Presentation is loading. Please wait.

Presentation is loading. Please wait.

Forms of Cyberbullying

Similar presentations

Presentation on theme: "Forms of Cyberbullying"— Presentation transcript:

1 Forms of Cyberbullying
News Anchor Story What is Cyber Bullying? Technologies Forms of Cyberbullying Facts Glossary Consequences Broken Friendship You Can’t Take it Back Quiz What Now? Cyberbullying

2 What is Cyberbullying Cyberbullying occurs when teens use communication technology to say hurtful, embarrassing, or threatening things about another teen. Cyberbullying can be very emotionally damaging to teens, and can have legal consequences for teens and parents. Back Next

3 Technologies Used Cyberbullying can come through many types of technology, including: s Instant messages sent over the Internet Chat rooms, where teens talk to each other online Text messages sent to a teen's cell phone Web sites Blogs, or web logs, which are public online journals Next

4 Technologies Used Interactions through online games
Social networking sites, like Facebook and MySpace, where individuals have a page about themselves where others can post messages Twitter, which sends short messages to a teen’s online account and cell phone Back Next

5 Forms of CyberBullying
There are many types of Cyberbullying, including: Sending mean messages to a person through or text Spreading rumors or lies about someone online through or text Excluding someone from online social groups Creating a web site to make fun of someone Threatening or harassing someone online Tricking someone into sharing secrets and then spreading that information around Next

6 Forms of CyberBullying
More forms of Cyber Bullying: Taking pictures of a person and sharing them online without the person's consent. Posting hurtful or threatening messages on social networking sites or web pages Stealing a person's account information to break into their account and send damaging messages Pretending to be someone else online to hurt another person Sexting, or circulating sexually suggestive pictures or messages about a person Back Next

7 Facts about cyberbullying
Visit to find facts about cyberbullying List the 6 facts you think apply most to you Back Next

8 Glossary of Terms Flaming: Online fights using electronic messages with angry and vulgar language. Harassment: Repeatedly sending offensive, rude and insulting messages. Cyberstalking: Repeatedly sending message that include threats of harm or are highly intimidating; engaging in other online activities that make a person afraid for his or her safety. Next

9 Glossary of Terms Denigration: “Dissing” someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships. Exclusion: Intentionally excluding someone from an online group, like a “buddy list” or a game. Trolling: Intentionally posting provocative messages about sensitive subjects to create conflict, upset people, and bait them into “flaming” or fighting. Next

10 Glossary of Terms Impersonation: Breaking into someone’s account, posing as that person and sending messages to make the person look bad, get that person in trouble or danger, or damage that person's reputation or friendships. Outing and trickery: Sharing someone’s secrets or embarrassing information online. Tricking someone into revealing secrets or embarrassing information, which is then shared online. Back Next

11 Consequences Under the Utah Criminal Code, electronic communication harassment of a minor is a third degree felony. Next

12 Consequences Utah defines electronic communication harassment as communication "with intent to annoy, alarm, intimidate, offend, abuse, threaten, harass, frighten, or disrupt the electronic communications of another person". This includes communicating insults, taunts, challenges, threats to inflict injury, physical harm, or threats to damage property. Next

13 Consequences Electronic communication harassment can be as simple as repeated trying to contact a person or their electronic device after the person has asked you not to contact them. Causing someone's electronic device to ring excessively to the point that it causes a disruption or jamming/overloading a system through excessive message traffic is electronic communication harassment. Back Next

14 Videos Broken Friendship and You Can’t Take it Back Real Life Stories Back Next

15 Quiz Are you a Cyberbully? Take the Quiz…What is your score? Cyberbully quiz Back Next

16 What do do about Cyberbullying
Review the tips below so you can be prepared if you are ever the victim of Cyberbullying: Tell an adult you trust about what is happening! Do not respond to rude s, messages, and comments. Save the evidence, such as and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your you. Next

17 What do do about Cyberbullying
If harassment is via , social networking sites, IM, and chat rooms, “block” bullies or delete your current account and open a new one. If harassment is via text and phone messages, change your phone number and only share the new number with trustworthy people. Also, check out phone features that may allow the number to be blocked. Get your school involved. Learn the school’s policy on cyberbullying and urge administrators to take a stance against all forms of bullying. Make a report to and if you feel something illegal has occurred, inform law enforcement. Next

18 What do you think about Cyberbullying?
Record your thoughts in your listening guide

Download ppt "Forms of Cyberbullying"

Similar presentations

Ads by Google