Cyberbullying and Online HarassmentActivities & Teaching Strategies
Active learning helps Year 7 students grasp the serious, often hidden effects of cyberbullying by letting them experience scenarios firsthand rather than just discussing them. When students step into roles and create campaigns, they move from passive listeners to active participants who understand the real-world impact of their digital actions.
Learning Objectives
- 1Identify specific examples of cyberbullying, including name-calling, exclusion, and impersonation.
- 2Explain the emotional and psychological effects of cyberbullying on victims and bystanders.
- 3Analyze strategies for responding to and reporting cyberbullying incidents effectively.
- 4Design a digital poster or short video script promoting positive online interactions and digital citizenship.
Want a complete lesson plan with these objectives? Generate a Mission →
Role-Play Workshop: Cyberbullying Scenarios
Divide class into small groups and provide scenario cards describing cyberbullying situations. Groups act out the incident, then switch roles to practice positive responses like blocking and reporting. End with group debrief on what worked best.
Prepare & details
Explain the psychological impact of cyberbullying on individuals.
Facilitation Tip: During the Role-Play Workshop, assign roles clearly and circulate to listen for empathy in student responses rather than just dramatic reactions.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Campaign Creation: Kindness Posters
Pairs brainstorm slogans and visuals for anti-cyberbullying posters using digital tools like Canva. They present designs to the class, explaining how each element promotes respect online. Display posters in the classroom or school.
Prepare & details
Analyze effective strategies for responding to and reporting cyberbullying.
Facilitation Tip: For Campaign Creation, provide examples of both effective and ineffective posters to guide students in analyzing tone and messaging first.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Case Study Circles: Real-Life Analysis
In small groups, students read anonymized cyberbullying cases and discuss impacts, prevention steps, and reporting processes. Each group shares one key takeaway with the whole class. Teacher facilitates to connect to curriculum standards.
Prepare & details
Design a campaign to promote kindness and respect online.
Facilitation Tip: In Case Study Circles, assign specific questions to each group to ensure all perspectives are covered and no one disengages from the discussion.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Reporting Relay: Step-by-Step Practice
Whole class lines up; teacher calls out cyberbullying scenarios. Students race to the board to write the next reporting step, such as screenshot evidence or contact helpline. Review as a group for accuracy.
Prepare & details
Explain the psychological impact of cyberbullying on individuals.
Facilitation Tip: During the Reporting Relay, place reporting forms or digital templates in visible locations so students practice with real tools they can use later.
Setup: Groups at tables with case materials
Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template
Teaching This Topic
Teaching cyberbullying requires balancing emotional safety with honest confrontation of harm. Start with clear definitions and immediate actions students can take, then build empathy through structured reflection. Avoid long lectures; instead, use peer-led discussions and real cases to keep the topic grounded. Research shows that students learn best when they connect concepts to their own digital lives, so anchor activities in their lived experiences with phones, games, and social media.
What to Expect
Successful learning happens when students can identify cyberbullying forms, explain their emotional and social effects, and demonstrate clear steps to respond or report. They should also recognize their own power as bystanders and allies in online spaces.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring Role-Play Workshop, watch for students who dismiss digital harm as 'less real' than in-person bullying.
What to Teach Instead
Use the role-play debrief to ask each character to describe their feelings and how the situation affected their day. Highlight statements that show lasting emotional impact to bridge the online-offline gap.
Common MisconceptionDuring Campaign Creation, watch for students who argue that ignoring cyberbullying is always the best response.
What to Teach Instead
Have groups compare their posters to the 'Ignore It' strategy. Ask them to identify which scenarios posters address and why ignoring can sometimes escalate harm.
Common MisconceptionDuring Case Study Circles, watch for students who claim bystanders bear no responsibility for cyberbullying.
What to Teach Instead
In small groups, ask students to trace how sharing or viewing a post enables the bully. Then, have them revise a case study to include bystander actions that could have changed the outcome.
Assessment Ideas
After Role-Play Workshop, provide three short scenarios. Ask students to mark 'Cyberbullying' or 'Not Cyberbullying' and explain their choice based on repetition and intent, collecting responses to check for accuracy and depth of reasoning.
During Campaign Creation, ask students to share their posters in pairs and explain how they designed them to encourage bystanders to act. Listen for language that distinguishes active versus passive bystander roles in their explanations.
After Reporting Relay, ask students to list two specific actions they can take if they experience or witness cyberbullying. Collect their answers to verify they include reporting to a trusted adult and using platform blocking features.
Extensions & Scaffolding
- Challenge early finishers to design a short social media post that models positive online behavior, including a caption and hashtags.
- Scaffolding for struggling students: Provide sentence starters for Case Study Circles, such as 'One consequence could be...' or 'A helpful action would be...'.
- Deeper exploration: Invite a digital safety expert or school counselor to join a panel after the Reporting Relay to answer student-generated questions.
Key Vocabulary
| Cyberbullying | The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. |
| Online Harassment | Repeated or severe behavior directed at an individual using electronic means that causes distress or fear. |
| Digital Footprint | The trail of data a person leaves behind when interacting online, which can include social media posts, website visits, and emails. |
| Bystander | A person who witnesses cyberbullying or online harassment but is not the direct target or perpetrator. |
| Digital Citizenship | The responsible and ethical use of technology and the internet, including online safety and respectful communication. |
Suggested Methodologies
More in Impacts and Digital Literacy
Introduction to Digital Citizenship
Students will explore what it means to be a responsible digital citizen and the importance of online etiquette.
2 methodologies
Online Etiquette and Netiquette
Students will learn about appropriate communication and behaviour in various online environments, including social media and forums.
2 methodologies
The Digital Footprint: Data Collection
Exploring how personal data is collected and the long term consequences of an online presence.
3 methodologies
Privacy Settings and Online Identity
Students will learn to manage privacy settings on various platforms and understand how their online identity is constructed.
2 methodologies
Cybersecurity Threats: Phishing & Malware
Understanding common threats like phishing and malware and how to defend against them.
2 methodologies
Ready to teach Cyberbullying and Online Harassment?
Generate a full mission with everything you need
Generate a Mission