SlideShare une entreprise Scribd logo
1  sur  30
Cyberbullying




Ally Blevins
LIS 5260
2 April 2012

               photo © 2007 Nathan Borror, Flickr                   (via:Wylio)
               Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
AASL Standards




photo © 2010 Michael 1952, Flickr                                  (via:Wylio)
 Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
instant messaging
                                                   texting
                       Video games


      phone calls
                                     video clips


                    email


        photos
                                       social networking




  HARASS
HUMILIATE




  photo © 2011 ThoseCameraCurls , Flickr                                        (via:Wylio)
  Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Bullying 2.0




photo © 2009 Rosaura Ochoa, Flickr                              (via:Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Anonymity




            photo © 2011 Sybil Liberty , Flickr                          (via:Wylio)
            Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
No Escape




photo © 2008 NCinDC , Flickr                         (via: Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Gender




  photo © 2011 Traci Gardner , Flickr                                (via: Wylio)
  Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Indirect
photo © 2009 David Precious , Flickr            (via:Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
THREATEN




     photo © 2008 lets_dothat , Flickr             (via: Wylio)
     Attribution-ShareAlike License,
     http://creativecommons.org/licenses/by/2.0/
Victim




photo © 2012 Greg Khng , Flickr                      (via:Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Bully




photo © 2009 Robert S. Donovan , Flickr                                       (via: Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Legislation




photo © 2007 David Shane , Flickr                                             (via:Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
PREVENTION
         photo © 2008 Eddie~S, Flickr                         (via: Wylio)
         Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Students




     photo © 2007 Susan Hersh , Flickr                                             (via:Wylio)
     Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Parents




   photo © 2009 Timothy Tsui , Flickr        (via:Wylio)
   Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Schools




photo © 2008 Chicago 2016 , Flickr                                            (via:Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Yourself




photo © 2010 marco antonio torres , Flickr (via: Wylio)
Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
www.facebook.com




www.Twitter.com
http://www.stopcyberbullying.org/index2.html
http://www.ncpc.org/cyberbullying
http://kidshealth.org/parent/positive/talk/cyberbullying.html
http://www.cyberbullying.org/
http://www.stopbullying.gov/index.html
http://cyberbullying.wikispaces.com/
http://couros.wikispaces.com/cyberbullying
photo © 2010 Michael Gil , Flickr                                  (via:Wylio)
 Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
Works Cited
Cassel, David. “Schoolboards: net dangers over-rated; bring social networks to school.”
Tech.Blorge, 7 Aug. 2007. Web. 29 Mar. 2012.
http://tech.blorge.com/Structure:+/2007/08/07/schoolboards-net-dangers-over-rated-bring-social-n
.
Chang, Charlotte. "Internet Safety Survey: Who Will Protect The Children?." Berkeley Technology Law
Journal 25.1 (2010): 501. Associates Programs Source. Web. 29 Mar. 2012.
"Cyberbullying Crackdown." Current Events. 17 Oct. 2011: 4-5. ProQuest Central. Web. 29 Mar. 2012.
Demaray, Michelle K., and Christina F. Brown. "Prevent Cyberbullying: Suggestions For Parents.
(Cover     Story)." Communique (0164775X) 38.4 (2009): 1-18. Education Research Complete. Web.
29 Mar. 2012.
Feinberg, Ted, and Nicole Robey. "Cyberbullying." Principal Leadership 9.1 (2008): 10-4. ProQuest
Central. Web. 29 Mar. 2012.
Haber, Joel D., and Scott B. Haber. "Cyberbullying." The Camping Magazine 2007: 52-7. ProQuest
Central. Web. 29 Mar. 2012.
Holladay, Jennifer. "Cyberbullying." The Education Digest 76.5 (2011): 4-9. ProQuest Central. Web. 29
Mar. 2012.
KLSSupport. “A Cyberbullying Suicide Story—Ryan Halligan age 13. YouTube. 2 July 2009. Web. 29
Mar. 2012. http://www.youtube.com/watch?v=E1LG9NymhTE&feature=related.
Works Cited
Norton, Justin M. "States Consider Laws to Curb Cyberbullies ; Anonymous Online
   Bullies often Cause More Damage than the Regular Schoolyard Type." Wisconsin
   State Journal: A.1. ProQuest Central. Feb 22 2007. Web. 29 Mar. 2012.
NovusSecurity. “Cyberbullying Prevention Tips (Novus Securtiy). YouTube 13 Apr. 2011.
   Web. 29 Mar. 2012. http://www.youtube.com/watch?v=B-wLFdd_jr4.
Regine, Sarah C., and Northside. "Unfriending Mean Teens." Chicago Tribune: 13.
   ProQuest Central. Mar 17 2011. Web. 29 Mar. 2012.
Smith, Peter K., et al. “Cyberbullying: its nature and impact in secondary school pupils.”
   Journal of Child Psychology and Psychiatry 49.4 (2008): 376-385. Wiley Online
   Library. Web. 29 Mar. 2012.
Stopbullying.gov. U.S. Department of Health & Human Services. Web. 29 Mar. 2012.
   http://www.stopbullying.gov/index.html.
Taylor, Kelley R., Esq. "Cyberbullying: Is there Anything Schools can do?" Principal
   Leadership 8.9 (2008): 60-2. ProQuest Central. Web. 29 Mar. 2012.
Timm, Carl, and Richard Perez. Seven Deadliest Social Network Attacks. Burlington:
   Elsevier Inc, 2010. Print

