Cyberbullying: Stay safe, Stay Smart Based on Justin Patchin’s Book: Words Wound.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Don’t be bullied, or be a bully.
Technology SafeKEY.
Common Sense Unit 2 – Lesson 3 Category: Internet Safety.
Internet Online Safety How to have FUN and Stay in Control.
Click Below to Begin the Quiz
What you don’t know CAN hurt you!
RESPECT  What is RESPECT? How do you define it? How do show your respect to you friends, teachers, coworkers, adults, etc.?  Respect is thinking and.
This week is anti-bullying week.
e-safety and cyber bullying
Social Media: FACEBOOK Kristin Martin Professional Development.
Cyberbullying Kassie McAninch.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Do you know how to keep yourself safe?
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Stop the Creepers and Cyberbullies! 5 Easy Ways to keep yourself safer online!
Technology Safety Ways to be safe on the internet and social world.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Anti- bullying week Year 4.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Internet Safety Even though it might be hard, try not to get upset by other people’s comments.
 Be a good friend  Be a mediator  Look  Listen  Tell someone who cares LOOK OUT FOR EACH OTHER. KEEP EACH OTHER SAFE. Be the change you want to see.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Controlling Your Social Networking Privacy Settings Stay safe online!
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Do pictures always give truthful information? Can publishing it be hurtful??
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
School Violence Awareness How to Stop Bullying?. How to Stop Bullying §The Victim §The Bystander §The Bully.
Cyberbullying: Crossing the Line. Today’s Objective:  You are going to analyze online bullying behaviors that “cross the line,” learn about the various.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
What’s Cyberbullying?. Today’s Objective: To be able to empathize with the targets of cyberbullying, recognize some of the key similarities and differences.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Screen Out the Mean!! What can you do when someone is mean to you online?
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
By: Alina. If I’m signing up for a job the people who might hire me have to search on the internet if I’m mature or capable of having a job because if.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Digital Footprints By: Devon Nicholson. What is a digital footprint? A digital footprint is an online footprint in which people can look at what you have.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Internet Safety. Online Concerns: Contact Content Conduct.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Bullying-part 2. Review During the last homeroom we covered  respectful behaviors  disrespectful behaviors  bullying To review this information and.
Gosbecks E-Safety Guide
E – SAFETY Being safe online
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Creating your online identity
Keeping Children Safe Online
Protecting Your Privacy Online
8 online danger tips By: kailee bariring.
E – SAFETY Being safe online
Internet Safety Grade 5.
STOP. THINK. CONNECT. Online Safety Quiz.
Sometimes people don’t really understand just how much cyberbullying can hurt. Someone who is cyberbullied might: Feel sad and alone, like Lolo in the.
Social and Emotional Learning Department
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Digital Citizenship Tech in TUSD.
Online Safety! Created by Educational Technology Network
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Online Safety: Rights and Responsibilities
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Cyberbullying: Stay safe, Stay Smart Based on Justin Patchin’s Book: Words Wound

Review  During the last homeroom, we explored how bullying affects families, friends, and the person who is being bullied. We also asked that you Stand Up, Speak Up and Step Up against bullying. Doing nothing actually is doing something: It is silently agreeing with the bullying. What specific strategies can you use to help/stand up to bullying this were your friend? For the past 8 months I have been cyberbullied. Someone who I thought was my friend started to talk about me. Little by little it just kept getting worse. I’d go online and see things that she and her friend post about me and then I would burst into tears. When summer started things started to die down since we weren’t in school anymore. Just when I thought it was over, it started up again. I feel so alone at times. I feel like nobody understands. Every time she and her friend post something online I don’t speak up for myself. I feel like if I try to defend myself, they’ll just twist my words and use them against me. I just don’t know what do anymore. Ava, 15  During the last homeroom, we explored how bullying affects families, friends, and the person who is being bullied. We also asked that you Stand Up, Speak Up and Step Up against bullying. Doing nothing actually is doing something: It is silently agreeing with the bullying. What specific strategies can you use to help/stand up to bullying this were your friend? For the past 8 months I have been cyberbullied. Someone who I thought was my friend started to talk about me. Little by little it just kept getting worse. I’d go online and see things that she and her friend post about me and then I would burst into tears. When summer started things started to die down since we weren’t in school anymore. Just when I thought it was over, it started up again. I feel so alone at times. I feel like nobody understands. Every time she and her friend post something online I don’t speak up for myself. I feel like if I try to defend myself, they’ll just twist my words and use them against me. I just don’t know what do anymore. Ava, 15

BE THERE: The simplest thing that you can do when you see someone is being treated badly is to be a friend to him or her. The moment when somebody is being harassed, teased, threatened, or humiliated is probably the very moment when he/she feels the most alone. That person needs a reminder that others really do care.

