Lesson 8: Cyber Bullying - The Carnegie Cyber...

4
Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University Page 21 www.carnegiecyberacademy.com Lesson 8: Cyber Bullying Learning Objectives Materials You Will Need Introduce cyber bullying and online harassment. Introduce cybersecurity issues related to cyber bullying. Raise students’ awareness of appropriate online behavior towards others. Raise students’ awareness about consequences related to cyber bullying and online harassment. Enhance students’ motor skills while navigating the game. Computers with Carnegie Cadets: The MySecureCyberspace Game installed Worksheet for Lesson 8: Cyber Bullying Hint Sheet 04 and 05 (download from http://www. carnegiecyberacademy.com/documents/hintSheet04. pdf and http://www.carnegiecyberacademy.com/ documents/hintSheet05.pdf) Classroom Activities (Duration: 45 minutes) Timeline Teacher Instructions Student Activities Introduce Concepts (15 min) Lead students into the game and direct them to the Clubhouse in Cyberspace. Have them talk to Betty and start their Level 2 training mission. (10 min) Have students listen to the tutorial and ask Betty the questions about cyber bullying. Start and log in to the game, then go to the Clubhouse in Cyberspace (CyberPort > Cyberspace Portal > Data Stream North > Clubhouse). Click on Betty and ask to start the Level 2 training mission. Listen to her tutorial and ask her all of the questions about cyber bullying. Develop and Practice (20 min) Let students play the mission until they earn a gold badge and then have them complete the ReQuest with Carlo. (20 min) Make sure all students earn a gold badge and unlock their third ReQuest with Carlo. Direct students to go to the CyberPort to complete the ReQuest with Carlo. If the students complete both the mission and ReQuest, hand out Hint Sheets 04 and 05 for the students to read. Play the mission until you earn a gold badge. After finishing the mission, go to the CyberPort and talk to Carlo (Data Stream North > Academy Portal). Offer to help him with cyber bullying. After completing the ReQuest, read Hint Sheets 04 and 05. Reinforce (10 min) Make sure all students have completed the mission and ReQuest and have read the two Hint Sheets. Hand out the worksheet and discuss questions 1-3 with them. (Worksheet, part 1) (7 min) Discuss strategies for protecting yourself from cyber bullying and avoiding becoming a cyber bully yourself with students. (Worksheet) (3 min) Read the worksheet and the three questions. Think about what Alan and his classmates could have done differently to prevent the situation from becoming worse. Think about ways to protect yourself from cyber bullying and ways that you might become a cyber bully, even if it is unintentional. Learning Outcomes At the end of this lesson, students will be able to: Demonstrate an understanding of cyber bullying and the electronics mediums used in cyber bullying. Follow a few basic cybersecurity steps to secure their private information online. Understand the importance of privacy and keeping their personal information private. Understand the consequences of cyber bullying and the effect on the victim. Understand how to deal with cyber bullying and how to protect yourself from cyber bullying.

Transcript of Lesson 8: Cyber Bullying - The Carnegie Cyber...

Page 1: Lesson 8: Cyber Bullying - The Carnegie Cyber...

Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University

Page 21www.carnegiecyberacademy.com

Lesson 8: Cyber Bullying

Learning Objectives Materials You Will NeedIntroduce cyber bullying and online harassment.• Introduce cybersecurity issues related to cyber bullying.• Raise students’ awareness of appropriate online behavior • towards others.Raise students’ awareness about consequences related to • cyber bullying and online harassment. Enhance students’ motor skills while navigating the game.•

Computers with Carnegie Cadets: The • MySecureCyberspace Game installedWorksheet for Lesson 8: Cyber Bullying• Hint Sheet 04 and 05 (download from • http://www.carnegiecyberacademy.com/documents/hintSheet04.pdf and http://www.carnegiecyberacademy.com/documents/hintSheet05.pdf)

Classroom Activities (Duration: 45 minutes)Timeline Teacher Instructions Student Activities

IntroduceConcepts (15 min)

Lead students into the game and direct them to the • Clubhouse in Cyberspace. Have them talk to Betty and start their Level 2 training mission. (10 min)Have students listen to the tutorial and ask Betty • the questions about cyber bullying.

