York Regional Police Technological Crime Unit Cyber Bullying Detective Constable Phil Shrewsbury-Gee Detective Paul DaSilva August 2008.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

TM BULLIES Who bullies are, what bullying is, and how we stop it.
What is Cyberbullying? "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted.
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
Cyber Bullying Everything you need to know. How is it different from normal bullying? By using technology like mobiles or the internet, this type of bullying.
Webb CISD Parent Meeting Fostering Dignity and Respect September 28, :30 p.m. – 6:30 p.m.
Cyberbullying Bullying with Technology. What is Cyberbullying??? Using , instant messaging, chat rooms, or other forms of information technology.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
HANDLING GOSSIP AND RUMORS Social Harassment Day 3.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Harmless Joke or Cyber-Bullying?
Cyberbullying A new and dangerous phenomenon. What is Cyberbullying? “Cyberbullying involves the use of information and communication technologies to.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber Bullying Presented by Detective Toth A Guide For Parents, Students and Teachers Tonawanda Middle School.
The Internet is Forever
Bully Free Freshman Class Session 2
By Kaleb, Olivia, Roianne and Shiva Cyber bullying is becoming bigger and bigger. People don’t realize that what they’re doing is hurting people. Cyber.
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
1 Cyber Safety Constable Maire Froud. 2 Overview Cyberspace Contract Setting Rules Using Social networking sites Cyber bullying.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Stand Up And Stop Bullying You Have The Power!
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Crossing the Line Cyberbullying Crossing the Line
 "Cyber bullying involves the use of information and communication technologies such as , cell phone and pager text messages, instant messaging.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
Cyber bullying Aj Newman Per 2 Jan/26/11. Cyber bullying  Cyber bullying is everywhere and its true.  Cyber bullying is horrible and there are multiple.
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
What are the differences between bullying and cyberbullying?
A Presentation For The Social Justice Project Lecture Series.
DUSDStudent Bullying Presentation Grades What is Bullying? No student or group of students shall, through physical, written, verbal, or other means,
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet Safety Mrs. Oliver Technology
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Bullying: What Parents Can Do Presented by The Crime Victims’ Center of Chester County, Inc.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
STOP CYBERBULLYING By Brandon Tremblay “Suicide does not end the chances of life getting worse, it simply eliminates the chances of it getting better”
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
Bullying, Cyberbullying, and the Law. Stop Hating Online: Pass It On TV Commercial Stop Hating Online: Pass It On.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
Lauren Sayah, Abby Wills, Sara Stahl. What is Cyber Bullying?  Is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass.
Max Joelson and Mitchell Moore. Problems  Facebook  Twitter  Texting  Instagram  Skype  Accounts Now with increased technology, bullies are.
Cyberbullying Crossing the Line (With a Few Extra Vocabulary Words Added for Clarification Purposes Only)
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
Cyberbullying. What is cyberbullying?  "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
By, Nadine Tereposky. Cyberbullying is a type of bullying that is done online, often done because of a photo someone uploaded or a rumor that was spread.
E-safety Helping your children stay safe on-line A presentation for Parents.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person.
YOU’VE GOT HATE MAIL. Boerne Middle School South.
Bully Free Sophomore Class Session 2
Carroll County Schools Advisement
Knowing the facts and consequences of cyber bullying
Deep Creek Elementary School
Cyber Bullies “Social Media is the new school yard for bullies”
Presentation transcript:

York Regional Police Technological Crime Unit Cyber Bullying Detective Constable Phil Shrewsbury-Gee Detective Paul DaSilva August 2008

What is Cyber Bullying?  Cyber-bullying involves the use of information and communication technologies such as , cell phone, pagers, SMS, IM, Web sites and defamatory personal polling Web sites,  to support deliberate, repeated, and hostile behaviour by an individual or a group, that is intended to harm others.

It’s only pictures and words so who cares?  The reality is that these words and pictures can result in;  Frustration  Depression  Anger

It’s only pictures and words and nobody really gets hurt, so who cares!!! 14 year old girl from New Jersey “Being bullied over the Internet is worse. It’s torment and it hurts. They say, ‘sticks and stones may break my bones, but names will never hurt me.’ That quote is a lie and I don’t believe in it. Sticks and stones may cause nasty cuts and scars, but those cuts and scars will heal. Insultive words hurt and sometimes take forever to heal.”