Contenu connexe

Tendances

RWJ LIFP Workshops
RWJ LIFP WorkshopsRWJ LIFP Workshops
RWJ LIFP WorkshopsBeth Kanter
 
Using Creative Commons for Greater Access and Scale for Your Teaching, Rese...
Using Creative Commons  for Greater Access and Scale  for Your Teaching, Rese...Using Creative Commons  for Greater Access and Scale  for Your Teaching, Rese...
Using Creative Commons for Greater Access and Scale for Your Teaching, Rese...Kathleen Ludewig Omollo
 
Photobucket
PhotobucketPhotobucket
Photobucketlwisnie3
 
Photobucket Powerpoint
Photobucket PowerpointPhotobucket Powerpoint
Photobucket PowerpointJordyn Siegel
 
Wat is web 2.0
Wat is web 2.0Wat is web 2.0
Wat is web 2.0jules48860
 
Working with Web 2.0 (TERENA-PR)
Working with Web 2.0 (TERENA-PR)Working with Web 2.0 (TERENA-PR)
Working with Web 2.0 (TERENA-PR)guest7981aa
 
Photobucket Powerpoint
Photobucket PowerpointPhotobucket Powerpoint
Photobucket Powerpointtanderes
 
Photobucket Powerpoint
Photobucket PowerpointPhotobucket Powerpoint
Photobucket PowerpointJordyn Siegel
 
USGS Web 2.0 Talk, June 2008
USGS Web 2.0 Talk, June 2008USGS Web 2.0 Talk, June 2008
USGS Web 2.0 Talk, June 2008Jim Angus
 
Research Knowledge Mobilization 2.0 Tools: Cultivating Digital Social Presence
Research Knowledge Mobilization 2.0 Tools: Cultivating Digital Social PresenceResearch Knowledge Mobilization 2.0 Tools: Cultivating Digital Social Presence
Research Knowledge Mobilization 2.0 Tools: Cultivating Digital Social PresenceUBC_NCIE
 
Web community strategy for magazines
Web community strategy for magazinesWeb community strategy for magazines
Web community strategy for magazinesPaul Bradshaw
 
Is the emperor wearing clothes? A debate on hype vs reality in elearning & ...
Is the emperor wearing clothes?   A debate on hype vs reality in elearning & ...Is the emperor wearing clothes?   A debate on hype vs reality in elearning & ...
Is the emperor wearing clothes? A debate on hype vs reality in elearning & ...Natalie Lafferty
 

Tendances (20)

RWJ LIFP Workshops
RWJ LIFP WorkshopsRWJ LIFP Workshops
RWJ LIFP Workshops
 
Using Creative Commons for Greater Access and Scale for Your Teaching, Rese...
Using Creative Commons  for Greater Access and Scale  for Your Teaching, Rese...Using Creative Commons  for Greater Access and Scale  for Your Teaching, Rese...
Using Creative Commons for Greater Access and Scale for Your Teaching, Rese...
 
Education 2.0
Education 2.0Education 2.0
Education 2.0
 
Photobucket
PhotobucketPhotobucket
Photobucket
 
Photobucket Powerpoint
Photobucket PowerpointPhotobucket Powerpoint
Photobucket Powerpoint
 
Wat is web 2.0
Wat is web 2.0Wat is web 2.0
Wat is web 2.0
 
Working with Web 2.0 (TERENA-PR)
Working with Web 2.0 (TERENA-PR)Working with Web 2.0 (TERENA-PR)
Working with Web 2.0 (TERENA-PR)
 
Photobucket Powerpoint
Photobucket PowerpointPhotobucket Powerpoint
Photobucket Powerpoint
 
Photobucket Powerpoint
Photobucket PowerpointPhotobucket Powerpoint
Photobucket Powerpoint
 
RLabs File Sharing Presentation
RLabs File Sharing PresentationRLabs File Sharing Presentation
RLabs File Sharing Presentation
 
USGS Web 2.0 Talk, June 2008
USGS Web 2.0 Talk, June 2008USGS Web 2.0 Talk, June 2008
USGS Web 2.0 Talk, June 2008
 
Research Knowledge Mobilization 2.0 Tools: Cultivating Digital Social Presence
Research Knowledge Mobilization 2.0 Tools: Cultivating Digital Social PresenceResearch Knowledge Mobilization 2.0 Tools: Cultivating Digital Social Presence
Research Knowledge Mobilization 2.0 Tools: Cultivating Digital Social Presence
 
Web community strategy for magazines
Web community strategy for magazinesWeb community strategy for magazines
Web community strategy for magazines
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Is the emperor wearing clothes? A debate on hype vs reality in elearning & ...
Is the emperor wearing clothes?   A debate on hype vs reality in elearning & ...Is the emperor wearing clothes?   A debate on hype vs reality in elearning & ...
Is the emperor wearing clothes? A debate on hype vs reality in elearning & ...
 
