Dr Philip Zimbardo the Bystander Effect BR

Total Page:16

File Type:pdf, Size:1020Kb

Dr Philip Zimbardo the Bystander Effect BR Requirement: All students in every school, must receive this annual training. Best Practices: This training is formatted to be one 45-minute classroom lesson. If desired, the lesson can be extended by using the Optional Expansion Lessons. Trainer instructions: Throughout this Script, instructions for the facilitator will be in italics. Those items to be spoken or asked will not be. Before you begin, familiarize yourself with the content and ensure the course technology is works for you. You may choose to play the lesson independently by downloading the PowerPoint and video from Canvas Files section. Discussions: Ask the discussion questions in whichever format is most appropriate to your setting and the students’ developmental level. Options include: Raise your hand to share; find a classmate to ask; write down your thoughts about; quick - turn to a partner and share. Booster Lesson: It is recommended you use the Booster Lesson 1-2 weeks following this training module. Optional expansion lessons are also encouraged and can be found in the Additional Resources Canvas page. • For grades 6-8: Go to the Be the 1 Toolkit and use the Grades 6-8, Lesson 1: Where We Stand and its Extension Activity role play with the 4 Intervention Strategies on slide #27. • For grades 9-12: Go to the Be the 1 Toolkit and use the Grades 9-12, Lesson 3: How can I Be the 1 to intervene with bullying? Make sure to review and include the 4 Intervention Strategies on slide #27. Source: Thank you to Bystander Revolution for the generous sharing of their excellent resources. Please visit their website to access the latest materials, bystanderrevolution.org. Messaging and Student Objectives: This lessons will inspire your students to “Be the 1” to help prevent and intervene with bullying. Create a safer and more respectful classroom/school environment by showing students that although some students bully others, most don’t. The Student Lesson Begins Below STATE: Today we are going to talk about how we can make our class and school a safer place where everyone feels respected. We are going to discuss how we treat each other and what we can do so EVERYONE is being treated in the way they deserve to be – with respect. 5-29-20 1 Agenda • What is bullying? • Why do we care about bullying? • What we can do to prevent and intervene with bullying? STATE: What stands in the way of respect? Disrespect and violence. If disrespect isn’t intervened with early, it can begin to repeat and grow into bullying, a form of violence. STATE: So today we’ll be exploring what bullying is, why we care about it, and what we can do to prevent and intervene with it. 2 What is bullying? STATE: Let’s begin by learning how bullying is really defined and what it looks like… 3 Have you ever… • Been called a name? • Excluded someone from your friend group? • Been picked on by someone who was bigger than you? • Not deleted a post that was cruel? • Responded in anger or were hurtful, but then said you were just “joking”? • Encouraged friends to laugh at someone? • Stayed silent when another was made fun of? ASK/STATE: • What is our school/my classroom policy/rule on bullying? • How do you think bullying is defined? • Without using names, have you ever seen or experienced it? Who would like to share what it looked like or felt like for the target of it? • How do people who bully behave – what does it look like, sound like, feel like for the people seeing it? Make sure the examples they give include all types of bullying behaviors by differentiating physical from non-physical (verbal, emotional, excluding someone, and cyberbullying) bullying. STATE: We’ve all been hurt and we’ve all hurt other people. And some of the pain caused by unkind acts can remain for years. But there are certain ways some people intentionally treat others that isn’t OK and doesn’t need to happen. 4 Bullying Defined Bullying is repeated, purposefully hurtful (intent to do harm) action against someone who has less power. Bullying is: • Repeated • Imbalance of Power • Purposeful You may have to rephrase or explain some of this vocabulary. STATE: Bullying is a form of violence. It is the ongoing targeting of someone who is unable to defend him or herself. People who bully can be male or female, young or old, someone you know or not. Bullying is a behavior, not a person. Unkind behaviors are bullying ONLY IF they include ALL 3 of these elements: 1) The behavior is Repeated over time. It doesn't just happen one time, or during one event or class period. 