Cyberbullying and Online HarassmentActivities & Teaching Strategies
Active learning helps Year 8 students grasp the hidden and immediate effects of cyberbullying by turning abstract ideas into real interactions. By role-playing and mapping scenarios, students see how online actions ripple into emotional and social consequences, making the topic personally relevant.
Learning Objectives
- 1Analyze the psychological effects of cyberbullying on adolescent self-esteem and social relationships.
- 2Compare the legal consequences of online harassment across Australian states and territories.
- 3Evaluate the effectiveness of different online safety strategies for preventing cyberbullying.
- 4Create a digital campaign plan to promote positive online interactions among peers.
- 5Synthesize information from case studies to explain the impact of online harassment on victims.
Want a complete lesson plan with these objectives? Generate a Mission →
Role-Play: Cyberbullying Scenarios
Divide students into small groups and assign roles: victim, bully, bystander, and supporter. Groups act out a scenario from provided cards, then switch roles and discuss intervention strategies. Debrief as a class to identify effective responses.
Prepare & details
Analyze the psychological and social impacts of cyberbullying on individuals.
Facilitation Tip: During the role-play activity, assign each student a specific platform or app so they experience how harassment appears in different spaces.
Setup: Four corners of room clearly labeled, space to move
Materials: Corner labels (printed/projected), Discussion prompts
Guideline Workshop: Positive Interactions
In pairs, students review real eSafety examples and brainstorm five guidelines for safe online behavior. Pairs combine into groups of four to refine and vote on the best set, then present to the class for school-wide adoption.
Prepare & details
Explain the legal consequences of online harassment in different jurisdictions.
Facilitation Tip: Before the guideline workshop, ask students to bring examples of positive and negative online interactions to analyze together.
Setup: Four corners of room clearly labeled, space to move
Materials: Corner labels (printed/projected), Discussion prompts
Case Study Analysis: Impact Mapping
Provide anonymized Australian case studies. In small groups, students map psychological, social, and legal impacts on charts, then share findings. Conclude with a whole-class vote on top prevention strategies.
Prepare & details
Construct a set of guidelines for promoting positive online interactions.
Facilitation Tip: For the case study analysis, provide a mix of public and private scenarios so students notice subtle forms of harm.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Support Network Poster: Who to Tell
Individually, students research local and national support services like Kids Helpline or eSafety. They create posters listing contacts and steps for reporting harassment, then gallery walk to add peer suggestions.
Prepare & details
Analyze the psychological and social impacts of cyberbullying on individuals.
Facilitation Tip: When creating the support network poster, encourage students to include both school and community resources to build a comprehensive safety net.
Setup: Four corners of room clearly labeled, space to move
Materials: Corner labels (printed/projected), Discussion prompts
Teaching This Topic
Teachers should balance emotional safety with honest discussion, using real examples to illustrate legal and social consequences. Avoid dramatizing cases, as this can overwhelm students; instead, focus on actionable strategies and clear boundaries. Research shows that when students practice intervention in role-plays, they are more likely to act in real situations, so prioritize guided rehearsal over lectures.
What to Expect
Students will move from recognizing cyberbullying to practicing prevention and intervention, using clear examples and legal frameworks. They will justify decisions, collaborate on solutions, and connect behaviors to consequences, showing understanding through discussion and creative work.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring the Role-Play: Cyberbullying Scenarios, watch for assumptions that cyberbullying only happens on public social media.
What to Teach Instead
Use the role-play cards to guide students through private messages, gaming chats, and app-based harassment, asking them to act out subtle forms like exclusion or rumor-spreading in these spaces.
Common MisconceptionDuring the Case Study Analysis: Impact Mapping, watch for the belief that ignoring or blocking a bully is always enough.
What to Teach Instead
Have students map the escalation paths in each case study, noting how ignoring can sometimes worsen harm, and use the mapping to test and justify reporting or seeking adult support.
Common MisconceptionDuring the Guideline Workshop: Positive Interactions, watch for confusion about whether Australian laws apply to young people.
What to Teach Instead
In the workshop, include a brief discussion of real cases involving minors, and ask students to connect specific behaviors to the Enhancing Online Safety for Children Act or criminal codes during their guideline creation.
Assessment Ideas
After the Role-Play: Cyberbullying Scenarios, provide students with a scenario involving cyberbullying. Ask them to write two sentences explaining one psychological impact on the victim and one strategy they could use to intervene as a bystander.
During the Guideline Workshop: Positive Interactions, pose the question: 'What are the most significant differences between face-to-face bullying and cyberbullying?' Facilitate a class discussion, guiding students to consider anonymity, reach, and permanence.
After the Case Study Analysis: Impact Mapping, present students with a list of online behaviors. Ask them to classify each behavior as either positive online interaction, cyberbullying, or online harassment, and briefly justify one classification.
Extensions & Scaffolding
- Challenge early finishers to design a short video or infographic explaining how to support a friend targeted by cyberbullying.
- Scaffolding for struggling students: provide sentence starters for the exit-ticket and pre-fill the case study mapping template with key terms.
- Deeper exploration: invite a guest speaker from the eSafety Commissioner to discuss reporting processes and outcomes.
Key Vocabulary
| Cyberbullying | The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. It is often repeated and intended to cause harm. |
| Online Harassment | Unwanted, offensive, or intimidating behavior that occurs online. This can include repeated unwanted contact, threats, or the spread of rumors. |
| Digital Citizenship | The responsible and ethical use of technology and online resources. It involves understanding rights, responsibilities, and safety in the digital world. |
| Bystander Intervention | The act of safely stepping in or speaking out when witnessing bullying or harassment. This can involve reporting, offering support, or de-escalating the situation. |
| eSafety Commissioner | An Australian government agency that provides resources and assistance for online safety issues, including cyberbullying and harassment. |
Suggested Methodologies
More in The Impact of Innovation
Robotics and Automation in Industry
Students will investigate the application of robotics and automation in various industries, examining their economic and social impacts.
3 methodologies
Artificial Intelligence and Job Displacement
Students will discuss the potential for Artificial Intelligence to displace human jobs and explore strategies for workforce adaptation and retraining.
3 methodologies
New Job Creation in the Digital Economy
Students will identify emerging job roles and industries created by advancements in digital technologies, such as AI, cybersecurity, and data science.
3 methodologies
Digital Waste and E-Waste Management
Students will investigate the environmental impact of electronic waste (e-waste) and explore sustainable practices for its disposal and recycling.
3 methodologies
Energy Consumption of Digital Systems
Students will assess the energy footprint of data centers, cloud computing, and personal devices, exploring strategies for energy efficiency.
3 methodologies
Ready to teach Cyberbullying and Online Harassment?
Generate a full mission with everything you need
Generate a Mission