Standing up to...About 43.8 percent of children aged 13-

Preview:

Citation preview

Standing up to CyberBullying

National Baseline Study on Violence Against Children by UNICEF

2016

About 43.8 percent of children aged 13-<18 years ever experienced cyber violence. About a third of the

types of cyber violence were in the form of verbal abuse over the internet or cellphone while a

fourth were sent sexual messages.

An estimated 2.5 percent had their own nude body or own sexual activities shown in the internet or

cellphone, including both real and falsified images.

© Stairway Foundation, Inc

4 out of 10 children in the Philippines Have experienced cyber-bullying

2012 Stairway Online Safety Study

© Stairway Foundation, Inc

Cyberbullying

© Stairway Foundation, Inc

Is the use of the internet and new communication technologies to harm or ridicule in a deliberate and hostile manner

© Stairway Foundation, Inc

#CyberBullying children to children

© Stairway Foundation, Inc

#CyberHarassment or CyberLynching or CyberAbuse when adults get involved

#Children’s Inappropriate behavior when children “cyberbully” adults

• a. Any unwanted physical contact between the bully and the victim like punching, pushing, shoving, kicking, slapping, tickling, headlocks, inflicting school pranks, teasing, fighting and the use of available objects as weapons;

• b. Any act that causes damage to a victim’s psyche and/or emotional well-being;

• c. Any slanderous statement or accusation that causes the victim undue emotional distress like directing foul language or profanity at the target, name-calling, tormenting and commenting negatively on victim’s looks, clothes and body; and

#Types of CyberBullying

© Stairway Foundation, Inc

Exclusion

© Stairway Foundation, Inc

Harassment

CyberStalking

Flaming

Masquerading

Outing

A child threatening another child through the internet

© Stairway Foundation, Inc

Harassment

Excluding a child from an online social circle

© Stairway Foundation, Inc

Exclusion

Taking on the identity of another child in order to tarnish the reputation of the child

© Stairway Foundation, Inc

Masquerading

Following the online activity of a child, making the child feel uncomfortable

© Stairway Foundation, Inc

CyberStalking

Teasing the child online in order to elicit a negative reaction from the child

© Stairway Foundation, Inc

Flaming

Exposing a child's secret (e.g. a private conversation between 2 children)

© Stairway Foundation, Inc

Outing

their photos were edited

(3 out of 10)

© Stairway Foundation, Inc

received direct threats (2 out of 10 said)

bad comments were made about them

(3 out of 10)

17% unspecified

2012 Stairway Online Safety Study

Who are the usual cyberbullies?

© Stairway Foundation, Inc

children they know but from other

schools (2 out of 10)

© Stairway Foundation, Inc

Not known to the victim but names were

displayed (2 out of 10)

Classmates (4 out of 10)

2 out of 10 anonymous

Profile of the Bully 2012 Stairway Online Safety Study

24/7 and the invasion of

home/personal space

© Stairway Foundation, Inc

The audience can be very large and

reached rapidly People who

cyberbully may attempt to remain

anonymous

CyberBully

Victim

Bystanders

Class/schoolmate

Class/schoolmate School personnel

CyberBully

Victim

Bystanders

Class/schoolmate

Class/schoolmate School personnel

Thousands of other net users

Thousands of other net users

How do we make the Internet a safe space for children?

© Stairway Foundation, Inc

© Stairway Foundation, Inc

P.I.E.

Policies and Practices

Education and Training

Infrastructure and Technology

© Stairway Foundation, Inc

P.I.E. in practice

© Stairway Foundation, Inc

Policies and Practices

Integrating Anti Bullying Policies in our school child protection policies

Create a Localized Code of Conduct

Section 4. Adoption of Anti-Bullying Policies

• All public and private kindergarten, elementary and secondary schools shall adopt policies to address the existence of bullying in their respective institutions. Such policies shall be regularly updated and, at a minimum, shall include provisions on prohibited acts, prevention and intervention programs, mechanisms and procedures.

