SlideShare une entreprise Scribd logo
1  sur  19
Haters & Trolls:
Creating Safe Spaces Online
       Rebecca Lansbury
Most populated site by 12 - 26 year olds are
Social Networking and Vlogging/Blogging sites.

           Young Teens   Youth   Generation Y
Social
Networking

Blogging

Vlogging

Social
Networking
2010 Cyberbullying Research Center
             Survey

20.8% of the kids have been cyberbullied in their lifetime

17% have been cyberbullied at least once in the previous 30 days

13.3% have been cyberbullied by rumors online

14.3% have been cyberbullied by mean or hurtful comments online.

7.2% have been threatened online




                      http://www.cyberbullying.us/research.php
Adolescent girls are significantly more likely to have experienced cyberbullying in their lifetimes.




                                              http://www.cyberbullying.us/2010_charts/cyberbullying_gender_2010.jpg
• One in ten parents online
  (12%) around the world say
  their child has experienced
  cyberbullying.

• One in four (24%) of those
  parents say they know a
  child in their community
  who has experienced
  cyberbulllying.

• Of those, 60% say the
  children experienced the
  harassing behavior on social
  networking sites like
  Facebook.




                                 http://www.ipsos-na.com/news-polls/pressrelease.aspx?id=5462#.Tw6exyC2__s.twitter
Natalie Farzenah
          15-years-old


The cyber bullying on Facebook Natalie
endured led her to contemplate suicide.




 "I thought maybe if I started this
 account, people would get to know me
 and they could finally stop giving me    "I got at least 10 messages, from the
 abuse,"                                  same person I think, saying: 'Kill
                                          yourself, everybody hates you, you're
                                          horrible'.




                                           http://www.bbc.co.uk/news/uk-england-16880173
Jessi Slaughter
      11-year-old


Jessi was placed under police
protection after receiving
threatening phone calls.




                                              http://gawker.com/5589103/how-the-internet-beat-up-an-11+year+old-girl
                 http://gawker.com/5590166/11+year+old-viral-video-star-placed-under-police-protection-after-death-threats
Issa Rae




      http://www.issarae.com/awkward                                     10
      http://www.xojane.com/issues/people-internet-can-be-hella-racist
Hashtags:                                     Anti-bullying
#cyberbullying
                                              Twitters:
#cyberbullyingfacts
                                              @Cyber_Bullying
#bullying
                                              @cyberbullying
#harassment
                                              @CyberBullyAlert
#antibullying
                                              @No_Cyberbullies
#safety
#mentalhealth
#nomorebullies


               http://hashonomy.com/hashtag/cyberbullying/         11
               http://socialmediatoday.com/index.php?q=SMC/78505
Anti-bullying Tumblr blogs:
http://reversecyberbullying.tumblr.com/

http://compassionalert.tumblr.com/

http://lets-bandage-it-up.tumblr.com/
13
Tips on how to prevent cyber bullying

• Don’t respond

• Block the user

• Save the evidence

• Report it
Question & Answer
• Have you or your friends been affected by
  Cyberbullying?
• How have you combat bullying in your online
  space?




                                        18
Thank you!




             19

Contenu connexe

Tendances

Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
What's So Scary About Social Software?
What's So Scary About Social Software?What's So Scary About Social Software?
What's So Scary About Social Software?Beth Gallaway
 
Media power point 3
Media power point 3Media power point 3
Media power point 3kelsietune
 
FACEBOOK: General Information for Parents
FACEBOOK: General Information for ParentsFACEBOOK: General Information for Parents
FACEBOOK: General Information for Parentsauthors boards
 
Week 5 Presentation
Week 5 PresentationWeek 5 Presentation
Week 5 Presentationmnowacki
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Sgp Powerpoint School Violence
Sgp Powerpoint School ViolenceSgp Powerpoint School Violence
Sgp Powerpoint School Violencemontrez2010
 
