BY: Vanessa, Daniela, Sheriff. Anonymity is when someone makes aggressive comments to you, but can disguise themselves. This means that it can be hard.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Be safe, Be Secure, Be Smart.... Be in Control!
This is my cyberbullying powerpoint
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
Cyberbullying. Real life examples Is this bullying? 1.Your friend sends you an embarrassing photo of one of the girls at his school. You think it’s funny.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Cyberbullying Not just on the playground anymore… What is it? Where does it happen? Why do we care? What can we do? Alcott Elementary 2010 Laura Lynch.
Stop Cyberbullying By Hayden Jordan and Arman. Table of contents  Anonymity  Pseudonym  Flaming  Cyber stalking  Exclusion  Harassment  Masquerading.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
e-safety and cyber bullying
High School Safe Environment “Cyberbullying” Resources and Assessment Materials.
Cyberbullying Internet Saftey: Information for H.S. Students.
S TOP CYBERBULLYING ! This is our project on cyberbullying. This will teach you different types of cyberbullying and stories of victims. We will tell you.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
ON LINE SAFTEY AND CYBER BULLYING DO U NO WHO R U TLKG 2?
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
Stop Cyberbullying By Jordan Rempel, Heslip7s. AKA: CYBERGOSSIPING!!!!!!!!! Outing – Forwarding personal messages that have been sent.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
By: Zach Oltmanns.
Cyber Bullying By Kevin Nolde
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Do pictures always give truthful information? Can publishing it be hurtful??
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Cyberbullying Assignment By dana.t. anonymity  Anonymity is when a anonymous person threatens you on your phone or some kind of digital device. Example.
STOP CYBERBULLYING By Brandon Tremblay “Suicide does not end the chances of life getting worse, it simply eliminates the chances of it getting better”
By Tyanna Paling and Manpreet Gill
Stop Cyberbullying By Terryn Bowdler.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
By: Desmond Seaton. Anonymity is when someone makes mean and threating comments to you, but is able to keep anonymous. Anonymity can include the use of.
EHS Computer Network Review. Hey Everybody! My name is Tek. I ’ m going to be your guide today!
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
By Nick and Austin Stop Cyberbullying.
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
PowerPoint created by Harvie, Brandon, and David STOP CYBERBULYING.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Outing is when someone forwards a message to the public that was sent to them by another person. Many bullies often tend to print out online conversations.
STOP CYBERBULLYING. By Kadin, Bryce. A PSEUDONYMS Anonymity is when someone makes threatening comments to you, but is able to hide who they are. This.
 Teenagers who do not have phones are more likely to be excluded than others  Girls are more likely to exclude, boys are usually involved in physical.
By Konrad keller. People who have a phone are “cool” and people who don’t are considered not cool so the people with the phone exclude others that are.
Stop Cyberbully By josh.h. anonymity Definition:  the state and quality of being anonymous  example of anonymity bullying when someone text something.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
By, Nadine Tereposky. Cyberbullying is a type of bullying that is done online, often done because of a photo someone uploaded or a rumor that was spread.
Staying Safe in Cyberspace Tregolls School-An Academy.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Stop Cyberbullying By Austin, Ben & Aaron.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Cyber-Bullying How to stay safe What to do if it happens to you.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Cyber bullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers,
E – SAFETY Being safe online
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyber bullying is a form of teen violence that can do lasting harm to young people.
Cyber Bullying 1. ONLINE.
Appropriate Use of Technology
Personal Safety Online
Presentation transcript:

BY: Vanessa, Daniela, Sheriff

Anonymity is when someone makes aggressive comments to you, but can disguise themselves. This means that it can be hard for you to find out who sent you the hurtful message. This is an example of anonymity, where the bully’s identity is hidden. If someone is sending you a hurtful text message on your cell phone, unless you recognize the phone number it is sent from, there’s a really low chance your going to know who it is.

A pseudonym is like a nickname. Bullies may name themselves a different name when they are on the internet, to when they are offline. They do this to keep their real character a secret from you. An example of a pseudonym is when you use instant messaging services like Facebook or Tumbler, you are known to others on internet by a nickname that you have picked.

Flaming is a hard core fight, that mostly takes place over instant messages, and chat rooms. To add emotion to their argument, bullies use images, capital letters, and symbols.

Masquerading is when bullies pretend to be someone who they really aren’t. They may make fake addresses or instant messaging names or they might use someone else’s or mobile phone to bully people. This will make people think someone else is bullying them.

Cyberstalking is a example of harassment. Usually messages are sent through secret communications, like or text messages. Cyberstalking can be very frightening. It can break up friendships, credit, careers, self-image, and confidence. It can lead the victim into far greater physical danger when connected with real-world stalking. Video

O uting is the public act or uphold of personal communications such as text messages, s or instant messaging. T his is an example of what happens to victims. L ots of bullies print out instant messaging comments mostly enclosed by personal or inappropriate information, and show them around to other people.

Harassment includes bullies sending hurtful messages aimed at an individual or group. Some bullies can or will post their messages to a public place, where everyone can see their comments. Bullies often send copied messages over and over, or at odd times of the day and night.

In many causes, teenagers who don't have cell phones are left out from the group of teenagers who do. Girls have been found to be more likely to leave out others, boys tend to do physical violence or threaten.

~ ~