ON LINE SAFTEY AND CYBER BULLYING DO U NO WHO R U TLKG 2?

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Be safe, Be Secure, Be Smart.... Be in Control!
BULLYING and Bullying behaviour is no longer restricted to the school yard. It is often by phone or online and out of sight and earshot of both teachers.
19 th – 23 rd November. What is Bullying? ‘’Behaviour by an individual or group, usually repeated over time, that intentionally hurts another individual.
FtbaKIYyg Article 29 (goals of education) Education must develop every child’s personality, talents and abilities to.
R U CYBERSAFE? – BEAT THE CYBERBULLY It’s not smart It’s not funny It’s not even amusing It’s darn right ignorant and the actions of a coward!!
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Forms of Cyberbullying
BELL WORK Why do you think people are bullies?.
BULLYING What Is The Definition of Bullying?
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Co-funded by the European Union The challenge of cyber-bullying Current situation and counter-measures by the Safer Internet Centre Germany VI. International.
Stop Cyberbullying By Hayden Jordan and Arman. Table of contents  Anonymity  Pseudonym  Flaming  Cyber stalking  Exclusion  Harassment  Masquerading.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Anti-Bullying Presentation September 24 th, 2012.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
ANYTHING THAT GETS INVENTED AFTER YOU’RE THIRTY IS AGAINST THE NATURAL ORDER OF THINGS AND THE BEGINNING OF THE END OF CIVILISATION AS WE KNOW IT …UNTIL.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Mel Johnson School Wabowden,MB April 9 /2014 – Prepared by Mr. R. Romero.
Bullying. Definition ◦RIM=  Repeated,  Imbalance of Power, and Malicious/Intentional If incident doesn’t meet the criteria to be “bullying,” it may.
Social Media How can we manage social network for children?
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
By: Zach Oltmanns.
Children and teens are bullied everyday through , instant messaging, social networking and text messaging. Cyber Bullying By:Olivia Martin.
Cyber Bullying By Kevin Nolde
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
Tucker High School Football DeKalb County School District’s Hazing Policy August 1, 2015.
© Childnet International 2008 What are the risks?.
By Thomas Bertalli. How Teens Use Social Networking Sites Most teens create at least a basic profile, with their name, age, status, photo and interests,
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Conflict Resolution & Violence Prevention Bullying Freshman Health.
BY: Vanessa, Daniela, Sheriff. Anonymity is when someone makes aggressive comments to you, but can disguise themselves. This means that it can be hard.
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
Internet Safety Why is internet safety important? What about mobiles? What are the risks? Why is the internet so great?
By Nick and Austin Stop Cyberbullying.
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
 Cyber Bullying is the use of technology to either bully, embarrass, harass or threaten another.  Some example of technology include:  Instant Messaging.
Cyberbullying Crossing the Line (With a Few Extra Vocabulary Words Added for Clarification Purposes Only)
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Bullying Good Morning Children
 Teenagers who do not have phones are more likely to be excluded than others  Girls are more likely to exclude, boys are usually involved in physical.
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
Cyberbullying The “ Device ” Evil Cyberbullying Cyberbullying is the use of any electronic communication device to convey a message in any form (text,
Brighton & Hove Healthy Schools Team E-safety and Cyberbullying Information for Parents and Carers.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Moraitis School English Department made by: Panagiotis Giannis, Stelios Laliotis, Nicolas Kalyvas, Manos Giavridis.
Cyberbullying BY LORD MUSHANGO.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
If you see it don’t support it! RECOGNISE IT, REJECT IT, REPORT IT!
BULLYING
HIB Lesson Bullying Prevention 7th Grade
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
HIB Lesson Bullying Prevention 8th Grade
NCMS taking a stand against bullying
Cyber Bullying 1. ONLINE.
Cyberbullying and Today’s Children
HIB Lesson Bullying Prevention 6th Grade
CYBER BULLYING BY RODRICK HILTZ 2014.
Presentation transcript:

ON LINE SAFTEY AND CYBER BULLYING

DO U NO WHO R U TLKG 2?

HOW BIG IS THE PROBLEM? Cyber based abuse and cyber bullying is a fact of life in schools for both staff and students but that does not mean we should accept or ignore it. Mobile phone, , bulletin boards, social networking sites, message boards can all be used to threaten and intimidate other people, including students and staff. Online bullying is much harder to detect than direct contact in social settings. Contact, abuse or bullying that begins online may quickly move offline

TYPES OF CYBER BULLYING On-line stalking ('cyberstalking') involves the repeated, prolonged, unwanted texting of or use of electronic messaging and display aimed at a particular person to harass, intimidate or frighten the recipient. This may be continuation of other forms of abuse, extending existing bullying into previously safe and secure settings. It may be a sole, anonymous form of bullying. Harassment and stalking usually involves: Repeated unwanted text, instant messages, or phone calls (including silent calls). Use of (message boards, chat rooms) to constantly harass, and/or post derogatory or defamatory statements or photographs to provoke a response from the victim (may be referred to as 'flaming'). Tracking targets by using spy-ware. Sending viruses.

DEFAMATION Posting upsetting or defamatory remarks about an individual online: Name-calling using a mobile device. General insults. Prejudice-based bullying. Sexist, homophobic and racist messages. Attack other kinds of difference (physical or mental disability, cultural or religious background, appearance or socio-economic position). Intention - to achieve ostracising/peer-rejection/exclusion.

WHERE BULLYING MAY ARISE Social networking sites, (Facebook, twitter, Bebo, MySpace) allow an online presence enabling communication with other network members. Fake accounts may be set up. Electronic messages or pictures placed on the web where they may be viewable by millions of people, become difficult to contain. Gated communities only allowing contact between members. A group of students can set up a closed group, which can protect them from unwanted contact. Refusal to return or acknowledge messages, deleting individual from friendship lists or using 'ignore' functions can be extremely hurtful. Video or pictures can be passed between mobile phones either by a local wireless connection, by text to other phones, uploaded to websites or posted to public video hosting sites.

RESPONSE Identifying perpetrators using technology is a difficult, technical and time- consuming process. Detection may depend on more traditional ways of investigating incidents — circumstantial evidence, a witness report or an admission of responsibility. Parents often do not see it is a problem for children to be on Facebook for example. Reports brought to the teacher to deal with children being victimised on FB.

STAY SAFE ON LINE!