the last couple of months):
    • 62% said that they had been cyberbullied by another student at school, and 46% had been cyberbullied by a friend.
    • 55% didn't know who had cyberbullied them.
  • Of those students who admitted cyberbullying others relatively frequently:
    • 60% had cyberbullied another student at school, and 56% had cyberbullied a friend.

What Are The Most Common Methods of Cyberbullying?

In studies of middle and high school students, (Fight Crime: Invest in Kids, 2006; Kowalski et al., 2005; Wolak, Mitchell, & Finkelhor, 2006) the most common way that children and youth reported being cyberbullied was through instant messaging. Somewhat less common ways involved the use of chat rooms, emails, and messages posted on Web sites. A study of younger children (Fight Crime: Invest in Kids, 2006) showed that they were most often bullied through email, comments on a Web site, or in a chat room.

Where Are Children and Youth Cyberbullied?

In a telephone survey of preteens (6-11 year-olds) and teens (12-17 year-olds) (Fight Crime: Invest in Kids, 2006):
  • 45% of preteens and 30% of teens who had been cyberbullied received the messages while at school.
  • 44% of preteens and 70% of teens who had been cyberbullied received the messages at home.
  • 34% of preteens and 25% of teens who had been cyberbullied received the messages while at a friend's house.


Do Children Tell Others If They Are Cyberbullied?

According to one telephone survey of preteens and teens (Fight Crime: Invest in Kids, 2006):
  • 51% of preteens but only 35% of teens who had been cyberbullied had told their parents about their experience.
  • 27% of preteens and only 9% of teens who had been cyberbullied had told a teacher.
  • 44% of preteens and 72% of teens who had been cyberbullied had told a friend.
  • 31% of preteens and 35% of teens who had been cyberbullied had told a brother or sister.
  • 16% of preteens and teens who had been cyberbullied had told no one.

How Does Cyberbullying Differ From Other Traditional Forms of Bullying?

Available research and experience suggest that cyberbullying may differ from more “traditional” forms of bullying in a number of ways (Willard, 2005), including:
  • Cyberbullying can occur any time of the day or night.
  • Cyberbullying messages and images can be distributed quickly to a very wide audience.
  • Children and youth can be anonymous when cyberbullying, which makes it difficult (and sometimes impossible) to trace them.

What Can Adults Do To Prevent and Address Cyberbullying?