It’s only pictures and words and nobody really gets hurt, so who cares!!! 14 year old girl from Illinois “I still cry when I think of what she said. After a while you start believing all the things people tell you that aren’t true. When I look in the mirror I wonder if I’m fat (I’m not) after what my ex-friend said.”

It’s only pictures and words and nobody really gets hurt, so who cares!!! 11 year old boy from York Region trying to scare his teacher “I saw you down by the lake this morning. You looked very pretty in that dress. I just wanted to slit your guts and…”

It’s only pictures and words and nobody really gets hurt, so who cares!!! 12 year old from York Region While using MSN IM, a 12 year old female was bullied into performing various sex acts with teen age males under the threat of having uncomplimentary pictures of her posted on the Internet.

Cyberbullying, it not that common. Right?  2005 Survey of 1,500 adolescents reported:  80% reported that bullying occurs online.  32% of males and 36% females report being bullied online.  12% report being directly threatened.  49% through SMS  56% in Chat rooms

Cyberbullying  Dr. Glen DiPasquale YRDSSB ret.  Cyberbullying has greater negative psychological impact  Physical bullying, there are safe places to go and escape the torment and abuse.  Technology such as Internet and cell phones permit the bullies to follow victim right into their house and even their bedroom.

Get of my case man. I can say what I want. 1 st amendment, freedom of speech.  1 st Amendment is US  Canada is, “freedom of opinion and expression.”  Not an absolute right.  Can and is restricted by law.

Freedom of Expression and the Law  There are a number of offences that may result from verbal or written utterances.  Threatening death or serious bodily harm  Threatening to damage property, kill or injure animal or bird.  Extortion  Defamatory libel  Criminal Harassment  Wilfully promoting hatred against an identifiable group.

Threats  Can be made directly to victim  Instant Messaging, SMS (Cell phone), , blog, social networking site, phone or in person.  Can be done through 3 rd person i.e., “tell Johnny that…”  Victim need not be identified for an offence to occur.  Secondary innocent meaning must be reasonable to a normal person.

Threats  Threats can be to,  an individual  an identified group  to a non-specific group  Threats to groups are most often anonymous (not signed)  Threats to groups often precede anniversaries of significant tragedies i.e. 911 and Columbine

Threats Threatening SMS Message sent to a former friend

Extortion  Most people know it as “Black Mail.”  Anyone, without lawful excuse, tries to make another person;  To do anything  Or cause anything to be done  By threats, violence or menace.  YRP Tech Crime  Most victims are teenage females

Defamatory Libel  Relatively new phenomenon  Free websites and other free Web services often used to facilitate.  Encourages people who don’t know the intended victim to participate in the cruel behaviour.  Encourages people to try to “out do” each other in their cruelty.  Has been the cause of many teen suicides

Cyber Bully Gets Jail

Why Cyberbully?  Bullies often falsely believe that their identity is immune from discovery (anonymity)  Perception that they cant get caught  Can easily encourage others to assist even when they don’t know the victim.  They think its fun!!!  They can follow the victim anywhere  No physical harm can become of the bully

Who is a Cyberbully  Anyone can become a cyberbully  Anyone who can use a computer or a cell phone  No age, sex, race, religion, education, upbringing, physical size or social status is exempt.  Brothers, sisters cousins friends etc.  You!!!

Who are victims?  Anyone can be a victim of cyberbullying there are no rules.  Victims can be:  Your former BFF  A relative  A school mate  A teacher  Co-worker  You!

Who else are victims  The geeky boy who becomes the fireman that goes into a burning building to save your family  The clumsy kid who becomes the police officer who tracks down and arrests the serial rapist  The goofy looking guy who becomes the rock star whose music you can’t live without  The girl who hangs with all the “losers” and becomes your wife.  The unattractive girl who, if she hadn’t committed suicide because of cyberbullying, would have grown up to discover the only cure for the disease that takes your life.

Think twice before you decide to engage in bullying behaviour… You may end up bullying yourself