Cyber Bullying: How can it be misinterpreted?. What is Cyber Bullying?

Slides:



Advertisements
Similar presentations
Internet Safety and Cyber Bullying All info came from
Advertisements

Cyber Bullying and Unkind Online Language
Digital Citizenship Corbin Elementary.
Jeopardy Online Safety Cyber Bullying Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy Protecting Computers.
The aim of the week: Young people recognise and challenge bullying behaviour wherever it happens - whether face to face or in cyberspace.
Learning Objectives Can I understand what is a computer virus and worm is Can I identify risks when using technology (E- Safety) Can I discuss cyber bullying.
HANDLING GOSSIP AND RUMORS Social Harassment Day 3.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Who Wants To Be A Safe Communicator? What does the ‘e’ stand for when it is in front of words? For example: , e-safety etc…
Bullying & Cyber Bullying Presented by… Teresa Errickson, SMS Counselor A-L Stephanie Davis, SMS Counselor M-Z.
Cyber bullying Ashley, Samiya. Cyber bullying Bulling which uses e-technology as a means of victimizing others. It is the use of an internet service or.
Bully Free Freshman Class Session 2
Cyber Bullying i-SAFE survey of 150,000 high school students 57% said hurtful or angry things to another person, had someone say hurtful or angry.
CYBER BULLYING Facebook Twitter XBOX live live You tube MySpace.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
By Hope Gallaway Social Networks. What is a Social Network? A social network is a social structure made up of individuals called “nodes”, which are tied.
 "Cyber bullying involves the use of information and communication technologies such as , cell phone and pager text messages, instant messaging.
Cyberbullying Brittany Benningfield EDF 204 Spring 2015.
What is cyberbullying? Contributed by Joanne Thompson All resources in the "Safeguarding Resources" section of our resource bank have been submitted by.
By Kenrick 8B2. * Cyberbullying is defined in legal glossaries as * actions that use information and communication technologies to support deliberate,
P.6.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Unit 4 Lesson 6 Electronic Aggression. Opening Work: Reflection Question: How might a DUI conviction impact a person’s life? What did you discover about.
Two major things to Look for on the Internet  1. Predators. Predators  2. How to Target a PredatorHow to Target a Predator  3. How can Parents Minimize.
Netiquette and Online Safety You know who it is! JOSH COHEN.
World of Technology. Technology Technology is the making, modification, usage and knowledge of tools, machines, techniquestoolsmachines craftscrafts,
Social Media Perry seikhon Per 7 March 11,2014. What is social media?  I think social media is talking to others or sharing pictures online, such as.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
The Nonverbal Murder of Technology: Cyber Bullying.
Intro: U TUBE VIDEO  “What to do when you’re bullied”
Internet Safety Mrs. Oliver Technology
Rage Reaction: What do you know about cyber-bullying?
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Children and teens are bullied everyday through , instant messaging, social networking and text messaging. Cyber Bullying By:Olivia Martin.
ROOM 23.  Bullying is negative behavior that is intended to either harm others physically or emotionally.  There are four main types of Bullying. 
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Unit 8.1 Creating an E-safety quiz using VB on Powerpoint Welcome to my E-Safety quiz.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Cyberbullying By:Ali Komorek. What is Cyberbullying O Cyberbullying is bullying that takes place using electronic technology. (
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
BULLYING PREVENTION Cyber Bullying. WHAT IS CYBER BULLYING? Cyber Bullying is using technology such as computers, cell phones and other electronic means.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Students Online: How Much Do You Know?. What percentage of U.S. teens (ages 12-17) use the Internet? 1.45% 2.62% 3.87% 4.98%
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
 Cyber Bullying is the use of technology to either bully, embarrass, harass or threaten another.  Some example of technology include:  Instant Messaging.
 Form of bullying online  Hatred in texts  Can causes self-harm or suicidal thoughts  Repeated offence  Threats, harassment, humiliation, embarrassment.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
By Leigh and Tara. Introduction Definition Repeated intentional actions using communicational technology for the deliberate harm caused by an individual.
Bullying and Harassment Andover YMCA Swim Team. What are... bullyingandharassment?
Cool Kids Online (Be safe) By Alan L. and Kevin L.
What would you do? Cyber Bullying. Directions: This PowerPoint contains scenarios in which you will have to think about the appropriate way to behave.
 It is the use of technology such as a computer or cell phone to harm someone.  It occurs when someone is threatening, making fun of, or humiliating.
CYBERSAFETY IN AISD: AWARENESS AND RESPONSE. 1. Cybersafety: What is it? » Definition »Social Media 2. Digital Citizenship: What is it? » Cyberbullying.
HOW TO STOP A CYBER-BULLY BILL AND JAKE CYBER SAFETY RULE #1 Don’t respond! If someone bullies you online don’t respond. If you respond that’s what the.
Bullying Project Kalene, Roz, Tanya. INTASC STANDARD Standard #3: Learning Environments The teacher works with others to create environments that support.
Cyberbullying The “ Device ” Evil Cyberbullying Cyberbullying is the use of any electronic communication device to convey a message in any form (text,
Social Media’s Effect on Teens Alison Torres & Madeline Cooney.
By: Allan Martinez Matthew Cervantez Mauricio Terres Ian Woodruff.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Cyber Bullying. Cyber Bullying is Different Children routinely underestimate its impact Children routinely underestimate its impact Involves more/different.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
Who Wants To Be A Safe Communicator?
Digital Citizenship Tech in TUSD.
Digital Citizenship Tech in TUSD.
Bullying Prevention Cyber Bullying.
Digital Citizenship Tech in TUSD.
Presentation transcript:

Cyber Bullying: How can it be misinterpreted?

What is Cyber Bullying?

Cyber Bullying involves the use of communication technology to deliberately harm others, by an individual or a group.

How can messages you say online be misinterpreted by others?

“You are Sooooooo Stupid!!!”

Cyber Bullying Scenarios A teacher discovers a Web site that is intended to mock a student in her class and will likely lead to the student being harassed at school. The site was not created at school and is not hosted on school computers (though it can be accessed from them)

Cyber Bullying Scenarios A teacher discovers that students are being pressured by a popular student to remove an unpopular student from their Facebook “friends” lists

Cyber Bullying Scenarios A student discovers that other students in his class have created an online forum in which students are invited to vote on whether or not the first student should be beaten up