Classroom+Break-out+Session

=**General Terms to introduce:**= •bashing: A series of harsh online verbal attacks. • exclusion: Keeping a student out of a popular group or Web site. • isolated: Separated from others. • outing: Telling a secret about a target causing him or her pain or embarrassment. • posing: Pretending to be somebody else online often to behave in ways that offend others or humiliate the person who is being impersonated. • self-esteem: Feeling good about yourself. • suspicion: Raising a question about somebody or something. • tactic: A technique or strategy. • undefended: Without defenses or allies. • vulnerable: A person who appears weak and susceptible to attack. • flaming: Fights between two people in text or e-mail messages. = = =**Scenarios:**=
 * bystander: sees abuse, but may not be involved
 * victim
 * perpetrator (bully)
 * instigator
 * How can we use scenarios to engage students in a meaningful dialogue about cyber-bullying and harassment online? What would the format look like?**
 * **Perhaps write this as a script**
 * introduce the language to discuss the"roles" (bully, victim, bystander, etc)


 * See examples of scenarios on the following websites:**

This site offers one line scenarios and asks students to rate the seriousness of each scenario. Here are the options: 1 = Totally acceptable and appropriate 2 = Possibly wrong, but no action needs to be taken 3 = Wrong, and school authorities or Internet service providers should take action 4 = Wrong, and civil action could be taken by the target or the target’s parents 5 = Wrong, and criminal charges should be pressed
 * [|Media Awareness]**


 * How could we use something like this? What are the strengths and weaknesses of using a written rating system like this?

[|Anti-Bias Lesson Plans] (click on the cyber-bullying scenarios handout) The handout on this site lists scenarios that are in first person. See example below.


 * Below are some specific examples of scenarios:**

You are sitting around the computer with a group of friends at a Friday night sleepover when Emily asks, Who dont we like? Who can we mess with? Someone suggests Sarah, a girl with a physical disability that causes her to walk with a limp. For some time, Sarah has been trying to become part of your group, but has been excluded because some girls think she is weird. When you all discover that Sarah is online, Emily sets up a fictitious screen name and sends Sarah an IM that says, Nice moves in gym class yesterday. Walk much? You laugh along with the other girls and participate in more mean messages.

You have an account on a gaming site, where you like to play World of Warcraft with your online friends. One day your parents discover an e-mail from the site administrator indicating that the account will be terminated due to the posting of the following message: I hate Hitler because he didnt finish the job he should have killed all the Jews. At first you swear that you had nothing to do with the message, but later admit that you were encouraged to post it by another student, who has been calling you mean names and threatening to hurt you. You tell your parents that you figured it wouldnt hurt anyone to post the message and it might get the bully to finally leave you alone.

You are furious with your best friend after hearing that he went on a date with a girl he knows you have liked since the sixth grade. You dig out an old photo of your friend from before he transferred to your school and before he lost fifty pounds. You scan the picture of a very overweight fifth-grader into your computer and e-mail it to the girl with a message saying, Just thought you should know what your boyfriend really looks like.

"Sixteen-year old Lucy is a high school junior. She got in an argument with her best friend, Sarah, and said she never wanted to talk to her again. Sarah felt angry and decided to get revenge by posting all of Lucy's contact information including her phone number and address on several sex-oriented websites. As a result, Lucy received many unwanted phone calls and visitors to her home."

What dangers could this form of cyberbullying result in? What should Sarah have done differently?

"Mary is a high school freshman in Texas. When her gym period was over, she got dressed in what she believed was the privacy of the girls' locker room. However, a classmate who wanted to make fun of Mary secretly used a cell phone to photograph her. The pictures of the naked girl were sent by instant messaging for students in the school to see. By the time Mary left the locker room, most of the school had seen the pictures and were pointing and laughing at Mary as she walked down the hall"

How would you feel if you were Mary? What would you do to stop this from happening in your own school?


 * The above scenarios were found on http://wbatista.myweb.usf.edu/scenarios.html and http://www.adl.org/education/curriculum_connections/cyberbullying/cyberbullying_lesson_2.asp?cc_section=lesson_2.