Mediafy your-course
Mediafy your-courseMediafy your-course
Mediafy your-course
 
ASWC2009 WS Talk
ASWC2009 WS TalkASWC2009 WS Talk
ASWC2009 WS Talk
 
Webs 2.0
Webs 2.0Webs 2.0
Webs 2.0
 
Inforation Cycle: The key for the Information Society
Inforation Cycle: The key for the Information Society Inforation Cycle: The key for the Information Society
Inforation Cycle: The key for the Information Society
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 

En vedette

Franklin Teen Angels Cyberbullying
Franklin Teen Angels CyberbullyingFranklin Teen Angels Cyberbullying
Franklin Teen Angels CyberbullyingFranklin Matters
 
Cyberbullying and the Selfie
Cyberbullying and the Selfie Cyberbullying and the Selfie
Cyberbullying and the Selfie tarynbrickner
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullyingdigitalskills
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
ENG 131: Technical Writing Introduction PowerPoint
ENG 131: Technical Writing Introduction PowerPointENG 131: Technical Writing Introduction PowerPoint
ENG 131: Technical Writing Introduction PowerPointElizabeth Lohman
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Recommendation Report
Recommendation ReportRecommendation Report
Recommendation ReportProf S
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal WritingTony
 
Report Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sectionsReport Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sectionsSherrie Lee
 

En vedette (19)

Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Franklin Teen Angels Cyberbullying
Franklin Teen Angels CyberbullyingFranklin Teen Angels Cyberbullying
Franklin Teen Angels Cyberbullying
 
Cyberbullying and the Selfie
Cyberbullying and the Selfie Cyberbullying and the Selfie
Cyberbullying and the Selfie
 
DigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: CyberbullyingDigitalSkills Presentation: Cyberbullying
DigitalSkills Presentation: Cyberbullying
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CyberBullying
CyberBullyingCyberBullying
CyberBullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
ENG 131: Technical Writing Introduction PowerPoint
ENG 131: Technical Writing Introduction PowerPointENG 131: Technical Writing Introduction PowerPoint
ENG 131: Technical Writing Introduction PowerPoint
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Recommendation Report
Recommendation ReportRecommendation Report
Recommendation Report
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal Writing
 
Report Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sectionsReport Writing - Conclusions & Recommendations sections
Report Writing - Conclusions & Recommendations sections
 

Similaire à Cyberbullying presentation

"Communicating Better with Your Members Using Social Media" US Youth Soccer P...
"Communicating Better with Your Members Using Social Media" US Youth Soccer P..."Communicating Better with Your Members Using Social Media" US Youth Soccer P...
"Communicating Better with Your Members Using Social Media" US Youth Soccer P...Todd Van Hoosear
 
New Media Eagle Ridge
New Media Eagle RidgeNew Media Eagle Ridge
New Media Eagle RidgeLaDonna Coy
 
Transparency International Workshop
Transparency International WorkshopTransparency International Workshop
Transparency International WorkshopMer Joyce
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
Social Media and Fundraising
Social Media and FundraisingSocial Media and Fundraising
Social Media and FundraisingIvan Nunez
 
Know your rights
Know your rightsKnow your rights
Know your rightsLYRASIS
 
Copyright for Teachers
Copyright for TeachersCopyright for Teachers
Copyright for TeachersCatherine Rigg
 
Apple's Apps for the Win
Apple's Apps for the WinApple's Apps for the Win
Apple's Apps for the Win8cwj
 
Apples Apps for the Win
Apples Apps for the WinApples Apps for the Win
Apples Apps for the Win8cwj
 
What Art Can Teach Brands About Building Engaged Online Communities
What Art Can Teach Brands About Building Engaged Online Communities What Art Can Teach Brands About Building Engaged Online Communities
What Art Can Teach Brands About Building Engaged Online Communities Ivan Nunez
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect StormJoanne Jacobs
 
Electronic Resource Management: Access, Integrate, Impact
Electronic Resource Management: Access, Integrate, ImpactElectronic Resource Management: Access, Integrate, Impact
Electronic Resource Management: Access, Integrate, ImpactMichael Rodriguez
 
BCUSU presentation part one
BCUSU presentation part oneBCUSU presentation part one
BCUSU presentation part oneDave Harte
 
Social Media Edge- Feb 2010
Social Media Edge- Feb 2010Social Media Edge- Feb 2010
Social Media Edge- Feb 2010hblowers
 
Warm Glow Giving
Warm Glow GivingWarm Glow Giving
Warm Glow GivingColleen Uay
 
The Power of the Selfie
The Power of the SelfieThe Power of the Selfie
The Power of the Selfieanas-hasan
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingmrmrumman
 

Similaire à Cyberbullying presentation (20)

"Communicating Better with Your Members Using Social Media" US Youth Soccer P...
"Communicating Better with Your Members Using Social Media" US Youth Soccer P..."Communicating Better with Your Members Using Social Media" US Youth Soccer P...
"Communicating Better with Your Members Using Social Media" US Youth Soccer P...
 
