SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
I N T C 3 6 1 0
N O V E M B E R 2 6 , 2 0 1 2
Cyberbullying
Cyberbullying
 Flash video
 "Cyberbullying" is when a child, preteen or teen is
tormented, threatened, harassed, humiliated,
embarrassed or otherwise targeted by another
child, preteen or teen using the Internet,
interactive and digital technologies or mobile
phones.
What is Cyberbullying
How Cyberbulling Works
 Direct attacks (messages sent to your kids directly)
and
 By proxy (using others to help cyberbully the victim,
either with or without the accomplice's knowledge).
TEXT Messaging Harassment
 Hateful or threatening messages to other kids
 Warning wars
 A screen name that is very similar to another kid's
name
 Text attacks-kids gang up –high volume of text =
higher cell phone charges
 Death threats – text, photos, videos
Stealing passwords
 A kid may steal another child's password and begin to
chat with other people, pretending to be the other kid.
 A kid may also use another kid's password to change
his/her profile to include sexual, racist, and
inappropriate things that may attract unwanted attention
or offend people.
 A kid often steals the password and locks the victim out
of their own account.
 Once the password is stolen, hackers may use it to hack
into the victim's computer.
Blogs
 Blogs are online journals. Kids sometimes use these blogs
to damage other kids' reputations or invade their privacy.
 For example, in one case, a boy posted a bunch of blogs
about his breakup with his ex-girlfriend, explaining how
she destroyed his life, calling her degrading names. Their
mutual friends read about this and criticized her. She
was embarrassed and hurt, all because another kid
posted mean, private, and false information about her.
 Sometimes kids set up a blog or profile page pretending
to be their victim and saying things designed to humiliate
them.
Sending Pictures through E-mail and Cell
Phones
 There have been cases of teens sending
mass e-mails to other users, that
include nude or degrading pictures of
other teens. Once an e-mail like this is
sent, it is passed around to hundreds
of other people within hours; there is
no way of controlling where it goes.
 The kids receive the pictures directly
on their phones, and may send it to
everyone in their address books or post
in online photos websites.

 Kids often take a picture of someone in
a locker room, bathroom or dressing
room and post it online or send it to
others on cell phones.
 Who's Hot? Who's Not? Who
is the biggest slut in the sixth
grade? These types of
questions run rampant on the
Internet polls, all created by
yours truly - kids and teens.
Such questions are often very
offensive to others and are yet
another way that kids can
"bully" other kids online.
Internet Polling
Interactive Gaming
 Gaming allows chat and other interactivity
 Kids verbally abuse the other kids, using threats and lewd
language.
 Lock them out of games, passing false rumors about them or
hacking into their accounts.
Sending Malicious Code
 SEND….
 viruses,
 spyware and
 hacking programs to their victims.
 They do this to either destroy their computers or spy
on their victim.
 Trojan Horse programs allow the cyberbully to
control their victim's computer remote control, and
can be used to erase the hard drive of the victim.
Sending Porn and Other Junk E-Mail
 Sign their victims up for e-mailing and IM marketing
lists, lots of them, especially to porn sites.
 Parents usually get involved, either blaming them
(assuming they have been visiting porn sites) or
making them change their e-mail.
Impersonation
 Post provocative messages in a hate group's chatroom posing
as the victim,
 inviting an attack against the victim,
 often giving the name, address and telephone number of the
victim to make the hate group's job easier. S
 Send a message to someone posing as the victim, saying
hateful or threatening things while masquerading as the
victim. They may also alter a message really from the victim,
making it appear that they have said nasty things or shared
secrets with others.
Why Cyberbully?
 Anger, revenge or frustration.
 For Entertainment
 Out of Boredom
 To intentionally torment
Help Stop Cyberbullying
 Educate students – cyberbullying is hurtful to the
victim. Don’t be a part of it.
 Encourage students not to respond if it happens to
them.
 Be aware of anonymous methods of reporting
cyberbullying…to administration or police.
NJ and the law
 In 2002, New Jersey adopted its first anti-bullying
legislation.
 In January 2011 that law was strengthened.
 The appointment of specific people in each school and district to run
antibullying programs
 the investigation of any episodes starting within a day after they
occur
 Public school employees are required to take training courses on how
to pick up on cyberbullying, while forcing all districts to create
"school safety teams" to consider complaints of bullying.
 School bullies to face suspension or expulsion, and requires school
superintendents to report all bullying incidents to the New Jersey
Board of Education
 Schools and districts will receive grades on how well they handle and
defuse such incidents.

Mais conteúdo relacionado

Mais procurados

Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine at McGill
 
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEduexcellence
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipErica Reid
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingwrhawkins
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 

Mais procurados (20)

Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cbp
CbpCbp
Cbp
 
Cyberbullying assignment
Cyberbullying assignmentCyberbullying assignment
Cyberbullying assignment
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 

Semelhante a Ppt cyberbullying

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying estegiulimazziotti96
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaamiliarguelles
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptxRAKHI SAWLANI
 

Semelhante a Ppt cyberbullying (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Essay On Cyber Bullying
Essay On Cyber BullyingEssay On Cyber Bullying
Essay On Cyber Bullying
 
Genderissues-RakhiS.pptx
Genderissues-RakhiS.pptxGenderissues-RakhiS.pptx
Genderissues-RakhiS.pptx
 
Essay On Different Kinds Of Bullying
Essay On Different Kinds Of BullyingEssay On Different Kinds Of Bullying
Essay On Different Kinds Of Bullying
 
