SlideShare une entreprise Scribd logo
1  sur  25
Cyberbullying What can help me help my students?
What is cyberbullying? ,[object Object]
It is not uncommon for cyberbullying to be prevalent in students ages 8-15 and beyond. Webb 2010
Vehicles for Cyberbullying ,[object Object]
Text messages
Picture messages
Email
Internet
Social networking sites
Chatrooms
Chat tools                                       and more…Webb 2010
Statistics ,[object Object]
One in three teens (ages 12-17) have been victims of cyberbullying
One in six pre-teens (ages 6-11) have been victims of cyberbullying
Children are just as likely to receive threatening messages at school as they are at home
The impact on the victims of bullying often include truancy, depression, poor academic performance, and sometimes suicideWebb 2010
Is it against the law? That depends… In the First Amendment we are all given the right of freedom of speech. There have been numerous court cases concerning cyberbullying, however each is individual and rulings remain just as unique and difficult to predict. Webb 2010
Law ,[object Object]
On this website, each state receives a letter grade based on the occurrences of cyberbullying cases and how they are handled. www.bullypolice.org
Also in Illinois schools are required to provide a minimum of two hours of Internet safety instruction annually to their K-12 students.Webb 2010
Challenges for Teachers ,[object Object]
Is bullying that takes place at home able to be disciplined within the school?
When do teachers step in?
What steps should be taken to decrease occurrences?Webb 2010
Challenges for Teachers None of these questions can be answered definitively.  So… What does the research say? Webb 2010

Contenu connexe

Tendances

Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentGail Matthews-DeNatale
 
Influence of Internet
Influence of InternetInfluence of Internet
Influence of InternetAhmed Faisal
 
Digital citizenship action plan
Digital citizenship action planDigital citizenship action plan
Digital citizenship action planlzoerhoff
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveSecurly
 
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...Mark Bullen
 
Web 2.0 and Education
Web 2.0 and EducationWeb 2.0 and Education
Web 2.0 and EducationJulie Evans
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014bellla33
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
Technology and the Classroom
Technology and the ClassroomTechnology and the Classroom
Technology and the ClassroomBen Rayome
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Week 13 Addressing Issues Part 2
Week 13 Addressing Issues   Part 2Week 13 Addressing Issues   Part 2
Week 13 Addressing Issues Part 2anneleftwich
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetMd Jahirul Islam Sojib
 

Tendances (18)

Iste2010
Iste2010Iste2010
Iste2010
 
Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to Assessment
 
Influence of Internet
Influence of InternetInfluence of Internet
Influence of Internet
 
Digital citizenship action plan
Digital citizenship action planDigital citizenship action plan
Digital citizenship action plan
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
Communication Preferences of Postsecondary Learners: Are Net Gen Learners Rea...
 
Web 2.0 and Education
Web 2.0 and EducationWeb 2.0 and Education
Web 2.0 and Education
 
E safety inset
E safety insetE safety inset
E safety inset
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Technology and the Classroom
Technology and the ClassroomTechnology and the Classroom
Technology and the Classroom
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
Chapter 2 oblinger & oblinger
Chapter 2  oblinger & oblingerChapter 2  oblinger & oblinger
Chapter 2 oblinger & oblinger
 
Week 13 Addressing Issues Part 2
Week 13 Addressing Issues   Part 2Week 13 Addressing Issues   Part 2
Week 13 Addressing Issues Part 2
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
ETEC635 Paper
ETEC635 PaperETEC635 Paper
ETEC635 Paper
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internet
 

En vedette

Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentationguest2a78e55
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentationColEanna
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyberbullying Presentation 2011
Cyberbullying Presentation 2011Cyberbullying Presentation 2011
Cyberbullying Presentation 2011IS Manila
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentationallyblevins
 
Franklin Teen Angels Cyberbullying
Franklin Teen Angels CyberbullyingFranklin Teen Angels Cyberbullying
Franklin Teen Angels CyberbullyingFranklin Matters
 

En vedette (7)

Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentation
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyberbullying Presentation 2011
Cyberbullying Presentation 2011Cyberbullying Presentation 2011
Cyberbullying Presentation 2011
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Franklin Teen Angels Cyberbullying
Franklin Teen Angels CyberbullyingFranklin Teen Angels Cyberbullying
Franklin Teen Angels Cyberbullying
 

Similaire à Cyberbully presentation

A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
pppppppppptttttttt.pptx
pppppppppptttttttt.pptxpppppppppptttttttt.pptx
pppppppppptttttttt.pptxMarcBacus2
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Part 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docxPart 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docxdanhaley45372
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.docmebrahten1
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.docAyesha Lata
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxmarilucorr
 
