Nov 26, 2009

Now back to my daughter of bullying in our home Welcome to cyber-bullying

Now back to my daughter of bullying in our home Welcome to cyber-bullying Last night, the daughter of Tom, Sue, came from her room to see his father and said:? I have another of those instant messages. He says:? You better not be tomorrow at school or otherwise?. It 'time for messages like this for several weeks. The result is that it is no longer as their computer on.Sue is now 14 years old and in 8th Class. He was bullied at school for a number of years and have a difficult time for the principal and teachers to put an end to it.Sue has two disadvantages, the goal. First, it has always had a weight problem, not very difficult, but only a little 'over weight. Secondly, the last name is difficult to pronounce. This has led to numerous opportunities to say and point out his name. I am very creative and cruel. Tom is aware that we are losing about 20 pounds, but what can I do to change his name? This should come as no surprise to anyone, but like all the changes that technology to adjust, unfortunately, even the bullies. Bullying is wireless. These are the situations, our children, who have never did.How does this happen? Inteet, mobile phones with SMS, instant messaging, camera phones and e-mail, the new tyrant tools.This next to a school near you, if it is not already. The conces that the cyber-bullying are: 1 cyberbullying can be far more serious and can be psychologically much more intense.2. It creates a barrier between the bully and the victim. This can Who can not be considered a potential Bully Bully hours, there is no contact, face to face. Smaller students have found a way to tough.3. It 'very difficult to catch the Bully. If the victim is suspected or caught their defense is that someone really needs me or someone my password.4. Camera phones, the Cyber-bullying more creative. As someone? S image and then manipulate them. When it is finished on a website or e-mail. Imagine an e-mail to an individual with his face bare, and you? Even in this case only a teenager.5. Many think that this is a joke, and not as serious as bullying face to face.Parents must awareMany children, including Sue, does not want to report the problem to their parents for fear of how their parents respond. Many believe that their parents take their phone, computer or Inteet access. This is an obvious solution to stop the messages, but it is only a temporary phenomenon. Sue feels harassed by the bully and punished by their parents, if their device is removed. This is a double punishment for her.SOLUTIONS available - ask questions and act as if you? Even in this case with the object. For example, you have never heard of any false messages it receives on his phone? Who in the school with their camera phones for photos of others who do not? T want their image? Then the father of Sue should educate their every situation and how to deal with them, if and when arises.Text messages? Once your obscene Message, threatening or abusive message on their cell Teaching Not react. Your wireless provider should to see how to address this situation.Chat rooms and instant messaging? This is what we need to teach Sue: 1 You should never leave their personal information.2. There should be at their password.3. When Sue receives inappropriate messages, which are divided, or the blocking of sender.4. It should not be inappropriate messages. We do not want a dialogue on begin.5. You should avoid the name of their school.6. No child should ever vote for someone from a chat room. The 17-year-old stallion is only 53 years to the bald man with a pot belly.E-mail? Again, if Sue is an unreasonable E-mail should not respond. Go to the SOURCE button to find out Information on the persecution, if they were from. When it comes to by someone at school, and then print the e-mail to use as evidence. Sue? Parents are the school or its service provider to see What options are available. When it comes to threats, then contact the police is always a option.Look in the e-mail filters, create folders for these e-mails and Spam-blocking software. Whatever you decide, you never be 100% perfect in blocking unwanted e-mails.Here few waing signs that your father must be aware of your needs and inform an adult if they are on this? If someone is with you, your personal information online? Buddy. If you are in news, photos, gifts, and said he would not be compatible with everyone. When requested, pictures of themselves to e-mailer. Remember adults, no friends with children on the inteet, then tell the child to remain silent, without fear purpose.Handling cyber bullying with your child before it becomes a problem that it will be easier if and when it becomes a problem. The child needs your advice and ignore the problem is not aid or support those who are victim of a cyber-bullying.Derek Randel is a trainer, advises parents and works with parents to the eradication of shouting at home. Has a program for parents to help bullying. It 'the author of three education