SlideShare une entreprise Scribd logo
1  sur  16
Cyber
Bullying

  United Against Violence
  Of Greater Dayton
What is Cyber
Bullying?
 Cyber Bullying is when a child is tormented,
  threatened, harassed, humiliated,
  embarrassed or otherwise targeted by
  another child using the Internet, interactive
  and digital technologies or cell phones. It
  has to have a minor on both sides, or at
  least have been instigated by a minor
  against another minor.
Cyber Bullies
    use…
 Social Networks : Facebook, My
  Space, Chat rooms
 E-mail
 Cell phones
 Instant messaging
 Bashing web sites
Bullying -Versus-
      Cyber Bullying
    Bullying                  Cyber Bullying
 Direct                     Can be anonymous
 Occurs on school           Usually occurs off school
  property                    property
 Poor relationships with    Good relationships with
  teachers                    teachers
 Fear retribution           Fear loss of privileges
  (Physical, Verbal and       (computer and cell
  Nonverbal)                  phones taken away)
                             Farther under the radar
                              than bullying
Types of Cyber
                      Bullying
 Cyber stalking: Repeatedly sending messages that
  include threats of harm or are highly intimidating
 Denigration: “Dissing” someone online. Sending or
  posting cruel gossip or rumors about a person
 Flaming: Online fights using messages with angry and
  vulgar language
 Harassment: Repeatedly sending offensive, rude, and
  insulting messages
 Impersonation: Pretending to be someone else and
  sending or posting material that makes a person look
  bad, gets them in trouble, or damages that person’s
  reputation or friendships
What
   Statistics say
 65% of kids between 8-14 have been involved directly or
  indirectly in a cyber bullying incident as the cyber bully,
  victim or friend.
 42% of kids have been bullied online. 35% have been
  threatened online.
 53% of kids admit to saying mean or hurtful things to
  someone online.
 50% has seen or heard of a website that bashes another
  student. 75% has visited a bashing website.
 90% of middle school students polled have had their
  feelings hurt online.
 58% of victims have not told their parents about the cyber
  bullying.
Why do kids cyber
        bully?
 They are often motivated by anger, revenge or frustration.
 Sometimes they do it for entertainment or because they
  are bored and have too much time on their hands.
 Many do it for laughs or to get a reaction.
 Some do it by accident, and either send a message to the
  wrong recipient or didn't think before they did something.
 The Power-hungry do it to torment others and for their ego.
 Mean girls do it to help boost or remind people of their own
  social standing.
 Some think they are righting wrong and standing up for
  others.
Preventing cyber
     bullying
-What parents can do-
  Discuss cyber bullying with your child.
  Educating the kids about the consequences (losing
   their cell phone and/or computer privileges) helps.
  Teaching them to respect others and to take a stand
   against bullying of all kinds helps too.

  Supervise and increase effective monitoring of the
   internet
  Know what your child is doing online and with their cell
   phones.
  Get to know your children's friends, are they the type of
   kids that are positive influences.
Preventing cyber
     bullying
-what kids can do -
 Block the cyber bully. You do not have to have
  them on your friends list.
 Ignore them. If you do not respond to a negative
  text, email, or comment online then the person
  may just calm down. It might take a while but be
  patient.
 Tell an adult if messages are continuous,
  threatening, or it’s affecting your daily routine.
 Talk, talk, talk to your parents or a trusted adult.
Preventing cyber
             bullying
     -what schools can do -
 Focus on values of kindness, respect,
  compassion, tolerance, and forgiveness.
 Develop problem solving skills.
 Provide staff, parent, and student
  education.
 Empower bystanders to speak up.
 Have written policies that address all types
  of bullying.
Help for victims of
      bullying
 Family supports, communication is the
  key to being supportive, listening to them
  and being there to talk.
 In-School counseling.
 Outside referral counseling.
 Anger management groups.
 Conflict resolution education.
What are the                         laws?
   House Bill                         276
 Sec. 3313.666. (A) As used in this section,
  "harassment, intimidation, or bullying" means any
  intentional written, verbal, or physical act that a
  student has exhibited toward another particular
  student more than once and the behavior both:
 (1) Causes mental or physical harm to the other
  student;
 (2) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or
  abusive educational environment for the other
  student.
What are the laws?
   Senate Bill 126(Pending)
      Introduced to senate in March 2011

