SlideShare une entreprise Scribd logo
1  sur  17
WHAT PARENTS NEED TO KNOW
CYBER BULLYING
Presented by Jill Sooy
What is Cyber Bullying?
 Cyber bullying involves sending or posting
harmful or cruel text or images using the
Internet (instant messaging, e-mails, chat
rooms, or social networking sites) or other
digital communication devices such as cell
phones. It can involve stalking, threats,
harassment, impersonation, humiliation,
trickery, and exclusion.
The Facts:
 93% of teens 12-17 go online
 63% of online teens go online daily
 89% on online teen go online from home, and most of
them go online from home most often.
 77% go online at school
 71% go online from friends or relatives homes
 60% go online from a library
 27% go online from their mobile phone
 76% of household with teens go online via broadband,
10% via dial up, and 12% do not have access at home.
Teen Connections
 75% of teens have a cell phone
 No gender or race/ethnic differences in ownership
 50% of teens with phones talk to friends daily
 54% of teens send test messages daily
 27% use their phone to go online
 73% of teens use an online social network site
 37% of SNS users send messages through social
networks daily
 80% of teens have a game console
 51% of teens have a portable gaming device
 Teens connect and interact with others online through games
Bullying Statistics
 42% of kids have been bullied online. 1 in 4 have
had it happen more than once.
 35% have been threatened. Nearly 1 in 5 have
had it happen more than once.
 21% have received mean or threatening e-mail.
 53% admit having said something hurtful to
another person online.
 58% have not told their parents about something
hurtful done to them online.
 Based on 2004 i-SAFE survey on 1500 students in grades 1-4
Quiz for Parents
 Do you know what this means?
WUF
RUUP4IT
PAW
P911
MOTOS
IPN
What Parents Can Do to Help
 Talk with kids about risks of the Internet
 Learn what kids are doing on line and keep
track of online behavior
 Become familiar with sites kids visit (My
Space, Facebook,Twitter, etc.)
 Remind them to never give out personal info
 Remind kids they should never meet face-to-
face with someone they meet online.
Continued…
 Share examples of inappropriate incidents
that can happen online
 Communicate online rules to kids and enforce
rules with consequences
 Keep computers in a place where online
activity is hard to hide
 Explain that cyber bullies aren’t always
anonymous; they can be traced and located
 Use parental controls & tracking programs
What To Do if
Your Child is Bullied
 Be aware of warning signs
 Reluctance to use the computer
 Change in mood or behavior
 Reluctance to go to school
 Poor school performance
 Be alert that your child could be bullying
others
 Document any bullying
What To Do Continued…
 Tell child you won’t blame them if bullied.
 One main reason kids don’t tell adults is fear of
losing computer privileges
 Contact the school to seek help from school
psychologist, counselor, and principal
 File a complaint with the web site, ISP, or cell
phone company
 Contact the police if the cyber bullying
includes threats
What Kids Need to Know
 Never give out personal information online
 Do not tell anyone you password, even
friends
 Do not retaliate
 It can escalate the harassment & make it unclear
who was the aggressor
 Tell the bully to stop or ignore
 Make hard copies
 Show and adult before deleting anything
Continued…
 Block future communication and clean up
buddy lists
 Do not say anything online you are not
comfortable having other people know
 If a friend cyber bullies, tell them to stop
School Response
 Incorporate cyber bullying into all relevant
school policies
 Bullying
 Harassment
 Internet and cell phone policies
 Determine the extent of cyber bullying in the
school population
 Educate staff members, students, and
parents about cyber bullying
School Response continued…
 Closely monitor students’ computer use at
school. Use filtering and tracking software.
 Teach student internet safety
 Investigate all reports of cyber bullying NOW
 Support student who are victims
 Understand legal obligations and restrictions
 Contact police if acts involve threats,
extortion, harassment, or hate crimes
Cyber Bullying Effects
on Health
 Sleep disturbances
 Feelings of sadness or anger
 Stomach pain
 Headaches
 Anxiety
 Depression
 Substance abuse
 Suicidal thoughts
Cyber Bullying Effects on
School Performance
 Absenteeism
 Behavior problems
 Lack of confidence
 Declining performance in the classroom
 Limited goals for the future and decreased
desire to do well
Conclusion
 Ryan Halligan’s story and short video clip
 FinalThoughts
 Questions and Answers

Contenu connexe

Tendances

Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsmeech
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting InfographicuKnow.com
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safelyCurso RRSS
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient informationsmithmpa
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Tendances (19)

Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
Parents must know about cyber bullying 1
Parents must know about cyber bullying 1Parents must know about cyber bullying 1
Parents must know about cyber bullying 1
 
Cyberbullying tips from connect safely
Cyberbullying tips from connect safelyCyberbullying tips from connect safely
Cyberbullying tips from connect safely
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 

Similaire à Inservice cyberbullyingpwpt

Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 

Similaire à Inservice cyberbullyingpwpt (20)

Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 

Dernier

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Inservice cyberbullyingpwpt

  • 1. WHAT PARENTS NEED TO KNOW CYBER BULLYING Presented by Jill Sooy
  • 2. What is Cyber Bullying?  Cyber bullying involves sending or posting harmful or cruel text or images using the Internet (instant messaging, e-mails, chat rooms, or social networking sites) or other digital communication devices such as cell phones. It can involve stalking, threats, harassment, impersonation, humiliation, trickery, and exclusion.
  • 3. The Facts:  93% of teens 12-17 go online  63% of online teens go online daily  89% on online teen go online from home, and most of them go online from home most often.  77% go online at school  71% go online from friends or relatives homes  60% go online from a library  27% go online from their mobile phone  76% of household with teens go online via broadband, 10% via dial up, and 12% do not have access at home.
  • 4. Teen Connections  75% of teens have a cell phone  No gender or race/ethnic differences in ownership  50% of teens with phones talk to friends daily  54% of teens send test messages daily  27% use their phone to go online  73% of teens use an online social network site  37% of SNS users send messages through social networks daily  80% of teens have a game console  51% of teens have a portable gaming device  Teens connect and interact with others online through games
  • 5. Bullying Statistics  42% of kids have been bullied online. 1 in 4 have had it happen more than once.  35% have been threatened. Nearly 1 in 5 have had it happen more than once.  21% have received mean or threatening e-mail.  53% admit having said something hurtful to another person online.  58% have not told their parents about something hurtful done to them online.  Based on 2004 i-SAFE survey on 1500 students in grades 1-4
  • 6. Quiz for Parents  Do you know what this means? WUF RUUP4IT PAW P911 MOTOS IPN
  • 7. What Parents Can Do to Help  Talk with kids about risks of the Internet  Learn what kids are doing on line and keep track of online behavior  Become familiar with sites kids visit (My Space, Facebook,Twitter, etc.)  Remind them to never give out personal info  Remind kids they should never meet face-to- face with someone they meet online.
  • 8. Continued…  Share examples of inappropriate incidents that can happen online  Communicate online rules to kids and enforce rules with consequences  Keep computers in a place where online activity is hard to hide  Explain that cyber bullies aren’t always anonymous; they can be traced and located  Use parental controls & tracking programs
  • 9. What To Do if Your Child is Bullied  Be aware of warning signs  Reluctance to use the computer  Change in mood or behavior  Reluctance to go to school  Poor school performance  Be alert that your child could be bullying others  Document any bullying
  • 10. What To Do Continued…  Tell child you won’t blame them if bullied.  One main reason kids don’t tell adults is fear of losing computer privileges  Contact the school to seek help from school psychologist, counselor, and principal  File a complaint with the web site, ISP, or cell phone company  Contact the police if the cyber bullying includes threats
  • 11. What Kids Need to Know  Never give out personal information online  Do not tell anyone you password, even friends  Do not retaliate  It can escalate the harassment & make it unclear who was the aggressor  Tell the bully to stop or ignore  Make hard copies  Show and adult before deleting anything
  • 12. Continued…  Block future communication and clean up buddy lists  Do not say anything online you are not comfortable having other people know  If a friend cyber bullies, tell them to stop
  • 13. School Response  Incorporate cyber bullying into all relevant school policies  Bullying  Harassment  Internet and cell phone policies  Determine the extent of cyber bullying in the school population  Educate staff members, students, and parents about cyber bullying
  • 14. School Response continued…  Closely monitor students’ computer use at school. Use filtering and tracking software.  Teach student internet safety  Investigate all reports of cyber bullying NOW  Support student who are victims  Understand legal obligations and restrictions  Contact police if acts involve threats, extortion, harassment, or hate crimes
  • 15. Cyber Bullying Effects on Health  Sleep disturbances  Feelings of sadness or anger  Stomach pain  Headaches  Anxiety  Depression  Substance abuse  Suicidal thoughts
  • 16. Cyber Bullying Effects on School Performance  Absenteeism  Behavior problems  Lack of confidence  Declining performance in the classroom  Limited goals for the future and decreased desire to do well
  • 17. Conclusion  Ryan Halligan’s story and short video clip  FinalThoughts  Questions and Answers