Download presentation
Presentation is loading. Please wait.
Published byAubrey Robinson Modified over 8 years ago
1
Cyber Bullies and Internet Predators The Downside of the Internet Dr. Christine McIntosh Consultant Kentucky Center for School Safety
2
http://www.kysafeschools.org/
4
Internet Landscape The Internet has dramatically changed our world and the way we interact within it. Faster communication Advanced research techniques Up-to-the-minute news Online shopping and services Financial management--online banking and bill paying
5
Why Use the Internet? Kids/Teens -Chat -E-mail -Instant Message -Homework -Gaming -Download Music/Movies -Social Networking Adults -Shopping -E-mail -Pay Bills -Banking -Research Products -Make Travel Plans
6
Student Behavior 30% of students say e-mail, chat rooms, or instant messaging is the main way they stay in contact with their friends. 38% of students feel freer to do what they want on the Internet. 31% of students say it is easier to talk with people on the Internet than in real life.
7
Cyber Bullying
8
What Is It? “Cyber Bullying” occurs when a child, preteen or teen is Tormented Threatened Harassed Humiliated Embarrassed Or otherwise targeted by another child, preteen or teen using…. Internet Interactive and digital technologies, or mobile phones.
9
What it involves… Sending mean, vulgar, or threatening messages or images; Posting sensitive, private information about another person; Pretending to be someone else in order to make that person look bad; Intentionally excluding someone from an online group
10
What it is not…. Once adults become involved, it is cyber- harassment or cyber-stalking. Adult cyber-harassment or cyber-stalking is NEVER called cyber bullying.
11
Some Facts 35% of kids have been threatened online 42% of kids have been bullied while online 53% of kids admit to bullying others online 58% have not told their parents or an adult
12
Bullying Then and Now Traditional bullies… Have power over victim because of size or popularity Circle of influence has finite size Can be devastating to victim Cyber bullies… Can harass victims behind veil of anonymity Has position of power regardless of size or social status. Circle of influence is worldwide, 24/7 Can be devastating to victim
13
Characteristics of a Traditional Bully Poor social skills Poor conflict management skills Poor social judgment Difficulty showing empathy or compassion to others Live in situations where they feel out of control or powerless Don’t “fit in” or who feel inadequate
14
Why do bullies bully? Selfishness Insecurity Anger Frustration Fear Entertainment Revenge Bored Too much time on hands Too many tech toys available For laughs or to get a reaction By accident
15
Why Bully Online? Joke Encouraged by friends Anonymous (feel powerful) Revenge (right a wrong) Promote own social status Misunderstood e-mail
16
Victims & Perpetrators Girls are twice as likely as boys to be victims and perpetrators of cyber bullying. Students who have been cyber bullied recently (at least twice in last couple of months) 62% said that they had been cyber bullied by another student at school 48% had been cyber bullied by a friend 58% did not know who had cyber bullied them.
17
Real Cyber Bullying Incidents “Star Wars Kid” Tape “Star Wars Kid” Tape Instant Messages claimed a student had a contagious disease. Cell phone camera used to take a locker room photo Student’s face morphed onto a pornographic photo Websites take polls for fattest, ugliest, etc…
18
Ways and Means Chat Rooms E-mail Personal Web Pages Personal Blogs
19
What To Do?
20
Stop
21
Must Remember… It is difficult for teens to totally stop using these communications. Internet and other forms of technology are essential to youth living in this always-connected digital generation. Electronic technology is how today’s youth make friends, stay in touch and become part of a social group.
22
What To Do? Block
23
What To Do? Tell
24
Must Remember Teens are often reluctant to report cyber bullying. Many believe that some “bullying” behaviors online happen to just about everyone to some degree. No big deal--just ignore it. Bullies often think everyone “does it” and victims should just “get over it.”
25
Contact Law Enforcement If known or suspected cyber bullying involves acts such as: Threats of violence Extortion Obscene or harassing phone calls or text messages Harassment, stalking, or hate crimes Child pornography
26
Warning Signs of a Possible Victim Unexpectedly stops using the computer Appears nervous or jumps when an IM or e- mail is received Appears uneasy about going to school or outside in general Appears to be angry, depressed, or frustrated after using the computer Becomes abnormally withdrawn from usual friends and family members
27
Warning Signs of a Possible Cyber Bully Quickly switches screens or closes programs when you walk by Uses the computers at all hours of the night Gets unusually upset if he/she cannot use the computer Laughing excessively while using the computer Avoid discussions about what they are doing on the computer Is using multiple online accounts, or an account that is not their own
28
Cyber Bullying
29
Suggestions for Educators Be PROACTIVE Teach cyber citizenship/ethics to students as soon as they begin using tech tools Educate students and staff about cyber bullying, its dangers, and what to do if someone is cyber bullied
30
Suggestions for Educators Be sure school’s anti-bullying rules and policies address cyber bullying Closely monitor students’ use of computers at school Use filtering and tracking software on all computers, but don’t rely solely on this software--SUPERVISE, SUPERVISE, SUPERVISE!!! Investigate report of cyber bullying IMMEDIATELY
31
Important to Know While some online actions maybe wrong, some of their Internet behaviors could be ILLEGAL. How explain undesirable actions of now to important people in future? Legal consequences could also be imposed.
