SlideShare une entreprise Scribd logo
1  sur  16
Cyberbullying
Brindetta Cook
CSIS 200
April 29, 2013
Source: http://thinkprogress.org/wp-content/uploads/2012/06/Cyberbullying.jpg
What is “Cyberbullying”?
“Cyberbullying is bullying that takes place using
electronic technology. “
Statistics
The Harford County Examiner reported similarly concerning cyber bullying 
statistics:
• Around half of teens have been the victims of cyber bullying
• Only 1 in 10 teens tells a parent if they have been a cyber bully victim
• Fewer than 1 in 5 cyber bullying incidents are reported to law
enforcement
• 1 in 10 adolescents or teens have had embarrassing or damaging
pictures taken of themselves without their permission, often using cell
phone cameras
• About 1 in 5 teens have posted or sent sexually suggestive or nude
pictures of themselves to others
Causes
• revenge of other peers
• for entertainment purposes
• to boost their ego
• to get a laugh from their peers
• help bolster or remind people of their
own social standing
Effects
•Undermining your confidence, self-esteem and sense of
security
•Affecting your performance and attendance at school
•Causing stress and affecting your health
•Affecting your professional reputation and career
•Fueling prejudice in areas such as race, religion and
sexuality
•Leading to suicidal thoughts
Who is affected?
• Ages 15-17
• Females are about twice as likely as
males to be victims and perpetrators of
cyber bullying.
• Males are more likely to be threatened
by cyber bullies than females
• Affects all races
Tyler Clementi
Jessica Logan
Technology’s Role
• Over 80% of teens use a cell phone regularly, making it the
most common medium for cyber bullying
• Cyberbullying can happen 24 hours a day, 7 days a week
• Cyberbullying messages and images can be posted
anonymously and distributed quickly to a very wide
audience.
• Deleting inappropriate or harassing messages, texts, and
pictures is extremely difficult after they have been posted or
sent.
How you can help!
• Don’t engage in or support mean material,
gossip, or rumors posted online, or talk about
it
• Support the victim being targeted online by
posting positive messages!
• Print the evidence to share with an authority
Remember!
• we are not invisible online, and
anything we post can be traced back to
us. Monitor your online reputation
YOU have the power
• If cyberbullying becomes severe and involves
threats of violence, you should contact the
police immediately. Some states have
computer harassment laws to prosecute
offenders.
Governor Cuomo Signs Legislation to
Help Protect Students from
Cyberbullying
• Requires Schools to Act When Cyberbullying Occurs
• Ensures Proper Protocols Are in Place to Deal with
Cyberbullying
• Sets Training Requirements For School Employees to Help
Identify and Prevent Cyberbullying
Have you ever been a victim of cyberbullying?
• A.)YES
• B.) NO
Source:
http://samuelflinn.files.wordpress.com/2012/05/cyber-
bullying-poster.jpg
Resources
Anti Bullying Campaigns and Programs:
• The Great American NO BULL Challenge
• Internet Safety 101
• Olweus Bullying Prevention Program
• Stomp Out Bullying
• Delete Digital Drama
• Cyberbully411
• STOP Cyberbullying
Sources
" What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday."
Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher-
advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>.
"Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger, 
Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013.
<http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>.
"Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013.
<http://endofbullying.com/cyberbullying-effects/>.
Sources cont’d.
"Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying |
Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web.
29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>.
"InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web.
29 Apr. 2013.
<http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>.
"What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d.
Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is-
it/index.html>.
"my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013.
<www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Contenu connexe

Tendances

Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 

Tendances (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
214 cyberbullying
214 cyberbullying214 cyberbullying
214 cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 

Similaire à Csis200 cyberbullying

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1Samphiriane
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItFeliciaDixon5
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation courtneyjohnson105
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia PresentationAshlynnH
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final pingXFactor Umitz
 

Similaire à Csis200 cyberbullying (20)

Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Bully
BullyBully
Bully
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Symposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In SchoolsSymposium On Anti-Bullying In Schools
Symposium On Anti-Bullying In Schools
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent ItCyber-Bullying: How to Recognize & Prevent It
Cyber-Bullying: How to Recognize & Prevent It
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Csis200 cyberbullying