New Media Eagle Ridge
New Media Eagle RidgeNew Media Eagle Ridge
New Media Eagle Ridge
 
Transparency International Workshop
Transparency International WorkshopTransparency International Workshop
Transparency International Workshop
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Social Media and Fundraising
Social Media and FundraisingSocial Media and Fundraising
Social Media and Fundraising
 
Untitled1
Untitled1Untitled1
Untitled1
 
Know your rights
Know your rightsKnow your rights
Know your rights
 
OHSLA2011
OHSLA2011OHSLA2011
OHSLA2011
 
Copyright for Teachers
Copyright for TeachersCopyright for Teachers
Copyright for Teachers
 
Apple's Apps for the Win
Apple's Apps for the WinApple's Apps for the Win
Apple's Apps for the Win
 
Apples Apps for the Win
Apples Apps for the WinApples Apps for the Win
Apples Apps for the Win
 
What Art Can Teach Brands About Building Engaged Online Communities
What Art Can Teach Brands About Building Engaged Online Communities What Art Can Teach Brands About Building Engaged Online Communities
What Art Can Teach Brands About Building Engaged Online Communities
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
 
Electronic Resource Management: Access, Integrate, Impact
Electronic Resource Management: Access, Integrate, ImpactElectronic Resource Management: Access, Integrate, Impact
Electronic Resource Management: Access, Integrate, Impact
 
BCUSU presentation part one
BCUSU presentation part oneBCUSU presentation part one
BCUSU presentation part one
 
Big Blue Network Overview
Big Blue Network OverviewBig Blue Network Overview
Big Blue Network Overview
 
Social Media Edge- Feb 2010
Social Media Edge- Feb 2010Social Media Edge- Feb 2010
Social Media Edge- Feb 2010
 
Warm Glow Giving
Warm Glow GivingWarm Glow Giving
Warm Glow Giving
 
The Power of the Selfie
The Power of the SelfieThe Power of the Selfie
The Power of the Selfie
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Dernier

Technical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics TradeTechnical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics TradeOptics-Trade
 
Austria VS France Injury Woes a Look at Euro 2024 Qualifiers.docx
Austria VS France Injury Woes a Look at Euro 2024 Qualifiers.docxAustria VS France Injury Woes a Look at Euro 2024 Qualifiers.docx
Austria VS France Injury Woes a Look at Euro 2024 Qualifiers.docxWorld Wide Tickets And Hospitality
 
Instruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics Trade
Instruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics TradeInstruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics Trade
Instruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics TradeOptics-Trade
 
Austria vs France David Alaba Switches Position to Defender in Austria's Euro...
Austria vs France David Alaba Switches Position to Defender in Austria's Euro...Austria vs France David Alaba Switches Position to Defender in Austria's Euro...
Austria vs France David Alaba Switches Position to Defender in Austria's Euro...Eticketing.co
 
Technical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics TradeTechnical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics TradeOptics-Trade
 
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdfJORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdfArturo Pacheco Alvarez
 
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/78377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7dollysharma2066
 
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited MoneyReal Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited MoneyApk Toly
 
Expert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FLExpert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FLAll American Billiards
 
IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.SJU Quizzers
 
Italy Vs Albania Euro Cup 2024 Italy's Strategy for Success.docx
Italy Vs Albania Euro Cup 2024 Italy's Strategy for Success.docxItaly Vs Albania Euro Cup 2024 Italy's Strategy for Success.docx
Italy Vs Albania Euro Cup 2024 Italy's Strategy for Success.docxWorld Wide Tickets And Hospitality
 
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docxFrance's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docxEuro Cup 2024 Tickets
 
Turkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdf
Turkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdfTurkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdf
Turkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdfEticketing.co
 
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics TradeInstruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics TradeOptics-Trade
 

Dernier (16)

Technical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics TradeTechnical Data | ThermTec Wild 335 | Optics Trade
Technical Data | ThermTec Wild 335 | Optics Trade
 
Austria VS France Injury Woes a Look at Euro 2024 Qualifiers.docx
Austria VS France Injury Woes a Look at Euro 2024 Qualifiers.docxAustria VS France Injury Woes a Look at Euro 2024 Qualifiers.docx
Austria VS France Injury Woes a Look at Euro 2024 Qualifiers.docx
 
Instruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics Trade
Instruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics TradeInstruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics Trade
Instruction Manual | ThermTec Hunt Thermal Clip-On Series | Optics Trade
 
Austria vs France David Alaba Switches Position to Defender in Austria's Euro...
Austria vs France David Alaba Switches Position to Defender in Austria's Euro...Austria vs France David Alaba Switches Position to Defender in Austria's Euro...
Austria vs France David Alaba Switches Position to Defender in Austria's Euro...
 
