Triaging Cyber Bullying: Protection, Intervention & Prevention - CAMFT 48th Annual Conference

Post on 27-Jun-2015

165 views 2 download

Tags:

description

In order to address the issue of cyber bullying, research supports that it must be met with a systemic approach. Within that response, it is most effective to utilize a triage approach: protection, intervention, and prevention.

transcript

CAMFT 48th Annual Conference

Triaging Cyber Bullying Protection, Intervention & Prevention

Holli Kenley, M.A.

Goals Goal One: To acquire methods and strategies in protection

from cyber bullying.

Goal Two: To acquire methods and strategies of intervention with cyber bullying.

Goal Three: To acquire methods and strategies in the prevention of cyber bullying.

Definition

“…willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.”

(Hinduja & Patchin, 2009)

Vocabulary1. Cyber victim, pure victim, cyber bullied, cyber

victimized

2. Cyber bully

3. Cyber bully victim, cyber bullied victimized

4. Traditional bully

5. Bullicide

A Few Facts

1. Synonyms for cyber bullying

2. Types of cyber bullying

3. Relationship to traditional bullying

4. Prevalence

Goal One- Protection Protection – To safeguard against cyber risk and to address

low level cyber harm.

Assessment:1. Role/s of client

2. Crisis intervention, protection, or both

Protection Educate adults and their children about safety measures.

1. Prepare children

2. Supervise and monitor children

3. Technological solutions “Stop – Save – Share” (Hinduja & Patchin, 2012)

“ I DON’T PLAY” (Sutton, 2009)

Protection Educate adults and their children about safety measures.

4. Web sites: www. Cyberbullying.us

www. Cyberbullyhelp.com

5. Blocking and Filtering Software

6. Report to Internet Service Provider (IPS) or Site

Protection Teach adults how to parent a high tech generation.

1. Family Internet Use Agreement (sample) Personal Code of Conduct

2. Implement safety measures for cyber victim Implement reasonable consequences for cyber bully

3. Net neighborhood (Coloroso, 2008)

4. Web buddies; peer helper programs

Protection Increase awareness of a cyber bullying culture and of the

roles/responsibilities of every individual.

Team Responsibility:1. Parents2. Youth3. Schools

4. Community5. Society (Trolley & Hanel, 2010)

Protection Team Responsibility:

6. Therapists and Clinicians:ServicesGroupsAdvocacyNewsletters or professional materials

Protection “A Whole Approach”

Safe environment

Anti –bullying program

Anti –bullying policy

Safe philosophy (Sullivan, 2011)

Pause

Questions…

Input…

Other thinking…

“...cyber bullying could be a normative component for contemporary relationships as individuals navigate and inhabit

social networking and video sharing worlds…cyber bullying concerns the interruption to and breakdown of ordinary relationships, not

just those of bully or victim.”

(Spears, Slee, Ownes & Johnson, 2009)

Definition

“Cyber bullying [is] an aggressive, intentional act, carried out by a group or individual, using electronic forms of contact, repeatedly and over time, against a victim who cannot easily

defend him or herself”.

(Smith, Mahdavid, Carvalho, and Tippett, 2006)

Vocabulary1. Instrumental aggression

2. Reactive aggression

3. Overt aggression

4. Covert aggression

5. Theories of aggression (Bauman, 2011)

Goal Two -Intervention Intervention – To identify role/s of clients, to assess level of

cyber harm, and to implement therapeutic strategies.

Assessment:1. Role/s of clients

2. Crisis intervention, protection and TX

Intervention To implement crisis interventions.

1. Cyber victim

2. Cyber bully

3. Cyber bully victim

Intervention To implement treatment strategies given the role/s of

clients.

