SlideShare une entreprise Scribd logo
1  sur  21
Team Mosaic:
  Hannah Morrell
Emmanuelle Besnard
    Dustin Sikes
Allison Dobosiewicz
   Tyler Rutledge
   What?
        When a child, preteen or teen is tormented by another child, preteen or
         teen using the Internet, interactive and digital technologies or mobile
         phones. It has to have a minor on both sides, or at least have been
         instigated by a minor against another minor.
   How?
        The methods used are limited only by the child's imagination and access to
         technology (Social networks, phones, chats…)




   www.stopcyberbultying.org
   Criminal case upon which Lori Drew was
    convicted of Computer Fraud and Abuse over
    the cyber-bullying of 13 year old Megan Meier.
   Drew, a 49 year old woman living in
    Missouri, created a fake myspace account with
    the alias name Josh Evans to befriend Megan
    Meier
   “Evans” and Meier began a flirtatious
    relationship that turned sour fast
   Megan Meier hung herself because of the
    remarks made by “Evans”
http://abcnews.go.com/GMA/story?id=3882520&page=1
   20% had someone pretend to         45% of all teens have
    be someone else in order to
    trick them into revealing           been cyberbullied in
    personal information
   17% were victimized by              the past year alone
    someone lying about them
    online
   13% learned that a
    cyberbully was pretending to
    be them while
    communicating with
    someone else
   10% were victimized by
    someone else posting
    unflattering pictures of them
    without permission


        www.ncpc.org
http://www.cyberbullying.us/research.php.
   Middle and High Schools
       Faculty
       Parents of students
       Students
   Create separate packets for each group
   Community
   Needs the most information
   Include background data so they can create
    their own presentations based on class needs
   Topics:
       How to tell if a student is being bullied online
       What to do if you suspect cyber bullying
       How you can prevent cyber bullying as a faculty
        member
   Also require a lot of background data. Focusing
    on prevention and signs
   Topics:
     How to prevent your child from becoming a target
      of bullying
     What to do if you find your child is being targeted
     How to know if your child is a bully online, and how
      to stop it
   Require the most targeted information on how
    to deal with being targeted
   Topics
       What to do if you are being cyber bullied
       How to prevent being targeted by cyber bullies
       How to be respectful of others online
   With the communities help we can create
    enough awareness to eventually stop cyber
    bullying
   Together we can decrease the statistics of cyber
    bullying
   Cyber bullying is too big of an issue to handle
    alone
   Make official laws against cyberbullying
   Join local PTA‟s
     Write letters to lawmakers
     Flag cyberbullying on social media sites
     Join movements/organizations




http://www.socialsafety.org/law_enforcement_cyberbullying.html
   E-mails,
   Instant messaging,
   Text or digital imaging messages sent on cell
    phones,
   Web pages
   Web logs (blogs), Chat rooms or discussion
    groups
   Social Networking sites
   Start a anti cyberbullying campaign
   School involvement
          Special events
          Public speakers and personal testimonies
          Pledging to not bully
          PSA involvement
   Advertisement on Facebook
   You tube video
Place a permanent ad on Facebook raising cyberbullying awareness and
prevention
   Educate social media
    users on how to
    recognize, handle, and
    prevent cyberbullying
   Show people the effects of
    cyberbullying
   Inform people on how to
    report or go to higher
    authority if needed
   Get people involved in the
    anti cyberbullying
    movement
   No more anonymity
   Get laws passed making
    cyberbullying illegal
   Facebook‟s marketing director Randi
    Zuckerberg says the best way to end
    cyberbullying is to not allow anonymous or
    spam accounts
   “people hide behind anonymity and feel like
    they can say whatever they want behind closed
    doors”
   Eric Schmidt, former Google CEO has made
    this suggestion in the past and predictes
    “govenments will eventually „demand‟ that
    people use their names for all online activity”
    http://www.huffingtonpost.com/mobileweb/2011/07/27/ra
    ndi-zuckerberg-anonymity-online_n_910892.html
   Conditions and terms of use agreement before
    accessing a Social media site
   Public record of your social media account
       Monitor Activity
       Point system like drivers when flagged or reported.
   Our optimal plan will be to pair with a
    nonprofit and use their financial backing to
    help get our program off the ground. If not, we
    have several options:
     Bootstrapping: Generate funds ourselves
     Small bank loans
     Partner with similar programs of size or scope
   How are we going to measure our success?
   Indicators:
     Social media monitoring: Are kids talking about the
      issue?
     Website traffic: Is our website generating views?
     Number of participants: How many
      schools, faculty, parents, and/or students are
      participating?
   Focus on effectiveness more than efficency
   www.stopcyberbullying.org
   http://csriu.org/cyberbully.
   http://www.socialsafety.org/law_enforcement_cy
    berbullying.html
   http://www.cyberbullying.us/research.php
   www.ncpc.org
   http://abcnews.go.com/GMA/story?id=3882520
    &page=1
   http://www.huffingtonpost.com/mobileweb/201
    1/07/27/randi-zuckerberg-anonymity-
    online_n_910892.html

Contenu connexe

Tendances

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
tburdzy1
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
mb29thom
 
The effect-of-social-networking-sites
The effect-of-social-networking-sitesThe effect-of-social-networking-sites
The effect-of-social-networking-sites
Ram Patil
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
Elizabeth Gestier
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
Sally Garza
 

Tendances (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyberbullying presentation
Cyberbullying presentationCyberbullying presentation
Cyberbullying presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
The effects of Social Networking upon society
The effects of Social Networking upon societyThe effects of Social Networking upon society
The effects of Social Networking upon society
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying presentation Xander Cole
Cyberbullying presentation Xander ColeCyberbullying presentation Xander Cole
Cyberbullying presentation Xander Cole
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
The effect-of-social-networking-sites
The effect-of-social-networking-sitesThe effect-of-social-networking-sites
The effect-of-social-networking-sites
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youth
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Effects of social media on youth.
Effects of social media on youth.Effects of social media on youth.
Effects of social media on youth.
 