Adults may not always be present in the online environments frequented by children and youth. Therefore, it is extremely important that adults pay close attention to cyberbullying and the activities of children and youth when using these newer technologies.
Suggestions for Parents: Tips To Help Prevent Cyberbullying:
  • Keep your home computer(s) in easily viewable places, such as a family room or kitchen.
  • Talk regularly with your child about online activities that he or she is involved in.
    • Talk specifically about cyberbullying and encourage your child to tell you immediately if he or she is the victim of cyberbullying, cyberstalking, or other illegal or troublesome online behavior.  View the Campaign’s Webisodes with your child and discuss in particular Webisode 5 that addresses cyberbullying.
    • Encourage your child to tell you if he or she is aware of others who may be the victims of such behavior.
    • Explain that cyberbullying is harmful and unacceptable behavior.  Outline your expectations for responsible online behavior and make it clear that there will be consequences for inappropriate behavior.
  • Although adults must respect the privacy of children and youth, concerns for your child’s safety may sometimes override these privacy concerns.  Tell your child that you may review his or her online communications if you think there is reason for concern.
  • Consider installing parental control filtering software and/or tracking programs, but don’t rely solely on these tools.
Tips For Dealing With Cyberbullying That Your Child Has Experienced:
Because cyberbullying can range from rude comments to lies, impersonations, and threats, your responses may depend on the nature and severity of the cyberbullying.  Here are some actions that you may want to take after-the-fact.
  • Strongly encourage your child not to respond to the cyberbullying.
  • Do not erase the messages or pictures. Save these as evidence.
  • Try to identify the individual doing the cyberbullying. Even if the cyberbully is anonymous (e.g., is using a fake name or someone else’s identity) there may be a way to track them through your Internet Service Provider. If the cyberbullying is criminal (or if you suspect that it may be), contact the police and ask them to do the tracking.
  • Sending inappropriate language may violate the “Terms and Conditions” of email services, Internet Service Providers, Web sites, and cell phone companies. Consider contacting these providers and filing a complaint.
  • If the cyberbullying is coming through email or a cell phone, it may be possible to block future contact from the cyberbully. Of course, the cyberbully may assume a different identity and continue the bullying.
  • Contact your school. If the cyberbullying is occurring through your school district’s Internet system, school administrators have an obligation to intervene. Even if the cyberbullying is occurring off campus, make your school administrators aware of the problem. They may be able to help you resolve the cyberbullying or be watchful for face-to-face bullying.
  • Consider contacting the cyberbully’s parents. These parents may be very concerned to learn that their child has been cyberbullying others, and they may effectively put a stop to the bullying.  On the other hand, these parents may react very badly to your contacting them. So, proceed cautiously. If you decide to contact a cyberbully’s parents, communicate with them in writing — not face-to-face. Present proof of the cyberbullying (e.g., copies of an email message) and ask them to make sure the cyberbullying stops.
  • Consider contacting an attorney in cases of serious cyberbullying. In some circumstances, civil law permits victims to sue a bully or his or her parents in order to recover damages.
  • Contact the police if cyberbullying involves acts such as:
    • Threats of violence
    • Extortion
    • Obscene or harassing phone calls or text messages
    • Harassment, stalking, or hate crimes
    • Child pornography
If you are uncertain if cyberbullying violates your jurisdiction’s criminal laws, contact your local police, who will advise you.
Suggestions For Educators
  • Educate your students, teachers, and other staff members about cyberbullying, its dangers, and what to do if someone is cyberbullied.
  • Be sure that your school’s anti-bullying rules and policies address cyberbullying.
  • Closely monitor students’ use of computers at school.
  • Use filtering and tracking software on all computers, but don’t rely solely on this software to screen out cyberbullying and other problematic online behavior.
  • Investigate reports of cyberbullying immediately. If cyberbullying occurs through the school district’s Internet system, you are obligated to take action. If the cyberbullying occurs off-campus, consider what actions you might take to help address the bullying:
    • Notify parents of victims and parents of cyberbullies of known or suspected cyberbullying.
    • Notify the police if the known or suspected cyberbullying involves a threat.
    • Closely monitor the behavior of the affected students at school for possible bullying.
    • Talk with all students about the harms caused by cyberbullying. Remember — cyberbullying that occurs off-campus can travel like wildfire among your students and can affect how they behave and relate to each other at school.
    • Investigate to see if the victim(s) of cyberbullying could use some support from a school counselor or school-based mental health professional.
  • Contact the police immediately if known or suspected cyberbullying involves acts such as:
    • Threats of violence
    • Extortion
    • Obscene or harassing phone calls or text messages
    • Harassment, stalking, or hate crimes
    • Child pornography
media link

Thursday, April 1, 2010

21 secrets the tech industry does not want you to know

The list of 21 secrets the tech industry does not want you to know the site was compiled by PC World with a view to inform and advise what to do about them.


- Internet media company we have fully identified. - Internet media company We Have Fully Identified. At least, ISPs have that power and used to track for example, those who use P2P networks and even whether protected content is being downloaded for the rights of self. At least, ISPs and power That Have Used to track for example, use P2P networks Those Who and Whether Even Being protected content is downloaded for the rights of self. And as in Chile, the different organizations that ensure these rights are seeking the law allows them to tap into the connections and what each user is doing on the Internet to pursue these "crimes." And as in Chile, the Different Organizations Ensure That These rights are the law seeking "Allows them to Tap Into the connections and What Each user is doing on the Internet to Pursue these" crime. "

- The phones do not cause the aircraft to crash. - The phones do-not cause the aircraft to crash. Because despite what we all believe and not allow even turn the phones during a flight, there is no evidence that actually cause interference with navigation systems of aircraft. Because Uncle Tom What we all believe and not allowed turn the phones Even During a flight, There Is No Evidence That Actually cause Interference with navigation systems of aircraft. In fact, you probably do not even have a sign in the air, eliminating any risk. In Fact, you do Probably Not Even Have A sign in the air, Eliminating Any Risk.