2) There is an Imbalance of power. The person being targeted has less power than the aggressor and is unable to stop the behavior, so it makes them fearful. For example, they can have less power because they are smaller, younger, a minority within the school, or not as popular. And finally, 3) The behavior is done on Purpose to hurt the other person. An easy way to determine if a behavior is hurtful is to just ask yourself, would I want to be treated that way? We use the acronym RIP to remember the definition. ASK: Can you think of any behaviors that could be confused with bullying, because they may appear to be similar? Possible answers include: • Harassment - can happen just one time. Hazing - is a form of bullying that is required to be part of a group. Hazing is any action or situation that recklessly or intentionally endangers the mental or physical health or safety of a student regardless of: 1) the student’s willingness to participate or; 2) that the conduct or activity was not sanctioned by the organization or; 3) that the activity was not consciously done as a condition of membership to the group. • Conflict or being mean – is when two people of equal power don’t get along and try to hurt each other on purpose, usually in anger. • Mutual Joking - is done for fun between people of equal power while being Rude is having bad manners or being inconsiderate, neither of which is usually done on purpose. ASK: • How common do you think bullying is? For example, if we surveyed our school and asked students anonymously if they had been face to face bullied in the last 12 months – what percentage do you think would say they have been? What about cyberbullied? • How/why would the rates be the same or different for face to face bullying versus cyberbullying? • How/why would the rates be the same or different for middle versus high school students? 5 Some Do, But Most Don’t Broward High Schools Broward Middle Schools 20 19 40 37.8 Broward FLA U.S. 33.5 2015 2017 14.4 14.9 15 14.3 13.6 30 11.5 10 18.7 20 14.5 5 Percentage 10 0 0 Bullied at School Electronically Bullied Bullied at School Electronically Bullied - 2017 YRBS (Youth Risk Behavior Survey) STATE: The Center for Disease Control (CDC) surveys Broward’s students anonymously every other year, and these are the facts – although some students do get bullied, most don’t. Note how it may be similar or different than their guesses, then explore the differences with the questions below. Let’s look at the high school rates first. For Broward, the number of high school students who report during the last 12 months they were: • Electronically bullied (13.6%) is statistically the same as the national US rate of 14.9%. And although it’s not shown, our high school rate of cyberbullying has not changed statistically from 2011 (11%) to now. • Face to face bullied (14.4%) is significantly LOWER than the national US percentage of 19%. This rate has also not changed statistically from 2011 (13.2%) to now. ASK: Why do you think that might be? STATE: Now let’s look at Broward’s middle school trend data from 2015 to 2017 (middle school has no national comparison data). • Face to face bullied on school property has remained statistically the same from 2015 to 2017, but it is MUCH HIGHER than (almost double) the high school rate. ASK: Why do you think that is? TRAINER NOTES: Young people who are perceived as different from their peers are at risk for being bullied. This might be part of why the highest rates of bullying can be found in middle school, where developmentally students are still finding their sense of identity and fear being "different" the most. STATE: Now let’s look at Broward’s middle school cyberbullying trend data - unlike all the other rates, it has SIGNIFICANTLY INCREASED from 2015 to 2017. ASK: Why do you think that might be? STATE: Overall most of us don’t bully, but even one person being bullied is too much. FYI FOR TRAINER: • Statistical significance is calculated using the CDC’s YRBSS Analysis Tool based on t- test analyses to determine pairwise differences between subpopulations. Differences between prevalence estimates were considered statistically significant if the t test p value was <0.05. • If electronic bullying and Internet safety is an issue for your students, use the following tools: Think B4U Post Toolkit, Class Meetings, SEL curriculum, Common Sense Media. 6 The Bullying Triangle Bystanders: 80% of us who hold the most power to Be the 1 to stop it! Person targeted Person bullying STATE: When examining the dynamics of bullying, we each play a role in the bullying triangle - either as the target of it, the person bullying, or the bystander seeing it.