Technical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics TradeTechnical Data | ThermTec Wild 650L | Optics Trade
Technical Data | ThermTec Wild 650L | Optics Trade
 
Denmark Vs Serbia Haaland Euro Cup CPR Drive Incident.docx
Denmark Vs Serbia Haaland Euro Cup CPR Drive Incident.docxDenmark Vs Serbia Haaland Euro Cup CPR Drive Incident.docx
Denmark Vs Serbia Haaland Euro Cup CPR Drive Incident.docx
 
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mysore Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdfJORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
JORNADA 3 LIGA MURO 2024GHGHGHGHGHGH.pdf
 
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/78377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
8377087607 ☎, Cash On Delivery Call Girls Service In Hauz Khas Delhi Enjoy 24/7
 
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited MoneyReal Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
Real Moto 2 MOD APK v1.1.721 All Bikes, Unlimited Money
 
Expert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FLExpert Pool Table Refelting in Lee & Collier County, FL
Expert Pool Table Refelting in Lee & Collier County, FL
 
IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.IPL Quiz ( weekly quiz) by SJU quizzers.
IPL Quiz ( weekly quiz) by SJU quizzers.
 
Italy Vs Albania Euro Cup 2024 Italy's Strategy for Success.docx
Italy Vs Albania Euro Cup 2024 Italy's Strategy for Success.docxItaly Vs Albania Euro Cup 2024 Italy's Strategy for Success.docx
Italy Vs Albania Euro Cup 2024 Italy's Strategy for Success.docx
 
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docxFrance's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
France's UEFA Euro 2024 Ambitions Amid Coman's Injury.docx
 
Turkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdf
Turkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdfTurkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdf
Turkiye Vs Georgia Turkey's UEFA Euro 2024 Journey with High Hopes.pdf
 
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics TradeInstruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
Instruction Manual | ThermTec Wild Thermal Monoculars | Optics Trade
 

Cyberbullying presentation

  • 1. Cyberbullying Ally Blevins LIS 5260 2 April 2012 photo © 2007 Nathan Borror, Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 2. AASL Standards photo © 2010 Michael 1952, Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 3. instant messaging texting Video games phone calls video clips email photos social networking HARASS
  • 4. HUMILIATE photo © 2011 ThoseCameraCurls , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 5. Bullying 2.0 photo © 2009 Rosaura Ochoa, Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 6. Anonymity photo © 2011 Sybil Liberty , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 7. No Escape photo © 2008 NCinDC , Flickr (via: Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 8. Gender photo © 2011 Traci Gardner , Flickr (via: Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 9. Indirect photo © 2009 David Precious , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 10. THREATEN photo © 2008 lets_dothat , Flickr (via: Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 11. Victim photo © 2012 Greg Khng , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 12. Bully photo © 2009 Robert S. Donovan , Flickr (via: Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 13. Legislation photo © 2007 David Shane , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 14. PREVENTION photo © 2008 Eddie~S, Flickr (via: Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 15. Students photo © 2007 Susan Hersh , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 16. Parents photo © 2009 Timothy Tsui , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 17. Schools photo © 2008 Chicago 2016 , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 18. Yourself photo © 2010 marco antonio torres , Flickr (via: Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 20.
  • 28. photo © 2010 Michael Gil , Flickr (via:Wylio) Attribution-ShareAlike License, http://creativecommons.org/licenses/by/2.0/
  • 29. Works Cited Cassel, David. “Schoolboards: net dangers over-rated; bring social networks to school.” Tech.Blorge, 7 Aug. 2007. Web. 29 Mar. 2012. http://tech.blorge.com/Structure:+/2007/08/07/schoolboards-net-dangers-over-rated-bring-social-n . Chang, Charlotte. "Internet Safety Survey: Who Will Protect The Children?." Berkeley Technology Law Journal 25.1 (2010): 501. Associates Programs Source. Web. 29 Mar. 2012. "Cyberbullying Crackdown." Current Events. 17 Oct. 2011: 4-5. ProQuest Central. Web. 29 Mar. 2012. Demaray, Michelle K., and Christina F. Brown. "Prevent Cyberbullying: Suggestions For Parents. (Cover Story)." Communique (0164775X) 38.4 (2009): 1-18. Education Research Complete. Web. 29 Mar. 2012. Feinberg, Ted, and Nicole Robey. "Cyberbullying." Principal Leadership 9.1 (2008): 10-4. ProQuest Central. Web. 29 Mar. 2012. Haber, Joel D., and Scott B. Haber. "Cyberbullying." The Camping Magazine 2007: 52-7. ProQuest Central. Web. 29 Mar. 2012. Holladay, Jennifer. "Cyberbullying." The Education Digest 76.5 (2011): 4-9. ProQuest Central. Web. 29 Mar. 2012. KLSSupport. “A Cyberbullying Suicide Story—Ryan Halligan age 13. YouTube. 2 July 2009. Web. 29 Mar. 2012. http://www.youtube.com/watch?v=E1LG9NymhTE&feature=related.
  • 30. Works Cited Norton, Justin M. "States Consider Laws to Curb Cyberbullies ; Anonymous Online Bullies often Cause More Damage than the Regular Schoolyard Type." Wisconsin State Journal: A.1. ProQuest Central. Feb 22 2007. Web. 29 Mar. 2012. NovusSecurity. “Cyberbullying Prevention Tips (Novus Securtiy). YouTube 13 Apr. 2011. Web. 29 Mar. 2012. http://www.youtube.com/watch?v=B-wLFdd_jr4. Regine, Sarah C., and Northside. "Unfriending Mean Teens." Chicago Tribune: 13. ProQuest Central. Mar 17 2011. Web. 29 Mar. 2012. Smith, Peter K., et al. “Cyberbullying: its nature and impact in secondary school pupils.” Journal of Child Psychology and Psychiatry 49.4 (2008): 376-385. Wiley Online Library. Web. 29 Mar. 2012. Stopbullying.gov. U.S. Department of Health & Human Services. Web. 29 Mar. 2012. http://www.stopbullying.gov/index.html. Taylor, Kelley R., Esq. "Cyberbullying: Is there Anything Schools can do?" Principal Leadership 8.9 (2008): 60-2. ProQuest Central. Web. 29 Mar. 2012. Timm, Carl, and Richard Perez. Seven Deadliest Social Network Attacks. Burlington: Elsevier Inc, 2010. Print