© Stairway Foundation, Inc

P.I.E.

Policies and Practices

Education and Training

Infrastructure and Technology

Maximizing online reporting and take down tools

© Stairway Foundation, Inc

Infrastructure and Technology

How to respond to a child online protection concern?

a. Immediate Responses

1. The victim or anyone who witnesses or has personal knowledge of a bullying incident or retaliation shall immediately call the attention of any school personnel.

2. The school personnel who was notified of a bullying incident or retaliation shall intervene, by:

i. Stopping the bullying or retaliation immediately;

ii. Separating the students involved;

iii. Removing the victim or, in appropriate cases, the bully or offending student, from the site;

v. Ensuring the victim’s safety, by: – Determining and addressing the victim’s immediate safety needs; and

– Ensuring medical attention, if needed, and securing a medical certificate, in cases of physical injury.

– Bringing the bully to the Guidance Office or the designated school personnel.

Content Person

Assess the Incidence

“Simple” Behavior

Ask the Cyberbully to take

down content

Use the built-in reporting and take

down function

Assess the Incidence

“Simple” Behavior

Ask the Cyberbully to take

down content

Use the built-in reporting and take

down function

Use school based

intervention

DO no.55, s.2013 (Anti-Bullying IRR)

DO no.18, s.2015 (Children at Risk)

DO no.40, s. 2012 (DepEd CPP) Adult to children

Child to child, “simple”

Child to others, “complex”

h. Applicability of RA 9344, as amended, and other related laws

• If the bullying incident or retaliation resulted in serious physical injuries or death, the case shall be dealt with in accordance with the provisions of Republic Act 9344 or the “Juvenile Justice and Welfare Act,”

Assess the Incidence

“Simple” Behavior

Ask the Cyberbully to take

down content

“Complex” Behavior

Take screenshots with the URL

shown

Use the built-in reporting and take

down function

Threat to life or others

Sexual content Use school

based intervention

www.facebook.com/qwsa)8324//jnjsd

Assess the Incidence

“Simple” Behavior

Ask the Cyberbully to take

down content

“Complex” Behavior

Take screenshots with the URL

shown

Secure the Child’s

account

Use the built-in reporting and take

down function

Threat to life Sexual

content Use school based

intervention

Content Person

Assess the Incidence

“Simple” Behavior

Ask the Cyberbully to take

down content

“Complex” Behavior

Take screenshots with the URL

shown

Secure the Child’s

account

Use the built-in reporting

function

Report to Law Enforcement

PNP Anti-CyberCrime

NBI Anti-CyberCrime

Use the built-in reporting and take

down function

Threat to life Sexual

content

Child Protection

Units

Use school based

intervention

Students who “bully” teachers?

Interventions which are non-punitive in nature and are inline with the Juvenile Justice Welfare Act

Don’t forget the DepEd case management

protocols!

DO no.40, s. 2012 (DepEd CPP)

DO no.55, s.2013 (Anti-Bullying IRR)

DO no.18, s.2015 (Children at Risk)

© Stairway Foundation, Inc

P.I.E.

Policies and Practices

Education and Training

Infrastructure and Technology

Teach children and adults about

Netiquette and Online Safety

© Stairway Foundation, Inc

Education and Training

Online Safety is NOT only about technology.

It is about behavioral change

© Stairway Foundation, Inc

Section 6. Prevention Programs

All public and private schools shall adopt bullying prevention programs. These programs shall be applicable to all students regardless of level of risk or vulnerability to bullying. Said programs shall also be comprehensive, multi-faceted and shall involve all education stakeholders and personnel. The programs may contain among others:

School-wide initiatives

Classroom-level initiatives

Involving parents in bullying prevention activities

© Stairway Foundation, Inc

Key Behavioral Change Topics

• Digital privacy (staying in control)

• Interacting with people online

• Dealing with online content

• Setting up self limits (empathy and addiction)

• Responding to abusive or inappropriate behavior online

• Where to get help?

www.cybersafe.asia

Recommended