Recommended publications
  • What Is 'Workplace Bullying'
    ‘The Boy In The Photograph’ ANTI-BULLYING PRESENTATION PERFORMED BY ROB HIGGS ‘The Boy In The Photograph’ is inspired by my own experiences... AM I BEING BULLIED? Several Times On Purpose The ‘Victim State’ FEAR SHAME SELF- BULLYING Strategies To Help Yourself If You Are Ever Bullied… Smash The Silence: Tell Someone & Report It Immediately. Allow Others To Support You. Keep A Diary. Collect Evidence. Build Confidence & Self-Esteem through Personal Challenge. Acknowledge your emotions. It’s OK To Feel Angry or Scared. Release the energy in a therapeutic way: Writing Performing Creating https://www.childline.org.u k/toolbox/art-box/ ‘BANTER’ vs ‘BULLYING’ http://www.telegraph.c o.uk/news/uknews/defe nce/11844639/Army- must-not-lose-banter-in- harassment- crackdown.html ROLEPLAY LOSER YOUR MUM.. UGLY WEIRDO THICK FREAK FAT I DON’T LIKE YOU. Creative Exercise Idea 1: Deflect With Humour Idea 2: Broken Record: “I don’t lose all the time” “Whatever, whatever, whatever” “Clearly not” or “That’s not true” “Thanks!..Thanks!..Thanks!..” “I’m pretty clever actually” “Blah, blah, blah..” “Thanks so much for telling me that.” Idea 3: Direct Question: “Everyone’s a bit weird. It’s a weird world.” “Is this banter or bullying?” “Great banter” “Why are you saying that?” “#Drama” or “#Banter” “What do you mean by that?” “Oh well” or “I don’t need you to like me” Idea 4: Use an ‘I Feel..’ Statement: “My Mum’s great, thanks for asking.” “You can’t talk to me like that.” “I’m just going to write that “You keep saying that…..and it down…and then not care.” makes me feel like…….” Top Tips.
    [Show full text]
  • Multidisciplinary Approaches to Research on Bullying in Adolescence
    Adolescent Res Rev (2017) 2:1–10 DOI 10.1007/s40894-016-0041-0 NARRATIVE REVIEW Multidisciplinary Approaches to Research on Bullying in Adolescence 1 1 2 3 Melissa K. Holt • Jennifer Greif Green • Mina Tsay-Vogel • Joanna Davidson • Claire Brown1 Received: 7 July 2016 / Accepted: 10 September 2016 / Published online: 15 September 2016 Ó Springer International Publishing 2016 Abstract Bullying is a significant public health problem in Keywords Bullying Á Adolescence Á Multidisciplinary the United States that affects youth functioning in multiple domains. Much of the research on bullying to date has focused on children, however, leaving gaps in the literature Introduction with respect to understanding bullying among adolescents. In particular, less is known about how adolescents con- Bullying remains a pressing public health problem in the ceptualize bullying, what predicts and is associated with United States. Increasingly, scholars have considered pre- bullying involvement among adolescents, and how pre- cursors, predictors, and consequences of bullying involve- vention programs might address the unique needs of mid- ment, as well as examined how to bolster the effectiveness dle and high school students. This special issue proposes of bullying prevention programs. Coupled with the research that a multidisciplinary perspective might be particularly attention to bullying in the last few decades, there has been useful in better understanding bullying among adolescents a significant expansion of states with laws mandating K-12 and determining how to design more effective interven- schools address bullying; whereas in 1999 only one state tions and prevention programs for this age-group. The had enacted legislation (Georgia), as of 2015 all 50 states current article introduces the special issue by briefly dis- passed anti-bullying legislation.
    [Show full text]
  • Harmful Online Communications: the Criminal Offences a Consultation
    Harmful Online Communications: The Criminal Offences A Consultation paper Consultation Paper 248 Law Commission Consultation Paper 248 Harmful Online Communications: The Criminal Offences A Consultation Paper 11 September 2020 I © Crown copyright 2020 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at https://www.lawcom.gov.uk/project/reform-of-the- communications-offences/ II The Law Commission – How we consult About the Law Commission: The Law Commission was set up by section 1 of the Law Commissions Act 1965 for the purpose of promoting the reform of the law. The Law Commissioners are: The Rt Hon Lord Justice Green, Chair, Professor Sarah Green, Professor Nicholas Hopkins, Professor Penney Lewis, and Nicholas Paines QC. The Chief Executive is Phillip Golding. Topic of this consultation: We are consulting on reform of the communications offences (Malicious Communications Act 1988 and Communications Act 2003) in light of developments in online communication. We are also consulting on specific behaviours such as cyberflashing, pile-on harassment, and the glorification of both self-harm and violent crime. Geographical scope: This consultation applies to the law of England and Wales. Duration of the consultation: We invite responses from 11 September 2020 to 18 December 2020. Responses to the consultation may be sent: By email to [email protected] OR By post to Online Communications Team, Law Commission, 1st Floor, Tower, 52 Queen Anne’s Gate, London, SW1H 9AG.