books.Now again bullying my daughter in our home Welcome to cyber-bullying Last night, the daughter of Tom, Sue, came from her room to see his father and said:? I have another of those instant messages. He says:? You better not be tomorrow at school or otherwise?. It 'time for messages like this for several weeks. The result is that it is no longer as their computer on.Sue is now 14 years old and in 8th Class. He was bullied at school for a number of years and have a difficult time for the principal and teachers to put an end to it. Sue has two disadvantages, the goal. First, it has always had a weight problem, not very difficult, but only a little 'over weight. Secondly, the last name is difficult to pronounce. This has led to numerous opportunities to say and point out his name. I am very creative and cruel. Tom is aware that we are losing about 20 pounds, but what can I do to change his name? This should come as no surprise to anyone, but like all the changes that technology to adjust, unfortunately, even the bullies. Bullying is wireless. These are the situations, our children, who have never did.How does this happen? Inteet, mobile phones with SMS, instant messaging, camera phones and e-mail, the new tyrant tools.This next to a school near you, if it is not already. The conces that the cyber-bullying are: 1 cyberbullying can be far more serious and can be psychologically much more intense.2. It creates a barrier between the bully and the victim. This can Who can not be considered a potential Bully Bully hours, there is no contact, face to face. Smaller students have found a way to tough.3. It 'very difficult to catch the Bully. If the victim is suspected or caught their defense is that someone really needs me or someone my password.4. Camera phones, the Cyber-bullying more creative. As someone? S image and then manipulate them. When it is finished on a website or e-mail. Imagine an e-mail to an individual with his face bare, and you? Even in this case only a teenager.5. Many think that this is a joke, and not as serious as bullying face to face.Parents must awareMany children, including Sue, does not want to report the problem to their parents for fear of how their parents respond. Many believe that their parents take their phone, computer or Inteet access. This is an obvious solution to stop the messages, but it is only a temporary phenomenon. Sue feels harassed by the bully and punished by their parents, if their device is removed. This is a double punishment for her.SOLUTIONS available - ask questions and act as if you? Even in this case with the object. For example, you have never heard of any false messages it receives on his phone? Who in the school with their camera phones for photos of others who do not? T want their image? Then the father of Sue should educate their every situation and how to deal with them, if and when arises.Text messages? Once your obscene Message, threatening or abusive message on their cell Teaching Not react. Your wireless provider should to see how to address this situation.Chat rooms and instant messaging? This is what we need to teach Sue: 1 You should never leave their personal information.2. There should be at their password.3. When Sue receives inappropriate messages, which are divided, or the blocking of sender.4. It should not be inappropriate messages. We do not want a dialogue on begin.5. You should avoid the name of their school.6. No child should ever vote for someone from a chat room. The 17-year-old stallion is only 53 years to the bald man with a pot belly.E-mail? Again, if Sue is an unreasonable E-mail should not respond. Go to the SOURCE button to find out Information on the persecution, if they were from. When it comes to by someone at school, and then print the e-mail to use as evidence. Sue? Parents are the school or its service provider to see What options are available. When it comes to threats, then contact the police is always a option.Look in the e-mail filters, create folders for these e-mails and Spam-blocking software. Whatever you decide, you never be 100% perfect in blocking unwanted e-mails.Here few waing signs that your father must be aware of your needs and inform an adult if they are on this? If someone is with you, your personal information online? Buddy. If you are in news, photos, gifts, and said he would not be compatible with everyone. When requested, pictures of themselves to e-mailer. Remember adults, no friends with children on the inteet, then tell the child to remain silent, without fear purpose.Handling cyber bullying with your child before it becomes a problem that it will be easier if and when it becomes a problem. The child needs your advice and ignore the problem is not aid or support those who are victim of a cyber-bullying.Derek Randel is a trainer, advises parents and works with parents to the eradication of shouting at home. Has a program for parents to help bullying. It 'the author of three books and can be reached at 847-853-4308 or derek@randelconsulting.com

No comments:

Post a Comment