- Navigation features "private" Internet browsers is not as secret. - Navigation features "private" Internet browsers is Not as secret. While this feature leaves no trace on the computer of the pages you've visited, like creating a record, thanks to the IP address and Internet provider company can know everything. While this feature leaves no trace on the computer of the pages you've visited, like Creating a record, thanks to the IP address and Internet provider company dog know everything. To avoid this, programs such as anonymized. To Avoid this, Programs Such as anonymized.


- The ink cartridges are unreasonably expensive. - The ink cartridges are unreasonably expensive. Because large companies have created advertising campaigns to convince users to buy spare parts or refill cartridges alternative is highly damaging to the printer. Because large companies created advertising Campaigns to Have convinces users to buy spare parts or refill cartridges is highly Damaging alternative to the printer. Apparently, the truth is not so well, and while there is a higher risk that ink will come out and stain and spoil the printer (or do not work perfectly) the price difference makes it worth risking . Apparently, the truth is not so well, and while There Is a High Risk That Will Come Out and ink stain and spoil the printer (or do Not Work Perfectly) the price makes it worth risking Difference. The savings are more significant than that. The savings are more Significant Than That.


- The license governing the rights of software may not be effective. - The license Governing the rights of software May Not be effective. That's because each country has different laws, and in some places, these licenses would be invalid. That's Because Each country has Different Laws, and in Some places, these licenses would be invalid.
- The cyberwarfare is increasing, and the U.S. - The cyberwarfare is Increasing, and the U.S. being lost. Being lost. The wars of the future will not be with lethal weapons and great battles between armies. The wars of the future will be with Not Lethal Weapons and great battles Between Armies. The way to undermine an enemy country is through the Internet, which is already happening, with continuous cyber-attacks aimed at breaking down different systems. The way to Undermine an enemy country will be Through the Internet, That Is Already something happening, with continuous cyber-attacks Different Aimed at breaking down systems. And getting the collapse is very simple, for example, through a simple DDOS attack, such as that directed against the U.S. North Korea And getting the collapse is very simple, for example, Through a simple DDOS attack, Such as That Directed Against the U.S. North Korea in July. last July.
- Google has the power to put the finger. - Google has the power to put the finger. And much more. And much more. The world's most used search engine handles much information about what we do, where we are and what our behavior on the Internet, would be sufficient to make a cross for detailed information. The world's most Used search engine handles much information about What we do, Where we are and What Our Behavior on the Internet, would be Sufficient to make a cross for Detailed Information. Only just think of the amount of data they handle who has a Google mail, calendar activities in Google Calendar, keeps his contacts there, share documents of all kinds on their servers, upload videos to YouTube, photos to Picassa and shouts to everyone where it is thanks to Latitude. Only just think of the amount of data Who They handle you to Google mail, calendar in Google Calendar Activities, There Keeps historical contacts, share documents of all kinds on Their servers, upload videos to YouTube, photos to Picassa and shouts it to everyone WHERE is thanks to Latitude.


- Pacemakers can also be hacked. - Pacemakers Can Also be hacked. At least, that showed a study by the University of Washington. At least, That Show a study by the University of Washington.


- Computers are highly toxic. - Computers are highly toxic. And although manufacturers have been diligent in removing harmful components, are still certain percentage of elements such as mercury, which if they are mishandled can cause a dangerous contamination. And although Manufacturers Have Been Diligent in Removing Harmful components, are Still Percentage of Certain Such elements as mercury, Which if mishandled They Are A Dangerous cause of contamination.


