Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person.

Similar presentations


Presentation on theme: "Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person."— Presentation transcript:

1

2 Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person.

3 What is Cyberbullying? Cyberbullying involves the use of , chat rooms, websites and other forms of electronic communication to: send mean-spirited messages make cruel and harmful remarks about individuals post unflattering or derogatory photos make direct threats or encourage acts of violence sexually harass

4 Why do kids cyberbully? Cyberbullying happens for many of the same reasons as any other type of bullying, but it may be even more appealing because it can be done anonymously. Popular kids or teens may bully because: They see it as a way to stay popular. Hurting others makes them feel powerful. Kids or teens who are less socially successful may bully because: It helps them cope with their own low self-esteem. They think it will help them fit in with their peers. In general, bullies’ behaviour usually stems from their own problems. Additional reasons kids may do their bullying online: Anonymity—Cyberbullying allows bullies to avoid facing their victims, so it requires less courage and provides the illusion that bullies won’t get caught. Because they don’t see their victims’ reactions in person, cyberbullies may not realize how much damage they are doing.

5 Who are the Cyberbullies?
Individuals: who are immature who are involved with hate groups who have been bullied themselves

6 How cyberbullying works
There are two kinds of cyberbullying: Direct attacks (messages sent to the kids directly) Cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge).

7 Direct Attacks Instant Messaging/Text Messaging Harassment.
Kids may send hateful or threatening messages to other kids, without realizing that while not said in real life, unkind or threatening messages are hurtful and very serious Stealing passwords A kid may steal another child's password and begin to chat with other people, pretending to be the other kid Web sites Kids sometimes create Web sites that may insult or endanger another child. Sending Pictures through and Cell Phones There have been cases of teens sending mass s to other users, that include nude or degrading pictures of other teens. Once an like this is sent, it is passed around to hundreds of other people within hours; there is no way of controlling where it goes. Many of the newer cell phones allow kids to send pictures to each other. The kids receive the pictures directly on their phones, and may send it to everyone in their address books.

8 Cyberbullying by proxy
Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Most of the time they are unwitting accomplices and don't know that they are being used by the cyberbully. The most typical way a cyberbullying by proxy attack occurs is when the cyberbully gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list, pretending to be the victim. They may also change the victim's password so they can't get into their own account. The victim's friends get angry with the victim, thinking they had sent the messages without knowing they have been used by the cyberbully. But it's not always this minor. Sometimes the cyberbully tries to get more people involved. For example...Mary wants to get back to Jennifet for not inviting her to her party. She goes online and, posing as Jennifer, posts "I hate Brittany, she is so stupid, ugly and fat!" on Facebook. Mary may tell Brittany and her friends that she read the post on Facebook and blames Jennifer for being mean. Brittany and her friends now start attacking Jennifer, and may report her to Facebook or her school. They are doing Mary's dirty work for her. Mary looks like the "good guy" and Jennifer may be punished by her parents, lose her account on Facebook and get into trouble at school. And Brittany and her friends may start to cyberbully Jennifer, too.

9 Why the Internet can Foster Cyberbullying
Sense of being anonymous Multiple on-line personas Sense of power No responsible adult in evidence

10 How to Stop a Cyberbully
Be private - keep passwords, pictures and secrets to yourself. Take five - don’t reply in anger. Stop, block and tell - don’t reply. Block the sender. Tell someone. Save the evidence on your computer or print out. Find online support.

11 Steps to Take if you believe you have been a victim of Cyberbullying
Determine if cyberbullying is actually going on. Save the evidence. Contact the offender’s parents - who may or may not be supportive.  Back up your remarks with written evidence. Contact your school. If warranted, contact an attorney. Threats, extortion and sexual harassment should be reported to the police.

12 What to do if you think you are a victim of cyberbullying
Contact : or visit gov.gr

13 References www.stopcyberbullying.org www.cyberbullying.org Music:
The cinematic orchestra: Arrival of the birds and transformation

14


Download ppt "Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person."

Similar presentations


Ads by Google