    [Show full text]
  • Active Shooter: Recommendations and Analysis for Risk Mitigation
    . James P. O’Neill . Police Commissioner . John J. Miller . Deputy Commissioner of . Intelligence and . Counterterrorism ACTIVE SHOOTER James R. Waters RECOMMENDATIONS AND ANALYSIS Chief of Counterterrorism FOR RISK MITIGATION 2016 EDITION AS RELEASED BY THE NEW YORK CITY POLICE DEPARTMENT TABLE OF CONTENTS ACKNOWLEDGEMENTS ................................................................................................................2 EXECUTIVE SUMMARY .................................................................................................................3 RECENT TRENDS ........................................................................................................................6 TRAINING & AWARENESS CHALLENGE RESPONSE .................................................................................... 6 THE TARGETING OF LAW ENFORCEMENT & MILITARY PERSONNEL: IMPLICATIONS FOR PRIVATE SECURITY ........ 7 ATTACKERS INSPIRED BY A RANGE OF IDEOLOGIES PROMOTING VIOLENCE ................................................... 8 SOCIAL MEDIA PROVIDES POTENTIAL INDICATORS, SUPPORTS RESPONSE .................................................... 9 THE POPULARITY OF HANDGUNS, RIFLES, AND BODY ARMOR NECESSITATES SPECIALIZED TRAINING .............. 10 BARRICADE AND HOSTAGE-TAKING REMAIN RARE OCCURRENCES IN ACTIVE SHOOTER EVENTS .................... 10 RECOMMENDATIONS ................................................................................................................11 POLICY .........................................................................................................................................
    [Show full text]
  • Sharing Information on Progress Report UNITED NATIONS
    Sharing Information on Progress Report 2014-2016 UNITED NATIONS Principles for Responsible Management Education (PRME) This is our Sharing Information on Progress (SIP) Report on the Implementation of the Principles for Responsible Management Education 2 | IVEY UN PRME SHARING INFORMATION ON PROGRESS REPORT Letter from Robert Kennedy, Dean of the Ivey Business School Ivey is proud to be a founding member and PRME champion. These roles reflect our deep-seated commitment to responsible leadership which has defined our business school for almost a century. As Canada’s first business school, first MBA and first PhD program, Ivey has a track record of first moves that respond to the forward-looking aspirations of real-world leaders. Ivey has a distinctive teaching pedagogy that documents and celebrates best practices, dedicated research centers and institutes, and innovative programming that brings to the fore the cross-sectoral solutions organizations can offer to the grand challenges of our time from climate change to persistent poverty and inequality to the refugee crisis. Our goal is to continuously champion what is possible for leaders, businesses and markets by helping the leaders we coach rethink the boundaries between business and society. Ivey students unlimit their potential, create positive social change, and actively model responsible approaches to future organizing. Ivey’s innovative approaches of integrating business and society continue to attract the best students, teachers and researchers. Responsible leadership is a shared goal and a mandatory part of every student’s formation, and every single member of the Ivey faculty embraces at least one of the PRME goals in their research, teaching and service.
    [Show full text]
  • White Caller Crime: Racialized Police Communication and Existing While Black
    Michigan Journal of Race and Law Volume 24 2019 White Caller Crime: Racialized Police Communication and Existing While Black Chan Tov McNamarah Cornell Law School Follow this and additional works at: https://repository.law.umich.edu/mjrl Part of the Civil Rights and Discrimination Commons, Law and Race Commons, Law and Society Commons, and the Law Enforcement and Corrections Commons Recommended Citation Chan T. McNamarah, White Caller Crime: Racialized Police Communication and Existing While Black, 24 MICH. J. RACE & L. 335 (2019). Available at: https://repository.law.umich.edu/mjrl/vol24/iss2/5 This Article is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Journal of Race and Law by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. WHITE CALLER CRIME: RACIALIZED POLICE COMMUNICATION AND EXISTING WHILE BLACK Chan Tov McNamarah Over the past year, reports to the police about Black persons engaged in innocuous behaviors have bombarded the American consciousness. What do we make of them? And, equally important, what are the consequences of such reports? This Article is the first to argue that the recent spike in calls to the police against Black persons who are simply existing must be understood as a systematic phenomenon which it dubs racialized police communication. The label captures two related practices. First, racially motivated police reporting—calls, complaints, or reports made when Black persons are engaged in behavior that would not have been read as suspicious, or otherwise worthy of police involvement had they been White.
