Cyber Bullying By Kevin Nolde

Slides:



Advertisements
Similar presentations
Cyber Stalking By Matthew Hall. What is cyber stalking? According to techarget.com, it is defined as a crime in which the attacker harasses a victim using.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Be safe, Be Secure, Be Smart.... Be in Control!
CYBERBULLYING Did you see that picture of Dana? – OMG!!
This is my cyberbullying powerpoint
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
HANDLING GOSSIP AND RUMORS Social Harassment Day 3.
Cyberbullying Simple Guidelines for Parents, Teachers, and Students January 17, 2007.
Cyber-bullying and Internet Safety. What is Bullying?  Intentionally causing harm to others  Verbal harassment  Physical assault  Exclusion from a.
Stop Cyberbullying By Hayden Jordan and Arman. Table of contents  Anonymity  Pseudonym  Flaming  Cyber stalking  Exclusion  Harassment  Masquerading.
Cyber Bullying By B Bryant.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
The Internet is Forever
e-safety and cyber bullying
Cyber Bullying BEAT BULLYING.
S TOP CYBERBULLYING ! This is our project on cyberbullying. This will teach you different types of cyberbullying and stories of victims. We will tell you.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
What is cyberbullying? Contributed by Joanne Thompson All resources in the "Safeguarding Resources" section of our resource bank have been submitted by.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
Cyber Bullying “All Cruelty Springs from Weakness.” – Seneca, 4BC-AD65.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Internet Safety: 5 th Grade. The Internet What are some good things with using the Internet? What are some good things with using the Internet? What are.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
By: Zach Oltmanns.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Cyberbullying Assignment By dana.t. anonymity  Anonymity is when a anonymous person threatens you on your phone or some kind of digital device. Example.
STOP CYBERBULLYING By Brandon Tremblay “Suicide does not end the chances of life getting worse, it simply eliminates the chances of it getting better”
By Tyanna Paling and Manpreet Gill
Stop Cyberbullying By Terryn Bowdler.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Cyber Bullying Kristina 5VN. What is Cyber Bullying? Cyber Bullying is when a form of bullying, which is carried out through an internet service such.
By: Desmond Seaton. Anonymity is when someone makes mean and threating comments to you, but is able to keep anonymous. Anonymity can include the use of.
BY: Vanessa, Daniela, Sheriff. Anonymity is when someone makes aggressive comments to you, but can disguise themselves. This means that it can be hard.
Cyberbullying What it is, How to deal with it, and more.
By Nick and Austin Stop Cyberbullying.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
A PARENT’S GUIDE TO CYBER BULLYING BY: SHIRLEY JONES.
PowerPoint created by Harvie, Brandon, and David STOP CYBERBULYING.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Outing is when someone forwards a message to the public that was sent to them by another person. Many bullies often tend to print out online conversations.
Cyber Bullying Good Morning Children
By Konrad keller. People who have a phone are “cool” and people who don’t are considered not cool so the people with the phone exclude others that are.
Stop Cyberbully By josh.h. anonymity Definition:  the state and quality of being anonymous  example of anonymity bullying when someone text something.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
By, Nadine Tereposky. Cyberbullying is a type of bullying that is done online, often done because of a photo someone uploaded or a rumor that was spread.
Stop Cyberbullying By Austin, Ben & Aaron.
Cyber-Bullying How to stay safe What to do if it happens to you.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Internet Safety Training For WYWLA High School Students Intro for Parents Responsible Use Policy.
Cyber bullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers,
Safe Surfin’ on the Internet
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Issues In media studies: Cyberbullying
Digital Citizenship Tech in TUSD.
Digital Citizenship Tech in TUSD.
Digital Citizenship Tech in TUSD.
What it is, how to spot it, and how to respond to it
CYBER BULLYING YEAR 7 COMPUTING.
Presentation transcript:

Cyber Bullying By Kevin Nolde

What is Cyber Bullying? Cyber Bullying- When someone uses the internet, phone, or other related devices to cause harm to other people in some way. Who uses it a lot today? Young People Young People Where does it all happen at? School School content/uploads/2011/07/main_cyberbullying.jpg

How People Cyber Bully Chat rooms Chat rooms IM via the web or Phone IM via the web or Phone Websites (Twitter, Facebook, etc.) Websites (Twitter, Facebook, etc.) pic.jpg

Types of Cyber Bullying Cyber Stalking Cyber Stalking Flaming Flaming Exclusion Exclusion Outing Outing Masquerading Masquerading content/uploads/2010/10/Bullying- Stop1.jpg wIULKvGNQI/S9JsYCRrliI/AAAAAAAAACs/cM_ PO7At8kw/s1600/Untitled.png

Cyber Stalking Repeated messages Repeated messages Threatening Threatening Sent to strike fear Sent to strike fear gif

Flaming Use of chat rooms, , IM, Use of chat rooms, , IM, Arguments with words and/or images Arguments with words and/or images Used to drive a point Used to drive a point Harsh language is often used Harsh language is often used mages/Cyber-bullying4.jpg

Exclusion One person gets bullied One person gets bullied Usually via Phone or the Web Usually via Phone or the Web Person is Excluded from everyone else Person is Excluded from everyone else cyberbullying.html I/AAAAAAAAAJk/MxfkXodJE3o/s1600/exclusion_ _new.jpg

Outing Sharing Private information Sharing Private information Via online communication or Mobile Phone Via online communication or Mobile Phone The person is then “outed” The person is then “outed” Information is shared publicly online or offline Information is shared publicly online or offline facebook-quiz-2.jpg

Masquerading Using a fake identity to harass another Using a fake identity to harass another Pretending to be someone they are not Pretending to be someone they are not Attempts to steal log-in information Attempts to steal log-in information Then sharing it publicly Then sharing it publicly dfighter/speedfighter0909/speedfighter / computer-virus- masquerading-as-binary-code-isolated-on- white-background.jpg

the effects of Cyber Bullying Less likely to attend school Less likely to attend school Poor grades Poor grades Self-Esteem issues Self-Esteem issues More likely to have health problems More likely to have health problems Usage of alcohol/drugs Usage of alcohol/drugs gif

How to handle Cyber Bullying Tell someone about it Tell someone about it Block, avoid, never respond to the bully Block, avoid, never respond to the bully Report to the police (if necessary) Report to the police (if necessary) Confront the bully in person Confront the bully in person content/uploads/2010/10/Bullying-Stop1.jpg

Don’t do Cyber Bullying It may have repercussions later It may have repercussions later Help anyone who is being Bullied Help anyone who is being Bullied Confront anyone who is Bullying someone Confront anyone who is Bullying someone Don’t send private information to anyone Don’t send private information to anyone ook10.jpg