BUILD A GROUP EFFORT: After stepping up and being a friend to someone who is being bullied, take your efforts further. Consider getting some of your friends to come together and rally around the person being bullied. There is strength-and safety-in numbers. Even when you most want to do what is right, you’ll probably be a little worried about becoming the next target of the bully. If your voice and support is echoed by others, you will feel stronger and more secure.

CRUSH CRUEL CONTENT:  We have all seen a YouTube video that starts with a few viewers and then goes viral. In the same way, online rumors, gossip, and other hurtful content can go from person to person to person in just seconds. This chain reaction can be devastating, but you can stop it in its tracks by never forwarding or sharing cruel or inappropriate content. When you do face these situations-moments when you have to decide whether to participate, step up, or speak up, how will you respond?

RECORD IT AND REPORT IT: To protect yourself and those being bullied, keep track of who, what, and when bullying behavior occurs. Screen shots and written journals can establish a repeated pattern of behavior that adults and websites can use as evidence to stop the bullying behavior. Please share this information with a trusted adult.

TALK TO A TRUSTED ADULT: When you are concerned about a family member or friend who is being bullied, you need support and should confide in a trusted adult. A trusted adult is someone who will listen to you carefully when you explain the problem and will ask what you would like to see happen- someone who will make sure that your voice is heard and will work with you to come up with a plan that makes sense. This trusted adult will work behind the scenes to resolve the bullying problem without directly or publicly involving you. The adult will try to protect both you and the person being bullied. Possible trusted adults include: your parents or other adult family members, an adult at school-teacher, counselor or principal, a coach, faith leader, or a close family friend.

Cyberbullying: What is it?  As the use of technology expends, a new type of bullying behavior is rapidly growing: Cyberbullying.  Cyberbullying is harassment and intimidation that takes place through text messages, online posts, , or other electronic forms of communication. It is defined as a situation in which someone intentionally and repeatedly makes fun of or mistreats another person on social media sites.  As the use of technology expends, a new type of bullying behavior is rapidly growing: Cyberbullying.  Cyberbullying is harassment and intimidation that takes place through text messages, online posts, , or other electronic forms of communication. It is defined as a situation in which someone intentionally and repeatedly makes fun of or mistreats another person on social media sites.

Cyberbullying: How do you protect yourself? Stay Smart and Stay Safe: How can you protect yourself from cyberbullying? How do you stay smart and safe using social media? Let’s take a little quiz to find out if your social media habits are putting you at risk. (Please hand out quiz to homeroom students. Quiz results are on the next slide.)

Cyberbullying: Quiz Results  Results:  0 points: Congratulations-you are acting in safe and smart ways. Keep it up.  1-10 points: You are acting pretty safe but some on your online activity puts you at risk.  points: Your social media habits are definitely risky but it’s not too late to protect yourself and your privacy. Listen closely to the suggestions to follow.  Results:  0 points: Congratulations-you are acting in safe and smart ways. Keep it up.  1-10 points: You are acting pretty safe but some on your online activity puts you at risk.  points: Your social media habits are definitely risky but it’s not too late to protect yourself and your privacy. Listen closely to the suggestions to follow.

Safety tips:  If you have ever been harassed online, you probably wonder if there was something that you could have done to keep it from happening or prevent it from happening in the future. While you probably won’t be able to prevent every single instance of disrespectful behavior, we would like to provide you some simple strategies to reduce the likelihood of it happening.

Safety tips: Be Careful with the Content You Post: The next time you text, tweet, or post, take a minute to think about the fact that anything you do online could eventually be seen by anyone. Once a piece of information enters cyberspace, you lose control over it. Your friends/enemies can then “tweak” your posted information and use it in anyway.

Safety tips: The Internet Never Forgets: Whether you like it or not, some people will judge you based on how you appear online. That’s just the way it is. And it can be almost impossible to completely remove something from the Internet once it’s out there. So do your best not to let anything be posted that is likely to compromise your reputation or be used against you. Be sure that you let your friends know where you stand when it comes to social media (tagging, etc.).