 Sec. 3313.666. (A) As used in this section,
  "harassment:
 (1) "Electronic act" means an act committed through
  the use of a cellular telephone, computer, pager,
  personal communication device, or other electronic
  communication device.
 (2) "Harassment, intimidation, or bullying" means any
  intentional written, verbal, electronic, or physical act
  that a student has exhibited toward another particular
  student more than once and the behavior both:
 (1)(a) Causes mental or physical harm to the other
  student;
 (2)(b) Is sufficiently severe, persistent, or pervasive
  that it creates an intimidating, threatening, or abusive
  educational environment for the other student.
www.stopviolence.
      org
Works Sited-

               www.stopcyberbullying.org
              www.stopbullyingnow.hrsa.gov
                     www.isafe.org
                  www.facs.pppst.com
               www.legislature.state.oh.us

       Demysifying and Deescalating Cyber Bullying
                  Barbara Trolly, Ph.D. CRC
      Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d
                   McKenna & Bargh, 2004
                   Ybarra & Mitchell, 2004
                  Nancy Willard, M.S., J.D.,
Director of the Center for Safe and Responsible Internet Use
Images sited
     Microsoft Clip Art
  Captaincollo.blogspot.com
          My.hsj.org
   Nikkihut.blogspot.com
    bullyingpictures.com
    Mainstreethardy.com
        Clipartof.com
  Healthylifestyles-news.org

Contenu connexe

Tendances

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
dreamingmoi
 

Tendances (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Effect of Bullying
Effect of BullyingEffect of Bullying
Effect of Bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Social Media and Happiness
Social Media and HappinessSocial Media and Happiness
Social Media and Happiness
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Bullying
BullyingBullying
Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 

En vedette

Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
brlewis1971
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
zackkay
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
amate1cl
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
DefinetheLine
 

En vedette (20)

Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
cyber bullying parent workshop 2012
cyber bullying parent workshop 2012cyber bullying parent workshop 2012
cyber bullying parent workshop 2012
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 

Similaire à Cyber Bullying

Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
Sarah Doty
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
Doctora2017
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
John Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
John Field
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
drumcut
 

Similaire à Cyber Bullying (20)

Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Sarah doty cyber bullying
Sarah doty cyber bullyingSarah doty cyber bullying
Sarah doty cyber bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Plus de Joe Gauder

United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 Update
Joe Gauder
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-update
Joe Gauder
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 update
Joe Gauder
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 update
Joe Gauder
 

Plus de Joe Gauder (11)

UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017UAVGD - Violent Crime Update Q4 2017
UAVGD - Violent Crime Update Q4 2017
 
SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016SBH Stop Violence Crime Stats Q3 2016
SBH Stop Violence Crime Stats Q3 2016
 
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancyUav gun crime 2016 q1-2 update_mcsoupdatefromnancy
Uav gun crime 2016 q1-2 update_mcsoupdatefromnancy
 
UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015UAVGD Crime Stats - 4th Quarter 2015
UAVGD Crime Stats - 4th Quarter 2015
 
United Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 UpdateUnited Against Violence - Gun Crime 2014 Q4 Update
United Against Violence - Gun Crime 2014 Q4 Update
 
SBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 StatsSBH UAV Gun Crime 2014 Q3 Stats
SBH UAV Gun Crime 2014 Q3 Stats
 
United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2United Against Violence - Gun Crime - 2014 - Q2
United Against Violence - Gun Crime - 2014 - Q2
 
Uav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-updateUav gun-crime-2013-eoy-update
Uav gun-crime-2013-eoy-update
 
Uav gun crime 2013_q3 update
Uav gun crime 2013_q3 updateUav gun crime 2013_q3 update
Uav gun crime 2013_q3 update
 
Uav gun crime 2013_q2 update
Uav gun crime 2013_q2 updateUav gun crime 2013_q2 update
Uav gun crime 2013_q2 update
 
Dayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime StatisticsDayton Gun and Violent Crime Statistics
Dayton Gun and Violent Crime Statistics
 

