SlideShare a Scribd company logo
1 of 21
Andrea Nugent
LIS 5260
Dr. Pentlin
March 2012
AASL Standards
 1.1.1, 1.1.6, 1.1.7, 1.2.3, 1.3.1, 1.3.3, 1.3.5, 1.4.1, 1.4.3
 2.1.1, 2.1.2, 2.1.6, 2.3.1, 2.3.2
 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.2.1, 3.3.2
 4.1.5, 4.3.4, 4.4.2, 4.4.3, 4.4.4
http://www.ua.edu/featu
or
                 lting , texts, Bu
       ing   insu ails               ildin
S end ning em                  ta rg
                                     et c
                                           ga
                                               We
       a te
 thre                                     erta b S
                                              in p ite t
          s
  o r IM                                          eop o
                                   o                 le
            tealing pa  sswords t
          S
          send th   reatening
           m  essages Using
     Making a
                false    prof e-mai
                             iles        l, blo
    identity t          spre      or c
               o             ad h       hat gs, onl
   spread h                       at ef      room     i ne
             at ef ul                   ul co    s to
   comment                                    mm
             s                                   ents
Outing and
                             Trickery
 Flaming      Denigration




                                 Cyber
                                Stalking

Harassment   The Lingo of
                Cyber
               bullying



  Happy
                            Impersonation
 Slapping     Exclusion &
              Ostracism
The Problem
           s with Cyber
                                  Bullying

                 http://www.manatee.k12.fl.us/sites/mid
No Breaks….




  Picture from Microsoft Powerpoint Clip Art
Gender…




          Pictures from Microsoft Powerpoint Clip Art
W h a t d o t e e n s t h in k o f
c y b e r b u lly in g ?

Picture from Microsoft Powerpoint Clip Art
Consequences of
Cyber Bullying




                  Pictures from Microsoft Powerpoint Clip Art
la ti on
    eg is
L




                    Picture from Microsoft Powerpoint Clip Art
Picture from Microsoft Powerpoint Clip Art




Prevention
The Stop Cyber bullying Pledge:

By taking this pledge, I agree to:
•Take a stand against cyberbullying, including sharing this pledge
with others and asking them to take it too.
•Not use technology as a weapon to hurt others
•“Think Before I click.”
•Think about the person on the other side
•Support others being cyberbullied and report cyber bullying
whenever I find it
•Not to join in cyberbullying tactics or be used by cyberbullies to hurt
others
•“Stop, Block, and Tell” when I am being targeted by a cyber bully
and to “Take 5” to help me calm down and walk away from the
computer.
•Be part of the solution, not the problem.
                                               Wired Safety Online
Works Cited
Bullying News Videos. “Cyberbullying-Megan Meier’s Story Part 1” YouTube. 5 Feb. 2009.
          Web. 2 April 2012.
“Cyber bully” Merriam-Webster Dictionary. Web. 2 April 2012.

Cyberbullying Research Center. Web. 2 April 2012.
Friedman, Lauri S., ed. Introducing Issues with Opposing Viewpoints: Cyberbullying. New
           York: Gale Cengage Learning, 2011. Print.
Jacobs, Tom. Teen Cyberbullying Investigated: Where Do Your
           Rights End and Consequences Begin? Minneapolis:
           Free Spirit Publishing, 2010. Print.
MySecureCyberspace. “Think Time: How Does Cyberbullying Affect You?” YouTube. 30 Nov
           2010. Web. 2 April 2012.
National Crime Prevention Council. “Cyberbullying.”
           National Crime Prevention Council. Web. 2 April 2012
Shariff, Shaheen. Confronting Cyber-Bullying: What Schools
           Need to Know to Control Misconduct and Avoid Legal Consequences.
   Cambridge, NY: Cambridge UP, 2009. Print.
Stop cyberbullying.org. Web. 2 April 2012

Wired Safety.org. Web. 2 April 2012.

