SlideShare une entreprise Scribd logo
1  sur  11
Cyberbullying
    By Josie Day
What is cyberbullying?
  Cyberbullying is when a student use the
       internet, cell phones, or other
 technological devices to send or post text
  or images intended to hurt, embarrass,
threaten, torment, humiliate, or intimidate
                their victim.
Cyberbullying Tactics
Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others

Exclusion: deliberately excluding someone from an online group
Impersonation: breaking into someone’s online account and sending messages or making post that will
cause embarrassment or damage to the person’s reputation and affect his or her relationships with
others

Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts

Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats

Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs

Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then
shared online

Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal
tendencies
Students Take on Cyberbullying
http://www.youtube.com/watch?v=3WoP0y3Syl
Q
What are the effects of Cyberbullying?
•   Hurt Feelings
•   Sadness
•   Anxiety
•   Depression
•   Anger
•   Shame
•   Fear
•   Frustration
•   Low Self Esteem
•   Trust Issues
•   Poor academic performance
•   Suicide
•   Bullying others
Why is cyberbullying so hurtful?
Cyberbullying is more harmful than face-to-face bullying for many reasons:
• Permanence: The insults, comments or images can be preserved by the
   person who was bullied or by others so that the victim may read or view
   them over and over again and the harm is re-inflicted with each reading or
   viewing.
• Audience size: The size of the audience that is able to view or access the
   damaging material increases the victim’s humiliation.
• Familiarity: Many young people are friends with or know their cyber bully
   either through school or other personal connections, increasing the
   potential for embarrassment and humiliation.
• Social Networking: Social networking sites such as Facebook and MySpace
   allow cyber bullies to engage in campaigns against a particular person
   which may involve many others.
• Speed: The speed at which harmful messages can reach large audiences
   also plays a major part in making cyberbullying so damaging to the targets.
Cyberbullying 101
http://www.youtube.com/watch?feature=player
_embedded&v=0iwWxGNAMr0#!
Rachael Neblett
Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her
small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her
parents anything. Or so they thought.

Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began
receiving threatening emails through her MySpace account. Rachael would keep this from her
parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want
them to worry.

The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also,
the person sending the emails was anonymous. Why Rachael kept going back and reading the
emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat.
Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal
at Bullitt East High School. It was obvious that the bully was another student at the school, since the
emails contained details of her movements during class and after school. The bully knew when she
caught the bus and where she lived. The principal had school officials watch Rachael as she got off
the bus and walked to class. But this did nothing to relieve Rachael's fear.

Desperation came early in October when Rachael received an email stating " I am not going to put
you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not
want to go to school or go out with her friends.

On October 9, shortly after receiving the threatening email, Rachael took her own life.

Since Rachael had been receiving threats, her death was put under investigation by the Mt.
Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or
alcohol. No chemical reason for depression.

Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No
person was ever arrested. Even though the police know the computer from which the emails were
sent there was not enough evidence to press charges
How to help prevent
   cyberbullying?
Encourage your students to…
• Block all communication with cyberbullies
• Do not forward any messages, comments, etc.
  that involve cyberbulling
• Always report any cyberbulling taking place to an
  adult
• Educate your students about the damages of
  cyberbullyig
How to prevent cyberbullying
             continued…
Encourage parents to…
• Get involved in their child’s cyberspace
• Open an account wherever your child has an
  account
• Know all your child’s passwords in order to
  have access to all your child’s accounts
• Check in weekly on your child’s Facebook page
  or other social media pages
References
• www.ncpc.org
• http://www.niot.org/front
• http://www.internetsafety101.org/cyberbullying.
  htm
• http://www.makeadifferenceforkids.org/index.ph
  p?id=8
• http://www.puresight.com/Cyberbullying/the-
  dangers-of-cyber-bullying.html
• Google Images

Contenu connexe

Tendances

Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpointgmtango
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Anti-bullying presentation #4
Anti-bullying presentation #4Anti-bullying presentation #4
Anti-bullying presentation #4itunaschool
 

Tendances (20)

Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Anti-bullying presentation #4
Anti-bullying presentation #4Anti-bullying presentation #4
Anti-bullying presentation #4
 

En vedette

En vedette (20)

CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Bullying
BullyingBullying
Bullying
 
Bullying virtual
Bullying virtualBullying virtual
Bullying virtual
 
Bullying verbal
Bullying verbalBullying verbal
Bullying verbal
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
 
Outfoxed
OutfoxedOutfoxed
Outfoxed
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Microsoft Power Point Bullying
Microsoft Power Point   BullyingMicrosoft Power Point   Bullying
Microsoft Power Point Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying
BullyingBullying
Bullying
 
Bullying apresentação
Bullying apresentaçãoBullying apresentação
Bullying apresentação
 
Trabalho sobre bullying
Trabalho sobre bullyingTrabalho sobre bullying
Trabalho sobre bullying
 
Dystopian Genre
Dystopian GenreDystopian Genre
Dystopian Genre
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
 