Dernier

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Cyber Bullying

  • 1. Cyber Bullying United Against Violence Of Greater Dayton
  • 2. What is Cyber Bullying?  Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or cell phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.
  • 3. Cyber Bullies use…  Social Networks : Facebook, My Space, Chat rooms  E-mail  Cell phones  Instant messaging  Bashing web sites
  • 4. Bullying -Versus- Cyber Bullying Bullying Cyber Bullying  Direct  Can be anonymous  Occurs on school  Usually occurs off school property property  Poor relationships with  Good relationships with teachers teachers  Fear retribution  Fear loss of privileges (Physical, Verbal and (computer and cell Nonverbal) phones taken away)  Farther under the radar than bullying
  • 5. Types of Cyber Bullying  Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating  Denigration: “Dissing” someone online. Sending or posting cruel gossip or rumors about a person  Flaming: Online fights using messages with angry and vulgar language  Harassment: Repeatedly sending offensive, rude, and insulting messages  Impersonation: Pretending to be someone else and sending or posting material that makes a person look bad, gets them in trouble, or damages that person’s reputation or friendships
  • 6. What Statistics say  65% of kids between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend.  42% of kids have been bullied online. 35% have been threatened online.  53% of kids admit to saying mean or hurtful things to someone online.  50% has seen or heard of a website that bashes another student. 75% has visited a bashing website.  90% of middle school students polled have had their feelings hurt online.  58% of victims have not told their parents about the cyber bullying.
  • 7. Why do kids cyber bully?  They are often motivated by anger, revenge or frustration.  Sometimes they do it for entertainment or because they are bored and have too much time on their hands.  Many do it for laughs or to get a reaction.  Some do it by accident, and either send a message to the wrong recipient or didn't think before they did something.  The Power-hungry do it to torment others and for their ego.  Mean girls do it to help boost or remind people of their own social standing.  Some think they are righting wrong and standing up for others.
  • 8. Preventing cyber bullying -What parents can do-  Discuss cyber bullying with your child.  Educating the kids about the consequences (losing their cell phone and/or computer privileges) helps.  Teaching them to respect others and to take a stand against bullying of all kinds helps too.  Supervise and increase effective monitoring of the internet  Know what your child is doing online and with their cell phones.  Get to know your children's friends, are they the type of kids that are positive influences.
  • 9. Preventing cyber bullying -what kids can do -  Block the cyber bully. You do not have to have them on your friends list.  Ignore them. If you do not respond to a negative text, email, or comment online then the person may just calm down. It might take a while but be patient.  Tell an adult if messages are continuous, threatening, or it’s affecting your daily routine.  Talk, talk, talk to your parents or a trusted adult.
  • 10. Preventing cyber bullying -what schools can do -  Focus on values of kindness, respect, compassion, tolerance, and forgiveness.  Develop problem solving skills.  Provide staff, parent, and student education.  Empower bystanders to speak up.  Have written policies that address all types of bullying.
  • 11. Help for victims of bullying  Family supports, communication is the key to being supportive, listening to them and being there to talk.  In-School counseling.  Outside referral counseling.  Anger management groups.  Conflict resolution education.
  • 12. What are the laws? House Bill 276  Sec. 3313.666. (A) As used in this section, "harassment, intimidation, or bullying" means any intentional written, verbal, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1) Causes mental or physical harm to the other student;  (2) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 13. What are the laws? Senate Bill 126(Pending) Introduced to senate in March 2011  Sec. 3313.666. (A) As used in this section, "harassment:  (1) "Electronic act" means an act committed through the use of a cellular telephone, computer, pager, personal communication device, or other electronic communication device.  (2) "Harassment, intimidation, or bullying" means any intentional written, verbal, electronic, or physical act that a student has exhibited toward another particular student more than once and the behavior both:  (1)(a) Causes mental or physical harm to the other student;  (2)(b) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or abusive educational environment for the other student.
  • 15. Works Sited- www.stopcyberbullying.org www.stopbullyingnow.hrsa.gov www.isafe.org www.facs.pppst.com www.legislature.state.oh.us Demysifying and Deescalating Cyber Bullying Barbara Trolly, Ph.D. CRC Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d McKenna & Bargh, 2004 Ybarra & Mitchell, 2004 Nancy Willard, M.S., J.D., Director of the Center for Safe and Responsible Internet Use
  • 16. Images sited Microsoft Clip Art Captaincollo.blogspot.com My.hsj.org Nikkihut.blogspot.com bullyingpictures.com Mainstreethardy.com Clipartof.com Healthylifestyles-news.org