Start and log in to the game, then go to the • Clubhouse in Cyberspace (CyberPort > Cyberspace Portal > Data Stream North > Clubhouse). Click on Betty and ask to start the Level 2 training mission. Listen to her tutorial and ask her all of the questions about cyber bullying.

Develop and

Practice (20 min)

Let students play the mission until they earn a gold • badge and then have them complete the ReQuest with Carlo. (20 min)

Make sure all students earn a gold badge and • unlock their third ReQuest with Carlo.Direct students to go to the CyberPort to • complete the ReQuest with Carlo.

If the students complete both the mission and • ReQuest, hand out Hint Sheets 04 and 05 for the students to read.

Play the mission until you earn a gold badge. •

After finishing the mission, go to the CyberPort • and talk to Carlo (Data Stream North > Academy Portal). Offer to help him with cyber bullying.After completing the ReQuest, read Hint Sheets 04 • and 05.

Reinforce (10 min)

Make sure all students have completed the mission • and ReQuest and have read the two Hint Sheets. Hand out the worksheet and discuss questions 1-3 with them. (Worksheet, part 1) (7 min)Discuss strategies for protecting yourself from • cyber bullying and avoiding becoming a cyber bully yourself with students. (Worksheet) (3 min)

Read the worksheet and the three questions. Think • about what Alan and his classmates could have done differently to prevent the situation from becoming worse.Think about ways to protect yourself from cyber • bullying and ways that you might become a cyber bully, even if it is unintentional.

Learning OutcomesAt the end of this lesson, students will be able to:

Demonstrate an understanding of cyber bullying and the electronics mediums used in cyber bullying.• Follow a few basic cybersecurity steps to secure their private information online.• Understand the importance of privacy and keeping their personal information private.• Understand the consequences of cyber bullying and the effect on the victim.• Understand how to deal with cyber bullying and how to protect yourself from cyber bullying.•

Page 2: Lesson 8: Cyber Bullying - The Carnegie Cyber...

Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University

Page 22www.carnegiecyberacademy.com

Worksheet 8: Cyber Bullying

1. Cyber Bullying

2. Protect Yourself from Cyber Bullying

Date: Name:

Cyber bullying is the use of the Internet to harass, intimidate, embarrass or demean others.

Quiz 1: What Jax did is considered cyber bullying, but Alan could have prevented this incident from happening. What could Alan have done differently to protect himself?

Quiz 2: What could Alan’s classmates have done differently to help and prevent the email from spreading more?

Quiz 3: Alan’s anger is understandable, but revenge will not solve the problem. What could Alan have done instead?

Betty, Clubhouse Supervisor

Do not share your personal information in cyberspace, especially photos 1. and videos of yourself.Never share your password with anyone except a trusted adult, no 2. matter how close of a friend they are.Never respond to a cyber bully and do not believe everything that is 3. posted online.Never send impulsive messages when you are angry or bored. You could 4. end up saying something that you will regret later.Tell a trusted adult about any cyber bullying and report it to authorities.5. Save emails or other evidence of cyber bullying for when you report it.6.

Page 3: Lesson 8: Cyber Bullying - The Carnegie Cyber...

If

an

em

ail

is f

rom

so

me

one

yo

u d

on’

t kn

ow

and

the

Sub

jec

t is

like

any

of

the

exa

mp

les

be

low

,

it

is p

rob

ab

ly S

pa

m:

© 2

012

Ca

rne

gie

Me

llon

Uni

ve

rsit

y. A

ll R

ight

s R

ese

rve

d.

It

soun

ds

too

go

od

to

be

tru

e

Se

nde

r: N

otM

CS

pa

mm

er

Sub

jec

t: Y

ou

just

wo

n m

illio

ns!!