Notes de l'éditeur

  1. AASL Standards 1.1.2, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.2.2, 1.2.3, 1.2.4, 1.3.1, 1.3.2, 1.3.3, 1.3.5, 1.4.3, 2.1.2, 2.1.4, 2.2.4, 2.3.1, 2.4.1, 2.4.3, 2.4.4, 3.1.5, 3.1.6, 3.3.2, 3.3.4, 3.4.2, 4.1.4, 4.1.5, 4.2.1, 4.2.2, 4.2.3, 4.3.4, 4.4.4, 4.4.6
  2. What is cyberbullying, exactly? Holladay suggest that cyberbullying is the repeated use of technology to harass, humiliate, or threaten others (4). People can cyberbully others through text messaging, instant messaging, blogs, email, social networks, and sharing embarrassing photos/videos. Smith et al. argue that while cyberbullying through phone calls and text messaging are the most common, the sharing of video clips and photos are reported to have the most negative impact (379).
  3. Cyberbullying differs from traditional bullying in the following ways: The inclusion of technology. The anonymity maintained by the bully. Bullying can easily continue outside of school. Gender does not play a role. It is very indirect.
  4. The most obvious difference between traditional bullying and cyberbullying is the inclusion of technology. Rather than verbally harassing or physically abusing a peer, cyberbullies use cell phones and computers to torment others. Timm and Perez report, “In May, 2009, an Elk Plain School of Choice female student by the name of Piper Smith was stunned to see a video posted on YouTube entitled, ‘Six Ways to Kill Piper.’ The video was created by two girls who at the time were ages 11 and 12, respectively. The video depicted how Piper would be killed through a variety of methods. These methods involved poisoning her, shooting her with guns, shoving her off a cliff, and even forced suicide. The two girls who were involved in the creation of the animated video were disciplined and the video itself was pulled from YouTube; however, it demonstrates the ease in which these sophisticated tools may be used for devious purposes” (100). Haber and Haber observe that there are several different types of cyberbullying, including the following: Flaiming - sending messages through email, instant message, or text message that are mean, rude, or inappropriate. Harassment - sending offensive messages to someone repeatedly. Cyber-Stalking - similar to harassment, but with threats of harm. Impersonating or Masquerading - using the online identity of another person to post material that causes that person to look bad. Outing - the public revealing of private or embarrassing information or photos in an effort to ostracize or humiliate that person. (54) Though cell phones can be used for cyberbulling, social networking sites like Facebook, blogs, and even web sites such as YouTube can be used to bully others.
  5. One of the reasons cyberbullying is so popular is the anonymity the bully can maintain. Feinberg and Robey believe that they likely feel much less afraid of being caught and disciplined (27). It is also common for cyberbullies, especially females, to work in groups. Not only does this make it more difficult to identify who is bullying, but it can also increase how often a victim is bullied. Norton claims, “The Internet allows students to insult others in relative anonymity, and experts who study cyberbullying say it can be more damaging to victims than traditional bullying like fist fights and classroom taunts” (A1). Reducing anonymity is one possible solution that has been discussed to help decrease cyberbullying.
  6. Though cyberbullying can occur at school, it typically takes place outside of the classroom. Traditionally, victims were mostly tormented at school, where they were put in the same path as their bullies. However, because cyberbullies use technology to reach their victims, there is no escape. Students can be states apart and still be bullied. This can cause victims to feel even more hopeless that their situation will ever improve.
  7. Feinberg and Robey report that while traditional bullies are more likely to be male, gender does not play a role in cyberbullying (27). However, Holladay suggests, males and females bully through technology in different ways. Ordinarily, males accuse each other of being gay while females use labels like, “slut” to cause harm and are more likely to work in groups (6).
  8. In relation to traditional bullying, cyberbullying is much less direct. Haber and Haber emphasize, “Rather than threatening a kid to his face, cyberbullies can simply type the message and hit send without seeing the all too real look on the face of the kid who receives it” (53). It is also suggested that it is easier to cyberbully because the lack of face-to-face interaction can make it difficult for bullies to feel empathy. For this same reason, the average student is much more likely to engage in cyberbullying than traditional bullying.
  9. Just like with traditional bullying, the effects of cyberbullying can be devastating. Cyberbullying.gov reports that most victims experience depression, anxiety, and feelings of loneliness. However, cyberbullying can also play a role in decreased academic achievement and could cause students to skip or drop out of school. Victims of cyberbullying may also show their frustration by becoming externally violent. Though it is very rare for victims to actually commit suicide, unfortunately, it can occur.
