Page 40

Cyberbullying stories Focus


To read about and discuss cyberbullying and the technologies cyberbullies use to hurt others

Page 22

Teacher information

1. (a) (b) (c) (d) (e)

handheld game console mobile phone computer, school intranet/email internet, online gaming/social networking site, chat site video camera, computer, YouTube/internet (video hosting site) 2. Possibly story 1, story 5

r o e t s Bo r e p ok u S

• Cyberspace does not have the physical boundaries that exist in the ‘real word’. While face-to-face bullying ends when the target gets home, cyberbullies can continue attacks using the internet or a mobile phone at any time of the day or night. Cyberspace provides the bully with a sense of anonymity, empowering bullies who may never have to see the effects of their actions on their target; it can be done quickly and on a large scale, because of the speed and reach of email, mobiles and websites; it easily allows bystanders to become bullies if they pass on emails or text/picture messages or take part in an online discussion. • Refer to pages vi–vii for further information.

3. Answers will vary but should include cyberbullying being a form of bullying using technologies such as mobile phones and the internet to intentionally and repeatedly hurt others.

4. Examples include messenger chat (IM), chat rooms, message boards, social networking sites, online gaming.

5. Cyberbullying is different from face-to-face bullying because it is often anonymous, and it can spread quickly and to many people. Anyone can bully and be bullied and it can happen almost anywhere and anytime.

Page 23

ew i ev Pr

Teac he r

• Cyberbullying is the use of information and communications technology (ICT), particularly mobile phones and the internet, to repeatedly and deliberately upset or attack someone. It can include threats, impersonation, exclusion, cyberstalking, defamation, or harassment designed to cause distress to the intended target. The bully or group of bullies can use mobile phone messages, calls or pictures; Internet social sites (chat rooms, message boards, social networking sites, video hosting sites, gaming sites or blogs); instant messaging or email to render the torment.


1.–4. Answers will vary. Teacher check

Supporting activity

• The students can make a poster to give a short lesson to another class to help them identify cyberbullying and also help people be more aware of their actions when using mobile phones and the internet.

• Before reading the text, ask the students about their use of information and communication technologies; ask if any students play games online, use ‘Neo pets’ or similar social networking site (some may have Facebook pages, Webkinz, Club Penguin, KidSwirl), watch YouTube clips, use Skype, have mobiles or email accounts. If time permits, ask them to explain to others what they can do and the fun they can have with these technologies.

w ww

• Explain to the students that while most of the time people use these technologies to have fun, contact each other and share pictures and ideas, some people also use these technologies to hurt others. This is a kind of bullying called cyberbullying. Cyberbullying is not ‘face-to-face’, but is using technologies to hurt others in different ways, sometimes in front of large number of people.

. te

m . u

© R. I . C.Publ i cat i ons •f orr evi ew pur posesonl y•


o c . che e r o t r s super

• Ensure the students understand any difficult terms such as ‘anonymous’ and ‘distort’. Discussing the text

• Read the text with the students and ask if they know of anything like this happening to anyone they know. Do they think each example is bullying? Ask them if they know of any other ways the internet, mobiles or other technologies could be used inappropriately.


Bullying in a cyber world - R.I.C. Publications®

Bullying in a Cyber World: Ages 6-8  
Bullying in a Cyber World: Ages 6-8  

The blackline masters cover the following: What is bullying?, Forms of bullying, Cyberbullying, Targets of bullying, Effects of bullying, Wh...