More Related Content

Viewers also liked

Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesSwapnil Shahade
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Conférence émotions et trac avant un entretien, clés et exercices pratiques
Conférence émotions et trac avant un entretien, clés et exercices pratiquesConférence émotions et trac avant un entretien, clés et exercices pratiques
Conférence émotions et trac avant un entretien, clés et exercices pratiquesTransmission RH
 
Résilience comment développer sa capacité à surmonter les epreuves et les ec...
Résilience  comment développer sa capacité à surmonter les epreuves et les ec...Résilience  comment développer sa capacité à surmonter les epreuves et les ec...
Résilience comment développer sa capacité à surmonter les epreuves et les ec...Transmission RH
 
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...Christophe Morin
 
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...AFI Expertise
 

Viewers also liked (9)

Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Conférence émotions et trac avant un entretien, clés et exercices pratiques
Conférence émotions et trac avant un entretien, clés et exercices pratiquesConférence émotions et trac avant un entretien, clés et exercices pratiques
Conférence émotions et trac avant un entretien, clés et exercices pratiques
 
Résilience comment développer sa capacité à surmonter les epreuves et les ec...
Résilience  comment développer sa capacité à surmonter les epreuves et les ec...Résilience  comment développer sa capacité à surmonter les epreuves et les ec...
Résilience comment développer sa capacité à surmonter les epreuves et les ec...
 
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
Sois autonome, présentation sur les jeux de pouvoir et l'autonomie dans les é...
 
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
Réconciliez vie personnelle et ambition professionnelle : comment tout avoir ...
 

Similar to Cyber bullying

Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
SonyS Digital Paper Tablet Lets The Office Go Paperless Gadgets ...
SonyS Digital Paper Tablet Lets The Office Go Paperless  Gadgets ...SonyS Digital Paper Tablet Lets The Office Go Paperless  Gadgets ...
SonyS Digital Paper Tablet Lets The Office Go Paperless Gadgets ...Suzanne Simmons
 
Idph presentation 4.5.12
Idph presentation 4.5.12Idph presentation 4.5.12
Idph presentation 4.5.12michaelshmarak
 
What do you do with a careless user (legacy)
What do you do with a careless user (legacy)What do you do with a careless user (legacy)
What do you do with a careless user (legacy)Scott Wilson
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018Richard Fitzwarine-Smith
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
Psychology for designers or 3 predictions from psychology for the future of ...
Psychology for designers or 3 predictions from psychology  for the future of ...Psychology for designers or 3 predictions from psychology  for the future of ...
Psychology for designers or 3 predictions from psychology for the future of ...cxpartners
 
Psychology for designers or 3 predictions from psychology for the future of ...
Psychology for designers or 3 predictions from psychology  for the future of ...Psychology for designers or 3 predictions from psychology  for the future of ...
Psychology for designers or 3 predictions from psychology for the future of ...Joe Leech
 
Pangalagaan Ang Kalikasan Essay
Pangalagaan Ang Kalikasan EssayPangalagaan Ang Kalikasan Essay
Pangalagaan Ang Kalikasan EssayKaty Langley
 
Dr. Seuss Letter Writing Paper Teacher Doodles
Dr. Seuss Letter Writing Paper  Teacher DoodlesDr. Seuss Letter Writing Paper  Teacher Doodles
Dr. Seuss Letter Writing Paper Teacher DoodlesLela Retzlaff
 
Advertising Essay (1) By Umu - Issuu
Advertising Essay (1) By Umu - IssuuAdvertising Essay (1) By Umu - Issuu
Advertising Essay (1) By Umu - IssuuAmanda Hengel
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying jun ijan
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Energy Conservation Essay In Hindi
Energy Conservation Essay In HindiEnergy Conservation Essay In Hindi
Energy Conservation Essay In HindiJessica Edwards
 
Good College Admission Essay
Good College Admission EssayGood College Admission Essay
Good College Admission EssayLana Sorrels
 
Process Analysis Essay Outline. Process Analysi
Process Analysis Essay Outline. Process AnalysiProcess Analysis Essay Outline. Process Analysi
Process Analysis Essay Outline. Process AnalysiBeth Johnson
 

Similar to Cyber bullying (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
SonyS Digital Paper Tablet Lets The Office Go Paperless Gadgets ...
SonyS Digital Paper Tablet Lets The Office Go Paperless  Gadgets ...SonyS Digital Paper Tablet Lets The Office Go Paperless  Gadgets ...
SonyS Digital Paper Tablet Lets The Office Go Paperless Gadgets ...
 