It

is a

dv

ert

isin

g s

om

eth

ing

Se

nde

r: J

oe

Sc

hmo

eS

ubje

ct:

Gre

at

De

als

He

re

The

re a

re lo

ts o

f m

issp

elle

d w

ord

s

Se

nde

r: S

unsh

1n3

Sup

ers

t@r

Sub

jec

t: B

rit3

da

ts R

he

er

It

soun

ds

rea

lly s

tra

nge

Se

nde

r: M

oni

ca

Lin

dsa

yS

ubje

ct:

Re

: ma

ngo

jus

tifi

ed

The

em

ail

soun

ds

inte

rest

ing

but

yo

u w

ere

n’t

exp

ec

ting

it

Se

nde

r: b

rouh

aha

Sub

jec

t: W

in a

fre

e g

am

e c

ons

ole

!

Tip

s fo

r I

de

ntif

yin

g S

pa

m E

ma

ilsPe

rso

nal I

nfo

rma

tio

n is

info

rma

tio

n a

bo

ut y

our

OFF

LI

NE

ide

ntit

y t

hat

som

eo

ne c

oul

d u

se t

o

fig

ure

out

who

or

whe

re y

ou

are

, su

ch

as:

Wha

t sc

hoo

l yo

u g

o t

o

Your

te

ac

hers

’ na

me

s

Cre

dit

Ca

rd n

umb

ers

Lic

ens

e p

late

num

be

rs

Na

me

of

tea

m y

ou

pla

y f

or

Your

num

be

r o

n y

our

te

am

Pla

ce

s ne

ar

yo

ur h

ous

e,

like

st

ore

s, r

est

aur

ant

s, o

r p

ark

s

Pla

ce

s y

ou

vis

it r

eg

ula

rly

If

yo

u a

re h

om

e a

lone

Whe

n y

ou

are

go

ing

to

be

ho

me

alo

ne

Your

ful

l na

me

Your

Use

r na

me

or

Pass

wo

rd

Your

ag

e

Your

ID

num

be

r o

r S

oc

ial

Se

cur

ity

Num

be

r

Your

em

ail

ad

dre

ss

Your

ho

me

ad

dre

ss

Your

pho

ne n

umb

er

Wha

t c

ity

yo

u liv

e in

Wha

t ne

ighb

orh

oo

d y

ou

live

in

Your

pa

rent

s’ n

am

es

Whe

re y

our

pa

rent

s w

ork

Na

me

s o

r p

hone

num

be

rs o

f fa

mily

me

mb

ers

and

fri

end

s

Exa

mp

les

of

Pers

ona

l Inf

orm

ati

on

So

me

we

bsi

tes

co

nta

in D

ang

ers

tha

t c

an

da

ma

ge

yo

ur c

om

put

er

or

ste

al y

our

pe

rso

nal

info

rma

tio

n. W

hen

yo

u a

re e

xplo

ring

we

bsi

tes,

wa

tch

out

fo

r th

e f

ollo

win

g 4

Da

nge

rs:

Tip

s fo

r re

co

gni

zin

g W

eb

site

Da

nge

rs

Lin

ks t

hat

do

wnl

oa

d f

iles

Form

s th

at

ask

fo

r Pe

rso

nal

Inf

orm

ati

on

Ad

ve

rtis

em

ent

s a

nd P

op

ups

Thr

ea

teni

ng,

hurt

ful,

or

ad

ults

-o

nly

co

nte

nt

The

se li

nks

usua

lly a

sk if

yo

u w

ant

to

sa

ve

or

op

en

the

file

whe

n y

ou

clic

k o

n th

em

and

ca

n sa

y

som

eth

ing

like

“C

lick

to D

ow

nlo

ad

” o

r “D

ow

nlo

ad

No

w”

Ad

ve

rtis

em

ent

s ha

ve

co

nte

nt t

hat

is d

iffe

rent

tha

n th

e w

eb

site

the

y

are

on

(lik

e a

ca

r A

d o

n a

we

bsi

te

ab

out

pup

pie

s),

and

so

me

tim

es

the

y s

ay

“A

d”

or

“Ad

ve

rtis

em

ent

” o

n th

em

Form

s c

an

be

a D

ang

er

if t

hey

ask

fo

r p

ers

ona

l inf

orm

ati

on

like

yo

ur

full

nam

e o

r c

red

it c

ard

num

be

r

Co

nte

nt c

an

be

a D

ang

er

if it

m

ake

s y

ou

fee

l ic

ky o

r un

co

mfo

rta

ble

or

say

s A

dul

ts-

onl

y

or

“Yo

u m

ust

be

18

or

old

er”

