before you text

This second module examines a variety of digital threats and crimes including bullying, harassment, sexting, and sextortion. It is important to recognize that these crimes are often interwoven and perpetuated together. You will also be challenged to make some mature decisions about specific activities others are involved in and about your own life as well.

Objectives

At the end of this module, students should be able to:

  • Explain why there is a lack of built-in internet safeguards.
  • Recall the types of bullying.
  • Apply the expanded components of the legal definition of bullying to correctly identify bullying behavior.
  • Describe examples of harassing behavior.
  • Identify the legal requirements of a schools’ bullying policy so students are protected.
  • Differentiate between someone using direct or indirect intervention behavior when they witness bullying.
  • Describe the characteristics of a social predator.
  • Compose a statement to your peers warning them how seemingly “fun” digital activity can lead to sextortion.
  • Summarize how to effectively fight against being a victim of sextortion.
  • Explain why it is important to understand and remember, especially during overwhelming and tough times, that there are cycles for everything in life.

  • Summarize how to effectively fight against being a victim of sextortion.
  • Explain why it is important to understand and remember, especially during overwhelming and tough times, that there are cycles for everything in life.

Topics

This module will review the following topics:

  • Lack of built-in internet safeguards
  • Bullying
  • Harassment
  • Social predators
  • Sexting
  • Sextortion
  • Suicide