Risks in the Digital World #2

Name of the Exercise Risks and risking in the Digital World #2
Number of participants 1-14
Duration 45 minutes
Objective For trainees to be aware of the potential risks related to harassment and bullying, how to avoid them, and how to treat them if they happen.
How to conduct it Connecting to topic – 5 min
Trainer asks participants about their own experience on cyberbullying and cyber harassment.
Interaction – 10 min
Trainer asks following questions: · What is cyberbullying?
a. When a student or more students bully another student on the internet
b. When a person sends mean messages (text or picture or video) to another person
c. When a person uses the phone of another person to apply actions which will get the owner of the phone into trouble
d. When a person pretends to be another person in online environment
e. Other: ………………..
· Have you ever been subjected to cyberbullying? YES / NO / NOT SURE -
If YES, how many times or how often?
· Did you report the online attack on your person? YES / NO -
If YES, to whom? - If NOT, why?
Open discussion is encouraged
Topics detailing - Types of personal attacks as ethical violation – 10 min
1. Trainer gives mini lesson in which they defines and classify the ethical violation (cyberbullying and others) within online communication.
2. Cyberbullying types to present:
· Exclusion
· General and specific harassment (Doxing, Cyberstalking, Trolling, Online impersonation, Catfishing, Swatting, Revenge porn)
· Trickery
· Fraping
· Masquerading and Defamation and Polling
· Dissing
· Flaming
· Sexting and Revenge porn
Exercise -
Analysis of threat and propose measures – 15 min

1. Trainer creates 3 groups of max 5 participants
2. Trainer organizes direct scenarios of persons who apply bullying and hating in social media environment for each of the 3 teams
2. Each group is invited to participate in communication with the hater or person who applies bullying; the groups will identify the attacks and its type, will analyse them, and they will propose measures as response to the attacks.
3. Trainer will encourage the critical and in common analysis of the proposed measures
Closing remarks Closing – 5 min 1. Trainer makes short review of discussions 2. Trainer presents the risks related to cyberbullying

Home | Resources | Categories | Glossary | Links | Top