Forms of Cyberbullying

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

CYBERBULLYING Did you see that picture of Dana? – OMG!!
The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
Cyber-bullying Why We are Mean to Each Other and How We Can Change.
CYBER BULLYING An Overview CYBER BULLYING IS… The use of electronic communication technologies to intentionally engage in repeated or widely disseminated.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying Simple Guidelines for Parents, Teachers, and Students January 17, 2007.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
BULLYING What Is The Definition of Bullying?
BCMS Forms of Bullying.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Online Aggression. Cyberbullying  Definition (Cyberbullying Research Center ) Willful and repeated harm inflicted through the use of computers, cell.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
The Internet is Forever
Cyberbullying Internet Saftey: Information for H.S. Students.
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
Cyberbullying Just because they can’t hear you, doesn’t make it any different March 2009.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
CYBERBULLYING Hopkins School Guidance Program.
Cyber Bullying by Lisa Rundall. Cyber bullying is… …when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
SEAL Say no to bullying.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Cyberbullying Online Social Aggression Guidelines for Educators.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Alexis Pilkington, 17 Long Island Phoebe Prince, 15, Massachusetts.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Cyberbullying Terms & Definitions Source:
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
Cyberbullying What it is, How to deal with it, and more.
Welcome to Technology Thursday, January 15, 2015.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyber Bullying. What is Cyber Bullying Being cruel to others by sending or posting harmful material using technological means; an individual or group.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Cyberbullying and Cyberstalking BY MS. BARBARA WOOLLEY.
Do unto others as you would have them do to you..
A Staff Development created by Martha Littles CYBER KIDS, CYBER BULLYING, AND CYBER BALANCE BY BARBARA TROLLEY AND CONSTANCE HANEL Image: corwin.com.
Are You a Cyber-Bully?  0 – 5 Points  Cyber Saint  Congratulations!! You are a Cyber Saint! Your online behaviour is exemplary! Keep up the good work!
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Cyber-Bullying How to stay safe What to do if it happens to you.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
Do Now Pick up a handout in the front of the room and answer the four questions to the best of your ability.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Cyberbullying project
CYBER BULLYING.
If you see it don’t support it! RECOGNISE IT, REJECT IT, REPORT IT!
Cyberbullying Life Class Lessons – Week of May 9th -May 13th.
Cyber Bullying 1. ONLINE.
Cyberbullying.
Cyber Bullying.
Issues With Internet in College
Cyberbullying: How Can I Protect My Child?
Online Safety Assembly.
Presentation transcript:

Forms of Cyberbullying News Anchor Story What is Cyber Bullying? Technologies Forms of Cyberbullying Facts Glossary Consequences Broken Friendship You Can’t Take it Back Quiz What Now? Cyberbullying

What is Cyberbullying Cyberbullying occurs when teens use communication technology to say hurtful, embarrassing, or threatening things about another teen. Cyberbullying can be very emotionally damaging to teens, and can have legal consequences for teens and parents. Back Next

Technologies Used Cyberbullying can come through many types of technology, including: Emails Instant messages sent over the Internet Chat rooms, where teens talk to each other online Text messages sent to a teen's cell phone Web sites Blogs, or web logs, which are public online journals Next

Technologies Used Interactions through online games Social networking sites, like Facebook and MySpace, where individuals have a page about themselves where others can post messages Twitter, which sends short messages to a teen’s online account and cell phone Back Next

Forms of CyberBullying There are many types of Cyberbullying, including: Sending mean messages to a person through email or text Spreading rumors or lies about someone online through email or text Excluding someone from online social groups Creating a web site to make fun of someone Threatening or harassing someone online Tricking someone into sharing secrets and then spreading that information around Next

Forms of CyberBullying More forms of Cyber Bullying: Taking pictures of a person and sharing them online without the person's consent. Posting hurtful or threatening messages on social networking sites or web pages Stealing a person's account information to break into their account and send damaging messages Pretending to be someone else online to hurt another person Sexting, or circulating sexually suggestive pictures or messages about a person Back Next

Facts about cyberbullying Visit DoSomething.org to find facts about cyberbullying List the 6 facts you think apply most to you Back Next

Glossary of Terms Flaming: Online fights using electronic messages with angry and vulgar language. Harassment: Repeatedly sending offensive, rude and insulting messages. Cyberstalking: Repeatedly sending message that include threats of harm or are highly intimidating; engaging in other online activities that make a person afraid for his or her safety. Next

Glossary of Terms Denigration: “Dissing” someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships. Exclusion: Intentionally excluding someone from an online group, like a “buddy list” or a game. Trolling: Intentionally posting provocative messages about sensitive subjects to create conflict, upset people, and bait them into “flaming” or fighting. Next

Glossary of Terms Impersonation: Breaking into someone’s account, posing as that person and sending messages to make the person look bad, get that person in trouble or danger, or damage that person's reputation or friendships. Outing and trickery: Sharing someone’s secrets or embarrassing information online. Tricking someone into revealing secrets or embarrassing information, which is then shared online. Back Next

Consequences Under the Utah Criminal Code, electronic communication harassment of a minor is a third degree felony. Next

Consequences Utah defines electronic communication harassment as communication "with intent to annoy, alarm, intimidate, offend, abuse, threaten, harass, frighten, or disrupt the electronic communications of another person". This includes communicating insults, taunts, challenges, threats to inflict injury, physical harm, or threats to damage property. Next

Consequences Electronic communication harassment can be as simple as repeated trying to contact a person or their electronic device after the person has asked you not to contact them. Causing someone's electronic device to ring excessively to the point that it causes a disruption or jamming/overloading a system through excessive message traffic is electronic communication harassment. Back Next

Videos Broken Friendship and You Can’t Take it Back Netsmartz.org Real Life Stories Back Next

Quiz Are you a Cyberbully? Take the Quiz…What is your score? Cyberbully quiz Back Next

What do do about Cyberbullying Review the tips below so you can be prepared if you are ever the victim of Cyberbullying: Tell an adult you trust about what is happening! Do not respond to rude e-mails, messages, and comments. Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your you. Next

What do do about Cyberbullying If harassment is via e-mail, social networking sites, IM, and chat rooms, “block” bullies or delete your current account and open a new one. If harassment is via text and phone messages, change your phone number and only share the new number with trustworthy people. Also, check out phone features that may allow the number to be blocked. Get your school involved. Learn the school’s policy on cyberbullying and urge administrators to take a stance against all forms of bullying. Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement. Next

What do you think about Cyberbullying? Record your thoughts in your listening guide