- The virus is not as effective in protecting the computer. - The virus is Not as Effective in Protecting the computer. There is always something that escapes and leaves a door open, which is quickly exploited by hackers to breach the systems. That There is Always something escapes and leaves a door open, Which Is Quickly Exploited by Hackers Breach to the systems.


- Your cell phone gives you away. - Gives You Your cell phone away. It is easy to know exactly where is a person through their phone, and although it has no GPS (which enable a more accurate location) simple triangulation of antennas which delivers data broadcast signal of our behavior and how we move. It is easy to know Exactly where is a person-through Their phone, and although it has no GPS (Which enable a more Accurate location) triangulation of simple antennas Which Delivers data broadcast signal of Our Behavior and how we move.
- There is no such thing as a cheap smartphone. - There is no such thing as a cheap smartphone. Whatever the option, usually on free loan to buy the company that subsidiarity in the end you end up paying thousands of dollars for their use. Whatever the option, Usually on free loan to buy the company That subsidiarity in the end you end up paying Thousands of dollars for Their use.


- You will spy webcam. - You will spy webcam. Of course, because even if one believes it is turned off, these devices can be operated for remote control. Of course, one Believes Because Even If It Is Turned Off, These Can be operated devices for remote control.


- Your boss can spy on you. - Your dog boss spy on you. And according to PC World, certainly does. And PC World According To, Certainly does. It's as easy as having one installed in the computer software to track everything you do instead of working. It's as easy as HAVING one installed in the computer software to track everything you do INSTEAD of working. Or to work, of course. Or to work, of course. In fact, a light indicator report that two thirds of employers monitor e-mails of their employees in the U.S. In Fact, a light indicator report two Thirds of Employers That monitor e-mails of Their Employees in the U.S.


- It is still possible to fight the industry that wants to stop piracy. - It Is Still possible to fight the industry That Wants to stop piracy. Several lawsuits against "pirates", charged to download content protected by copyright reason has been given to users, contrary to what associations representing the recording industry or looking film. Several Lawsuits against "pirates", charged to download content protected by copyright reason've Been Given to users, Contrary To What Associations Representing the recording industry or looking film.


- Electronic passports can be tapped. - Electronic Passports Can be tapped. Modernity put a chip indicates that these documents would make everything easier, but if you hack, can alter the data and making an innocent citizen, a dangerous criminal. Modernity put a chip Indicates That These documents would make everything Easier, But if you hack, can alter the data and making an innocent citizen, a criminal Dangerous. This, thanks to the technology they use, RFID, allows access to the chip through the air, using electromagnetic waves. This, thanks to the They use technology, RFID, Allows access to the chip-through the air, using electromagnetic waves.


- Social networks will never forget. - Social networks will never forget. And though one will regret having exposed on sites like Facebook, and the profile is deleted, the records are stored forever. And one will regret HAVING Though Exposed on sites like Facebook, and the profile is deleted, the records are stored forever.


- Almost any service contract may be terminated without paying a fine. - Almost Any service contract terminated May Be Without paying a fine. The law protects consumers. The Law Protects Consumers.


- The CIA knows everything. - The CIA knows everything. For the National Security Agency U.S. For the U.S. National Security Agency is simple and sniff the network involved in the activity of any user. is simple and sniff the network Involved in the activity of Any user.


- Facebook applications know more than necessary. - Facebook Applications Than know more necessary. You almost do not even realize, but when you install any new application, they are given permission to enter all our files and data, including those that are not visible. Almost Not Even You do realize, But When you install Any new application, They Are Given permission to enter All Our files and data, Including Those That are not visible.


- Geolocation Data are not private. - Geolocation Data Are Not private. Operators to store data on calls from their users, their movements and their rate plans, and eventually, they can sell this to others. Operators to store data on Their calls from users, Their Movements and Their rate plans, and Eventually, They sell this to Others.