Idph presentation 4.5.12
Idph presentation 4.5.12Idph presentation 4.5.12
Idph presentation 4.5.12
 
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
 
What do you do with a careless user (legacy)
What do you do with a careless user (legacy)What do you do with a careless user (legacy)
What do you do with a careless user (legacy)
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Psychology for designers or 3 predictions from psychology for the future of ...
Psychology for designers or 3 predictions from psychology  for the future of ...Psychology for designers or 3 predictions from psychology  for the future of ...
Psychology for designers or 3 predictions from psychology for the future of ...
 
Psychology for designers or 3 predictions from psychology for the future of ...
Psychology for designers or 3 predictions from psychology  for the future of ...Psychology for designers or 3 predictions from psychology  for the future of ...
Psychology for designers or 3 predictions from psychology for the future of ...
 
Pangalagaan Ang Kalikasan Essay
Pangalagaan Ang Kalikasan EssayPangalagaan Ang Kalikasan Essay
Pangalagaan Ang Kalikasan Essay
 
Dr. Seuss Letter Writing Paper Teacher Doodles
Dr. Seuss Letter Writing Paper  Teacher DoodlesDr. Seuss Letter Writing Paper  Teacher Doodles
Dr. Seuss Letter Writing Paper Teacher Doodles
 
Advertising Essay (1) By Umu - Issuu
Advertising Essay (1) By Umu - IssuuAdvertising Essay (1) By Umu - Issuu
Advertising Essay (1) By Umu - Issuu
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
My bonsai is texting me!
My bonsai is texting me!My bonsai is texting me!
My bonsai is texting me!
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Energy Conservation Essay In Hindi
Energy Conservation Essay In HindiEnergy Conservation Essay In Hindi
Energy Conservation Essay In Hindi
 
Good College Admission Essay
Good College Admission EssayGood College Admission Essay
Good College Admission Essay
 
Process Analysis Essay Outline. Process Analysi
Process Analysis Essay Outline. Process AnalysiProcess Analysis Essay Outline. Process Analysi
Process Analysis Essay Outline. Process Analysi
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Cyber bullying

  • 1. Andrea Nugent LIS 5260 Dr. Pentlin March 2012
  • 2. AASL Standards  1.1.1, 1.1.6, 1.1.7, 1.2.3, 1.3.1, 1.3.3, 1.3.5, 1.4.1, 1.4.3  2.1.1, 2.1.2, 2.1.6, 2.3.1, 2.3.2  3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.2.1, 3.3.2  4.1.5, 4.3.4, 4.4.2, 4.4.3, 4.4.4
  • 4. or lting , texts, Bu ing insu ails ildin S end ning em ta rg et c ga We a te thre erta b S in p ite t s o r IM eop o o le tealing pa sswords t S send th reatening m essages Using Making a false prof e-mai iles l, blo identity t spre or c o ad h hat gs, onl spread h at ef room i ne at ef ul ul co s to comment mm s ents
  • 5. Outing and Trickery Flaming Denigration Cyber Stalking Harassment The Lingo of Cyber bullying Happy Impersonation Slapping Exclusion & Ostracism
  • 6. The Problem s with Cyber Bullying http://www.manatee.k12.fl.us/sites/mid
  • 7.
  • 8. No Breaks…. Picture from Microsoft Powerpoint Clip Art
  • 9. Gender… Pictures from Microsoft Powerpoint Clip Art
  • 10. W h a t d o t e e n s t h in k o f c y b e r b u lly in g ? Picture from Microsoft Powerpoint Clip Art
  • 11. Consequences of Cyber Bullying Pictures from Microsoft Powerpoint Clip Art
  • 12.
  • 13. la ti on eg is L Picture from Microsoft Powerpoint Clip Art
  • 14. Picture from Microsoft Powerpoint Clip Art Prevention
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. The Stop Cyber bullying Pledge: By taking this pledge, I agree to: •Take a stand against cyberbullying, including sharing this pledge with others and asking them to take it too. •Not use technology as a weapon to hurt others •“Think Before I click.” •Think about the person on the other side •Support others being cyberbullied and report cyber bullying whenever I find it •Not to join in cyberbullying tactics or be used by cyberbullies to hurt others •“Stop, Block, and Tell” when I am being targeted by a cyber bully and to “Take 5” to help me calm down and walk away from the computer. •Be part of the solution, not the problem. Wired Safety Online
  • 20.
  • 21. Works Cited Bullying News Videos. “Cyberbullying-Megan Meier’s Story Part 1” YouTube. 5 Feb. 2009. Web. 2 April 2012. “Cyber bully” Merriam-Webster Dictionary. Web. 2 April 2012. Cyberbullying Research Center. Web. 2 April 2012. Friedman, Lauri S., ed. Introducing Issues with Opposing Viewpoints: Cyberbullying. New York: Gale Cengage Learning, 2011. Print. Jacobs, Tom. Teen Cyberbullying Investigated: Where Do Your Rights End and Consequences Begin? Minneapolis: Free Spirit Publishing, 2010. Print. MySecureCyberspace. “Think Time: How Does Cyberbullying Affect You?” YouTube. 30 Nov 2010. Web. 2 April 2012. National Crime Prevention Council. “Cyberbullying.” National Crime Prevention Council. Web. 2 April 2012 Shariff, Shaheen. Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences. Cambridge, NY: Cambridge UP, 2009. Print. Stop cyberbullying.org. Web. 2 April 2012 Wired Safety.org. Web. 2 April 2012.

