Aïda Michlowski, PhD, JD Terror by Technology
Inappropriate content Inappropriate contact Inappropriate conduct What is cyberbullying?
How does cyberbullying differ from physical (F2F) bullying?
What are the methods of cyberbullying? Stealing passwords Malicious code Internet polling Interactive gaming Sending porn Mass s Impersonating Text attack Blogging Textual harassment
Where does occur?
Who are the perpetrators & the victims? Megan Meier Anthony Stand Top 6 Ways to Kill Piper
What are the warning signs? Stop,Block,Tell! Keep safe, Keep away, Keep telling!
How do we deal with cyberbullying? ID the Creep Take 5 Keep current, Keep checking, Keep communicating
Think before you click!