Safety tips: Google yourself: One way to protect yourself from online dangers is to keep an eye on what has been said or posted about you. You can do this by regularly using Google, Bing, Yahoo, etc., to look for your full name and screen names that you use on social media sites. Another popular tool is using either socialmention.com or nutshellmail.com. On both sites, you can get updates when your name/screen name is mentioned on Facebook, Twitter, YouTube, and other social sites.

Safety tips:  Never Respond to Mysterious Messages: Would your respond to junk mail or answer a phone call from an “unidentified” caller? Treat tweets and texts the same way-with care. NEVER open an attachment from a stranger as it may have a harmful program called a Trojan horse that collects your personal and private data.  Never Respond to Mysterious Messages: Would your respond to junk mail or answer a phone call from an “unidentified” caller? Treat tweets and texts the same way-with care. NEVER open an attachment from a stranger as it may have a harmful program called a Trojan horse that collects your personal and private data.

Safety tips:  Always Log Out: Most social media sites like Facebook, Twitter, and Instagram let you remain logged in even after you close your Web browser or close out your app. This is convenient when you revisit the site but there is a problem: Anyone else that uses your device can also easily access your account if your login credentials are stored. Here is a common scenario: You were checking your Facebook page on the family computer and then you leave without logging out. Your mom uses the computer next, and she surfs over to Facebook. While there she clicks “like” on the fan page for her favorite TV show, sends a friend request to a coworker, and comments on your brother’s latest post. Unfortunately, she does all this while logged into YOUR account!!  Needless to say, you can understand how someone that wants to hurt you could use your stored “log in” against you.  Always Log Out: Most social media sites like Facebook, Twitter, and Instagram let you remain logged in even after you close your Web browser or close out your app. This is convenient when you revisit the site but there is a problem: Anyone else that uses your device can also easily access your account if your login credentials are stored. Here is a common scenario: You were checking your Facebook page on the family computer and then you leave without logging out. Your mom uses the computer next, and she surfs over to Facebook. While there she clicks “like” on the fan page for her favorite TV show, sends a friend request to a coworker, and comments on your brother’s latest post. Unfortunately, she does all this while logged into YOUR account!!  Needless to say, you can understand how someone that wants to hurt you could use your stored “log in” against you.

Safety tips: Guard Your Goods and Protect Your Passwords: It is very easy to “borrow” a friend’s phone, IPad, tablet, etc. to take a quick picture, text a quick message, etc. If someone uses your device, the person receiving the information will think that it is from you. Protect yourself by locking down your devices with passcodes or swipe patterns. Keep passwords confidential.

Safety tips: Location, Location, Location: Most smartphones, digital cameras, tablets, and similar devices include geotagging features. Geotagging ties location based metadata into photos, videos, text messages, and other content. While this information is great to let your friends know where you are, it also tells everyone else that is connected to your social media site. It is wise to turn the location setting off to keep uninvited guest from showing up or using it against you.

Safety tips: Think before you friend or follow: On top of setting up your privacy protections on Facebook and other sites so that only your friends can see your posts and other information, it is really important to know exactly who those friends are and to make sure they’re trustworthy.

Safety tips: Catfishing: Catfishing is when someone pretends to be someone they’re not using Facebook or other social media to create false identities, particularly to pursue deceptive online romances. This is a type of cyberbullying. Please be careful when choosing your online friends.

Reflection:  Brainstorm types of information that is never a good idea to post online.  Discuss whether or not they see this kind of material online regularly.  How does it make them feel? How have they responded to it in the past? What advice can you share with your friends to keep them safe and smart?  Brainstorm types of information that is never a good idea to post online.  Discuss whether or not they see this kind of material online regularly.  How does it make them feel? How have they responded to it in the past? What advice can you share with your friends to keep them safe and smart?

A personal safety assignment for you:  Please search for your name and user names on popular websites like Google, Social Mention (socialmention.com), and Zabasearch. What personal information is in the web about you?  Please view your Facebook and Instagram profiles as if they were strangers who stumbled upon them (that is, to search for themselves when they are not logged into their own accounts ). How secure are your current safety setting? Do you need to adjust them?  Please search for your name and user names on popular websites like Google, Social Mention (socialmention.com), and Zabasearch. What personal information is in the web about you?  Please view your Facebook and Instagram profiles as if they were strangers who stumbled upon them (that is, to search for themselves when they are not logged into their own accounts ). How secure are your current safety setting? Do you need to adjust them?