  10. Students who are traditional victims of bullying are the same people who are likely to be cyberbullied. Some have hypothesized that typical victims of bullying may engage in cyberbullying. However, Smith et al. insist that this theory has not been supported. Feinberg and Robey argue, “Approximately half of cyberbullying victims are also targets of traditional bullying. Victims generally are more unpopular, isolated, depressed, anxious, and fearful than their peers. Those at risk are more likely to be searching for acceptance and attention online, more vulnerable to manipulation, less attentive to Internet safety messages, less resilient in getting out of a difficult situation, less able or willing to rely on their parents for help, and less likely to report a dangerous online situation to an adult” (27). Chang reports that the effects of bullying last into adulthood and can even impact victims a decade after the actual incident (516).
  11. While the victims of cyberbullying are similar to traditional victims of bullying, the bully may be different. Feinberg and Robey emphasize, “Like traditional bullies, cyberbullies tend to have poorer relationships with their caregivers than their peers. They are more likely than nonbullies to be targets of traditional bullying, to engage in delinquent behavior and frequent substance use, and to be daily Internet users” (27). However, because people feel less empathy when cyberbullying than during traditional bullying, “regular” students are quite likely to be cyberbullies. Even those who bully should be provided with support from the school, including counseling.
  12. Due to its devastating popularity, many states have adopted anticyberbullying laws. However, it is suggested in “Cyberbullying Crackdown” that it is tricky to create anticyberbullying laws without infringing on people’s first amendment rights and some believe that making cyberbullying a crime goes too far (5). Many school districts are taking action into their own hands by adopt rules that combat cyberbullying including revoking their school internet privileges, in school suspension, expulsion, and other disciplinary actions.
  13. How can cyberbullying be prevented?
  14. Feinberg and Robey suggest that students should respond to cyberbullying in the following way: Do not retaliate, because retaliation can escalate the harassment and make it unclear who first instigated the aggression. Either ignore the communication or calmly tell the cyberbully to stop. Tell an adult about the cyberbullying, particularly if there is anything threatening in the messages. Make a hard copy of the posted material. Write down how you feel or what you might want to say, but don't send it to anyone. Walk away and read it later. You will feel better and probably won't want to send it to the bully, but you may want to include it with other documentation. Do not delete e-mail or text messages until an adult has reviewed and documented the material. Block future communication and clean up your instant messenger buddy list. Do not do or say anything online that you wouldn't do in person or that you are not comfortable having other people know. (28) Students need to be taught that their should be a separation between public and private. Essentially, people can access nearly anything and just because you send a photo to your boyfriend or post something on Twitter for your friends does not mean they will be the only people who see it. Technology makes it very easy to pass information along to a large group of people very quickly. If it is something you would not want your parent or grandparent to see, do not post or send it!
  15. Since the majority of cyberbullying takes place outside of school, parents must get involved to lessen cyberbullying. It is much easier for students to bully one another when what they do on the internet and how much time they spend on it is not monitored. According to Feinberg and Robey, schools should provide parents with the following tips to combat cyberbullying: Keep computers in easily viewable places, such as the family room or kitchen. Talk regularly with your children about the online activities in which they are involved and Internet etiquette in general. Be specific about the risks of cyberbullying and their need to tell you if something bothers them. Respect for adolescents' privacy is important, but tell your children that you may review their online communications if you become concerned. Set clear expectations for responsible online behavior and phone use. Explain the consequences for violating those expectations. Consider establishing a parent-child Internet use contract. Be aware of warning signs that might indicate that your son or daughter is being bullied, such as reluctance to use the computer, a change in the child's behavior and mood, or reluctance to go to school. Consider installing parental control filtering software and tracking programs, but do not rely solely on these tools. Be equally alert to the possibility that your child is bullying others online, even if unintentionally. Document any bullying. Contact the school to enlist the help of the school psychologist, the school counselor, the principal, or the resource officer. File a complaint with the web site, ISP, or cell phone company. Contact the police if the cyberbullying includes threats. (28).