Editor's Notes

  1. As the Internet becomes more integrated into the lives of the younger generation, kids have found a way to attack and bully other kids using the different tools of the Internet. It is called Cyber bullying.
  2. What is cyber bullying? The Webster-Merriam dictionary defines cyber bullying as this: “ the electronic posting of mean-spirited messages about a person often done anonymously.” Another definition given by stopcyberbullying.org defines cyber bullying as “when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen, teen using the Internet, interactive and digital technologies or mobile phones.” The other thing to remember about cyber bullying is that it is only considered cyber bullying if two minors are involved. If the exchange is minor and an adult then it is called cyber harassment or cyber stalking. (stopcyberbullying.org)
  3. Different Forms of Cyber bullying Cyber bullying comes in many different forms and from many different sources, not just from a computer. Judge Tom Jacobs book Teen Cyberbullying Investigated gives a great list of the different forms that cyber bullying can take. They are: Sending insulting or threatening emails, texts, or instant messages to someone using a computer, cell phone or any other e-communication device Spreading hateful comments about someone via e-mail, blogs, online profiles, or chat rooms Stealing passwords and sending out threatening messages using a false identity Building a Web Site targeting specific people (3)
  4. These are the terms most commonly used when describing the different types of cyber bullying. Flaming = heated, online exchange Harassment= electronic messages that can cause emotional distress Denigration= online postings of negative or false information about someone Impersonation= giving negative, false information to other while impersonating someone else Outing and trickery= electronically sharing or forwarding personal or secret information Exclusion and ostracism= removing or blocking people from buddy lists Cyber stalking= using technology to stalk and threaten a target Happy slapping= videotaping and electronically disseminating an instance of slapping someone (Friedman, 27)
  5. Bullying vs. Cyber Bullying There are two big differences between cyber bullying and bullying: Cyber bullying is more anonymous while bullying is more direct Even though it is more anonymous, 50% of cyber bully victims who their cyber bully whether they realize it or not (Friedman, 13). People who cyber bully, tend to do it because they think that having a screen name gives them some protection. And it does because it does make it harder to track who they actually are (Shariff, 44). Bullying happens face to face while cyber bullying uses technology.
  6. The biggest difference of all… Cyber bullying can go on 24/7 With regular bullying, victims got a break on the evenings and weekends. With cyber bullying, victims can be harassed 24/7 via different forms of electronic communication. Perry Aftab, a cyber bully expert says “The kids who beat you up in school didn’t used to follow you home… now they do.” (Friedman, 8)
  7. Girls tend to be victims of cyber bullying than boys do. In a poll done in 2006-2007 17% of girls said they had experience with some one taking a private message and forwarding it to someone, while only 13% of boys had this happen 15% said they had received a threatening or aggressive e-mail, IM or text message and only 10% of boys had this happen 16% of girls said someone had spread a rumor about them online while only 9% of boys had this happen 7% had someone post an embarrassing picture of them online without their permission opposed to the 5% of boys that had it happen (Friedman, 56)
  8. Some teenagers do not understand the problem with cyber bullying. When asked why they think cyber bullies do what they do, 81% percent said that cyber bullies do it because they think its funny. (National Crime Prevention Council) Possible reasons that teens cyber bully others are: Don’t think cyber bullying is a big deal Don’t think about the consequences Are encouraged by their friends Think everyone cyber bullies Think they won’t get caught. (National Crime Prevention Council)
