Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

 Cyberbullying is when a child, preteen, or teen is tormented, harassed, threatened, or otherwise targeted by another child using the Internet, interactive.
What is Cyberbullying? "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted.
When you or someone else uses a computer or cell phone to cause harm or distress to other kids, this is called.
The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
Cyber-bullying Why We are Mean to Each Other and How We Can Change.
CYBER BULLYING An Overview CYBER BULLYING IS… The use of electronic communication technologies to intentionally engage in repeated or widely disseminated.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
AWCPA/APS is a BULLY FREE ZONE aurorak12
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyberbullying Just because they can’t hear you, doesn’t make it any different March 2009.
Things To Know SOURCES:
Crossing the Line Cyberbullying Crossing the Line
S TOP CYBERBULLYING ! This is our project on cyberbullying. This will teach you different types of cyberbullying and stories of victims. We will tell you.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
CYBERBULLYING Hopkins School Guidance Program.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Do pictures always give truthful information? Can publishing it be hurtful??
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Alexis Pilkington, 17 Long Island Phoebe Prince, 15, Massachusetts.
CYBER SAFETY & PREVENTION Jacquelyn M. Trejo Southmore Intermediate.
Cyberbullying The Digital World’s Ugly Reality Understanding the psychology behind it, the forms of it, and it’s prevention – a parent’s guide.
By Tyanna Paling and Manpreet Gill
Stop Cyberbullying By Terryn Bowdler.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Cyberbullying Terms & Definitions Source:
Cyberbullying What it is, How to deal with it, and more.
By Nick and Austin Stop Cyberbullying.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyber Bullying. What is Cyber Bullying Being cruel to others by sending or posting harmful material using technological means; an individual or group.
Cyberbullying Crossing the Line (With a Few Extra Vocabulary Words Added for Clarification Purposes Only)
Outing is when someone forwards a message to the public that was sent to them by another person. Many bullies often tend to print out online conversations.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
By, Nadine Tereposky. Cyberbullying is a type of bullying that is done online, often done because of a photo someone uploaded or a rumor that was spread.
Do unto others as you would have them do to you..
Are You a Cyber-Bully?  0 – 5 Points  Cyber Saint  Congratulations!! You are a Cyber Saint! Your online behaviour is exemplary! Keep up the good work!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Cyber-Bullying How to stay safe What to do if it happens to you.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
Do Now Pick up a handout in the front of the room and answer the four questions to the best of your ability.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person.
Cyberbullying project
Protecting Your Privacy Online
CYBER BULLYING.
Remember cyber Bullying can also lead to death!!!
Cyber Bullying BY PHONE.
If you see it don’t support it! RECOGNISE IT, REJECT IT, REPORT IT!
Cyberbullying Life Class Lessons – Week of May 9th -May 13th.
Cyber Bullying 1. ONLINE.
Cyberbullying.
Virtual Battles: Cyberbullies
Issues In media studies: Cyberbullying
Issues With Internet in College
Online Safety! Created by Educational Technology Network
Cyberbullying: How Can I Protect My Child?
What it is, how to spot it, and how to respond to it
Presentation transcript:

Are you a bully?

2

 Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. Cyberbullies may use , chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace.com.

 Flaming. Online fights using electronic messages with angry and vulgar language. Joe and Alec’s online exchange got angrier and angrier. Insults were flying. Joe warned Alec to watch his back in school the next day.  Harassment. Repeatedly sending nasty, mean, and insulting messages. Sara reported to the principal that Kayla was bullying another student. When Sara got home, she had 35 angry messages in her box. The anonymous cruel messages kept coming— some from complete strangers.

 Denigration. “Dissing” someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships. Some boys created a “We Hate Davon” Web site where they posted jokes, cartoons, gossip, and rumors, all dissing Joe.  Impersonation. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships. Shanika watched closely as Tasha logged on to her account and discovered her password. Later, Shanika logged on to Tasha’s account and sent a hurtful message to Emma’s boyfriend, Adam.

 Outing. Sharing someone’s secrets or embarrassing information or images online.  Derrick, an obese high school student, was changing in the locker room after gym class. Mike took a picture of him with his cell phone camera. Within seconds, the picture was flying around the phones at school.  Trickery. Talking someone into revealing secrets or embarrassing information, then sharing it online. Karen sent a message to Jeanine pretending to be her friend and asking lots of questions. Jeanine responded, sharing really personal information. Karen forwarded the message to lots of other people with her own comment, “Jeanine is a loser.”

 Exclusion. Intentionally and cruelly excluding someone from an online group.  Misha tries hard to fit in with a group of girls at school. She recently got on the “outs” with a leader in this group. Now Misha has been blocked from the friendship links of all of the girls.  Cyberstalking. Repeated, intense harassment and denigration that includes threats or creates significant fear.  When Michelle broke up with Sean, he sent her many angry, threatening, pleading messages. He spread nasty rumors about her to her friends and posted a sexually suggestive picture she had given him in a sex-oriented discussion group, along with her address and cell phone number.

 Cyberthreats are either direct threats or “distressing material”—general statements that make it sound like the writer is emotionally upset and may be considering harming someone else, harming himself or herself, or committing suicide.  You Can’t Take it Back You Can’t Take it Back

 A group of girls were fighting with one of their friends, Nicole. They created a “Rate Nicole” group on a social networking site. They posted embarrassing photos of Nicole from middle school and high school and invited their hundreds of “friends” to join the group to look at the photos, and tell Nicole how she stacked up. Cruel and crude comments were posted on the group’s message board. One message said that some girls were planning to beat up Nicole. At school, Nicole got text messages on her cell phone saying, “Take a look at what everyone thinks of you.”

 What emotions do you think Nicole felt when she saw the photos and read all the comments online?  How do you think she felt when she read that some girls wanted to beat her up?  How do you think this situation affected the learning environment of the school?

 Sometimes you need to go online in order to do homework assignments. You want to have portable electronic devices for networking with your friends. But the more you are online or connected to cell networks, the more likely it is that you will be involved in harassing situations. You may not have posted a single comment—or maybe you did. You may not be the person getting abused or threatened. Yet it is very likely that you have witnessed it. Not everyone reacts the same way, but many teens say that when these kinds of bullying behaviors occur at any time of the day or night, both online and face to face, it can be very depressing.

 What advice you would you give Nicole?  What advice would you give the girls who created the group?  What could you do if you witnessed a similar situation online that made you worried?

 CyberTips CyberTips  Broken Friendship Broken Friendship

 “You Can’t Take it Back”?:  What should the boy have done when his friends asked him to rate the website?