    [Show full text]
  • Jokela School Shooting on 7 November 2007
    MINISTRY OF JUSTICE, FINLAND PUBLICATION 2009:1 Jokela School Shooting on 7 November 2007 Report of the Investigation Commission PUBLICATION 2009:1 Jokela School Shooting on 7 November 2007 Report of the Investigation Commission ISSN 1458-6444 ISBN 978-952-466-803-3 (nid.) ISBN 978-952-466-804-0 (PDF) Ministry of Justice, Finland Helsinki 2009 DESCRIPTION M I N I S T R Y OF J U S T I C E Date of publication Finland 26 February 2009 Authors Type of publication Publication of the Ministry of Justice Investigation Commission of the Jokela school shooting Assigned by Chairman Tuulikki Petäjäniemi, LL.M. Council of State Secretary, Chief Accident Investigator Kai Valonen Date when body appointed 6 November 2008 Name of the publication Jokela School Shooting on 7 November 2007 – Report of the Investigation Commission (Translation of the original Finnish report) Parts of publication Description of the event and background information, general information on the Jokela events, the work of the media, analysis and conclusions, measures taken and safety recommendations Abstract On 7 November 2007 a bloody deed took place in Jokela where a senior high school student shot eight persons and himself in a school centre. The reasons for the school shooting were multifarious and complex, and the shooting constituted a deliberate criminal act showing the methodical nature that constitutes an essential element of murder. The marginalization of the perpetrator was of a special kind, the result of several contributory factors. The family, upbringing and the school community but also society as a whole, nowadays including the Internet environment, are in a prime position for preventing marginalization.
    [Show full text]
  • Complete Dissertation
    VU Research Portal School shootings Pfeifer, B. 2017 document version Publisher's PDF, also known as Version of record Link to publication in VU Research Portal citation for published version (APA) Pfeifer, B. (2017). School shootings: Existential concerns and implicit religion. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. E-mail address: [email protected] Download date: 01. Oct. 2021 Part one: Background of this study and overview of theoretical approaches of school shooting 1 2 1 About this research Since the middle of the 20th century, more than 160 school shootings have occurred worldwide, with several hundreds of victims killed and many others wounded. Many people wonder why and how these tragedies can happen. Many speculate, but what do we really know about these tragic incidents? Answers to these questions are urgently needed because they can inform prevention and response policies.
    [Show full text]
  • Stories in Action: the Cultural Influences of School Shootings On
    This article was downloaded by: [84.215.202.88] On: 03 May 2014, At: 01:21 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Critical Studies on Terrorism Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/rter20 Stories in action: the cultural influences of school shootings on the terrorist attacks in Norway Sveinung Sandberga, Atte Oksanenb, Lars Erik Berntzenc & Tomi Kiilakoskid a Department of Criminology and Sociology of Law, University of Oslo, Oslo, Norway b National Research Institute of Legal Policy, Helsinki, Finland c Department of Political and Social Sciences, European University Institute, Firenze, Italy d Finnish Youth Research Network, Helsinki, Finland Published online: 30 Apr 2014. To cite this article: Sveinung Sandberg, Atte Oksanen, Lars Erik Berntzen & Tomi Kiilakoski (2014): Stories in action: the cultural influences of school shootings on the terrorist attacks in Norway, Critical Studies on Terrorism, DOI: 10.1080/17539153.2014.906984 To link to this article: http://dx.doi.org/10.1080/17539153.2014.906984 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis.
