SlideShare une entreprise Scribd logo
1  sur  21
Team Mosaic:
  Hannah Morrell
Emmanuelle Besnard
    Dustin Sikes
Allison Dobosiewicz
   Tyler Rutledge
   What?
        When a child, preteen or teen is tormented by another child, preteen or
         teen using the Internet, interactive and digital technologies or mobile
         phones. It has to have a minor on both sides, or at least have been
         instigated by a minor against another minor.
   How?
        The methods used are limited only by the child's imagination and access to
         technology (Social networks, phones, chats…)




   www.stopcyberbultying.org
   Criminal case upon which Lori Drew was
    convicted of Computer Fraud and Abuse over
    the cyber-bullying of 13 year old Megan Meier.
   Drew, a 49 year old woman living in
    Missouri, created a fake myspace account with
    the alias name Josh Evans to befriend Megan
    Meier
   “Evans” and Meier began a flirtatious
    relationship that turned sour fast
   Megan Meier hung herself because of the
    remarks made by “Evans”
http://abcnews.go.com/GMA/story?id=3882520&page=1
   20% had someone pretend to         45% of all teens have
    be someone else in order to
    trick them into revealing           been cyberbullied in
    personal information
   17% were victimized by              the past year alone
    someone lying about them
    online
   13% learned that a
    cyberbully was pretending to
    be them while
    communicating with
    someone else
   10% were victimized by
    someone else posting
    unflattering pictures of them
    without permission


        www.ncpc.org
http://www.cyberbullying.us/research.php.
   Middle and High Schools
       Faculty
       Parents of students
       Students
   Create separate packets for each group
   Community
   Needs the most information
   Include background data so they can create
    their own presentations based on class needs
   Topics:
       How to tell if a student is being bullied online
       What to do if you suspect cyber bullying
       How you can prevent cyber bullying as a faculty
        member
   Also require a lot of background data. Focusing
    on prevention and signs
   Topics:
     How to prevent your child from becoming a target
      of bullying
     What to do if you find your child is being targeted
     How to know if your child is a bully online, and how
      to stop it
   Require the most targeted information on how
    to deal with being targeted
   Topics
       What to do if you are being cyber bullied
       How to prevent being targeted by cyber bullies
       How to be respectful of others online
   With the communities help we can create
    enough awareness to eventually stop cyber
    bullying
   Together we can decrease the statistics of cyber
    bullying
   Cyber bullying is too big of an issue to handle
    alone
   Make official laws against cyberbullying
   Join local PTA‟s
     Write letters to lawmakers
     Flag cyberbullying on social media sites
     Join movements/organizations




http://www.socialsafety.org/law_enforcement_cyberbullying.html
   E-mails,
   Instant messaging,
   Text or digital imaging messages sent on cell
    phones,
   Web pages
   Web logs (blogs), Chat rooms or discussion
    groups
   Social Networking sites
   Start a anti cyberbullying campaign
   School involvement
          Special events
          Public speakers and personal testimonies
          Pledging to not bully
          PSA involvement
   Advertisement on Facebook
   You tube video
Place a permanent ad on Facebook raising cyberbullying awareness and
prevention
   Educate social media
    users on how to
    recognize, handle, and
    prevent cyberbullying
   Show people the effects of
    cyberbullying
   Inform people on how to
    report or go to higher
    authority if needed
   Get people involved in the
    anti cyberbullying
    movement
   No more anonymity
   Get laws passed making
    cyberbullying illegal
   Facebook‟s marketing director Randi
    Zuckerberg says the best way to end
    cyberbullying is to not allow anonymous or
    spam accounts
   “people hide behind anonymity and feel like
    they can say whatever they want behind closed
    doors”
   Eric Schmidt, former Google CEO has made
    this suggestion in the past and predictes
    “govenments will eventually „demand‟ that
    people use their names for all online activity”
    http://www.huffingtonpost.com/mobileweb/2011/07/27/ra
    ndi-zuckerberg-anonymity-online_n_910892.html
   Conditions and terms of use agreement before
    accessing a Social media site
   Public record of your social media account
       Monitor Activity
       Point system like drivers when flagged or reported.
   Our optimal plan will be to pair with a
    nonprofit and use their financial backing to
    help get our program off the ground. If not, we
    have several options:
     Bootstrapping: Generate funds ourselves
     Small bank loans
     Partner with similar programs of size or scope
   How are we going to measure our success?
   Indicators:
     Social media monitoring: Are kids talking about the
      issue?
     Website traffic: Is our website generating views?
     Number of participants: How many
      schools, faculty, parents, and/or students are
      participating?
   Focus on effectiveness more than efficency
   www.stopcyberbullying.org
   http://csriu.org/cyberbully.
   http://www.socialsafety.org/law_enforcement_cy
    berbullying.html
   http://www.cyberbullying.us/research.php
   www.ncpc.org
   http://abcnews.go.com/GMA/story?id=3882520
    &page=1
   http://www.huffingtonpost.com/mobileweb/201
    1/07/27/randi-zuckerberg-anonymity-
    online_n_910892.html

Contenu connexe

Tendances

Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Awareness Of Social Media
Awareness Of Social MediaAwareness Of Social Media
Awareness Of Social MediaAkbar Kiani
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationclifforddyyy
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1itunaschool
 