on

it

Tip

s fo

r R

ep

ort

ing

Cy

be

r B

ully

ing

Cy

be

r b

ully

ing

is u

sing

the

Int

ern

et

to t

hre

ate

n, e

mb

arr

ass

, p

ick

on,

or

put

-d

ow

n p

eo

ple

. R

em

em

be

r to

sa

ve

ev

ide

nce

of

cy

be

r b

ully

ing

. He

re’s

so

me

tip

s fo

r d

ec

idin

g w

hom

to

re

po

rt

cy

be

r b

ully

ing

to

:

Co

nta

ct

the

we

bm

ast

er,

site

ow

ner,

or

cus

tom

er

serv

ice

and

re

que

st t

hat

the

off

ens

ive

m

ate

ria

ls b

e r

em

ov

ed

. If

tha

t d

oe

sn’t

wo

rk,

co

nta

ct

the

We

b s

ite

ho

st a

nd a

sk t

hem

to

pul

l d

ow

n th

e s

ite

if it

vio

late

s th

e t

erm

s o

f a

gre

em

ent

.

Co

nta

ct

the

bul

ly’s

IS

P t

o s

ee

if it

qua

lifie

s a

s a

bus

e. T

hey

ma

y s

end

a w

arn

ing

or

susp

end

the

us

er’

s a

cc

oun

t. C

ont

ac

t y

our

ow

n I

SP

fo

r he

lp w

ith

blo

cki

ng a

n a

cc

oun

t.

Co

nta

ct

the

pho

ne s

erv

ice

pro

vid

er

- m

ost

ca

lls c

an

be

tra

ce

d a

nd t

hey

ma

y b

e a

ble

to

blo

ck

the

ca

lls o

r le

t y

ou

kno

w w

here

the

y a

re c

om

ing

fro

m s

o y

ou

ca

n re

po

rt t

he a

bus

e.

Co

nta

ct

the

sc

hoo

l Pri

ncip

al o

r C

oun

selo

r. I

f th

e c

yb

erb

ully

ing

ha

pp

ens

at

scho

ol o

r is

a

ffe

cti

ng t

he s

cho

ol e

nvir

onm

ent

the

y m

ay

be

ab

le t

o in

terv

ene

. If

the

sc

hoo

l do

es

not

hav

e a

c

yb

er

bul

lyin

g p

olic

y, a

sk t

hem

to

cre

ate

one

.

If

the

bul

ly g

oe

s to

sc

hoo

l wit

h y

our

chi

ld...

If

the

bul

lyin

g h

ap

pe

ns t

hro

ugh

a c

ell

pho

ne...

If

the

bul

lyin

g h

ap

pe

ns t

hro

ugh

a W

eb

sit

e...

If

the

bul

lyin

g h

ap

pe

ns t

hro

ugh

Em

ail

or

Ins

tant

Me

ssa

ge

...

If

the

re is

the

thr

ea

t o

f p

hysi

ca

l da

nge

r...

Co

nta

ct

the

loc

al l

aw

enf

orc

em

ent

if t

here

is t

he t

hre

at

of

phy

sic

al h

arm

. The

y m

ay

als

o h

av

e a

sp

ec

ial c

yb

er

cri

me

s un

it t

hat

ca

n in

ve

stig

ate

.

Ne

tiq

uett

e T

ips

Ne

tiq

uett

e is

the

eti

que

tte

of

the

Int

ern

et,

sim

ple

rul

es

for

how

yo

u sh

oul

d a

ct

in

Cy

be

rsp

ac

e t

hat

kee

p t

hing

s p

olit

e a

nd h

elp

ev

ery

one

ge

t a

long

. He

re’s

so

me

tip

s fo

r b

ein

g

a g

oo

d C

yb

er

Cit

ize

n a

nd p

rac

tic

ing

go

od

Ne

tiq

uett

e:

Che

ck

for

typ

os

or

oth

er

mis

take

s b

efo

re y

ou

po

st o

r se

nd a

me

ssa

ge

. Use

e

mo

tic

ons

like

;)

and

ac

rony

ms

like

LO

L t

o g

et

yo

ur m

ess

ag

e a

cro

ss in

the

rig

ht

spir

it.

