What is Netiquette?
"Netiquette" refers to network etiquette. With online communication being non-verbal, it is important to use good manners. Check out the basic “do’s and don’t’s” of etiquette in the following links. After you finish, take the netiquette quiz to rate your online manners!
Social Networking and Cyber bullying.
According to pewinternet.org, “92% of teens report going online daily — including 24% who say they go online almost constantly.” (Lenhart, 2015).
"Netiquette" refers to network etiquette. With online communication being non-verbal, it is important to use good manners. Check out the basic “do’s and don’t’s” of etiquette in the following links. After you finish, take the netiquette quiz to rate your online manners!
- Internet Etiquette: 10 Rules of Etiquette
http://www.uticaod.com/article/20120907/blogs/309079938 - NETIQUETTE The Responsible Netizen
http://edtech2.boisestate.edu/danamohn/502/netiquette.html - The Netiquette Quiz
http://www.learnthenet.com/test-yourself/netiquette/
Social Networking and Cyber bullying.
According to pewinternet.org, “92% of teens report going online daily — including 24% who say they go online almost constantly.” (Lenhart, 2015).
Social Networking
What is social networking? Social networking is the use of websites and applications to interact with other users. Examples of non-school related social networks used by school age students are Facebook, Twitter, Instagram, Kik, and After School.
Our school district encourages students to participate in educational websites such as IXL.com, nearpod.com, and HaikuLearning.com. These websites will never ask for personal information.
Below are age appropriate suggested videos for social networking.
Elementary School. Faux Paw's Adventures in the Internet
Middle School. Do you really have a private life online? (social network privacy loss due to friends).
High School. PSA on Digital Privacy
What is social networking? Social networking is the use of websites and applications to interact with other users. Examples of non-school related social networks used by school age students are Facebook, Twitter, Instagram, Kik, and After School.
Our school district encourages students to participate in educational websites such as IXL.com, nearpod.com, and HaikuLearning.com. These websites will never ask for personal information.
Below are age appropriate suggested videos for social networking.
Elementary School. Faux Paw's Adventures in the Internet
Middle School. Do you really have a private life online? (social network privacy loss due to friends).
High School. PSA on Digital Privacy
Cyber bullying
Due to the growing trend of technology, a vast amount of bullying takes place online via social networking sites. This bullying is called cyber bullying.
Cyber bullying is similar to other types of bullying, except it takes place online and through text messages sent to cell phones. Cyberbullies can be classmates, online acquaintances, and even anonymous users, but most often they do know their victims. (What is Cyberbullying?, 2015)
Examples of cyber bullying
http://www.stopbullying.gov/cyberbullying/
Due to the growing trend of technology, a vast amount of bullying takes place online via social networking sites. This bullying is called cyber bullying.
Cyber bullying is similar to other types of bullying, except it takes place online and through text messages sent to cell phones. Cyberbullies can be classmates, online acquaintances, and even anonymous users, but most often they do know their victims. (What is Cyberbullying?, 2015)
Examples of cyber bullying
- Cyber stalking – cyber stalking can be described as the sending of messages to frighten or threaten someone. The person receiving these messages begins to worry about their safety and general well being.
- Degradation/humiliation – bullies will use cyber bullying to spread rumors and hearsay with the purpose of damaging the victim’s reputation to ensure that they are shunned.
- Harassing – harassing is the sending of insulting, threatening and harassing messages via the internet or cell phones. These messages are however sent persistently and tirelessly.
- Impersonating – impersonation is the act of taking on an identity that is false for the purpose of tormenting a person and damaging their reputation. Impersonation can also be acted out by pretending to be the victim also by creating a false identity or profile.
- Flaming – this is a very hostile and rude form of abuse where the bully uses vulgar and abusive language with the intention of starting a fight with the victim.
- Text messaging – most bullies will use text messaging to torment another teenager or pre-teen. They do this by enlisting the help of other bullies and together they keep sending endless text messages to their victim’s phone. The purpose of all this is to run up the victim’s phone bill which will eventually get them into serious trouble.
- Password theft – some bullies will do everything possible to gain the passwords of a teenager illegally. After gaining these passwords, the bully enters the victim’s sites and locks them out. In some cases, the bully will use these sites to bully others.