Bullying in the digital age4
Bullying in the digital age4Bullying in the digital age4
Bullying in the digital age4lheikkila
 
e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?Becta FE and Skills
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docxRunning head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docxcharisellington63520
 
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docxRunning head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docxtodd271
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Josie Fraser
 
Its the law
Its the lawIts the law
Its the lawnsharoff
 
Running head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docxRunning head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docxjoellemurphey
 

Similaire à Cyberbully presentation (20)

A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
pppppppppptttttttt.pptx
pppppppppptttttttt.pptxpppppppppptttttttt.pptx
pppppppppptttttttt.pptx
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Part 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docxPart 13 short (paragraph) Vignettes in style of house on mango s.docx
Part 13 short (paragraph) Vignettes in style of house on mango s.docx
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
Bullying in the digital age4
Bullying in the digital age4Bullying in the digital age4
Bullying in the digital age4
 
e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?e-safety? Isn’t that just blocking some website?
e-safety? Isn’t that just blocking some website?
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docxRunning head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
 
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docxRunning head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
Running head CHAPTER 1 INTRODUCTION1CHAPTER 1 INTRODUCTIO.docx
 
Cyberbullying Presentation 2008
Cyberbullying Presentation 2008Cyberbullying Presentation 2008
Cyberbullying Presentation 2008
 
Its the law
Its the lawIts the law
Its the law
 
Its the law
Its the lawIts the law
Its the law
 
Running head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docxRunning head COLLEGE COMP DISCUSSION1College comp discuss.docx
Running head COLLEGE COMP DISCUSSION1College comp discuss.docx
 

Dernier

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Dernier (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Cyberbully presentation

