cybersafety

Q5 Cyberbullying: Bystander vs. Upstander

6. Cyber Smart

Hidden Influences

Every day, you navigate a digital world where conflict is rarely just a simple argument between two people, but a complex web fueled by invisible influences like silence, likes, and shared screenshots. Because you cannot rely on facial expressions or tone of voice online, learning to identify who is truly driving the conflict and who has the power to stop it, is the essential skill that transforms you from a passive spectator into an upstander.

Discussion question to think about as you play the video below:

  • How can someone be an upstander in a cyberbullying situation?

How To Be An Upstander

Direct link (2:31 min.)

The Goal With Cyberbullying

Cyberbullying can include people in multiple roles such as instigators to start it, reinforcers to cheer it on, and bystanders to watch it happen. If you only look for the bully, you can miss the rest of the team.

As a Player Conduct & Safety Agent, we need your help going through chat logs to find the upstanders. When a peer intervenes, bullying quickly stops the majority of the time. An upstander is faster and more effective than any ban hammer. Your job is to analyze the evidence, identify what to look for in different cyberbullying roles, and help collect evidence on how to encourage more upstanders in Level Up Studio video games.

The Team Intro. Training

As a whole team (your class), open the training session to learn more about the different roles in cyberbullying:

  • Aggressor (Bully), Target (Victim), Instigator (Starter), Reinforcer (Sidekick), Bystander (Silent), Upstander (Hero).

Step 1. A team leader (this may be your teacher or a trainee on the team) will lead the whole team through a discussion about the Roles of Cyberbullying in The Players Module 2.

Step 2. A team leader (this may be your teacher or a trainee on the team) will now lead the whole team through the Forensic Training. This will be an example of what you will need to complete during your own training.  

  • Read the Scanning Protocol within the training.
  • You will be looking at player chat logs to identify the different roles.
  • Access the The Players Training Module to complete 2. Forensic Training.

Your Individual Training Practice

Now it is your turn to identify these roles in different chat logs where cyberbullying has taken place. 

Step 1. Access the activity, select the Upstander Digital Activity.html

Step 2. Select the Download icon in the top left above the html coding. 

Step 3. Go to your downloads and open up the file (Upstander Digital Activity) to start the activity.

  • It may take a moment to open so be patient.
  • Read the Digital Instructions.
  • The first Chat Log Analysis was the training example that was completed as a whole team.

Step 4. Complete the Chat Log Analysis for Case #002, #003, & #004.

Step 5. Once you have completed all three case files, generate and save the PDF file by selecting the blue button as shown in the image below.

Step 6. Add your completed activity to your Player Conduct & Safety Portfolio on the Quest 5: Upstander slide.

MITECS  Michigan Integrated Technology Competencies for Students, and

ISTE Standards for Students

2. Digital Citizen
a. Cultivate and manage their digital identity and reputation, and are aware of the permanence of their actions in the digital world.
b. Engage in positive, safe, legal, and ethical behavior when using technology, including social interactions online or when using networked devices.
c. Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.

d. Manage their data to maintain digital privacy and security, and are aware of data-collection technology used to track their navigation online.