SlideShare une entreprise Scribd logo
1  sur  12
Brian Wood
CSIS 200
What is cyber bullying?
 Is the use of the Internet and related technologies to
harm other people, in a deliberate, repeated, and
hostile manner.
What Causes a teen to be a bully?
 Fewer protective factors, such as parental supervision
 Drug and alcohol use
 Family conflict.
Relevant Statistics
 Over half of adolescents and teens have been bullied
online, and about the same number have engaged in
cyber bullying.
 Over 25% of adolescents and teens have been bullied
repeatedly through their cell phones or the internet.
Statistics Cont.
 Around half of teens have been the victim of cyber
bullying.
 Only 1 in 10 teens tells a parent if they have been a
cyber bully victim.
 Victims are more likely to have low self esteem and to
consider suicide.
Ryan Halligan
 Had a learning disability, and spent most of his
summer in 2003 online.
 Kids from school constantly tormented him.
 On his return to school the tormenting continued.
 Ryan's sister found him dead in the bathroom on
October 7, 2003
Tyler Clementi
 Dharun Ravi, Tylers roommate, recorded Tyler having
homosexual experiences.
 Ravi then put the recordings on the internet for all of
his Twitter followers to see
 Tyler jumped from the George Washington Bridge on
September 22, 2010.
Different Types of Cyber Bullying
1. Harassment
2. Impersonation
3. Use of Photographs
4. Creating Websites, Blogs, Polls and More
5. Participating in "Happy-Slapping"
Effects of Cyber Bullying on Victim
 Be unwilling to attend school
 Receiving poor grades
 Have lower self-esteem
 Have more health problems
 Use alcohol and drugs
Waysto Prevent Cyber Bullying
 Educate the kids about the consequences.
 If someone sends a mean or threatening
message, don't respond. Save it and show it to a
trusted adult.
 Parents should keep home computers in a busy area of
the house.
 Parents need to keep an eye on their child's online
activity.
Sources
 http://www.bullyingstatistics.org/content/cyber-
bullying-statistics.html
 http://en.wikipedia.org/wiki/Cyber-bullying
 http://blog.koldcast.tv/2011/koldcast-news/8-
infamous-cases-of-cyber-bullying/
 http://bullying.about.com/od/Cyberbullying/a/5-
Types-Of-Cyberbullying.htm
 http://www.goodtherapy.org/blog/teens-cyber-
bullying-risk-factors-1025123
Sources Cont.
 http://www.ncpc.org/topics/cyberbullying/stop-
cyberbullying
 http://www.americanhumane.org/children/stop-
child-abuse/fact-sheets/cyber-bullying-prevention-
and-intervention.html
 http://endofbullying.com/cyberbullying-effects/
 http://www.meganmeierfoundation.org/megansStory.
php

Contenu connexe

Tendances

Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 

Tendances (20)

Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

En vedette

Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesis
none
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
beh yong hua
 
Cyberbully slides 2010
Cyberbully slides 2010Cyberbully slides 2010
Cyberbully slides 2010
Chris Bigenho
 
Apresentação sobre cyberbullying
Apresentação sobre cyberbullyingApresentação sobre cyberbullying
Apresentação sobre cyberbullying
crbmonteiro
 

En vedette (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying
BullyingBullying
Bullying
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesis
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Recovered file 1
Recovered file 1Recovered file 1
Recovered file 1
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying project
 
Cyberbully slides 2010
Cyberbully slides 2010Cyberbully slides 2010
Cyberbully slides 2010
 
cyberbullying
cyberbullyingcyberbullying
cyberbullying
 
Cyberbullying ppt
Cyberbullying pptCyberbullying ppt
Cyberbullying ppt
 
Apresentação sobre cyberbullying
Apresentação sobre cyberbullyingApresentação sobre cyberbullying
Apresentação sobre cyberbullying
 

Similaire à Cyber bullying slide share

Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
adewolfe
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
tburdzy1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kpwillia
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
dulud2lm
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 

Similaire à Cyber bullying slide share (20)

Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Cyberbullying slidedeck
Cyberbullying slidedeckCyberbullying slidedeck
Cyberbullying slidedeck
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
Presentation2
Presentation2Presentation2
Presentation2
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Dernier (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

Cyber bullying slide share

  • 2. What is cyber bullying?  Is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
  • 3. What Causes a teen to be a bully?  Fewer protective factors, such as parental supervision  Drug and alcohol use  Family conflict.
  • 4. Relevant Statistics  Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying.  Over 25% of adolescents and teens have been bullied repeatedly through their cell phones or the internet.
  • 5. Statistics Cont.  Around half of teens have been the victim of cyber bullying.  Only 1 in 10 teens tells a parent if they have been a cyber bully victim.  Victims are more likely to have low self esteem and to consider suicide.
  • 6. Ryan Halligan  Had a learning disability, and spent most of his summer in 2003 online.  Kids from school constantly tormented him.  On his return to school the tormenting continued.  Ryan's sister found him dead in the bathroom on October 7, 2003
  • 7. Tyler Clementi  Dharun Ravi, Tylers roommate, recorded Tyler having homosexual experiences.  Ravi then put the recordings on the internet for all of his Twitter followers to see  Tyler jumped from the George Washington Bridge on September 22, 2010.
  • 8. Different Types of Cyber Bullying 1. Harassment 2. Impersonation 3. Use of Photographs 4. Creating Websites, Blogs, Polls and More 5. Participating in "Happy-Slapping"
  • 9. Effects of Cyber Bullying on Victim  Be unwilling to attend school  Receiving poor grades  Have lower self-esteem  Have more health problems  Use alcohol and drugs
  • 10. Waysto Prevent Cyber Bullying  Educate the kids about the consequences.  If someone sends a mean or threatening message, don't respond. Save it and show it to a trusted adult.  Parents should keep home computers in a busy area of the house.  Parents need to keep an eye on their child's online activity.
  • 11. Sources  http://www.bullyingstatistics.org/content/cyber- bullying-statistics.html  http://en.wikipedia.org/wiki/Cyber-bullying  http://blog.koldcast.tv/2011/koldcast-news/8- infamous-cases-of-cyber-bullying/  http://bullying.about.com/od/Cyberbullying/a/5- Types-Of-Cyberbullying.htm  http://www.goodtherapy.org/blog/teens-cyber- bullying-risk-factors-1025123
  • 12. Sources Cont.  http://www.ncpc.org/topics/cyberbullying/stop- cyberbullying  http://www.americanhumane.org/children/stop- child-abuse/fact-sheets/cyber-bullying-prevention- and-intervention.html  http://endofbullying.com/cyberbullying-effects/  http://www.meganmeierfoundation.org/megansStory. php

Notes de l'éditeur

  1. Tests essentially show that family life has a major impact if a child becomes a cyber bully.  Results shows that teens with the least amount of parental supervision engage the most in cyber bullying.
  2. Considering how over 80% of teens use a cell phone regularly, and hardly ever leaves their sides.  It makes it a popular medium to use for cyber bullying.
  3. These statistics show how there is a large portion of teens and adolescents who are victims of this type of bullying; however, they're doing very little to search for help.
  4. It wasn't until after his death that Ryan's father looked through his online chat logs.  His father was shocked at what he had been reading; it is for this reason that parents need to take a more active role in the online life that our generation lives in.
  5. Tyler actually went to an RA in search for help.  However, action was not taken fast enough to prevent his decision.
  6. An example of harassment could be consistently sending hurtful text messages.Impersonation is if someone makes a fake Facebook account pretending to be someone they're not.Using photographs, such as taking and sending nude photos of a victim.Posting blogs is an example of what happened to Megan Meirer."Happy-Slapping" is if someone records a victim being bullied and posts it to an online forum such as youtube so the masses can witness the humiliation.
  7. Essentially the best way for there to be a prevention of cyber bullying is education and if parents take an active role and consistently watch what their child is doing not only on the internet but in their free time as well, as drug and alcohol use has an affect on teens becoming cyber bullies.