Presentation is loading. Please wait.

Presentation is loading. Please wait.

6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.

Similar presentations


Presentation on theme: "6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009."— Presentation transcript:

1

2 6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009

3 Internet Technology Affecting Humans I LOVE Bloggin g I LOVE IMing I LOVE IMing I LOVE Facebook I LOVE Chatting with my Friends I LOVE Chatting with my Friends

4 CyberBullying What is Bullying? Bullying is a continued abuse of power by a person (or group) over another person. What is Cyber Bullying? Cyber Bullying is bullying through an electronic medium such as a computer or cell phone.

5 Roles Those involved in cyber bullying are Perpetrators Targets Bystanders

6 The Internet has created a new type of bully: someone who uses online anonymity to engage in bullying behavior. Believing themselves to be anonymous, some young people feel free to commit acts online that they would never carry out in person. (F2F – Face to Face) Perpetrators

7 People may write things online that they would never say in person because they don’t “see” the other person. Perpetrators In addition to anonymity, the fact that the cyberbully can’t be seen or heard online can add to hurtful behavior.

8 One student commented: [With] the Internet, you can really get away with a lot more because I don't think a lot of people would have enough confidence to walk up to someone and be like, “I hate you, you're ugly.” But over the Internet you don't really see their face or they don't see yours and you don't have to look in their eyes and see they're hurt. Perpetrators

9 A target is the person(s) who are the ones who are being bullied by someone else. A target is the person(s) who are the ones who are being bullied by someone else. Targets

10 Although there is no physical violence, cyber bullying may be more frightening to targets because the bully is unknown. Targets It could be someone the target sees everyday at school, but doesn’t know it. This can lead to feelings of helplessness. With no “real” person to point to, targets can’t file a complaint.

11 The target’s situation is worsened by the reality that the home, which is usually safe from a “real” bully, is no longer safe because cyber bullying can continue on the computer at home. Targets

12 This important group is made up of those who know that someone is being bullied online. In a March 2008 a study of 2095 students in grades 6, 7, 10 and 11 conducted by the University of Toronto, 28% reported having witnessed cyber bullying. Bystanders

13 Of this percentage: 9% became involved in the bullying behavior 32% watched but didn’t participate 14% voiced their objection to the person doing the bullying 21% tried to stop the bully 11% logged off the computer 7% tried to befriend the bully, and 7% reported the bully to someone who could help. Bystanders

14 Online Methods of Cyber Bullying There are several ways that young people bully others online. 1. They may send e-mails or instant messages containing insults or threats directly to a person. 3. They may steal passwords to e-mail or IM (instant messaging) accounts belonging to other kids and send out threatening e-mails or instant messages under a false identity. 2. They may also spread hateful comments about a person to others through e-mail, instant messaging or postings on Web sites and online diaries (blogs).

15 Online Methods of Cyber Bullying Increasing numbers of kids are being bullied through text messaging with cell phones. The use of cell phones is challenging the ability of adults to monitor and guide children because, unlike a computer placed in a public area of a home, school or library, cell phones are personal, private, connected—and usually accessible.

16 Online Methods of Cyber Bullying Kids tend to keep their phones turned on at all times, meaning that bullies can harass victims at school or even in their own bedrooms. Built-in digital cameras in cell phones add a new dimension to the problem. In one case students used a camera cell phone to take a photo of an overweight classmate in the shower after gym. The picture was distributed throughout the school e-mail list within minutes.

17 Online Methods of Cyber Bullying Adults find that online bullying is difficult to detect in schools and impossible to monitor off school property.

18 Cyber Bullying and the Law Teens should be aware that some forms of online bullying are considered criminal acts. It is a crime to communicate repeatedly with someone if it causes them to fear for their own safety or the safety of others.

19 Cyber Bullying and the Law It's also a crime to publish a “defamatory libel”—writing something that is designed to insult a person or is likely to injure a person's reputation by exposing him or her to hatred, contempt or ridicule.

20 Cyber Bullying and the Law Remember, you do have control over a bullying situation. If you are the bully – stop it. If you are being bullied – tell an adult.


Download ppt "6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009."

Similar presentations


Ads by Google