Research thesis (effects of bullying)
Research thesis (effects of bullying)Research thesis (effects of bullying)
Research thesis (effects of bullying)
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
 

Similaire à Cyberbullying powerpoint

School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxROSALIEBASA1
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingMelissa McDonald
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 

Similaire à Cyberbullying powerpoint (20)

School Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptxSchool Cyber Bullying Among Students .pptx.pptx
School Cyber Bullying Among Students .pptx.pptx
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cbp
CbpCbp
Cbp
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 

Dernier

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Cyberbullying powerpoint

  • 1. Cyberbullying By Josie Day
  • 2. What is cyberbullying? Cyberbullying is when a student use the internet, cell phones, or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim.
  • 3. Cyberbullying Tactics Gossip: posting or sending cruel gossip to damage a person’s reputation and relationships with others Exclusion: deliberately excluding someone from an online group Impersonation: breaking into someone’s online account and sending messages or making post that will cause embarrassment or damage to the person’s reputation and affect his or her relationships with others Harassment: repeatedly posting or sending offensive, rude, and insulting messages or posts Cyberstalking: posting or sending unwanted or intimidating messages, which may include threats Flaming: online fights where scornful and offensive messages are posted on websites, forums, or blogs Outing and Trickery: tricking someone into revealing secrets or embarrassing information, which is then shared online Cyberthreats: remarks on the internet threatening or implying violent behavior, displaying suicidal tendencies
  • 4. Students Take on Cyberbullying http://www.youtube.com/watch?v=3WoP0y3Syl Q
  • 5. What are the effects of Cyberbullying? • Hurt Feelings • Sadness • Anxiety • Depression • Anger • Shame • Fear • Frustration • Low Self Esteem • Trust Issues • Poor academic performance • Suicide • Bullying others
  • 6. Why is cyberbullying so hurtful? Cyberbullying is more harmful than face-to-face bullying for many reasons: • Permanence: The insults, comments or images can be preserved by the person who was bullied or by others so that the victim may read or view them over and over again and the harm is re-inflicted with each reading or viewing. • Audience size: The size of the audience that is able to view or access the damaging material increases the victim’s humiliation. • Familiarity: Many young people are friends with or know their cyber bully either through school or other personal connections, increasing the potential for embarrassment and humiliation. • Social Networking: Social networking sites such as Facebook and MySpace allow cyber bullies to engage in campaigns against a particular person which may involve many others. • Speed: The speed at which harmful messages can reach large audiences also plays a major part in making cyberbullying so damaging to the targets.
  • 8. Rachael Neblett Rachael Neblett, a seventeen-year old student at Bullitt East High School. At less than 5 feet tall, her small stature was an advantage in gymnastics and cheerleading. It seemed Rachael could tell her parents anything. Or so they thought. Because of her small size, Rachael was an easy target for bullies. In the summer of 2006, she began receiving threatening emails through her MySpace account. Rachael would keep this from her parents, maybe fearing they would make her close her MySpace account, or maybe she didn't want them to worry. The emails were not the usual type of bullying. These notes had a stalking terroristic nature. Also, the person sending the emails was anonymous. Why Rachael kept going back and reading the emails no one will ever know. Maybe the fear of the unknown was worse than knowing the threat. Mark and Donna didn't ignore the problem. They went into action, taking the emails to the principal at Bullitt East High School. It was obvious that the bully was another student at the school, since the emails contained details of her movements during class and after school. The bully knew when she caught the bus and where she lived. The principal had school officials watch Rachael as she got off the bus and walked to class. But this did nothing to relieve Rachael's fear. Desperation came early in October when Rachael received an email stating " I am not going to put you in the hospital, I am going to put you in the morgue." After receiving that email, Rachael did not want to go to school or go out with her friends. On October 9, shortly after receiving the threatening email, Rachael took her own life. Since Rachael had been receiving threats, her death was put under investigation by the Mt. Washington police. In the end, it was ruled a suicide. The toxicology report show no drugs or alcohol. No chemical reason for depression. Mark and Donna feel certain that it was the cyberstalking that caused Rachael to end her life. No person was ever arrested. Even though the police know the computer from which the emails were sent there was not enough evidence to press charges
  • 9. How to help prevent cyberbullying? Encourage your students to… • Block all communication with cyberbullies • Do not forward any messages, comments, etc. that involve cyberbulling • Always report any cyberbulling taking place to an adult • Educate your students about the damages of cyberbullyig
  • 10. How to prevent cyberbullying continued… Encourage parents to… • Get involved in their child’s cyberspace • Open an account wherever your child has an account • Know all your child’s passwords in order to have access to all your child’s accounts • Check in weekly on your child’s Facebook page or other social media pages
  • 11. References • www.ncpc.org • http://www.niot.org/front • http://www.internetsafety101.org/cyberbullying. htm • http://www.makeadifferenceforkids.org/index.ph p?id=8 • http://www.puresight.com/Cyberbullying/the- dangers-of-cyber-bullying.html • Google Images