Delete CyberBullying Boston Public Schools Cyber Safety Campaign.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

ON LINE and doing FINE Using your head When surfing the web. Family Campers and RVers 2011.
Cyber-bullying Why We are Mean to Each Other and How We Can Change.
CYBER BULLYING An Overview CYBER BULLYING IS… The use of electronic communication technologies to intentionally engage in repeated or widely disseminated.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Bullying & Cyberbullying ◦What is it? ◦Examples ◦Impact and support for students ◦Bystander effect ◦Prevention.
Forms of Cyberbullying
Cyberbullying.
Cyberbullying Simple Guidelines for Parents, Teachers, and Students January 17, 2007.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
By: Kinga Budziszewska, Ashley Hiralal, Jakila Maybury, and Lauren Moore.
Cyberbullying Just because they can’t hear you, doesn’t make it any different March 2009.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
CYBERBULLYING Hopkins School Guidance Program.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Digital Citizenship and Media Literacy
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Alexis Pilkington, 17 Long Island Phoebe Prince, 15, Massachusetts.
Cyberbullying The Digital World’s Ugly Reality Understanding the psychology behind it, the forms of it, and it’s prevention – a parent’s guide.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Aimee Mallen CNED 577. Using technology to bully or intentionally cause harm to others.
Cyberbullying Terms & Definitions Source:
Cyberbullying What it is, How to deal with it, and more.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyber Bullying. What is Cyber Bullying Being cruel to others by sending or posting harmful material using technological means; an individual or group.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Cyberbullying and Cyberstalking BY MS. BARBARA WOOLLEY.
Do unto others as you would have them do to you..
Are You a Cyber-Bully?  0 – 5 Points  Cyber Saint  Congratulations!! You are a Cyber Saint! Your online behaviour is exemplary! Keep up the good work!
Cyber-Bullying How to stay safe What to do if it happens to you.
Do Now Pick up a handout in the front of the room and answer the four questions to the best of your ability.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Safe Surfin’ on the Internet
CYBER BULLYING.
Remember cyber Bullying can also lead to death!!!
Cyber Bullying BY PHONE.
If you see it don’t support it! RECOGNISE IT, REJECT IT, REPORT IT!
Cyberbullying Life Class Lessons – Week of May 9th -May 13th.
GOSSIP and CYBERBULLYING
NCMS taking a stand against bullying
Pics, Flicks, and Sexting
Cyber Bullying 1. ONLINE.
Cyberbullying.
Virtual Battles: Cyberbullies
World Bullying Prevention Day
GOSSIP and CYBERBULLYING
Cyber Bullying.
Life High school waxahachie
Issues With Internet in College
Cyberbullying: How Can I Protect My Child?
What it is, how to spot it, and how to respond to it
Online Safety Assembly.
Presentation transcript:

Delete CyberBullying Boston Public Schools Cyber Safety Campaign

“Cyber bullying is the use of modern communication technologies to embarrass, humiliate, threaten, or intimidate an individual in the attempt to gain power and control over them.” Cyberbullying

Harmful Bystanders Those who encourage and support the bully or watch the bullying from the sidelines, but do nothing to intervene or help the target.

Helpful Bystanders Those who seek to stop the bullying, protest against it, provide support to the target, or tell an adult. One of the most important strategies to address cyberbullying will be stimulating more students to become helpful bystanders.

Vocabulary Flaming Impersonation Denigration Harassment Intimidation

Vocabulary Public Humiliation Stalking Outing Trickery Exclusion

Online fights using electronic messages with angry and vulgar language. Flaming

text online forumsocial network

Retaliation is not the answer Avoid giving out personal details or information online Report abuse to people in charge of sites Keep records of abusive or harassing messages Strategies

Pretending to be someone else and sending or posting material to get another person in trouble or to damage that person’s reputation or friendships. Impersonation

Don’t share your passwords with anyone Be aware that not everyone online is who they say they are Strategies

“Dissing” someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships. Denigration

Report violations to ISP or Site Administrator Tell a trusted adult Stand up for others Don’t be a bully! Strategies

Repeatedly sending nasty, mean, and insulting messages. Harassment

Harassment tends to be crueler Global audience No escape for the victim

Block the bully Save the evidence Tell a trusted adult Contact law enforcement if you feel threatened Strategies

Communicating with someone and threatening to harm that person. Personal Intimidation

“Unblock Yahoo in the schools now! We know where you work.”

Tell a trusted adult Save the evidence Contact law enforcement Strategies

Drawing negative attention toward an individual by circulating a negative online video or message about that person. Public Humiliation

Free Speech vs. Public Safety Law Enforcement Uses Video as Evidence

Report violations to ISP or Site Administrator Tell a trusted adult Stand up for others Don’t be a bully! Strategies

Repeated, intense harassment and denigration that includes threats or creates significant fear. Stalking

Cyberstalker could be anyone Usually has some knowledge of the victim

Contact law enforcement Tell a trusted adult Avoid revealing personal information Keep records of abusive and harassing messages Strategies

Sharing someone’s secrets or embarrassing information or images online. Outing

Talking someone into revealing secrets or embarrassing information, then sharing it online. Trickery

Protect your personal information Contact site administrator to get content off Tell an adult Strategies

Food for Thought Be Smart Think before you send Understand that usually nothing is private in cyberspace Be Strong Squash the pressure Don’t give into it, don’t let your friends give in Be Responsible Don’t ask for an inappropriate photo Don’t forward or send inappropriate photos you receive

BPS Acceptable Use Policy Websense Software Alerts Criminal Investigation and Punishment School District Enforcement

BPS Cyber Safety Campaign Educate students about online safety Develop materials for BPS community Train Cyber Mentors Maintain web site, blog, & facebook

Shield Copyright Firewall Amika Online Personal Safety Cyberbullying Intellectual Property Cybersecurity

Felicia Vargas Cyber Safety Campaign Eric Esteves Karla DeLeon