  • 1. Cyberbullying What can help me help my students?
  • 2.
  • 3. It is not uncommon for cyberbullying to be prevalent in students ages 8-15 and beyond. Webb 2010
  • 4.
  • 11. Chat tools and more…Webb 2010
  • 12.
  • 13. One in three teens (ages 12-17) have been victims of cyberbullying
  • 14. One in six pre-teens (ages 6-11) have been victims of cyberbullying
  • 15. Children are just as likely to receive threatening messages at school as they are at home
  • 16. The impact on the victims of bullying often include truancy, depression, poor academic performance, and sometimes suicideWebb 2010
  • 17. Is it against the law? That depends… In the First Amendment we are all given the right of freedom of speech. There have been numerous court cases concerning cyberbullying, however each is individual and rulings remain just as unique and difficult to predict. Webb 2010
  • 18.
  • 19. On this website, each state receives a letter grade based on the occurrences of cyberbullying cases and how they are handled. www.bullypolice.org
  • 20. Also in Illinois schools are required to provide a minimum of two hours of Internet safety instruction annually to their K-12 students.Webb 2010
  • 21.
  • 22. Is bullying that takes place at home able to be disciplined within the school?
  • 23. When do teachers step in?
  • 24. What steps should be taken to decrease occurrences?Webb 2010
  • 25. Challenges for Teachers None of these questions can be answered definitively. So… What does the research say? Webb 2010
  • 26. Research: Bullying is a relatively recent research focus with work beginning in the early 70’s. Because of the even more recent nature of cyberbullying, there are several issues that characterize research in this area, and there are not many helpful conclusions. Webb 2010
  • 27.
  • 28. What are some effective intervention methods from previous studies in traditional bullying that could effect work on cyberbullying?Webb 2010
  • 29.
  • 30. Several pieces of cyberbullying research cite previous studies of traditional bullying, but it is difficult to transfer any prevention methods because of the often secretive nature of cyberbullying
  • 34. What now? For now, short of conducting more research, teachers can choose to follow their school’s technology policy and/or compose their own. Having a classroom technology policy could prevent problems from happening before they occur. It can also provide teachers with a set of fair and equal consequences for policy violations. Webb 2010
  • 35.
  • 36. clearly states the goals that the teacher intends to achieve by using technology and names any known activities that will use certain technologies
  • 37. shows compliance and understanding by both parent(s)/guardian(s) and student (preferably by means of a signature) and returned to the teacher to be filedWebb 2010
  • 38.
  • 39. provides the teacher and administrator’s contact information
  • 40. is thoroughly checked for correct spelling, grammar, and structure
  • 41. is approved by an administrator before being sent home with students (Some schools require this, others do not, but it’s still a good idea!)Webb 2010
  • 42. HINT Between the previous two slides and several additional slides that will be seen shortly in this presentation, you will be easily able to compose a technology policy for your desired setting and fulfill the assignment requirements. Note those slides!
  • 43.
  • 44. Remind students of the policies in place frequently throughout the duration of a project or school year.
  • 45. Post your policy in the classroom or computer lab so students have no excuse for being unfamiliar with it.Webb 2010
  • 46. Complete the Activity: Locate the Cyberbullying Activity on WesternOnline. Read it carefully and complete it by the posted due date. Worth 40 pts. Don’t forget to review the rubric before starting! The following slides will help you create your submission. Read the instructions and use this presentation to guide your progress. Webb 2010
  • 47. How to write your introduction An introduction should begin by stating the need for keeping our students safe while using technology and defining unfamiliar terms like “cyberbullying.” Next, it should mention what types of technology students may use in the classroom, for which activities they will be used, and what this document actually is. Lastly, the introduction should provide additional resources for parents/guardians or students to find more information on different computer programs, processes or devices you might be using. Webb 2010
  • 48. How to word your policy Divide your policy into two or three paragraphs depending upon the age of your students. ¶ - Expectations (i.e. …) students are expected to treat all technological equipment with care and respect. Students are expected to follow teacher instructions with regard to internet usage and website viewing with no exceptions. Students are prohibited from… ¶ - Consequences (might be identical to school’s handbook consequences) Webb 2010
  • 49. How to word your policy ¶ - Student usage expectations of outside devices: Cell phones Pagers Cameras Mp3 players Gaming devices etc… Many schools simply prohibit use of these during school hours or on school grounds. Webb 2010
  • 50. How to incorporate compliance This consists of a couple simple sentences. All the sentences need to state is that a signature at the bottom of the document represents agreement with the policies outlined in the document, and that students who do not comply will not be allowed to participate in such activities. Both student and parent(s)/guardian(s) signatures should be present. Webb 2010
  • 51. How to include contact information Finally, include your personal as well as school office contact information for families to use if they have any questions. Ms. Doe, 3rd grade, 555-1234, jdoe@school.edu Elementary office, West Best School: 555-5678 Webb 2010
  • 52. References Bully Police U.S.A. (2009). Retrieved from website: www.bullypolice.org Meyers, J. J. (2009). Censoring cyber speech on campus??? Unpublished manuscript. Presented September 29, 2009 at Western Illinois University. Meyers, J. J., & Carper, G. T. (2009). Cyberbullying: The legal challenge for educators. West’s Educational Law Reporter. Meyers, J. J., Carper, G. T., & Hemphill, L. S. (2009). Cyber Bullies Come to Campus: Are Administrators and Faculty Ready? Roskamp, T. J. (2009). Cyberbullying in Illinois public schools. Unpublished doctoral dissertation, Western Illinois University. Webb 2010
  • 53. References Backer, T. E., & Russ, A. (2007). Implementing evidence-based youth violence prevention programs: one community’s experiences. Human Interaction Research Institute, Retrieved from: http://www.humaninteract.org/images/finalrep149.pdf. Hirschstein, M. K., Van Schoiack Edstrom, L., Frey, K. S., Snell, J. L., & MacKenzie, E. P. (2007). Walking the talk in bullying prevention: teacher implementation variables related to initial impact of the Steps to Respect program. School Psychology Review, 36(1), 3-21. Hoff, D. L., & Mitchell, S. N. (2008). Cyberbullying: causes, effects, and remedies. Journal of Educational Administration, 47(5), 652-665. Juvonen, J., & Gross, E. F. (2008). Extending the school grounds? Bullying experiences in cyberspace. Journal of School Health, 78(9), 496-505. Webb 2010
  • 54. References Salmivalli, C., Kaukiainen, A., & Voeten, M. (2005). Anti-bullying intervention: implementation and outcome. British Journal of Educational Psychology, 75, 465-487. Slonje, R., & Smith, P. K. (2007). Cyberbullying: another main type of bullying? Scandinavian Journal of Psychology, 49, 147-154. Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: its nature and impact in secondary school pupils. The Journal of Child Psychology, 49(4), 376-385. Wright, V. H., Burnham, J. J., Inman, C. T., & Ogorchock, H. N. (2009). Cyberbullying: using virtual scenarios to educate and raise awareness. Journal of Computing in Teacher Education, 26(1), 35-42.  Yasuda, H. (2009). Preventing cyberbullying without prohibitions: looking at web science from an educational perspective. In: Proceedings of the WebSci ‘09: Society On-line, 18-20 March 2009, Athens, Greece. (In Press) Webb 2010