- Web site creating – bullies will create websites and pages and load them with images, statements and insulting remarks for the sole purpose of tormenting and humiliating a person.
- Use of Photos and images – bullies will post embarrassing photos of their victims all over the internet to torment and humiliate them. In most cases, these photos and images are fake and just altered to portray the victim. We all have heard of stories where teenagers have been tricked into sending their naked photos to a stranger they met online only for the stranger to post them all over the internet just to humiliate and torture the victim emotionally.
- PC attacks – this is the sending of Trojan horses, viruses, worms, spyware and so on to another person’s computer. With our youth becoming more knowledgeable on computer technology, pc attacks have become extremely easy to employ.
- Proxy attacks – bullies who prefer this kind of bullying usually enlist the help of their fellow bullies and friends to humiliate and cause emotional damage to others. Proxy attacks are where the bully with the help of someone else will install a proxy into the computer of the victim. By doing this, the bully will be able to access even the most confidential information of the victim through the proxy which will transmit it to him or her. The bully will then use this information to humiliate or threaten the victim. (CyberBullying Examples, 2015)
http://www.stopbullying.gov/cyberbullying/
Below are age appropriate suggested videos for cyber bullying.
- NetSafe Episode 4: Be Kind Online (Grades K-3)
- NetSafe Episode 5: Cyberbullies are No Fun! (Grades 4-6)
- Cyberbullying (Middle School Grades)
- Cyberbullying PSA (High School Grades)
Responsible Use Policy
- All students must use their student identification login and network password while using the school network.
- Students shall not engage in social media sites during school hours unless directed by an educator for educational use only.
- Any educational site designated by the teacher for use has been approved by the school district. These sites do require personal information other than first and last name. The student shall not engage in any site that requires personal information.
- Students will not engage in any gesture that is expressed through written language, verbally, and/or physically that degrades a person is considered bullying. This includes, but is not limited to a person’s race, religion, color, gender, sexual orientation, disability, national origin, or any other unique characteristic. This behavior will be considered bullying whether it takes place on or off school property, at any school function, or in a school vehicle.
(Bullying Policy for Schools) - Any student who chooses to participate in bullying will be met with a swift and severe consequence. (Bullying Policy for Schools)
References
Bullying Policy for Schools. Retrieved October 27, 2015, from http://teaching.about.com/od/SchoolPolicy/a/Bullying-Policy.htm
CyberBullying Examples (2015, May 9). Retrieved October 27, 2015, from http://nobullying.com/cyberbullying-examples/
Digital Citizenship Week (2015, September). Retrieved October 27, 2015, from https://sites.google.com/a/cherokeek12.org/b-safe-cherokee/
Lenhart, A. (2015, April 9). Teens, Social Media & Technology Overview 2015. Retrieved October 27, 2015, from http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/
Netiquette. Retrieved from October 27, 2015, from http://www.auburn.edu/citizenship/netiquette.html
Netiquette Home Page. Retrieved October 27, 2015, from http://www.albion.com/netiquette/
What is Cyberbullying? Retrieved October 27, 2015, from http://www.stopbullying.gov/cyberbullying/what-is-it/
What is Cyberbullying? (2015). Retrieved October 27, 2015, from http://www.ncpc.org/topics/cyberbullying/what-is-cyberbullying
Bullying Policy for Schools. Retrieved October 27, 2015, from http://teaching.about.com/od/SchoolPolicy/a/Bullying-Policy.htm
CyberBullying Examples (2015, May 9). Retrieved October 27, 2015, from http://nobullying.com/cyberbullying-examples/
Digital Citizenship Week (2015, September). Retrieved October 27, 2015, from https://sites.google.com/a/cherokeek12.org/b-safe-cherokee/
Lenhart, A. (2015, April 9). Teens, Social Media & Technology Overview 2015. Retrieved October 27, 2015, from http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/
Netiquette. Retrieved from October 27, 2015, from http://www.auburn.edu/citizenship/netiquette.html
Netiquette Home Page. Retrieved October 27, 2015, from http://www.albion.com/netiquette/
What is Cyberbullying? Retrieved October 27, 2015, from http://www.stopbullying.gov/cyberbullying/what-is-it/
What is Cyberbullying? (2015). Retrieved October 27, 2015, from http://www.ncpc.org/topics/cyberbullying/what-is-cyberbullying