Prevention of Cyber Bullying

Only available on StudyMode
  • Download(s) : 53
  • Published : April 12, 2013
Open Document
Text Preview
Contents
1. Introduction 2. Background 3. Design of the programme a. Title b. Target c. Goal d. Objectives i. Knowledge level ii. Skill level iii. Attitude level e. Strategy and method f. Duration 4. Outcome Evaluation 5. Boundaries and Potential Limitations 6. Reference 7. Appendix

Individual Project plan of Prevention of Cyber Bullying

1. Introduction This is a project plan of health education and promotion school programme. It is designed by the students of Bachelor of Health Education (Hons) in Hong Kong institute of Education. The topic is prevention of Cyber Bullying. This programme is designed for the target group of secondary four students. The programme is adapted into a lesson of civil education of forty-five duration. The venue will be a classroom in secondary school. The resources are collected from the government departments, some non-government organisations (NGOs) and internet then we tailor-made it for the target teenagers. The aims of this programme are to reveal a clear definition and the harmful effects of Cyber Bullying to the target, then provide them some skills to handle the probable situations of bullying. Finally our destination is to correct some misconception of bullying is acceptable behavior in schools among partial students.

2. Background The definition of “Cyber Bullying” should be as “an intentional, aggressive act or behaviour that is carried out by a group or an individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend himself or herself” (Peter Smith, Jess Mahdavi, Manuel Carvalho and Neil Tippett, 2008). The current situation of cyber bullying in HK has become more serious. A survey conducted on primary four to secondary six students by an NGO, Hong Kong Christian Service (HKCS) in 2009. A total of 908 surveys were collected. The result of the survey showed that nearly 20% of adolescent participants had experienced cyber bullying (HKCS, 2009): There were 18% young people who said that they had been victims of Internet bullying over the past year, while 13% of the respondents claimed themselves having the online

bullying behaviours. The three most common bullying acts on the Internet included: echoing others in laughing at the victims, spreading rumours about the victims, and forwarding photos, videos or sound clips to embarrass the victims. A warning signal was raised for the parents, teachers, social workers even the information technology workers and the Network Providers. They should pay attention to the health of juvenile and be alerted to the prevention of cyber bullying due to the following reasons. According to the survey, Cyber bullying conveys harmful impacts to the victims involved. 60% of the victims believed that their physical and emotional health was damagingly affected. 46% expressed that their social activities have been disordered. 36% pointed out that their school life was disturbed. 15% also stated that their family life has been interfered (HKCS, 2009). The notable data above indicated that as the information technology had been developed rapidly, a new form of juvenile delinquency had alarmed the siren. The contributing factors of cyber bullying consist of two parts. One of them is related to the individual factors while the other is the nature of internet use. Firstly the individual factors are including ignorance, lack of social skills and revenge. Ignorance means the adolescents don’t aware of the negative effect can be done on both of victims and the bully. Lack of social skills represents a youngster who doesn’t know how to communicate one’s feelings with others face to face. Revenge refers a bully involved in cyber bullying could be a victim in real life who thus takes a revenge on the internet or mobile platforms. Secondly the nature of internet use also contains three aspects: anonymity, prevalence of social media and lack of adults’ guidance (Veenstra, S., 2011). All of these factors lead...
tracking img