 Cyberbullying is when a child, preteen, or teen is tormented, harassed, threatened, or otherwise targeted by another child using the Internet, interactive.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Internet Safety: What’s Cyberbullying?
What is Cyberbullying? "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted.
When you or someone else uses a computer or cell phone to cause harm or distress to other kids, this is called.
Common Sense Unit 2 – Lesson 3 Category: Internet Safety.
Definition Is when a child, preteen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen.
Cyberbullying Bullying with Technology. What is Cyberbullying??? Using , instant messaging, chat rooms, or other forms of information technology.
Cyberbulling: Crossing the Line
Cyberbullying Old Problem, New Playground. Bullies are no longer restricted to the school yard. They are often online, out of the sight and earshot of.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying Contributed by Sarah Bell All resources in the "Safeguarding Resources" section of our resource bank have been submitted by delegates on.
ANTI- BULLYING WEEK CYBER BULLYING 16 – 20 November 2009.
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
Cyber Bullying. What do you think it is?? Cyber Bullying is….
Cyber Bullying Presented by Detective Toth A Guide For Parents, Students and Teachers Tonawanda Middle School.
e-safety and cyber bullying
Cyberbullying Kassie McAninch.
Crossing the Line Cyberbullying Crossing the Line
Facts About Cyber Bullying Victims of cyberbullying are at an increased risk for traditional bullying victimization, substance use, and school problems.
Internet Safety Awareness
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
CYBERBULLYING Hopkins School Guidance Program.
Cyber-Bullying and internet use
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
Judith Taylor.Technology tools.5AA
Bullying… What you can do about it. Who is Involved? Who are the three people involved in bullying situations? Definition of Bullying – “Bullying is when.
Hueneme Elementary School District
By: Brett Sauve. What is Cyber-bullying? Being tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 Be a good friend  Be a mediator  Look  Listen  Tell someone who cares LOOK OUT FOR EACH OTHER. KEEP EACH OTHER SAFE. Be the change you want to see.
Intro: U TUBE VIDEO  “What to do when you’re bullied”
Hueneme Elementary School District
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Do pictures always give truthful information? Can publishing it be hurtful??
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Joe Ranallo, Melissa Fornes, and Christina Myles.
Cyber bullying Victoria County Community Access Program Society.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Digital Citizenship 6 th - 8 th Unit 1 Lesson 4 Cyberbullying: Be Upstanding How do you judge the intentions and impact of people’s words and actions online?
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
Cyberbullying: Be Upstanding
BULLYING AT SCHOOL Let’s stop the MADNESS!. You Are Not Alone Everyone has been bullied in their lifetime. How a person deals with the first bullying.
Madison Petro Jenelle Richards Mat Lucas. Bullying is when somebody mistreats another person on purpose. The people being bullied most likely has a hard.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
What’s Cyberbullying?. Today’s Objective: To be able to empathize with the targets of cyberbullying, recognize some of the key similarities and differences.
Cyber Bullying Good Morning Children
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
NOYes Not Sure? A Digital Citizenship Lesson Plan for Middle School.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Dealing with Cyberbullying. Characteristics of Bullying: A member of a group is targeted for: verbal abuse spreading of hurtful rumors threats of exclusion.
Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Cyberbullying Be an upstander!.
Appropriate Use of Technology
CYBERBULLYING References: Fund for Civility, Respect, and Understanding OK, Inc. Friends4Friends Campaign
Digital Citizenship Tech in TUSD.
Online Safety! Created by Educational Technology Network
By the Anti-bullying Ambassadors
Presentation transcript:

 Cyberbullying is when a child, preteen, or teen is tormented, harassed, threatened, or otherwise targeted by another child using the Internet, interactive and digital technologies, or mobile phone.  Click here to read more.here

 Click here to view a short videohere

Which of the following is an example of cyberbullying?  Threatening another person online Threatening another person online  Sending around an embarrassing photo of someone Sending around an embarrassing photo of someone  Posting hurtful information about another person online Posting hurtful information about another person online  All of the above All of the above

 Cyberbullying works two ways: Directly and Indirectly.  Check out the following web page to read more.web page

 Some examples of direct bullying attacks include: ◦ Text and instant message harassment ◦ Stealing passwords ◦ Sending pictures through and phone ◦ Pretending to be someone else  For more examples click here.here

 An indirect attack on someone usually occurs when a cyberbully gets another person to bully for them. Sometimes the other person has no idea they’re even being used to do this.  Click here to read more.here

 Cyberbullying works directly and indirectly ◦ True or False? TrueFalse?