  • 2. What is “Cyberbullying”? “Cyberbullying is bullying that takes place using electronic technology. “
  • 3. Statistics The Harford County Examiner reported similarly concerning cyber bullying  statistics: • Around half of teens have been the victims of cyber bullying • Only 1 in 10 teens tells a parent if they have been a cyber bully victim • Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement • 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras • About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others
  • 4. Causes • revenge of other peers • for entertainment purposes • to boost their ego • to get a laugh from their peers • help bolster or remind people of their own social standing
  • 5. Effects •Undermining your confidence, self-esteem and sense of security •Affecting your performance and attendance at school •Causing stress and affecting your health •Affecting your professional reputation and career •Fueling prejudice in areas such as race, religion and sexuality •Leading to suicidal thoughts
  • 6. Who is affected? • Ages 15-17 • Females are about twice as likely as males to be victims and perpetrators of cyber bullying. • Males are more likely to be threatened by cyber bullies than females • Affects all races
  • 8. Technology’s Role • Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying • Cyberbullying can happen 24 hours a day, 7 days a week • Cyberbullying messages and images can be posted anonymously and distributed quickly to a very wide audience. • Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.
  • 9. How you can help! • Don’t engage in or support mean material, gossip, or rumors posted online, or talk about it • Support the victim being targeted online by posting positive messages! • Print the evidence to share with an authority
  • 10. Remember! • we are not invisible online, and anything we post can be traced back to us. Monitor your online reputation
  • 11. YOU have the power • If cyberbullying becomes severe and involves threats of violence, you should contact the police immediately. Some states have computer harassment laws to prosecute offenders.
  • 12. Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying • Requires Schools to Act When Cyberbullying Occurs • Ensures Proper Protocols Are in Place to Deal with Cyberbullying • Sets Training Requirements For School Employees to Help Identify and Prevent Cyberbullying
  • 13. Have you ever been a victim of cyberbullying? • A.)YES • B.) NO Source: http://samuelflinn.files.wordpress.com/2012/05/cyber- bullying-poster.jpg
  • 14. Resources Anti Bullying Campaigns and Programs: • The Great American NO BULL Challenge • Internet Safety 101 • Olweus Bullying Prevention Program • Stomp Out Bullying • Delete Digital Drama • Cyberbully411 • STOP Cyberbullying
  • 15. Sources " What are the effects of cyberbullying? | Cyberbullying | Teacher advice | Teachtoday." Teachtoday. N.p., n.d. Web. 28 Apr. 2013. <http://www.teachtoday.eu/en/Teacher- advice/Cyberbullying/What-are-the-effects-of-cyberbullying.aspx>. "Cyber Bullying Statistics - Bullying Statistics." Bullying Statistics ­ Teen Violence, Anger,  Bullying, Treatment Options. N.p., n.d. Web. 29 Apr. 2013. <http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html>. "Cyberbullying Effects | End Of Bullying." EndofBullying.com. N.p., n.d. Web. 29 Apr. 2013. <http://endofbullying.com/cyberbullying-effects/>.
  • 16. Sources cont’d. "Governor Cuomo Signs Legislation to Help Protect Students from Cyberbullying | Governor Andrew M. Cuomo." Governor Andrew M. Cuomo. N.p., n.d. Web. 29 Apr. 2013. <http://www.governor.ny.gov/press/07092012cyberbullying>. "InternetSafety101.org: Statistics." InternetSafety101.org: Home. N.p., n.d. Web. 29 Apr. 2013. <http://www.internetsafety101.org/cyberbullyingstatistics.htm#_ftnref>. "What is Cyberbullying | StopBullying.gov." Home | StopBullying.gov. N.p., n.d. Web. 27 Apr. 2013. <http://www.stopbullying.gov/cyberbullying/what-is- it/index.html>. "my Secure Cyberspace:." Cyberbullying. N.p., n.d. Web. 28 Apr. 2013. <www.mysecurecyberspace.com/encyclopedia/index/cyberbullying.html>.

Notes de l'éditeur

  1. http://www.stopbullying.gov/cyberbullying/what-is-it/index.html Examples of cyberbullying include: mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully: Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward private text messages, pictures, etc. Post pictures of victims without their consent Sending mean messages or threats to a person&apos;s email account or cell phone Spreading rumors online or through texts Posting hurtful or threatening messages on social networking sites or web pages Stealing a person&apos;s account information to break into their account and send damaging messages Pretending to be someone else online to hurt another person Taking unflattering pictures of a person and spreading them through cell phones or the Internet Sexting, or circulating sexually suggestive pictures or messages about a person
  2. Cyber world has become the new way to communicate in today&apos;s society People (students) in particular don’t think they can get caught Can lead to other devastating tragedies (school shootings, suicide, and other harm) http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html
  3. The teen years can be cruel. Nearly everyone has been a part of some form of bullying during his or her lifetime, be it on the giving or receiving end. In general, cyber bullies have their own motives on why they are involved in cyber bullying. Some of their intentions have been identified as power, attention, retaliation, boredom, jealousy, and the pleasure of inflicting pain.
  4. Can have a lasting impression on you for the rest of your life
  5. Cyberbullying has become a prevalent problem globally Homosexual and bisexual teens are more likely to report bullying than heterosexual teens Students with disabilities are more likely to be the victims of bullying Females are more often the victims of bullying than males
  6. Tyler Clementi: jumped to his death from the George Washington Bridge. This occurred after a sexual encounter he had with a man in his dorm room was allegedly video streamed over the internet without Clementi&apos;s knowledge Jessica Logan: committed suicide after sexting a nude photo of herself to her boyfriend. When they broke up, he sent the photo to everyone else at her school. Jessica was cruelly harassed for months by the other girls at her school, Jessica Logan decided to tell her story on a Cincinnati television station. Her purpose was simple: “I just want to make sure no one else will have to go through this again.” The interview was in May 2008. Two months later, on July 3, 2008, Jessie attended the funeral of a boy who committed suicide, then came home and killed herself.
  7. The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying
  8. You may be able to sue a cyberbully or the bully&apos;s parents for damages if you can prove defamation, invasion of privacy, or intentional infliction of emotional distress. Damages can include money spent on counseling, limited college opportunities due to failing grades, etc.
  9. The new law goes into effect on July 1, 2013. The new law cracks down on cyberbullying through the following provisions: “ The new law is designed to strengthen a school&apos;s response to harassment and bullying through improved reporting, investigation, intervention, training and prevention. The new law requires schools to take action when students experience cyberbullying or other forms of harassment. It ensures that school districts take immediate steps to end harmful behavior, prevent recurrences, and ensure the safety of the targeted students. The legislation also establishes improved training to help teachers and administrators better prevent and respond to bullying and other harmful acts.” http://www.governor.ny.gov/press/07092012cyberbullying