33
Cyber Bullying Tips for Students
34
How to Prevent Being Cyber Bullied Don’t give out private information such as passwords and PINs (personal identification numbers)
35
How to Prevent Being Cyber Bullied Be careful where you post personal information online, such as name, address and phone number. This information can be used in a negative way by bullies.
36
How to Prevent Being Cyber Bullied Use Netiquette. Be polite online and others will tend to do the same. Ignore anyone who gets angry or bullies you.
37
How to Prevent Being Cyber Bullied Consider avoiding sharing buddy lists, as it increases the chances of being bullied.
38
How to Prevent Being Cyber Bullied Don’t send a message when you are angry.
39
How to Prevent Being Cyber Bullied Delete messages from people you don’t know or from people who are acting angry or mean.
40
How to Prevent Being Cyber Bullied When something doesn’t seem right, it probably isn’t. Leave the site or chat.
41
PSAs
42
Cyber Predators Definitions (& some statistics) Common Characteristics Communication Tools Grooming Process Avoiding Risks Online Resources
43
Definitions Predator--one who stalks or uses lies, secrecy, or stealth to get close enough to another person in order to easily hurt or harm them. Prey--one who is a victim or is vulnerable to victimization by a predator, no matter what their age.
44
i-SAFE TM Statistics 63% have their own e-mail account (53% are not controlled or managed by parents or other adults) 17% have kept their Internet activity a secret from friends or family
45
i-SAFE TM Statistics 12% have attempted to make friends with an older person 10% have met face to face with someone not of their own age whom they had first met online
46
Common Characteristics Age 25 - 65 Well-Educated Married Cross Socio-Economic Boundaries Steady Employment Varied Computer Expertise Male
47
Communication Tools Chat Rooms Private Chats Blogs Instant Messaging/Texting E-mail Phone
48
Grooming Process
49
Shared Interests
50
Grooming Process Shared Interests Trust
51
Grooming Process Shared Interests Trust Secrecy
52
Grooming Process Shared Interests Trust Secrecy Breaking Down Barriers
53
Grooming Process Shared Interests Trust Secrecy Breaking Down Barriers Threats
54
Grooming Process Shared Interests Trust Secrecy Breaking Down Barriers Threats Face-to-Face Meeting
55
Avoiding Risks Online
56
Keep the computer in an open area.
57
Any form of online communication has its risks. Chat Rooms E-mail Personal Web Pages Personal Blogs Posting Photos
58
Choose a “safe”Screen Name.
59
Andrew15Vette LukeBruins22 Jessiegirl14 maria14jazz
60
Profiles should be short and vague.
62
Chat Rooms are popular, fun and a predator’s playground.
63
Blogs and Social Networking Sites-- Know Who You Are Communicating With Online
64
Gaming--No Longer an Isolating and Solitary Activity
65
What to do if confronted with inappropriate situation online…
66
Tell parent, guardian, or another trusted adult.
67
If happens at school, or involves school in any way, tell a teacher, counselor, librarian or administrator.
68
Notify the ISP or social-networking site if someone or something makes you feel uncomfortable.
69
Contact law enforcement if feel threatened by someone or something online.
70
Children’s Online Privacy Protection Act (COPPA)
71
Resources “Ad Council/Cyberbullying Prevention” http://www.adcouncil.org COPPA--Children’s Online Privacy Protection Act http://www.coppa.org i-SAFE--The Leader in e-SAFETY Education http://www.isafe.org/ Kentucky Center for School Safety--Internet Safety http://www.kysafeschools.org/ http://www.kysafeschools.org/ NetSmartz Workshop--Educate. Engage. Empower http://www.netsmartz.org/ OnGuardOnline--Your Safety Net TM “Social Networking Sites: Safety Tips for Tweens and Teens” http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm WiredSafety.org--The World’s Largest Internet Safety and Help Group http://wiredsafety.org/> “Ad Council/Cyberbullying Prevention” http://www.adcouncil.org COPPA--Children’s Online Privacy Protection Act http://www.coppa.org i-SAFE--The Leader in e-SAFETY Education http://www.isafe.org/ Kentucky Center for School Safety--Internet Safety http://www.kysafeschools.org/ http://www.kysafeschools.org/ NetSmartz Workshop--Educate. Engage. Empower http://www.netsmartz.org/ OnGuardOnline--Your Safety Net TM “Social Networking Sites: Safety Tips for Tweens and Teens” http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm WiredSafety.org--The World’s Largest Internet Safety and Help Group http://wiredsafety.org/>
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.