Av

oid

usi

ng A

LL

CA

PS

, it

me

ans

yo

u a

re s

hout

ing

.

Alw

ay

s a

sk p

erm

issi

on

be

fore

po

stin

g a

bo

ut s

om

eo

ne o

r sh

ari

ng a

n e

ma

il, p

hoto

, o

r c

hat

co

nve

rsa

tio

n, a

nd m

ake

sur

e t

hat

it d

oe

s no

t c

ont

ain

any

pe

rso

nal i

nfo

rma

tio

n.

Ke

ep

me

ssa

ge

s sh

ort

, p

olit

e,

and

to

the

po

int.

Do

n't

spa

m p

eo

ple

wit

h m

ulti

ple

m

ess

ag

es

or

wa

ste

the

ir t

ime

. Try

no

t to

use

to

o m

uch

cha

t sl

ang

if y

ou

thin

k th

e

oth

er

pe

rso

n w

on'

t un

de

rsta

nd it

.

Be

a C

ham

pio

n, n

ot

a C

hum

p

Be

po

lite

and

re

spe

ctf

ul o

f o

the

rs

Pay

Att

ent

ion

to F

orm

at

Ask

Be

fore

yo

u Po

st

Be

he

lpfu

l and

co

urte

ous

to

oth

ers

and

do

n't

be

a c

yb

er

bul

ly. I

f so

me

one

is b

ein

g

rud

e t

o y

ou,

be

the

be

tte

r p

ers

on.

Ta

lk t

o a

tru

ste

d a

dul

t, b

loc

k th

em

, o

r si

mp

ly

wa

lk a

wa

y. I

f th

ey

are

bul

lyin

g s

om

eo

ne e

lse

, d

on’

t jo

in in

and

ma

ke it

wo

rse

. Be

su

pp

ort

ive

and

po

siti

ve

and

try

to

he

lp t

he v

icti

m if

yo

u c

an.

Tip

s fo

r G

row

ing

a P

osi

tiv

e O

nlin

e R

ep

uta

tio

nYo

ur o

nlin

e r

ep

uta

tio

n c

an

be

po

siti

ve

or

neg

ati

ve

, it

all

de

pe

nds

on

how

yo

u b

eha

ve

whe

n y

ou'

re in

cy

be

rsp

ac

e a

nd w

hat

oth

er

pe

op

le s

ay

ab

out

yo

u.

Do

sha

re t

hing

s th

at

wo

uld

imp

rove

yo

ur r

ep

uta

tio

n a

s a

g

oo

d s

tud

ent

, a

go

od

fri

end

, a

nd a

te

am

pla

ye

r

Do

n’t

sha

re t

hing

s th

at

wo

uld

da

ma

ge

yo

ur r

ep

uta

tio

n a

s a

g

oo

d f

rie

nd a

nd a

re

spe

cta

ble

and

tru

stw

ort

hy p

ers

on

Do

n’t

sha

re t

hing

s th

at

will

ma

ke y

ou

a t

arg

et

for

we

ird

o

stra

nge

rs o

r b

ullie

s

Be

ca

refu

l ab

out

who

m y

ou

trust

wit

h y

our

re

put

ati

on

whe

n y

ou

ad

d t

hem

to

yo

ur f

rie

nds

and

sha

re t

hing

s w

ith

the

m

Be

on

the

lo

oko

ut

for

oth

ers

da

ma

gin

g y

our

re

put

ati

on

and

a

ct

quic

kly

to

min

imiz

e t

he d

am

ag

e

Page 4: Lesson 8: Cyber Bullying - The Carnegie Cyber...

If

an

em

ail

is f

rom

so

me

one

yo

u d

on’

t kn

ow

and

the

Sub

jec

t is

like

any

of

the

exa

mp

les

be

low

,

it

is p

rob

ab

ly S

pa

m:

© 2

012

Ca

rne

gie

Me

llon

Uni

ve

rsit

y. A

ll R

ight

s R

ese

rve

d.