  16. One of the largest problems for schools concerning cyberbullying is that it usually takes place outside of the school setting. However, it still very much effects what takes place during the school day and the school should provide victims with the help they require. Feinberg and Robey assert, “victims should receive appropriate supports, such as targeted skills development, counseling, monitoring, and referral to community resources. It may also be appropriate to contact the cyberbully's parents and to provide behavioral interventions to the bully” (30). Feinberg and Robey suggest incorporating cyberbullying into relevant school policies including the following: Bullying Harassment Sexual Harassment Internet Use Cell Phone Use Policies (28) Schools can provide classes for parents to educated them about cyberbullying. They can also help by posting these tips on the school website, distributing them through email, and sending students home with flyers including this information.
  17. Cyberbullying is not just a student situation, but something that can effect teachers, staff, and administrators as well. Feinberg and Robey insist, “Online harassment of school staff members is an emerging concern for administrators. Cyberspace offers a perception of safety and power to students who are angry at a teacher or think that it is amusing to poke fun at or humiliate an adult in power. There is a fine line between free speech and harassment in these cases, so principals should work closely with district legal counsel to appropriately address harassment of staff members in school policies” (31).
  18. Facebook is trying to help alleviate cyberbullying by making it easier for kids to get help. Regine and Northside report, “Last week, Facebook announced the addition of a new "social reporting" tool that allows Facebook users -- including teens -- to not only privately report disturbing content to the site, but also to responsible adults in their friend networks. Facebook also is adding an improved Safety Center with educational videos and articles about cyberbullying” (13). Regine and Northside suggest that children and teenagers are not mature enough to be using a social networking website like Facebook (13). Most websites that cyberbullies use have privacy preferences that can lessen some incidences of cyberbullying. Though cyberbullies may use social networks as an outlet to torment others, it is definitely not the most popular source. Cassel emphasizes that most educators find merit in using social networks in the classroom setting. Therefore, instead of blocking Bebo, LinkedIn, etc, schools and parents should teach students how to responsibly use these resources and to protect themselves.
  19. The following resources can help inform students, parents, and schools about cyberbullying: http://www.stopcyberbullying.org/index2.html http://www.ncpc.org/cyberbullying http://kidshealth.org/parent/positive/talk/cyberbullying.html http://www.cyberbullying.org/ http://www.stopbullying.gov/index.html http://cyberbullying.wikispaces.com/ http://couros.wikispaces.com/cyberbullying
  20. Stop Cyberbullying This web site has information about what cyberbullying is, how it works, and what you can do to take action against it. It also organizes specific information for students, parents, and professionals (educators and law enforcement).
  21. National Crime Prevention Council This resource has basic information concerning cyberbullying. However, it also has links to other valuable resources and public service announcements about cyberbullying.
  22. KidsHealth This web site has information pertaining to all facets of children’s health, including information for parents, teens, and kids about cyberbullying. It also has additional resources about cyberbullying and is available in Spanish.
  23. Cyberbullying.org This web site has examples of and supplies news about cyberbullying. However, this resource also has a very unique section titled, “Talk the Talk” in which parents and other adults can learn to recognize online acronyms and emoticons that students may be using.
  24. Stopbullying.gov Stopbullying.gov provides information about bullying and cyberbullying from various government agencies, including the Department of Education.
  25. Cyberbullying Wiki This wiki has information about cyberbullying and how to prevent it. It also has a PowerPoint about online safety for high school students. There are also several beneficial videos available on this wiki.
  26. Open Thinking Wiki This wiki has other information about educational topics other than cyberbullying. However, there are some excellent videos and resources highlighted in the “cyberbullying” page of this wiki.
  27. Technology is a wonderful resource that enriches education and should not be removed from schools due to the fear of cyberbullying. Instead, students should be educated about how to protect themselves online and what steps they should take if they become a victim of cyberbullying. The schools policies on cyberbullying should be made very clear and students should be taught how damaging cyberbullying can be. Schools should provide both victims and cyberbullies with support. Schools should also inform and educate parents/guardians about the warning signs of cyberbullying (both in the victim and bully) as well as what steps can be taken to prevent or lessen cyberbullying attacks. They should also be encourage to get involved in their child’s lives because cyberbullying mostly takes place outside. Parents should also be provided with helpful online resources. Educators should also take steps to protect themselves from cyberbullying and to maintain their online privacy.