• Home
  • Buy the Book
  • More ebooks
  • Reviews
  • Ethel Is Hot LOL
  • Free resources
    • For Educators
  • Hot Topics blog
  • News & Press
  • About Us
  • Contact

Apparently this Iowa high school has no definition for video bullying

11/21/2013

0 Comments

 
The word Melcher-Dallas high school is searching for is ... Videojacking.

An Iowa high school ruled that  several videos students took of another student, Levi Null, 13, who has
Asperger's Syndrome and ADHD--doesn't "meet the criteria" for bullying and the school board President, Bob Lepley, says he stands by the principal's decision (via Gawker).

The students videotaped Null's involuntary movements
without his knowledge or permission and posted them online with school computers. Further, they videotaped other kids hitting, smacking and teasing Null.

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter and YouTube to harass, threaten or intimidate someone.

Though I personally did not view these videos (Melcher-Dallas high school
claims they've all been taken offline and destroyed), the very existence of them is a cyberbullying tactic known as Videojacking: When someone videotapes a target without his knowledge/approval and uploads the video to a popular video-sharing websites.

Here is the news story on WHOTV. It is quite obvious to anyone that Null felt harassed, threatened and intimidated.

This school has set a dangerous precedent to refuse to categorize these students' behavior as cyberbullying. Moreover, they had an opportunity to re-evaluate their school policy to further define a tactic they clearly had no previous experiences with and update the policy to protect this student from mob-like behavior.  But they didn't. That alone is hard to believe, but when, according to WHOTV, the students used school computers to upload these videos--there were still no consequences, I have to ask:  is it any surprise that kids  constantly report they feel unsafe at schools when so many adults on the other side of the Digital Divide are operating with an inadequate understanding of what they're up against?

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Summer Sale: $12.50 Buy The Book

0 Comments

The latest mobile cyberbullying tactic of teens: Text Bombing

11/20/2013

1 Comment

 
Earlier this month, a 15-year old from St. Petersburg, FL was arrested for sending “hundreds of threatening text messages” over the course of eight days to former friends. Some were even death threats. The suspect used a smartphone app called Kik Messenger, which happens to be the cyberbullying app du jour, also used in the Rebecca Ann Sedwick cyberbullying case that contributed to her suicide. Kik allows users to send text messages from an Internet Desk Top to cell phones.

The tactic is called “text bombing”

Huffington Post writer Ann Brenoff deftly addresses this tactic in her article, “What Every Parent Needs to Know About Text Bombs.” Her article did a great job identifying some of the apps used to do the cyberbully’s “dirty work,” but before we get into that, let’s drill down a little deeper into the motivation behind text bombing.

With text bombing, there are two ways to inflict harm.

The first way, like most cyberbullying tactics, is rooted in emotional conflict. The ex-friend, the ex-beau, the jealous peer, etc. lashes out in anger, and in extreme moment, repeatedly texts the most hurtful thing anyone can think of, e.g., you don’t matter. Go kill yourself. I will find you and destroy you.

For example, in the St. Petersburg case, the teen suspect learned that one of her target’s relatives had recently committed suicide, so she began bombarding her ex-friend with messages to do the same.

The second way to text bomb relies on apps to do the dirty work by sending a message hundreds of times as a way to harass the target, break their phone or even cost them money. Popular text bombing apps mentioned in Brenoff’s article included SMSBOMBER (Android) and SMSBARRAGE before the Google App store got wise to it and banned them.  However, these text-bombing apps can be found anywhere. A simple Google search finds more SMS bombing apps like those from Cydia that anyone can learn to use in minutes.

With my cyberbullying columns, I’m always trying to identify the latest tactic and provide educators and parents with technological and behavior tips to prevent it.

First the tech tips: The way to block multiple duplicated messages from any sender is through Anti-SMS Text Bomb (Android). The link to this page also includes several other anti-sms bombing apps for other phones.

And according to NY Daily News, there’s a new app being developed, called STOPit, which students download to their phones. It enables students to easily capture malicious behavior with their Apple or Droid smart phone and send it to adult contacts or officials with the touch of a button — and in some cases anonymously.

As usual, the public reaction to this text bomb tactic is shrill, bordering on exasperation. Said one HuffPo commenter: “Here's an idea.....don't give a cell phone to a kid [who] doesn't think that each and every keystroke equals $$$$$$. If they are STILL too young to understand the value of a $ then they are too young for a cell phone.”

According to the latest Pew Internet and American Life study on Teens and Technology (March 2013) 78% of teens (12-17) now have a cell phone, and almost half (47%) of those own smartphones. An earlier study in 2010,  found that most teenagers with cell phones have family plans paid by their parents.

When you give a child or teenager a cell phone or computer of any type, you are giving them limitless power to do good or to do harm. And likely, you are footing the bill, so you already have leverage for encouraging their ethical behavior around texting.

An ongoing conversation needs to accompany the privilege of owning a smartphone. Do you discuss with your child:

  • Sending any form of text bomb is considered harassment and will not be tolerated. Do you spell out the consequences for this behavior?
  • Does your child know they don’t have the right to say anything they want? Anytime a child’s language approaches bodily threats and harassment, it is not protected by freedom of speech and it is quite conceivable he or she can be arrested.
  • Does your child know some states are considering holding the parents’ liable for the child’s cyberbullying actions?
The tools, the tactics and the technology are all going to change. Six months down the road; we are likely going to have a whole new set of apps and digital devices connected with cyberbullying. But the conversation between kids and their parents (and schools) should be about the expected and appropriate behavior when handed a technological device. Are you having that conversation already?

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book

1 Comment
    Picture

    Cyberslammed
    Hot Topics

    Cyberbullying tactics in the news, expert advice from contributors and prevention tips for parents, educators and kids.

    RSS Feed


    Blog Comment Rules

    All comments are pre-screened before posting. Anonymous comments will not be allowed. Keep it civil and on topic. No harassing or personal attacks; even if you disagree with something, please do it respectfully.

    Categories

    All
    After School App
    Anonymous Apps
    Anxiety
    Ask.fm
    Bulletins
    Burn Book
    Cell Phones/smart Phones
    Cyberbullying Policies
    Deepfake
    Digital Pile On
    Ethel Is Hot (LOL)
    Expert Contributors
    Facebook
    Formspring
    Funstagram
    "Go Kill Yourself"
    Google+
    Hater's Club
    Homophobic Cyberbullying
    Identifying Cyberbullies
    Imposter Profile
    Instagram
    Kik Messenger
    Myspace
    Parent Contracts
    Rating Website
    Sexting
    Slut Shaming
    Slut-shaming
    Snapchat
    Streetchat
    Text Bombing
    Tween Novels
    Twitter
    Videojacking
    Whisper
    Yelp
    Youtube
    Zoom

    RSS Feed

    Archives

    February 2022
    April 2021
    March 2021
    February 2021
    October 2020
    July 2020
    April 2020
    February 2020
    July 2018
    December 2017
    October 2017
    January 2017
    November 2016
    September 2016
    July 2016
    April 2016
    February 2016
    November 2015
    September 2015
    July 2015
    June 2015
    May 2015
    April 2015
    January 2015
    November 2014
    October 2014
    September 2014
    April 2014
    March 2014
    February 2014
    January 2014
    November 2013
    October 2013
    September 2013
    July 2013
    February 2013
    November 2012
    October 2012
    September 2012
    August 2012
    June 2012
    May 2012