It

soun

ds

too

go

od

to

be

tru

e

Se

nde

r: N

otM

CS

pa

mm

er

Sub

jec

t: Y

ou

just

wo

n m

illio

ns!!

It

is a

dv

ert

isin

g s

om

eth

ing

Se

nde

r: J

oe

Sc

hmo

eS

ubje

ct:

Gre

at

De

als

He

re

The

re a

re lo

ts o

f m

issp

elle

d w

ord

s

Se

nde

r: S

unsh

1n3

Sup

ers

t@r

Sub

jec

t: B

rit3

da

ts R

he

er

It

soun

ds

rea

lly s

tra

nge

Se

nde

r: M

oni

ca

Lin

dsa

yS

ubje

ct:

Re

: ma

ngo

jus

tifi

ed

The

em

ail

soun

ds

inte

rest

ing

but

yo

u w

ere

n’t

exp

ec

ting

it

Se

nde

r: b

rouh

aha

Sub

jec

t: W

in a

fre

e g

am

e c

ons

ole

!

Tip

s fo

r I

de

ntif

yin

g S

pa

m E

ma

ilsPe

rso

nal I

nfo

rma

tio

n is

info

rma

tio

n a

bo

ut y

our

OFF

LI

NE

ide

ntit

y t

hat

som

eo

ne c

oul

d u

se t

o

fig

ure

out

who

or

whe

re y

ou

are

, su

ch

as:

Wha

t sc

hoo

l yo

u g

o t

o

Your

te

ac

hers

’ na

me

s

Cre

dit

Ca

rd n

umb

ers

Lic

ens

e p

late

num

be

rs

Na

me

of

tea

m y

ou

pla

y f

or

Your

num

be

r o

n y

our

te

am

Pla

ce

s ne

ar

yo

ur h

ous

e,

like

st

ore

s, r

est

aur

ant

s, o

r p

ark

s

Pla

ce

s y

ou

vis

it r

eg

ula

rly

If

yo

u a

re h

om

e a

lone

Whe

n y

ou

are

go

ing

to

be

ho

me

alo

ne

Your

ful

l na

me

Your

Use

r na

me

or

Pass

wo

rd

Your

ag

e

Your

ID

num

be

r o

r S

oc

ial

Se

cur

ity

Num

be

r

Your

em

ail

ad

dre

ss

Your

ho

me

ad

dre

ss

Your

pho

ne n

umb

er

Wha

t c

ity

yo

u liv

e in

Wha

t ne

ighb

orh

oo

d y

ou

live

in

Your

pa

rent

s’ n

am

es

Whe

re y

our

pa

rent

s w

ork

Na

me

s o

r p

hone

num

be

rs o

f fa

mily

me

mb

ers

and

fri

end

s

Exa

mp

les

of

Pers

ona

l Inf

orm

ati

on

So

me

we

bsi

tes

co

nta

in D

ang

ers

tha

t c

an

da

ma

ge

yo

ur c

om

put

er

or

ste

al y

our

pe

rso

nal

info

rma

tio

n. W

hen

yo

u a

re e

xplo

ring

we

bsi

tes,

wa

tch

out

fo

r th

e f

ollo

win

g 4

Da

nge

rs:

Tip

s fo

r re

co

gni

zin

g W

eb

site

Da

nge

rs

Lin

ks t

hat

do

wnl

oa

d f

iles

Form

s th

at

ask

fo

r Pe

rso

nal

Inf

orm

ati

on

Ad

ve

rtis

em

ent

s a

nd P

op

ups

Thr

ea

teni

ng,

hurt

ful,

or

ad

ults

-o

nly

co

nte

nt

The

se li

nks

usua

lly a

sk if

yo

u w

ant

to

sa

ve

or

op

en

the

file

whe

n y

ou

clic

k o

n th

em

and

ca

n sa

y

som

eth

ing

like

“C

lick

to D

ow

nlo

ad

” o

r “D

ow

nlo

ad

No

w”

