Standing up to CyberBullying
National Baseline Study on Violence Against Children by UNICEF
2016
About 43.8 percent of children aged 13-<18 years ever experienced cyber violence. About a third of the
types of cyber violence were in the form of verbal abuse over the internet or cellphone while a
fourth were sent sexual messages.
An estimated 2.5 percent had their own nude body or own sexual activities shown in the internet or
cellphone, including both real and falsified images.
© Stairway Foundation, Inc
4 out of 10 children in the Philippines Have experienced cyber-bullying
2012 Stairway Online Safety Study
© Stairway Foundation, Inc
Cyberbullying
© Stairway Foundation, Inc
Is the use of the internet and new communication technologies to harm or ridicule in a deliberate and hostile manner
© Stairway Foundation, Inc
#CyberBullying children to children
© Stairway Foundation, Inc
#CyberHarassment or CyberLynching or CyberAbuse when adults get involved
#Children’s Inappropriate behavior when children “cyberbully” adults
• a. Any unwanted physical contact between the bully and the victim like punching, pushing, shoving, kicking, slapping, tickling, headlocks, inflicting school pranks, teasing, fighting and the use of available objects as weapons;
• b. Any act that causes damage to a victim’s psyche and/or emotional well-being;
• c. Any slanderous statement or accusation that causes the victim undue emotional distress like directing foul language or profanity at the target, name-calling, tormenting and commenting negatively on victim’s looks, clothes and body; and
#Types of CyberBullying
© Stairway Foundation, Inc
Exclusion
© Stairway Foundation, Inc
Harassment
CyberStalking
Flaming
Masquerading
Outing
A child threatening another child through the internet
© Stairway Foundation, Inc
Harassment
Excluding a child from an online social circle
© Stairway Foundation, Inc
Exclusion
Taking on the identity of another child in order to tarnish the reputation of the child
© Stairway Foundation, Inc
Masquerading
Following the online activity of a child, making the child feel uncomfortable
© Stairway Foundation, Inc
CyberStalking
Teasing the child online in order to elicit a negative reaction from the child
© Stairway Foundation, Inc
Flaming
Exposing a child's secret (e.g. a private conversation between 2 children)
© Stairway Foundation, Inc
Outing
their photos were edited
(3 out of 10)
© Stairway Foundation, Inc
received direct threats (2 out of 10 said)
bad comments were made about them
(3 out of 10)
17% unspecified
2012 Stairway Online Safety Study
Who are the usual cyberbullies?
© Stairway Foundation, Inc
children they know but from other
schools (2 out of 10)
© Stairway Foundation, Inc
Not known to the victim but names were
displayed (2 out of 10)
Classmates (4 out of 10)
2 out of 10 anonymous
Profile of the Bully 2012 Stairway Online Safety Study
24/7 and the invasion of
home/personal space
© Stairway Foundation, Inc
The audience can be very large and
reached rapidly People who
cyberbully may attempt to remain
anonymous
CyberBully
Victim
Bystanders
Class/schoolmate
Class/schoolmate School personnel
CyberBully
Victim
Bystanders
Class/schoolmate
Class/schoolmate School personnel
Thousands of other net users
Thousands of other net users
How do we make the Internet a safe space for children?
© Stairway Foundation, Inc
© Stairway Foundation, Inc
P.I.E.
Policies and Practices
Education and Training
Infrastructure and Technology
© Stairway Foundation, Inc
P.I.E. in practice
© Stairway Foundation, Inc
Policies and Practices
Integrating Anti Bullying Policies in our school child protection policies
Create a Localized Code of Conduct
Section 4. Adoption of Anti-Bullying Policies
• All public and private kindergarten, elementary and secondary schools shall adopt policies to address the existence of bullying in their respective institutions. Such policies shall be regularly updated and, at a minimum, shall include provisions on prohibited acts, prevention and intervention programs, mechanisms and procedures.
© Stairway Foundation, Inc
P.I.E.
