CYBERBULLYING Hopkins School Guidance Program.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

TECHNICOOL A Technology Safety Program © 2011 PCAV.
CYBERBULLYING Did you see that picture of Dana? – OMG!!
When you or someone else uses a computer or cell phone to cause harm or distress to other kids, this is called.
What is Cyberbullying? Cyberbullying is when one person or a group of people aim to threaten, tease or embarrass someone else by using a mobile phone,
Cyberbullying Bullying with Technology. What is Cyberbullying??? Using , instant messaging, chat rooms, or other forms of information technology.
Bullying is the act of intentionally causing harm to others, through verbal harassment, physical assault, or other more subtle methods, i.e. exclusion.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Bullying & Cyberbullying ◦What is it? ◦Examples ◦Impact and support for students ◦Bystander effect ◦Prevention.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying information for teens. Are you a cyberbully? For the following questions: Give yourself a 0 = no, I have never done this 1 = yes, I have.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
ANTI- BULLYING WEEK CYBER BULLYING 16 – 20 November 2009.
What is Bullying? Physical Bullying:
Bullying… What you can do about it
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber-Bullying What is it?
 "Cyber bullying involves the use of information and communication technologies such as , cell phone and pager text messages, instant messaging.
Anti Bullying Policy Training
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
Cyberbullying Brittany Benningfield EDF 204 Spring 2015.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Benignus Elementary Librarian
SEAL Say no to bullying.
Bullying… What you can do about it. Who is Involved? Who are the three people involved in bullying situations? Definition of Bullying – “Bullying is when.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
Karen McCuiston Kentucky Center for School Safety Murray State University.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Do pictures always give truthful information? Can publishing it be hurtful??
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
By Tyanna Paling and Manpreet Gill
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
Berkeley Unified School District Cyber Savvy social networking and netiquette.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
Cyberbullying What it is, How to deal with it, and more.
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Sticks and Stone 2:37. According to the CDC: – Any type of harassment or bullying (teasing, telling lies, making fun of someone, making rude or mean comments,
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Bullying Good Morning Children
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Cyber-Bullying How to stay safe What to do if it happens to you.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Stand Up, Don’t stand by RCMS Counseling Mr. Ochoa Mrs. Guerrero.
Dealing with Cyberbullying. Characteristics of Bullying: A member of a group is targeted for: verbal abuse spreading of hurtful rumors threats of exclusion.
Cyberbullying Cyberbullying is the repeated misuse of technology in order to harass, intimidate, bully, or terrorize another person.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Protecting Your Privacy Online
Stand Up, Don’t stand by RCMS Counseling Mr. Ochoa Mrs. Guerrero.
CyberBullying.
Cyberbullying.
Digital Citizenship Tech in TUSD.
Stand Up, Don’t stand by RCMS Counseling Mr. Ochoa Mrs. Guerrero.
Digital Citizenship Tech in TUSD.
Digital Citizenship Tech in TUSD.
CyberBullying.
Presentation transcript:

CYBERBULLYING Hopkins School Guidance Program

WHAT IS CYBERBULLYING? Modern day bullying that takes place on the computer, cell phone, and pager text messages.

WHY DO KIDS CYBERBULLY? Some kids might think they are having fun and not even realize they are bullying. Some kids think it feels as though they are invisible and no one will know they are doing it. Some kids want to get revenge for something a kid did to them at school that day. Can you think of any other reasons?

WHAT ARE THE DIFFERENT TYPES OF CYBERBULLYING? Instant Messaging, Text Messaging You’ve Got Mail When kids send hateful or threatening messages to other kids. They might spread a rumor this way.

Stealing Passwords and Impersonation A kid may steal another kid’s password and begin to chat with other people, pretending to be the other kid. He/she may say mean things that offend and anger this person’s friends or even strangers. Meanwhile, no one knows it is not the real kid. This kid can really hurt friendships.

FLAMING Online fights using electronic messages with angry and vulgar language.

HARRASSMENT Repeatedly sending offensive, rude, and insulting messages.

Text Wars Text wars are when kids gang up on the target, sending thousands of text-messages to the target’s cell phone. The target is then faced with a huge cell phone bill and angry parents.

Web Sites Kids used to tease each other on the playground; now they do it on web sites. Kids create web sites that may insult another kid. They also post other kids’ personal information and pictures.

Sending Pictures Through Email, Texts, Cell Phones, and Instagram Some kids have been sending embarrassing pictures of kids to other kids using either emails or cell phones.

INSTAGRAM Lots of Hopkins Students have an Instagram Account and are following each other on Instagram.

Internet Polling Some kids are creating on line polls. Asking questions like “Let’s vote is Murray popular?” “Yes or no.” “Does Murray have B.O.? PLACE YOUR VOTE!

Interactive Gaming Some kids play interactive games on gaming devices such as X-Box Live and Sony Play Station 2 and 3. These kids can verbally abuse other kids, use threats, and rude language while playing these games.

WHAT CAN YOU DO TO STOP CYBERBULLYING? Tell the Cyberbully to stop - the target could send a non-emotional assertive message to the cyberbully telling him or her to stop. Print out and save the threatening messages.

USE GOOD MESSAGING MANNERS In cyberspace people can’t see facial expressions or hear your tone of voice. They have only two ways of judging what you’re thinking. One way is by the words you choose. The other is by the manners you use. So, choose wisely!

IGNORE Block all communications with the cyberbully through email and IM contact lists. Avoid going to the site or group where you have been attacked. Change your email address, account, username, or phone number.

TAKE 5 Before sending an IM take a 5 minute break - think about how you are feeling. Watch what you put in writing. E-mails and text messages have a way of sprouting wings and getting into the wrong hands. Sign off and get physical, go for a walk, ride a bike, play ball, shoot hoops, play fetch with your dog!

TALK Talk to a friend or an older sibling about it. Tell your parents and come up with a plan. Have your parents talk to the cyber-bully’s parents.

REPORT TO INTERNET SERVICE PROVIDER Most cyberbullying violates the ISP’s terms of service. Look at the person’s ISP name in their email address. Many ISPs will close an account if a person is in breaking the terms of service. If someone has stolen your identity report this to your ISP.

BEWARE OF COOKIES Cookies are small computer files placed in your computer by the sites you visit. These files contain numbers to identify your computer. They also identifyyour browser, operation system, and internet service provider. This is how you can be identified. A cookie records the date and time you visited and how long you stayed.