 Which of the following is an example of a direct cyberbullying attack?  Text Harassment Text Harassment  Warning Wars Warning Wars  Stealing someone’s account Stealing someone’s account

 Cyberbullying happens for many reasons ◦ Kids can be motivated by anger, frustration, fear, or enacting revenge. ◦ Some people may even do it accidentally. ◦ Some kids do it for entertainment value out of boredom. ◦ There are many different reasons why people cyberbully. Click here to read about the different types of cyberbullies.here

 Which of the following is NOT a type of cyberbully?  Mean GirlsMean Girls  AccidentalAccidental  The Best FriendThe Best Friend  Vengeful AngelVengeful Angel

 Because cyberbullying methods can be different there is no clear cut way to prevent each circumstance, however, there are some basic tips to follow: ◦ Don’t pass along cyberbullying messages. ◦ Block all communications from cyberbullies. ◦ Discourage friends from cyberbullying. ◦ Report it to someone you trust (parent, teacher, an adult). ◦ Contact your local authorities. SAVE all documentation from the cyberbully you may have.

 The next section will include different scenario’s of cyberbullying. After your read each scenario you will be prompted to either provide the victim of cyberbullying with advice on how to handle the situation and/or confront the cyberbully yourself.  Please begin by watching the following YouTube video while asking yourself, “What Would I Do?” YouTube

 According to the narrator of the video, how many states have enacted laws to punish bullying, including cyberbullying?  66  1818  3434  5050

 Jenna is having a birthday party. She invites some friends to celebrate. Three girls overhear her inviting her friends and decide to create a website called “Everyone Hates Jenna.” On the website they tell everyone that Jenna is a loser and not to go to her birthday party. Meanwhile, word gets around at school. What advice would you give Jenna?

 What should Jenna Do?  Jenna should forget like anything ever happened and let it go on.Jenna should forget like anything ever happened and let it go on.  Jenna should cancel her birthday party.Jenna should cancel her birthday party.  Jenna should save any bullying messages she has, or copy the website, and report the girls to a trusted adult.Jenna should save any bullying messages she has, or copy the website, and report the girls to a trusted adult.

 For the past week, Maria has been receiving strange s saying “I’ll find you.” She doesn’t recognize the address. She doesn’t know if it’s someone playing a joke on her or if it’s a stranger. She’s very scared either way. One day, the s beginning coming every few minutes. This time they say “I’m almost there.” If she called you for advice, what would you say?

 What advice would you give Maria?  Maria should tell the bully to come over because she’s “ready” for them.Maria should tell the bully to come over because she’s “ready” for them.  Maria should block the bully, save all messages, and call the local authorities as soon as possible.Maria should block the bully, save all messages, and call the local authorities as soon as possible.  You tell Maria you’ll be over soon and you will both confront the secret bully together.You tell Maria you’ll be over soon and you will both confront the secret bully together.

 Greg sends a funny video of himself reenacting his favorite movie to his friend Joe. Joe laughs and thinks Greg looks stupid so shows some other people at school. They also laugh and decide to post the video on YouTube for all to see. Hundreds of people begin posting nasty comments about Greg. Soon he goes to school and begins to hear more cruel comments about the video from other classmates. What would you say to Joe in this situation?

 What would you say to Joe in this situation?  Joe, what you did was hilarious. It was just a joke and Greg should be able to handle it.Joe, what you did was hilarious. It was just a joke and Greg should be able to handle it.  Joe, posting Greg’s video online was little mean, you could have just made fun of him without posting it online.Joe, posting Greg’s video online was little mean, you could have just made fun of him without posting it online.  Joe, what you did was cruel and it’s called cyberbullying. No one should do this to another person. I’ve already reported what you have to done to the our school principal.Joe, what you did was cruel and it’s called cyberbullying. No one should do this to another person. I’ve already reported what you have to done to the our school principal.

 Now that you’ve learned all about cyberbullying and how to handle it best, it’s time to take to your blogs. In your blog, write about what you have learned about cyberbullying and create a list of tips for dealing with cyberbullying in a responsible way. Make sure you share the link to your blog with your instructor.  Before you go, check out this short music video. Remember, if you or someone you know is being bullied. Report it! You do NOT deserve to be bullied!music video