Are We the Terminal Generation? (Part 2)
Are We the Terminal Generation? (Part 2)Are We the Terminal Generation? (Part 2)
Are We the Terminal Generation? (Part 2)Beth Frisby
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowVA Simple Services
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
You Don't Build Homes
You Don't Build HomesYou Don't Build Homes
You Don't Build HomesTara Hunt
 
Modified presentation
Modified presentationModified presentation
Modified presentationani5212
 
Team1 the good, the bad, and the ugly 00
Team1 the good, the bad, and the ugly 00Team1 the good, the bad, and the ugly 00
Team1 the good, the bad, and the ugly 00cassy253
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 

Tendances (19)

Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
Privacy Law
Privacy LawPrivacy Law
Privacy Law
 
What's So Scary About Social Software?
What's So Scary About Social Software?What's So Scary About Social Software?
What's So Scary About Social Software?
 
102009
102009102009
102009
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
FACEBOOK: General Information for Parents
FACEBOOK: General Information for ParentsFACEBOOK: General Information for Parents
FACEBOOK: General Information for Parents
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week 5 Presentation
Week 5 PresentationWeek 5 Presentation
Week 5 Presentation
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
ALI ABA 2011 "The 'Social' Lawyer"
ALI ABA 2011 "The 'Social' Lawyer"ALI ABA 2011 "The 'Social' Lawyer"
ALI ABA 2011 "The 'Social' Lawyer"
 
Sgp powerpoint
Sgp powerpointSgp powerpoint
Sgp powerpoint
 
Sgp Powerpoint School Violence
Sgp Powerpoint School ViolenceSgp Powerpoint School Violence
Sgp Powerpoint School Violence
 
Are We the Terminal Generation? (Part 2)
Are We the Terminal Generation? (Part 2)Are We the Terminal Generation? (Part 2)
Are We the Terminal Generation? (Part 2)
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should Know
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
You Don't Build Homes
You Don't Build HomesYou Don't Build Homes
You Don't Build Homes
 
Modified presentation
Modified presentationModified presentation
Modified presentation
 
Team1 the good, the bad, and the ugly 00
Team1 the good, the bad, and the ugly 00Team1 the good, the bad, and the ugly 00
Team1 the good, the bad, and the ugly 00
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 

Similaire à Haters & Trolls: Creating Safe Spaces Online

Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
The Dark Sides of Social Networking
The Dark Sides of Social Networking The Dark Sides of Social Networking
The Dark Sides of Social Networking carolinekoskie
 
Stopping cyber bullying
Stopping cyber bullyingStopping cyber bullying
Stopping cyber bullyingBeSchofield12
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 

Similaire à Haters & Trolls: Creating Safe Spaces Online (20)

Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Presentation1
Presentation1Presentation1
Presentation1
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Bullying_Hits_The_Web
Bullying_Hits_The_WebBullying_Hits_The_Web
Bullying_Hits_The_Web
 
The Dark Sides of Social Networking
The Dark Sides of Social Networking The Dark Sides of Social Networking
The Dark Sides of Social Networking
 
Stopping cyber bullying
Stopping cyber bullyingStopping cyber bullying
Stopping cyber bullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Haters & Trolls: Creating Safe Spaces Online

