By Tyanna Paling and Manpreet Gill

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
CYBERBULLYING Did you see that picture of Dana? – OMG!!
This is my cyberbullying powerpoint
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
HANDLING GOSSIP AND RUMORS Social Harassment Day 3.
Cyberbullying.
BULLYING What Is The Definition of Bullying?
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
SAINT JOSEPH HIGH SCHOOL CYBER BULLYING SOPHOMORE PRESENTATION.
Stop Cyberbullying By Hayden Jordan and Arman. Table of contents  Anonymity  Pseudonym  Flaming  Cyber stalking  Exclusion  Harassment  Masquerading.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyberbullying Internet Saftey: Information for H.S. Students.
Crossing the Line Cyberbullying Crossing the Line
S TOP CYBERBULLYING ! This is our project on cyberbullying. This will teach you different types of cyberbullying and stories of victims. We will tell you.
CYBERBULLYING Hopkins School Guidance Program.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Benignus Elementary Librarian
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Bullying… What you can do about it. Who is Involved? Who are the three people involved in bullying situations? Definition of Bullying – “Bullying is when.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
Cyberbullying A Student Guide.
By: Zach Oltmanns.
Cyber Bullying By Kevin Nolde
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Do pictures always give truthful information? Can publishing it be hurtful??
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Cyberbullying Assignment By dana.t. anonymity  Anonymity is when a anonymous person threatens you on your phone or some kind of digital device. Example.
STOP CYBERBULLYING By Brandon Tremblay “Suicide does not end the chances of life getting worse, it simply eliminates the chances of it getting better”
Stop Cyberbullying By Terryn Bowdler.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
By: Desmond Seaton. Anonymity is when someone makes mean and threating comments to you, but is able to keep anonymous. Anonymity can include the use of.
BY: Vanessa, Daniela, Sheriff. Anonymity is when someone makes aggressive comments to you, but can disguise themselves. This means that it can be hard.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
Cyberbullying What it is, How to deal with it, and more.
By Nick and Austin Stop Cyberbullying.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyberbullying Crossing the Line (With a Few Extra Vocabulary Words Added for Clarification Purposes Only)
PowerPoint created by Harvie, Brandon, and David STOP CYBERBULYING.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Outing is when someone forwards a message to the public that was sent to them by another person. Many bullies often tend to print out online conversations.
STOP CYBERBULLYING. By Kadin, Bryce. A PSEUDONYMS Anonymity is when someone makes threatening comments to you, but is able to hide who they are. This.
 Teenagers who do not have phones are more likely to be excluded than others  Girls are more likely to exclude, boys are usually involved in physical.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
By Konrad keller. People who have a phone are “cool” and people who don’t are considered not cool so the people with the phone exclude others that are.
Stop Cyberbully By josh.h. anonymity Definition:  the state and quality of being anonymous  example of anonymity bullying when someone text something.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
By, Nadine Tereposky. Cyberbullying is a type of bullying that is done online, often done because of a photo someone uploaded or a rumor that was spread.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Cyber-Bullying How to stay safe What to do if it happens to you.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Bullying. In order to be considered bullying, the behavior must be aggressive and include:  An Imbalance of Power: Kids who bully use their power—such.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Cyber bullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers,
Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person.
Cyberbullying project
Cyberbullying Life Class Lessons – Week of May 9th -May 13th.
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Cyber Bullying 1. ONLINE.
Cyberbullying.
Conyers Middle School Advisement Lesson October 20, 2014
Cyber Bullying.
CYBER BULLYING BY RODRICK HILTZ 2014.
What it is, how to spot it, and how to respond to it
Presentation transcript:

By Tyanna Paling and Manpreet Gill Stop Cyberbullying By Tyanna Paling and Manpreet Gill

Anonymity Anonymity is when someone makes threatening comments to you, but is able to hide who they are. That it is difficult for you to try and figure out who is sending you threatening message or email. Anonymity also includes usage of Aliases or Pseunionyms. When someone else uses another persons phone you send you a message, email or text.

Pseudonyms Pseudonyms is like a nickname. Some bullies can call themselves a different name when there online. When you use instant messenger like MSN or Yahoo messaging, you’re a nickname to others online. Bullies may change their name to something offensive.

Flaming Flaming is a really intense argument, that regularly takes place in a chat rooms over instant messages. Flaming bullies use capital letters, images and symbols to add emotion to the argument. This is a real life example: “I was instant messaging my best friend, and we had an argument over a guy...The next day she printed the conversation and handed it to a group of girls, but she’d changed it. It read like I had said all these really mean things (about them) that I never said, and they believed her.” *Never reply to a bully when you are angry!.. Wait a bit.*

Masquerading Masquerading is a form of cyberbullying when the bully try's to pretend to be someone else when they aren’t. they create fake email addresses or messaging names, they might use another persons cell number to bully you. Example: “A 13-year-old gave her password to her best friend. After they had a fight, the ex-friend used the girls screen name to enter on an adult chat room and gave out the girl’s phone number. A man from the chat room called the girl’s house- but luckily intercepted by the mother.

Cyberstalking Cyberstalking is one of the forms of harassment. Messages are sent through personal communications like text or email message.

Outing Outing is a public display of personal communications like text messages. Some bullies print out or screen shot email or messaging conversations, also containing sexual or personal information. And will like to decide to send by text or show them to face friends or other people around them the conversation.

Harassment Harassment includes bullies sending offensive messages towards an individual or a group. Bullies send the same messages over and over again every hour of the day everyday. Example: “I’m going to kill you.” How would you feel if someone sends that to?

Exclusion Exclusion: A teenager who didn’t have a mobile phone are excluded from the other teenagers who do have a mobile phone. Girls are to be more likely to exclude others. Boys try to threaten physical violence. Example: “ an 11-year-old American, Natalie recalled in an newspaper interview how every girl in a class was invited but one to a recent sleepover. The girls at the party went on the internet that night and taunted the one who had been left out.”

How to stop cyberbullying Cyberbullying occurs when electronic communications such as text messages, emails, instant messages, and social media updates are used to threaten or humiliate someone. Its consequences can be just as serious as the effects of bullying that occurs in person.

3 ways to help stop cyberbullying…1 way Look for sings of harassments. Cyberbullying often takes the form of one person harassing another through emails, instant messaging, text messages or other modes of electronic communication. Hateful or threatening messages. This includes name-calling, attempts to control someone’s behavior by threatening to expose embarrassing information and or threats of violence. Embarrassing or threatening images. An unending barrage of emails, instant messages, or text, whether or not they are threatening in nature.

2 way… Look for signs of public humiliation. Another common form of cyberbullying happens when the bully harasses a target by the way of public embarrassment, rather than directly contacting them, cyber bullies may use these public tactics: Posting humiliating messages on a social media site, a blog, or another public space. Spreading rumors and gossip using social media, text messages and other tools. Sharing pictures that are embarrassing or explicit in nature, or are altered with the internet to humiliate, on social ,media websites and through text messaging.

3 way… Look for signs of impersonation. A less obvious, but equally harmful form of cyberbullying takes place wen the bully attacks someone by impersonating them as a way to bring about humiliation or punishment. In this case it is more difficult to identify the perpetrator. In some cases the bully may create a screen name nearly identical to the screen name used by someone, then use that name to create embarrassing or threatening situations for them. The bully may steal the target’s password, hack their accounts ,and send embarrassing message to others or make expensive purchases.