Ad

ve

rtis

em

ent

s ha

ve

co

nte

nt t

hat

is d

iffe

rent

tha

n th

e w

eb

site

the

y

are

on

(lik

e a

ca

r A

d o

n a

we

bsi

te

ab

out

pup

pie

s),

and

so

me

tim

es

the

y s

ay

“A

d”

or

“Ad

ve

rtis

em

ent

” o

n th

em

Form

s c

an

be

a D

ang

er

if t

hey

ask

fo

r p

ers

ona

l inf

orm

ati

on

like

yo

ur

full

nam

e o

r c

red

it c

ard

num

be

r

Co

nte

nt c

an

be

a D

ang

er

if it

m

ake

s y

ou

fee

l ic

ky o

r un

co

mfo

rta

ble

or

say

s A

dul

ts-

onl

y

or

“Yo

u m

ust

be

18

or

old

er”

on

it

Tip

s fo

r D

ea

ling

wit

h C

yb

er

Bul

lyin

gC

yb

er

bul

lyin

g is

usi

ng t

he I

nte

rne

t to

thr

ea

ten,

em

ba

rra

ss,

pic

k o

n, o

r p

ut-

do

wn

pe

op

le. T

hey

ca

n m

ake

yo

u p

rett

y m

ise

rab

le,

so if

yo

u e

ve

r ru

n in

to a

cy

be

r b

ully

, re

me

mb

er

the

se t

ips:

Whe

n a

Bul

ly a

tta

cks

, fi

rst

try

to

igno

re o

r b

loc

k th

em

.

If

the

att

ac

ks b

ec

om

e o

ve

rwhe

lmin

g o

r sc

ary

, y

ou

sho

uld

pro

ba

bly

let

a t

rust

ed

ad

ult

kno

w

ab

out

it.

The

Bul

ly is

pro

ba

bly

try

ing

to

pic

k a

fig

ht. I

f y

ou

ca

n la

ugh

it o

ff in

ste

ad

of

rea

cti

ng o

r

fig

htin

g b

ac

k, t

he B

ully

do

esn

’t g

et

wha

t th

ey

wa

nt.

Talk

wit

h y

our

tru

ste

d a

dul

t a

bo

ut s

tra

teg

ies

to d

ea

l wit

h th

e b

ully

ing

and

co

me

up

wit

h a

pla

n to

ge

the

r.

Be

pre

pa

red

to

re

po

rt t

he b

ully

.

Be

a g

oo

d c

yb

er

cit

ize

n a

nd h

elp

pre

ve

nt c

yb

er

bul

lyin

g.

Sa

ve

any

ev

ide

nce

of

the

bul

lyin

g,

suc

h a

s e

ma

il a

nd in

sta

nt m

ess

ag

es

and

sc

ree

nsho

ts o

f

we

b p

ag

es.

Se

e H

int

She

et

05

fo

r in

form

ati

on

on

how

to

re

po

rt c

yb

er

bul

lyin

g.

If

yo

u w

itne

ss c

yb

er

bul

lyin

g,

try

to

do

so

me

thin

g f

rie

ndly

to

he

lp t

he v

icti

m,

so t

hey

do

n't

fee

l

alo

ne. D

on'

t jo

in in

and

ma

ke t

hing

s w

ors

e.

Pro

tec

t y

our

self

fro

m c

yb

er

bul

lyin

g a

s m

uch

as

po

ssib

le.

Ma

ke s

ure

tha

t y

ou

wo

n’t

be

an

ea

sy t

arg

et

for

cy

be

r b

ullie

s. D

on’

t sh

are

yo

ur p

ers

ona

l

info

rma

tio

n in

Cy

be

rsp

ac

e,

esp

ec

ially

pho

tos

and

vid

eo

s, a

nd d

on’

t tr

y t

o p

ick

fig

hts

wit

h

oth

er

pe

op

le.