  • 1. Haters & Trolls: Creating Safe Spaces Online Rebecca Lansbury
  • 2.
  • 3. Most populated site by 12 - 26 year olds are Social Networking and Vlogging/Blogging sites. Young Teens Youth Generation Y
  • 5. 2010 Cyberbullying Research Center Survey 20.8% of the kids have been cyberbullied in their lifetime 17% have been cyberbullied at least once in the previous 30 days 13.3% have been cyberbullied by rumors online 14.3% have been cyberbullied by mean or hurtful comments online. 7.2% have been threatened online http://www.cyberbullying.us/research.php
  • 6. Adolescent girls are significantly more likely to have experienced cyberbullying in their lifetimes. http://www.cyberbullying.us/2010_charts/cyberbullying_gender_2010.jpg
  • 7. • One in ten parents online (12%) around the world say their child has experienced cyberbullying. • One in four (24%) of those parents say they know a child in their community who has experienced cyberbulllying. • Of those, 60% say the children experienced the harassing behavior on social networking sites like Facebook. http://www.ipsos-na.com/news-polls/pressrelease.aspx?id=5462#.Tw6exyC2__s.twitter
  • 8. Natalie Farzenah 15-years-old The cyber bullying on Facebook Natalie endured led her to contemplate suicide. "I thought maybe if I started this account, people would get to know me and they could finally stop giving me "I got at least 10 messages, from the abuse," same person I think, saying: 'Kill yourself, everybody hates you, you're horrible'. http://www.bbc.co.uk/news/uk-england-16880173
  • 9. Jessi Slaughter 11-year-old Jessi was placed under police protection after receiving threatening phone calls. http://gawker.com/5589103/how-the-internet-beat-up-an-11+year+old-girl http://gawker.com/5590166/11+year+old-viral-video-star-placed-under-police-protection-after-death-threats
  • 10. Issa Rae http://www.issarae.com/awkward 10 http://www.xojane.com/issues/people-internet-can-be-hella-racist
  • 11. Hashtags: Anti-bullying #cyberbullying Twitters: #cyberbullyingfacts @Cyber_Bullying #bullying @cyberbullying #harassment @CyberBullyAlert #antibullying @No_Cyberbullies #safety #mentalhealth #nomorebullies http://hashonomy.com/hashtag/cyberbullying/ 11 http://socialmediatoday.com/index.php?q=SMC/78505
  • 13. 13
  • 14.
  • 15.
  • 16.
  • 17. Tips on how to prevent cyber bullying • Don’t respond • Block the user • Save the evidence • Report it
  • 18. Question & Answer • Have you or your friends been affected by Cyberbullying? • How have you combat bullying in your online space? 18