Cyber victim:1. Profile

2. Needs/motivations

3. Relationship to technology

Intervention To implement treatment strategies…

Cyber victim:1. Protective measures in place; legal issues2. Address victimization/empowerment3. Goals of counseling4. Address presenting or co-occurring disorders5. Positive peer relationships/social skill building6. Support groups 7. Work with parent/guardian (Campbell, 2007)

Intervention To implement treatment strategies given the role/s of

clients.

Cyber bully:1. Profile

2. Needs/motivations

3. Relationship to technology

Intervention To implement treatment strategies…

Cyber bully:1. Punishment (?)2. Positive need fulfillment3. Social skill building4. Empathy building5. Address presenting or co-occurring disorders 6. Group work7. Work with parent/guardian; legal issues

Intervention To implement treatment strategies given the role/s of

clients.

Cyber bully victim:1. Profile, history, and relationship to both2. Assess levels of danger to self and others3. Assess underlying pathology or co-occurring disorders4. Implement psychological, educational, and social

response 5. Work with parent/guardian; legal issues

Intervention To implement treatment strategies…

Cyber victim, cyber bully, cyber bully victim:1. Interpersonal approaches

2. Brief-solution focused therapy (low level) Cog/Behavioral; Rational Emotive (high level)

3. Support groups * Pikas “Shared Method of Concern”

4. Restorative justice (Bauman, 2011)

Intervention To implement the “System’s Approach” or “Holistic

Approach” as it applies to treatment.

Parents - Youth - School - Community - Law Enforcement :1. Psychological response

2. Educational response

3. Social response

Intervention To implement “System’s Approach”…

IP Family (Relationship to technology)

Schools/Counselors/Therapists

Community/Support Systems/Legal

Intervention To review role of support systems as they apply to

intervention.

Support systems:1. Groups

2. Holistic Approach

Pause

Questions…

Input…

Other thinking…

“Technology is never the problem or the solution…behavior is. Media is behavioral. Focus on our humanity – who we are and how

we treat one another – online or offline.”

(Hinduja & Patchin, 2012)

Goal Three -Prevention Prevention – To address the causal factors of cyber bullying

and to implement healthy practices in our relationships with technology and with others.

Causal factors – a review of current thinking:1. Two social networking norms

2. Technology-induced conditioned responses

3. Profile of bully or bully victim

Prevention1. Causal factors – two social networking norms

Anonymity or pseudonymity1. Detachment from real world2. Distant from target3. Disinhibition

Power differential1. Ease2. Expansion3. Emboldened

Prevention2. Causal factors – technology-induced conditioned response

Habits of electronic communication reinforced by:1. Disinhibition 2. Developmental factors3. Reinforcement from self and from others4. Repetition 5. Factors in cyber space

Prevention3. Causal factors -combine with profile of bully or bully victim

Attitudes, beliefs, and motivations:1. Regard (lack of empathy)

2. Revenge

3. Relationship between victim (T or C) , cyber bully, and traditional bully

Prevention

“Technology use is an indirect form of contact and interaction with society. A healthy balance of direct interaction with peers and physical activities promotes good social skills, problem solving abilities, and physical fitness.”

(Trolley & Hanel, 2008)

Prevention To implement healthy practices in our relationships with

technology.

Cyber balance:1. Family assessment 2. Education3. Establish philosophy, guidelines and practices4. Direct interaction, empathy building, serve others5. Adults model healthy behaviors

Prevention To implement healthy practices in our relationships with

others.

1. An enforceable policy in place2. Peer support3. Positive interdependent experiences4. Individual and group accountability5. Face to face interaction

6. Teach and model interpersonal skills7. Group process (role play and build empathy)

Prevention

“…restoring the use of technology within the family, particularly by youth…allows you to experience the benefits of technology while reducing the risks…cyber bullying is a symptom of being out of balance with technology.”

(Trolley & Hanel, 2010)

Prevention

Celebrate being present

Celebrate being available

Celebrate our similar need for respect, dignity & human regard

All Together Now…

Diverse Faces Of Mental Health

“Face to Face: Unwired”

Holli Kenley