Ne

tiq

uett

e T

ips

Ne

tiq

uett

e is

the

eti

que

tte

of

the

Int

ern

et,

sim

ple

rul

es

for

how

yo

u sh

oul

d a

ct

in

Cy

be

rsp

ac

e t

hat

kee

p t

hing

s p

olit

e a

nd h

elp

ev

ery

one

ge

t a

long

. He

re’s

so

me

tip

s fo

r b

ein

g

a g

oo

d C

yb

er

Cit

ize

n a

nd p

rac

tic

ing

go

od

Ne

tiq

uett

e:

Che

ck

for

typ

os

or

oth

er

mis

take

s b

efo

re y

ou

po

st o

r se

nd a

me

ssa

ge

. Use

e

mo

tic

ons

like

;)

and

ac

rony

ms

like

LO

L t

o g

et

yo

ur m

ess

ag

e a

cro

ss in

the

rig

ht

spir

it.

Av

oid

usi

ng A

LL

CA

PS

, it

me

ans

yo

u a

re s

hout

ing

.

Alw

ay

s a

sk p

erm

issi

on

be

fore

po

stin

g a

bo

ut s

om

eo

ne o

r sh

ari

ng a

n e

ma

il, p

hoto

, o

r c

hat

co

nve

rsa

tio

n, a

nd m

ake

sur

e t

hat

it d

oe

s no

t c

ont

ain

any

pe

rso

nal i

nfo

rma

tio

n.

Ke

ep

me

ssa

ge

s sh

ort

, p

olit

e,

and

to

the

po

int.

Do

n't

spa

m p

eo

ple

wit

h m

ulti

ple

m

ess

ag

es

or

wa

ste

the

ir t

ime

. Try

no

t to

use

to

o m

uch

cha

t sl

ang

if y

ou

thin

k th

e

oth

er

pe

rso

n w

on'

t un

de

rsta

nd it

.

Be

a C

ham

pio

n, n

ot

a C

hum

p

Be

po

lite

and

re

spe

ctf

ul o

f o

the

rs

Pay

Att

ent

ion

to F

orm

at

Ask

Be

fore

yo

u Po

st

Be

he

lpfu

l and

co

urte

ous

to

oth

ers

and

do

n't

be

a c

yb

er

bul

ly. I

f so

me

one

is b

ein

g

rud

e t

o y

ou,

be

the

be

tte

r p

ers

on.

Ta

lk t

o a

tru

ste

d a

dul

t, b

loc

k th

em

, o

r si

mp

ly

wa

lk a

wa

y. I

f th

ey

are

bul

lyin

g s

om

eo

ne e

lse

, d

on’

t jo

in in

and

ma

ke it

wo

rse

. Be

su

pp

ort

ive

and

po

siti

ve

and

try

to

he

lp t

he v

icti

m if

yo

u c

an.

Tip

s fo

r G

row

ing

a P

osi

tiv

e O

nlin

e R

ep

uta

tio

nYo

ur o

nlin

e r

ep

uta

tio

n c

an

be

po

siti

ve

or

neg

ati

ve

, it

all

de

pe

nds

on

how

yo

u b

eha

ve

whe

n y

ou'

re in

cy

be

rsp

ac

e a

nd w

hat

oth

er

pe

op

le s

ay

ab

out

yo

u.

Do

sha

re t

hing

s th

at

wo

uld

imp

rove

yo

ur r

ep

uta

tio

n a

s a

g

oo

d s

tud

ent

, a

go

od

fri

end

, a

nd a

te

am

pla

ye

r

Do

n’t

sha

re t

hing

s th

at

wo

uld

da

ma

ge

yo

ur r

ep

uta

tio

n a

s a

g

oo

d f

rie

nd a

nd a

re

spe

cta

ble

and

tru

stw

ort

hy p

ers

on

Do

n’t

sha

re t

hing

s th

at

will

ma

ke y

ou

a t

arg

et

for

we

ird

o

stra

nge

rs o

r b

ullie

s

Be

ca

refu

l ab

out

who

m y

ou

trust

wit

h y

our

re

put

ati

on

whe

n y

ou

ad

d t

hem

to

yo

ur f

rie

nds

and

sha

re t

hing

s w

ith

the

m

Be

on

the

lo

oko

ut

for

oth

ers

da

ma

gin

g y

our

re

put

ati

on

and

a

ct

quic

kly

to

min

imiz

e t

he d

am

ag

e