Similaire à Pr cyberbullying campaign powerpoint

Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
HannahMorrell
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
lippertnicole
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
Grant Ward
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
christiandean12115
 

Similaire à Pr cyberbullying campaign powerpoint (20)

Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Facebook
FacebookFacebook
Facebook
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Chandan kumar
Chandan kumarChandan kumar
Chandan kumar
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Pr cyberbullying campaign powerpoint

  • 1. Team Mosaic: Hannah Morrell Emmanuelle Besnard Dustin Sikes Allison Dobosiewicz Tyler Rutledge
  • 2. What?  When a child, preteen or teen is tormented by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.  How?  The methods used are limited only by the child's imagination and access to technology (Social networks, phones, chats…)  www.stopcyberbultying.org
  • 3. Criminal case upon which Lori Drew was convicted of Computer Fraud and Abuse over the cyber-bullying of 13 year old Megan Meier.  Drew, a 49 year old woman living in Missouri, created a fake myspace account with the alias name Josh Evans to befriend Megan Meier  “Evans” and Meier began a flirtatious relationship that turned sour fast  Megan Meier hung herself because of the remarks made by “Evans” http://abcnews.go.com/GMA/story?id=3882520&page=1
  • 4. 20% had someone pretend to  45% of all teens have be someone else in order to trick them into revealing been cyberbullied in personal information  17% were victimized by the past year alone someone lying about them online  13% learned that a cyberbully was pretending to be them while communicating with someone else  10% were victimized by someone else posting unflattering pictures of them without permission www.ncpc.org
  • 6. Middle and High Schools  Faculty  Parents of students  Students  Create separate packets for each group  Community
  • 7. Needs the most information  Include background data so they can create their own presentations based on class needs  Topics:  How to tell if a student is being bullied online  What to do if you suspect cyber bullying  How you can prevent cyber bullying as a faculty member
  • 8. Also require a lot of background data. Focusing on prevention and signs  Topics:  How to prevent your child from becoming a target of bullying  What to do if you find your child is being targeted  How to know if your child is a bully online, and how to stop it
  • 9. Require the most targeted information on how to deal with being targeted  Topics  What to do if you are being cyber bullied  How to prevent being targeted by cyber bullies  How to be respectful of others online
  • 10. With the communities help we can create enough awareness to eventually stop cyber bullying  Together we can decrease the statistics of cyber bullying  Cyber bullying is too big of an issue to handle alone  Make official laws against cyberbullying
  • 11. Join local PTA‟s  Write letters to lawmakers  Flag cyberbullying on social media sites  Join movements/organizations http://www.socialsafety.org/law_enforcement_cyberbullying.html
  • 12. E-mails,  Instant messaging,  Text or digital imaging messages sent on cell phones,  Web pages  Web logs (blogs), Chat rooms or discussion groups  Social Networking sites
  • 13. Start a anti cyberbullying campaign  School involvement  Special events  Public speakers and personal testimonies  Pledging to not bully  PSA involvement  Advertisement on Facebook  You tube video
  • 14. Place a permanent ad on Facebook raising cyberbullying awareness and prevention
  • 15. Educate social media users on how to recognize, handle, and prevent cyberbullying  Show people the effects of cyberbullying  Inform people on how to report or go to higher authority if needed  Get people involved in the anti cyberbullying movement  No more anonymity  Get laws passed making cyberbullying illegal
  • 16. Facebook‟s marketing director Randi Zuckerberg says the best way to end cyberbullying is to not allow anonymous or spam accounts  “people hide behind anonymity and feel like they can say whatever they want behind closed doors”  Eric Schmidt, former Google CEO has made this suggestion in the past and predictes “govenments will eventually „demand‟ that people use their names for all online activity” http://www.huffingtonpost.com/mobileweb/2011/07/27/ra ndi-zuckerberg-anonymity-online_n_910892.html
  • 17. Conditions and terms of use agreement before accessing a Social media site  Public record of your social media account  Monitor Activity  Point system like drivers when flagged or reported.
  • 18. Our optimal plan will be to pair with a nonprofit and use their financial backing to help get our program off the ground. If not, we have several options:  Bootstrapping: Generate funds ourselves  Small bank loans  Partner with similar programs of size or scope
  • 19. How are we going to measure our success?  Indicators:  Social media monitoring: Are kids talking about the issue?  Website traffic: Is our website generating views?  Number of participants: How many schools, faculty, parents, and/or students are participating?  Focus on effectiveness more than efficency
  • 20.
  • 21. www.stopcyberbullying.org  http://csriu.org/cyberbully.  http://www.socialsafety.org/law_enforcement_cy berbullying.html  http://www.cyberbullying.us/research.php  www.ncpc.org  http://abcnews.go.com/GMA/story?id=3882520 &page=1  http://www.huffingtonpost.com/mobileweb/201 1/07/27/randi-zuckerberg-anonymity- online_n_910892.html