The Benefits of Social Media
The Benefits of Social MediaThe Benefits of Social Media
The Benefits of Social MediaSoci@lite
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationdreamingmoi
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 

Tendances (20)

Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Awareness Of Social Media
Awareness Of Social MediaAwareness Of Social Media
Awareness Of Social Media
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Bullying
BullyingBullying
Bullying
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
The Benefits of Social Media
The Benefits of Social MediaThe Benefits of Social Media
The Benefits of Social Media
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 

Similaire à Pr cyberbullying campaign powerpoint

Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social mediaMike North
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 

Similaire à Pr cyberbullying campaign powerpoint (20)

Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Facebook
FacebookFacebook
Facebook
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Chandan kumar
Chandan kumarChandan kumar
Chandan kumar
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Pr cyberbullying campaign powerpoint

  • 1. Team Mosaic: Hannah Morrell Emmanuelle Besnard Dustin Sikes Allison Dobosiewicz Tyler Rutledge
  • 2. What?  When a child, preteen or teen is tormented by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.  How?  The methods used are limited only by the child's imagination and access to technology (Social networks, phones, chats…)  www.stopcyberbultying.org
  • 3. Criminal case upon which Lori Drew was convicted of Computer Fraud and Abuse over the cyber-bullying of 13 year old Megan Meier.  Drew, a 49 year old woman living in Missouri, created a fake myspace account with the alias name Josh Evans to befriend Megan Meier  “Evans” and Meier began a flirtatious relationship that turned sour fast  Megan Meier hung herself because of the remarks made by “Evans” http://abcnews.go.com/GMA/story?id=3882520&page=1
  • 4. 20% had someone pretend to  45% of all teens have be someone else in order to trick them into revealing been cyberbullied in personal information  17% were victimized by the past year alone someone lying about them online  13% learned that a cyberbully was pretending to be them while communicating with someone else  10% were victimized by someone else posting unflattering pictures of them without permission www.ncpc.org
  • 6. Middle and High Schools  Faculty  Parents of students  Students  Create separate packets for each group  Community
  • 7. Needs the most information  Include background data so they can create their own presentations based on class needs  Topics:  How to tell if a student is being bullied online  What to do if you suspect cyber bullying  How you can prevent cyber bullying as a faculty member
  • 8. Also require a lot of background data. Focusing on prevention and signs  Topics:  How to prevent your child from becoming a target of bullying  What to do if you find your child is being targeted  How to know if your child is a bully online, and how to stop it
  • 9. Require the most targeted information on how to deal with being targeted  Topics  What to do if you are being cyber bullied  How to prevent being targeted by cyber bullies  How to be respectful of others online
  • 10. With the communities help we can create enough awareness to eventually stop cyber bullying  Together we can decrease the statistics of cyber bullying  Cyber bullying is too big of an issue to handle alone  Make official laws against cyberbullying
  • 11. Join local PTA‟s  Write letters to lawmakers  Flag cyberbullying on social media sites  Join movements/organizations http://www.socialsafety.org/law_enforcement_cyberbullying.html
  • 12. E-mails,  Instant messaging,  Text or digital imaging messages sent on cell phones,  Web pages  Web logs (blogs), Chat rooms or discussion groups  Social Networking sites
  • 13. Start a anti cyberbullying campaign  School involvement  Special events  Public speakers and personal testimonies  Pledging to not bully  PSA involvement  Advertisement on Facebook  You tube video
  • 14. Place a permanent ad on Facebook raising cyberbullying awareness and prevention
  • 15. Educate social media users on how to recognize, handle, and prevent cyberbullying  Show people the effects of cyberbullying  Inform people on how to report or go to higher authority if needed  Get people involved in the anti cyberbullying movement  No more anonymity  Get laws passed making cyberbullying illegal
  • 16. Facebook‟s marketing director Randi Zuckerberg says the best way to end cyberbullying is to not allow anonymous or spam accounts  “people hide behind anonymity and feel like they can say whatever they want behind closed doors”  Eric Schmidt, former Google CEO has made this suggestion in the past and predictes “govenments will eventually „demand‟ that people use their names for all online activity” http://www.huffingtonpost.com/mobileweb/2011/07/27/ra ndi-zuckerberg-anonymity-online_n_910892.html
  • 17. Conditions and terms of use agreement before accessing a Social media site  Public record of your social media account  Monitor Activity  Point system like drivers when flagged or reported.
  • 18. Our optimal plan will be to pair with a nonprofit and use their financial backing to help get our program off the ground. If not, we have several options:  Bootstrapping: Generate funds ourselves  Small bank loans  Partner with similar programs of size or scope
  • 19. How are we going to measure our success?  Indicators:  Social media monitoring: Are kids talking about the issue?  Website traffic: Is our website generating views?  Number of participants: How many schools, faculty, parents, and/or students are participating?  Focus on effectiveness more than efficency
  • 20.
  • 21. www.stopcyberbullying.org  http://csriu.org/cyberbully.  http://www.socialsafety.org/law_enforcement_cy berbullying.html  http://www.cyberbullying.us/research.php  www.ncpc.org  http://abcnews.go.com/GMA/story?id=3882520 &page=1  http://www.huffingtonpost.com/mobileweb/201 1/07/27/randi-zuckerberg-anonymity- online_n_910892.html