Notes de l'éditeur

  1. Hello! My name is Rebecca Lansbury. I am a queer HS senior interning at the Women ’s Media Center in New York City. I’m an active tumblr and I use social networks for the majority of my social connections. It’s a great way to get your voice hear, no matter what your politics. But youth who vocalize their opinions are often the first to be bullied, especially online. Girls outnumber boys of those bullied and in the wake of teen suicides and cyberhate, we created this webinar to both raise awareness of the issue and find solutions.
  2. Different generations use the web for different activities. As you an see from this Forrester research study, 26% of Older Boomers, ages 51-61, are spectators online, meaning that they are reading blogs, watch peer generated videos and/or listen to pod casts.
  3. When it comes to young teens, youth, and young adults, our activities online all involve social networking or blogging in some way. Ages 12-26 either create and express themselves by putting their voices and opinions out there, read other ’s opinions, or comment on existing content.
  4. Today we are going to focus on four of the most populated sites among 12-26 year olds: YouTube, Tumblr, Facebook, and Twitter. Notably, they are also the most popular sites for cyberbullying activities.
  5. In February 2010, the Cyberbullying Research Center surveyed a random sample of 4,441 children and teenagers from ages 10-18. The samples were taken from 37 different schools in the southern U.S. As you can see, 1/5 th of the kids interviewed for the survey have been cyberbullied. What is even more shocking is that 17% of all the kids interviewed had been bullied in the previous month. Only 3% had not.
  6. In 2010 the Cyberbullying Research Center conducted a survey in which the sample size was 4374 youth ages 10-18. Overwhelmingly, the adolescent girls reported being cyberbullied. An unrelated 2011 study found that girls who bullied others by age 8 have an increased risk of becoming teenage mothers.
  7. Getting down to specific social networks, the research firm Ipsos surveyed a total of 18,687 citizens in 24 countries via an online survey about their experiences on Facebook. One in ten parents online (12%) around the world say their child has experienced cyberbullying. One in four (24%) of those parents say they know a child in their community who has experienced cyberbulllying. Of those, 60% say the children experienced the harassing behavior on social networking sites like Facebook.
  8. To give you an idea of how pervasive the problem is among young women, we ’ll tell the story of Natalie Far-zen-ha. in February of 2012, Natalie became a victim of cyberbullying just minutes after creating a profile on Facebook and began to contemplate suicide due to the abuse.
  9. The bullying continues and, for girls, usually involves personal and appearance-based hate comments. Jessi Slaughter, 11 yrs/o became a victim after posting a video in response to internet hate she had been getting previously. Because of the video, Jessi became an even bigger target for horrendous cyberbullying that then transformed into real life harrassment. Commenter ’s circulated Jessi's real name, phone number, address, links to all her social networking accounts, prank called her, spammed her Facebook and MySpace accounts, had pizzas delivered to her house, were considering sending call girls off Craigslist to the address. Jessi was placed under police protection.
  10. In 2012 Issa Rae won the Shorty Awards (which honor the best in social media and Internet content) for her popular web series, “Awkward Black Girl.” When she announced the accomplishment via Facebook and Twitter, the response she got from, as she describes, “Internet-equivalent of the Tea Party”, appeared and began brutally attacking her and her web series with racist and misogynistic comments. Issa resonded by retweeting and calling out her attackers.
  11. At the moment, Twitter is 53% Female. Many anti-cyberbullying twitters and hashtags have been created in an attempt to combat it.
  12. And the newest social network in our bunch isn ’t any kinder. When Tumblr was first founded in 2007, it was intended to be a space for those to easily blog and share content. Tagged a micro-blogging site, Tumblr bridged the gap between Facebook and Twitter and was adopted by many teenage girls for it’s ease of use and female community. To this day, Tumblr’s users are 54% female. As the population of tumblr grew, however, so did the amount of free floaters, who did not have a blog and who saw an easy target in the largely feminist and queer-safe space. 54% female  updated on May 25 by QuantCast.com
  13. If you do a tumblr search, you ’ll find a large community of young women with strong opinions who make issue or theme-related Tumblr blogs. Following the bullying trend, women with strong opinions are often called out, trolled, harassed and receive the most hate comments. As a result of all the hate on tumblr, blogs have been established as an online-resource for those contemplating suicide.
  14. Compassion Alert is one of those blogs. If a reader reports that a tumblr user is having a bad night, CA will ask their followers to cheer up the person.
  15. If it is reported that a user is really upset and having semi-suicidal thought, CA alert will call this an ”Orange Alert”, meaning that there is the possibility of a suicidal risk.
  16. If the alert is either a “Red Alert” or an “Urgent Red Alert, that means that the suicide risk is high or definite.
  17. Finally, if you ’ re being bullied, here are some tips to consider: If someone bullies you, remember that your reaction is usually exactly what the bully wants. It gives him or her power over you. Don ’t retaliate . Getting back at the bully turns you into one and reinforces the bully’s behavior. Help avoid a whole cycle of aggression. Most sites give you the power when it comes to blocking. If someone is messaging you, there is usually an option to block their communications to you. Other sites, like Tumblr, that give you an anonymous option, which blocked users can access to continue their harassment, can be turned off. You can save the evidence by taking a screen shot. On a mac, you press either comman+shift+4 to be able to control what exactly you ’re taking a picture of, or command+shift+3 to take a picture of your entire screen. On a PC, you can press the Print Screen button, located in the upper right hand corner of your keyboard, to take a picture of your entire screen and then, if you want to, you can paste it in Paint to crop it. Along with the option of blocking, sites also usually have a place where you can report a user or a photo/post that might have been posted. What techniques have you used to combat bullying? At this time we are going to open the chat to any questions you all may have.