Skip to main content

5 Bullying Prevention Tips from an Expert

Is your child being bullied? Here are five bullying prevention tips to help you understand why some students decide to pick on other kids.

1. The Classic Bully Was a Victim First

Hurt people, Hurt people. People who have been hurt in the past, and do not go through some sort of healing process, often either hurt other people in the same way or they let the hurting action continue to happen.
Healed people, heal people. It’s best to help students talk to caring adults about their hurts so they can heal emotionally from their pain. Talking to a counselor will help to strengthen a student’s emotional health. Many students care about physical strength training but often disregard the importance of being emotionally healthy. Emotionally healthy students stabilize the class and the school culture.

2. Victim Mentality vs. Leadership Mentality

People who have been hurt and haven’t gone through any healing process often carry a victim mentality, and rightly so. When a person with a victim mentality walks into a room, they say to themselves, “how are OTHERS going to treat ME.”
When a leader walks into a room, they say to themselves, “how can I treat OTHERS.” Leaders will focus on how they are going to treat other people.

3. The Golden Rule vs. the Law of Reciprocity

Most people know the Golden Rule; however, they do not live by the Golden Rule. Most people live by the Law of Reciprocity, which says that if you’re nice to me then I’m going to be nice to you. This law does not work because if we live by this, then if you’re mean to me, according to the law of reciprocity, I’m going to be mean back to you. It’s an eye for eye approach. So basically, I could be having a good day and the moment you say something bad about me, now I have to say something bad about you, which ruins my day. So now my day will be dictated by how others treat me. This gives away a lot of the power we all have within us.
However, we retain our power when we live out the Golden Rule. This rule says that we will treat other people the way we want to be treated. This article on corruption in our society is to be implemented when people are mean to us. So, when someone says something mean to you, use the Golden Rule when you react. You don’t let people run over you or treat you however they want, but regardless of how mean people can be, we do not try to match their meanness. Instead, we do the complete opposite.

4. Resilient Students Are Less Likely to Be Bullied

The goal is for students to become resilient. To be resilient is to have something taken apart and then put back together in a way that it can function like it was intended to function. So we want students to get to the point where they go through trials or have a mean moment with another student and they can quickly go back to being the student they were supposed to be. They don’t fall apart, they go through the healing process, they don’t stay victims, and they can continue to be the student they were supposed to be.

5. Fights Don’t Start Off as Fights

Most fights happen because students didn’t know how to resolve a conflict on their own. A student should never hit another student for whatever reason. When a student puts their hands on another student without permission it’s assault, it’s a crime and should be dealt with as such.

Comments

Popular posts from this blog

How to Write Great Deductive Essays

When writing, say, for various science subjects, not least medicine, it is important to be able to think in a logical manner. And there are few assignments that demonstrate logic better than writing a deductive essay. When tasked with this type of assignment, you may well wonder what the process involves. What is meant by deduction, evidence, premise and conclusion, for example? Why are they essential in these papers? While deductive writing cannot teach people logical thinking, we are able to provide guidance that should help you write better deductive essays. The process of deduction is a bit similar to puzzle solving; only it is in written form. Consult your tutor before beginning an assignment of this type to see what style of argumentation is expected e.g. whether they want the propositional or categorical type. Once you have all needed information, you are ready to begin writing. Be careful about dividing your writing into numerous parts because this can disrupt the smooth flow

DIY Christmas Gifts, Decorations, and Displays

There’s always room for another decoration or one more gift! So, if you’re looking for some holiday inspiration, you’ve come to the right place. Here are five of our favorite DIY Christmas gifts, decorations, and displays to bring the holidays into your home. This simple cabinet decoration will be making an appearance at my home this year. Finding another “spot” for decorations can be tricky, but what better location for all of your Christmas cards than the kitchen?! It is a universal gathering place! With just a few yards of ribbon and some tape, you can mimic this card display, too. Wooden signs are a simple holiday decoration that can be featured on your front porch this year. The best part? You can use BOTH sides of the wood, and have decorations for back-to-back holidays—that way you don’t have to pack and unpack each season. Use any colors or words you like, and enjoy! It happens more often than I’d like to admit, but when headed to a holiday party or get-together, I often

10 mobile security myths that need debunking

Securing mobile devices is a continuing challenge for enterprises as they deploy more mobile applications. In some cases, security risks are overblown; in others, they are underestimated. What myths about mobile security should IT security managers be aware of? Read my essay now! 1: Mobile devices don't need encryption A surprising number of companies don't implement data encryption on mobile devices. If these devices are being used as thin clients only, with enterprise data being stored in the cloud, there is less need for encryption. However, more and more mobile devices store contacts lists, photos, price lists, sales notes, and other sensitive information. The localized storage enables field-based personnel to keep working even if the cloud becomes unavailable. For these reasons alone, encryption should more widely considered. 2: Wearables don't need to have security practices applied Wearable devices are just beginning to make an entry into enterprises. In early