    [Show full text]
  • Shooting for Fame: Spectacular Youth, Web 2.0 Dystopia, and the Celebrity Anarchy of Generation Mash-Up
    Fairfield University DigitalCommons@Fairfield Communication Faculty Publications Communication Department 2010 Shooting for fame: Spectacular youth, web 2.0 dystopia, and the celebrity anarchy of generation mash-up Michael Serazio Fairfield University, [email protected] Follow this and additional works at: https://digitalcommons.fairfield.edu/communications-facultypubs Copyright 2010 Wiley-Blackwell. This is a pre-print of an article accepted for publication in Communication, Culture, & Critique (3, 3, 2010). The definitive version is available at www3.interscience.wiley.com. Repository Citation Serazio, Michael, "Shooting for fame: Spectacular youth, web 2.0 dystopia, and the celebrity anarchy of generation mash-up" (2010). Communication Faculty Publications. 13. https://digitalcommons.fairfield.edu/communications-facultypubs/13 Published Citation Serazio, Michael. 2010. Shooting for fame: Spectacular youth, web 2.0 dystopia, and the celebrity anarchy of generation mash-up. Communication, Culture, & Critique 3 (3) 416-434. This item has been accepted for inclusion in DigitalCommons@Fairfield by an authorized administrator of DigitalCommons@Fairfield. It is brought to you by DigitalCommons@Fairfield with permission from the rights- holder(s) and is protected by copyright and/or related rights. You are free to use this item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses, you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/or on the work itself. For more information, please contact [email protected]. Running Head: SHOOTING Shooting for Fame: Deleted: Notorious Spectacular Youth, Web 2.0 Dystopia, and the Celebrity Anarchy of Generation Mash-Up Shooting 1 Abstract In this essay, I analyze the emergent phenomenon of infamous youth shooters at the Deleted: , contemporary intersection of technology and celebrity.
    [Show full text]
  • Think B4U Post
    1 Table of Contents . Before You Begin . Acknowledgements . Program Overview & Multi-Tiered Systems of Support . Research Based Lesson Structure . Best Practices Implementation Plan . Peer-to-Peer (P2P) Component . Revolving Library . Lesson Plans 1. Subject Area #1: “Your Post Can Haunt Your Future” 2. Subject Area # 2: “If You Don’t Want Everyone To See, Don’t Let Anyone See It” 3. Subject Area # 3: “Don’t Be Over-Exposed Online” 4. Subject Area # 4: “Your Post May Be Used Against You” and “What Effects Are Your Posts Having?” 5. Subject Area # 5: “If You Wouldn’t Say It To Someone’s Face, Don’t Say It Online” . Internet Safety Programs & Resources; Sources & Citations . Appendix A. Digital Citizenship Week B. Event Flyer C. Logo & Posters D. Morning Announcements & Videos E. Parent Letter F. Parent Training G. Program Overview Flyer H. Staff Training I. Student Kick-Off Assembly J. Revolving Library Directions Before You Begin When you teach digital citizenship to your students, you help create a positive school culture supported by safe and responsible technology usage. Implementing the Think B4U Post Internet Safety Program empowers students, parents and staff to ensure children learn how to navigate the digital world safely by appreciating the responsibility they hold for their choices and actions while going online, using cell phones or other digital media. Think B4U Post’s goal of changing attitudes and behaviors surrounding online behaviors is accomplished by pairing marketing campaign messaging with student involvement and social and emotional learning (SEL) enriched lesson plans. As you develop your school’s Think B4U Post Internet Safety Program implementation plan, please keep in mind the time allocated as well as the fidelity of implementation will largely determine your success.
    [Show full text]
  • Adapting IIED As a Solution to Doxing by Reshaping Intent
    COMMENTS “Do(x) You Really Want to Hurt Me?”: Adapting IIED as a Solution to Doxing by Reshaping Intent Victoria McIntyre* I. INTRODUCTION ................................................................................. 111 II. WHAT IS DOXING? ............................................................................ 113 A. Swatting: A Dangerous Offshoot of Doxing ................... 115 B. The Victims ...................................................................... 115 III. GAPS IN THE LAW ............................................................................. 118 A. Criminal Law Penalties .................................................... 119 B. Issues with Law Enforcement and Prosecutors ................ 123 C. Tort Law Remedies .......................................................... 125 IV. A LEGAL SOLUTION: EXPANSION OF INTENTIONAL INFLICTION OF EMOTIONAL DISTRESS ............................................. 126 A. A History of IIED ............................................................. 126 B. The First Amendment ....................................................... 128 C. How IIED Must Change ................................................... 131 V. CONCLUSION .................................................................................... 133 I. INTRODUCTION Picture this: a woman goes on a date with a man she meets on OkCupid.1 The first date goes well, and they begin seeing each other more frequently. She is a video game developer, and he is a computer programmer. The relationship does not last
    [Show full text]