Glossary Cyber Bullying Terms for Parents and Teachers

Cyber Bullying Related Terms

 

Bash Board: An online bulletin board on which individuals may post anything they want. The content tends to be malicious, ridiculing, hateful statements directed against another person.

<?xml:namespace prefix = o ns = “urn:schemas-microsoft-com:office:office” /> 

Blog: Interactive web journal or diary (web log) viewable to general audience or specific groups

 

Buddy List: Collection of real names, screen names, or handles which represent “friends” or buddies within an instant message, chat program, or cell phone.

 

Cyberbullying: Cyberbullying is the use of e-mail, instant messaging, chat rooms, pagers, cell phones, or other forms of information technology to deliberately harass, threaten, or intimidate someone.

 

Cyber Bullying Victim: The one who is on the receiving end of online social cruelty

 

Cyberstalking: Harassment that includes threats of harm or is highly intimidating and intruding upon one’s personal privacy.

 

Cyberthreats: Online material that either generally or specifically raises concerns that the creator may intent to inflict harm or violence to self of others.

 

IM/Instant Messaging: The act of instantly communicating between two or more people over a network such as the Internet.

 

Flaming (email text etc.): Sending rude, crude, angry or obscene messages directed at a person or persons either privately or to an online group.

 

Happy Slapping: Extreme form of bullying where physical assaults are recorded on mobile phones and distributed to others. Sometimes they are posted on Social Networking sites or blogs.

 

Harassment: Unsolicited words or actions intended to annoy, alarm or abuse another individual

 

ISP: Internet Service Provider, the company that provides an Internet connection to individuals or companies

 

Offender: The one who instigates online social cruelty

 

Social Networking web sites: Online service that bring together people by organizing them around a common interest or by providing an interactive environment of photos bligs, user profiles, and messaging systems. Examples include Facebook and MySpace.

 

Spam: Unsolicited electronic mail sent from someone you do not know.

 

Trolling: Deliberately positing false information to entine a genuinely helpful people to respond and contribute to the discussion.

 

URL: Universal record locator: a string of text that specifies the location of an object accessible through the Hypertext Transfer Protocol (HTTP), typically a World Wide Web address, as of a home page or iplay channel. A Web URL begins with “http://”. Differs from a domain name in the sense that the domain name is a part of a URL and corresponds with IP addresses to form a URL.

 

 

Cyber Bullying Resource from Kamaron Institute www.kamaron.org  and Kamaron Institute Resource Cyber Bullying Resource Center

Security Software Reviews For Parents and Teachers

Cyber Bullying Resource: Security Safety Software Reference

Proactive informed parents are the best deterrent. The security concerns have spawned an industry of touted “software solutions.” At best software tools are reinforcements for your personal child safety campaign. 

Software tools generally focus on two major tasks: tracking and monitoring internet usage and filtering or blocking certain forms of internet access.  The following chart provides a comparison of the features of some of the more prominent programs available but is not a Kamaron recommendation.


the more prominent programs available but is not a Kamaron recommendation.

Product/Price

Features

Evaluation

CyberPatrol from SurfControl
<?xml:namespace prefix = o ns = “urn:schemas-microsoft-com:office:office” /> 
$39.95 (12 month)
$59.95 (24 month)
Discounts for future subscriptions and for bulk purchases (5 or more licenses)

·         Records all web surfing activity
·         Sends email report.
·         Provides site and program blocking and time restrictions.2

·         PC Magazine Editor Rating of 4 (out of 5).
·         Reviewers note its susceptibility to overriding, especially on outbound IMs.

CYBERsitter
 
$39.95 for a single computer, with discounts for additional computers.  No subscription fees.

·         Records all web surfing activity and IMs.
·         Sends email report.
·         Provides site and program blocking and time restrictions.2
·         Blocks Social Networking sites such as MySpace and FaceBook.

·         Five time winner of PC Magazine’s Editor’s Choice Award.
·         Some minor Windows interface difficulties reported.

Safe Eyes
 
$50.00  per year for up to three computers.

·         Records all web surfing activity and IMs.
·         Sends email report
·         Provides site and program blocking and time restrictions.2
·         Blocks P2P file sharing.1

·         Winner of PC Magazines Editor’s Choice Award
·         Some trouble with URL filters blocking legitimate sites.

Allume Sustems Spycatcher
 
$30.00

·         Beats others at detecting and blocking spam
·         Activate Parental Controls

·         Consumer Reports reviewed.
 