  9. Many victims of cyber bullying are afraid to step forward and tell someone about what is going on leaving them to deal with all the problems on their own. Many cyber bully victims experience: Depression Low self esteem issues Problems at school They may also pull away from friends and family. May stop doing the activities they once enjoyed And in the most severe cases… the victim may commit suicide. (Friedman, 25 & National Crime Prevention Council) One of the possible reasons that cyber bullying is more harmful to its victims is because the torment happens 24/7, happens before a much larger audience and the threats and insults are permanently preserved on the Internet (Friedman, 27) More and more teens are committing suicide because of cyber bullying.
  10. Federal Laws: 2008- Congress passed the Protecting Children in the 21 st Century Act. *Requires public schools to educate their students about cyber bullying, online safety, and sexual predators. State Laws: 19 states have laws that cover some aspect of cyber bullying. Missouri is one of them. Missouri Law: “Harassment by computer, text message, and other electronic device is illegal; it is a felony for an adult (age 21 and older) to cyberbully anyone 17 or younger.” After Megan Meier fell victim to cyber bullying, her home town of Dardenne Prairie, Missouri passed a measure outlawing online harassment. Any one caught in violation of the law receives a misdemeanor which can possibly lead to a $500 fine and 90 days in jail. (Jacobs, 19-20)
  11. What can we do to help prevent cyber bullying? Educate students on cyber bullying. Get them to understand cyber bullying is no joke. Encourage students to tell an adult (parent or teacher) if they fall victim to cyber bullying Educate parents and other community members about the problems of cyber bullying. (National Crime Prevention Council) There are also a bunch of helpful websites with more information about cyber bullying and ways to help prevent it. Some are:
  12. WiredSafety.org advertises itself as the world’s first internet safety and help guide. It provides great information for any age group or any professional group. There are different pages that cater to youth, adults, schools and law enforcement. It’s a great tool for anyone looking to information about cyber bullying or any other problems that might occur online.
  13. Stopcyberbullying.org is another great website that offers a lot of information about cyber bullying and what can be done to prevent it. Once again it gives you the option to go to a portion of the site for certain age groups and professional groups. The fun thing about this web site is that it has a game that kids can download called Alex Wonder Kid cyberdective. This makes learning about cyber bullying fun and interactive for younger students.
  14. Cyberbullying.us has a lot of good downloadable resources to print off as handouts. There are word games such as crosswords and word searches, quizzes about cyber bullying, cyber bullying scenario sheets. There is also a section for cyber bully victims to share their story and see that they are not alone.
  15. The National Crime Prevention Council website is another great website to use when finding information about cyber bullying and tips on how to prevent it. On this website you can even get professional training from the NCPC on cyber bullying and how to manage bullying situations. There also downloadable resources on this page as well such as podcasts, handouts and commercials on cyber bullying.
  16. I found this pledge in of the books I looked at it. The pledge is originally from WiredSafety.org. but it would be a great thing to use with students to wrap up a lesson on cyber bullying and have them sign. Teachers can print it out and then offer to laminate it so that students can keep it in a safe place at home or in the classroom.
  17. This YouTube video reviews some of the information that was mentioned in this presentation. This video would also be a good tool to use with students when talking to them about cyber bullying because it is a very informative video.