Policies and Practices
Education and Training
Infrastructure and Technology
Maximizing online reporting and take down tools
© Stairway Foundation, Inc
Infrastructure and Technology
How to respond to a child online protection concern?
a. Immediate Responses
1. The victim or anyone who witnesses or has personal knowledge of a bullying incident or retaliation shall immediately call the attention of any school personnel.
2. The school personnel who was notified of a bullying incident or retaliation shall intervene, by:
i. Stopping the bullying or retaliation immediately;
ii. Separating the students involved;
iii. Removing the victim or, in appropriate cases, the bully or offending student, from the site;
v. Ensuring the victim’s safety, by: – Determining and addressing the victim’s immediate safety needs; and
– Ensuring medical attention, if needed, and securing a medical certificate, in cases of physical injury.
– Bringing the bully to the Guidance Office or the designated school personnel.
Content Person
Assess the Incidence
“Simple” Behavior
Ask the Cyberbully to take
down content
Use the built-in reporting and take
down function
Assess the Incidence
“Simple” Behavior
Ask the Cyberbully to take
down content
Use the built-in reporting and take
down function
Use school based
intervention
DO no.55, s.2013 (Anti-Bullying IRR)
DO no.18, s.2015 (Children at Risk)
DO no.40, s. 2012 (DepEd CPP) Adult to children
Child to child, “simple”
Child to others, “complex”
h. Applicability of RA 9344, as amended, and other related laws
• If the bullying incident or retaliation resulted in serious physical injuries or death, the case shall be dealt with in accordance with the provisions of Republic Act 9344 or the “Juvenile Justice and Welfare Act,”
Assess the Incidence
“Simple” Behavior
Ask the Cyberbully to take
down content
“Complex” Behavior
Take screenshots with the URL
shown
Use the built-in reporting and take
down function
Threat to life or others
Sexual content Use school
based intervention
www.facebook.com/qwsa)8324//jnjsd
Assess the Incidence
“Simple” Behavior
Ask the Cyberbully to take
down content
“Complex” Behavior
Take screenshots with the URL
shown
Secure the Child’s
account
Use the built-in reporting and take
down function
Threat to life Sexual
content Use school based
intervention
Content Person
Assess the Incidence
“Simple” Behavior
Ask the Cyberbully to take
down content
“Complex” Behavior
Take screenshots with the URL
shown
Secure the Child’s
account
Use the built-in reporting
function
Report to Law Enforcement
PNP Anti-CyberCrime
NBI Anti-CyberCrime
Use the built-in reporting and take
down function
Threat to life Sexual
content
Child Protection
Units
Use school based
intervention
Students who “bully” teachers?
Interventions which are non-punitive in nature and are inline with the Juvenile Justice Welfare Act
Don’t forget the DepEd case management
protocols!
DO no.40, s. 2012 (DepEd CPP)
DO no.55, s.2013 (Anti-Bullying IRR)
DO no.18, s.2015 (Children at Risk)
© Stairway Foundation, Inc
P.I.E.
Policies and Practices
Education and Training
Infrastructure and Technology
Teach children and adults about
Netiquette and Online Safety
© Stairway Foundation, Inc
Education and Training
Online Safety is NOT only about technology.
It is about behavioral change
© Stairway Foundation, Inc
Section 6. Prevention Programs
All public and private schools shall adopt bullying prevention programs. These programs shall be applicable to all students regardless of level of risk or vulnerability to bullying. Said programs shall also be comprehensive, multi-faceted and shall involve all education stakeholders and personnel. The programs may contain among others:
School-wide initiatives
Classroom-level initiatives
Involving parents in bullying prevention activities
© Stairway Foundation, Inc
Key Behavioral Change Topics
• Digital privacy (staying in control)
• Interacting with people online
• Dealing with online content
• Setting up self limits (empathy and addiction)
• Responding to abusive or inappropriate behavior online
• Where to get help?
www.cybersafe.asia