1Peer-to-peer (P2P) file sharing programs allow direct downloading between end user computers, without the safeguards of a mediating website.  P2P programs are used primarily to share music and video files, but can be used for any kind of computer data.

2Program blocking capabilities include both programs installed on the computer and programs accessed online (e.g., video games and gambling programs).  Time restrictions capabilities include both limiting the amount of time spent online in a given period (e.g., per day or week) and limiting access at certain times of the day (e.g., between 1:00 and 6:00 a.m.).

THE FIRST LINE OF DEFENSE

This seeming cornucopia of solutions may be deceptive, however.  CNet reports that the <?xml:namespace prefix = st1 ns = “urn:schemas-microsoft-com:office:smarttags” />US Justice Department cast doubt last winter on the notion that software alone is adequate protection.  And Anne Collier, editor of NetFamilyNews.org, argues on the StaySafe.org website that Web 2.0 (cyberspeak for the new generation of internet involving multimedia, mobile access, multidirectional communication, and user-driven content) defies control, and reliance on software to keep our children safe is a partial solution at best.

GetNetWise.org offers a helpful Online Safety Guide that provides general tips for kids, teens, and families, then breaks specific suggestions down into age groups with three-year spans. 

www.kamaron.org and Kamaron Resource Center

 

Cyber Bullying Solutions Schools Home

Daily, half of <?xml:namespace prefix = st1 ns = “urn:schemas-microsoft-com:office:smarttags” />America’s school children, approximately 12 million, are impacted by bullying on the bus and in school.  Cyber bullying is in addition to this larger problem that impacts the quality of student education.

 

A partnerships with school, home, transportation, and community is required.

<?xml:namespace prefix = o ns = “urn:schemas-microsoft-com:office:office” /> 

The number of kids using the Internet makes it the preferred way to communicate. The Pew Internet & American Life Project reports that approximately 17 million kids aged 12 to 17 use the Internet.

 

Teens have embraced IM—74 percent of teens IM, compared to only 44 percent of adults. IM  is the preferred cyber bullying medium of teenage girls.

 

Cyber Bullying incidents tracked at 6 percent in 2000 are now estimated in range of 18% to 42% of students in grades 4 through 8, say they have been bullied online.

 

Less than 20 percent tell their parents that they have been cyber bullying victims our of fear of loosing internet access.

 

It’s a cycle. Half of cyber bullying victims also display cyber bullying behaviors. 

 

Cyber bullies sometimes leave their “electronic finger prints” behind. Electronic messages such as IM’s and emails leave “fingerprints”—nine-digit numbers recorded with your ISP (Internet Service Provider).

 

 

Cyber Bullying Preemption and Prevention In Schools

 

Launch a proactive, preemptive program that replaces the natural name-calling, bullying, taunting bullying behaviors with a positive focus.  Re-norm what is considered cool at school

 

Kamaron Institute has successfully done with the KC3 Positive Label Program, which has proven to decrease bullying behaviors by 50 percent.

 

Make sure ethics and character as bullying preemption should be included in any computer instruction given at your school.

 

Partner with your PTA for a parent briefing on all cyber bullying as well as bullying on buses and in school.

 

Encourage your school district to develop a clear, comprehensive bully preemption and cyber bulling prevention policy on acceptable computer use, both on and off school property.

 

The policy should spell out what constitutes cyber bullying, and list consequences.

 

Establish a bullying prevention relationship with your local police department, perhaps inviting “cyber cops” to your school to speak to parents and kids on proper Internet use.

Kamaron Institute Business Growth Fact: Administering Aspirations

Your Kamaron Institute news nugget: Today's business facts and stats may assist in accelerating your business thinking. Kamaron chose this business fact to add value to your visit to the Kamaron news site. Remember: Knowledge is not power. Wise application of knowledge by people of character and integrity is power. We attract what we are rather than simply what we want.

“A leader is a dealer in hope.”~ Napoleon Bonaparte

Kamaron Institute is dedicated to accelerating business and education. The way we think provides a vital different in creating positive results.

Kamaron Institute's Educational , KC3 Positive Label Program is a research based bullying prevention, positive character program that has proven to cut bully behaviors in half while doubling tolerance and cooperation. Partner in education of the National Museum of Patriotism.

© 2005 Kamaron Institute , Kamaron Institute, Margaret S Ross Books