Essay About Dealing With Cyberbullying
Essay About Dealing With CyberbullyingEssay About Dealing With Cyberbullying
Essay About Dealing With Cyberbullying
 
Essay On Cyberbullying
Essay On CyberbullyingEssay On Cyberbullying
Essay On Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Mais de 3610Instructor

Mais de 3610Instructor (18)

Pln spr14
Pln spr14Pln spr14
Pln spr14
 
Flipped classroom project
Flipped classroom projectFlipped classroom project
Flipped classroom project
 
Communication tools
Communication tools Communication tools
Communication tools
 
Visual literacy ppt
Visual literacy pptVisual literacy ppt
Visual literacy ppt
 
Portfolio ppt
Portfolio pptPortfolio ppt
Portfolio ppt
 
Pln prof.org ppt_fa13
Pln prof.org ppt_fa13Pln prof.org ppt_fa13
Pln prof.org ppt_fa13
 
Social bookmarking lsit ppt
Social bookmarking lsit pptSocial bookmarking lsit ppt
Social bookmarking lsit ppt
 
Nings
NingsNings
Nings
 
Communication tools ppt fa2013
Communication tools ppt fa2013Communication tools ppt fa2013
Communication tools ppt fa2013
 
Ppt blooms lesson_plans
Ppt blooms lesson_plansPpt blooms lesson_plans
Ppt blooms lesson_plans
 
Lesson1 tools for the classroom
Lesson1 tools for the classroomLesson1 tools for the classroom
Lesson1 tools for the classroom
 
Pln nings ppt_spr13
Pln nings ppt_spr13Pln nings ppt_spr13
Pln nings ppt_spr13
 
Rev competition
Rev competitionRev competition
Rev competition
 
Review ownership
Review ownershipReview ownership
Review ownership
 
Webquests ppt
Webquests pptWebquests ppt
Webquests ppt
 
Pln ppt1
Pln ppt1Pln ppt1
Pln ppt1
 
Handhelds in the classroom
Handhelds in the classroomHandhelds in the classroom
Handhelds in the classroom
 
Lesson1 tools for the classroom
Lesson1 tools for the classroomLesson1 tools for the classroom
Lesson1 tools for the classroom
 

Ppt cyberbullying

  • 1. I N T C 3 6 1 0 N O V E M B E R 2 6 , 2 0 1 2 Cyberbullying
  • 3.  "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. What is Cyberbullying
  • 4. How Cyberbulling Works  Direct attacks (messages sent to your kids directly) and  By proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge).
  • 5. TEXT Messaging Harassment  Hateful or threatening messages to other kids  Warning wars  A screen name that is very similar to another kid's name  Text attacks-kids gang up –high volume of text = higher cell phone charges  Death threats – text, photos, videos
  • 6. Stealing passwords  A kid may steal another child's password and begin to chat with other people, pretending to be the other kid.  A kid may also use another kid's password to change his/her profile to include sexual, racist, and inappropriate things that may attract unwanted attention or offend people.  A kid often steals the password and locks the victim out of their own account.  Once the password is stolen, hackers may use it to hack into the victim's computer.
  • 7. Blogs  Blogs are online journals. Kids sometimes use these blogs to damage other kids' reputations or invade their privacy.  For example, in one case, a boy posted a bunch of blogs about his breakup with his ex-girlfriend, explaining how she destroyed his life, calling her degrading names. Their mutual friends read about this and criticized her. She was embarrassed and hurt, all because another kid posted mean, private, and false information about her.  Sometimes kids set up a blog or profile page pretending to be their victim and saying things designed to humiliate them.
  • 8. Sending Pictures through E-mail and Cell Phones  There have been cases of teens sending mass e-mails to other users, that include nude or degrading pictures of other teens. Once an e-mail like this is sent, it is passed around to hundreds of other people within hours; there is no way of controlling where it goes.  The kids receive the pictures directly on their phones, and may send it to everyone in their address books or post in online photos websites.   Kids often take a picture of someone in a locker room, bathroom or dressing room and post it online or send it to others on cell phones.
  • 9.  Who's Hot? Who's Not? Who is the biggest slut in the sixth grade? These types of questions run rampant on the Internet polls, all created by yours truly - kids and teens. Such questions are often very offensive to others and are yet another way that kids can "bully" other kids online. Internet Polling
  • 10. Interactive Gaming  Gaming allows chat and other interactivity  Kids verbally abuse the other kids, using threats and lewd language.  Lock them out of games, passing false rumors about them or hacking into their accounts.
  • 11. Sending Malicious Code  SEND….  viruses,  spyware and  hacking programs to their victims.  They do this to either destroy their computers or spy on their victim.  Trojan Horse programs allow the cyberbully to control their victim's computer remote control, and can be used to erase the hard drive of the victim.
  • 12. Sending Porn and Other Junk E-Mail  Sign their victims up for e-mailing and IM marketing lists, lots of them, especially to porn sites.  Parents usually get involved, either blaming them (assuming they have been visiting porn sites) or making them change their e-mail.
  • 13. Impersonation  Post provocative messages in a hate group's chatroom posing as the victim,  inviting an attack against the victim,  often giving the name, address and telephone number of the victim to make the hate group's job easier. S  Send a message to someone posing as the victim, saying hateful or threatening things while masquerading as the victim. They may also alter a message really from the victim, making it appear that they have said nasty things or shared secrets with others.
  • 14. Why Cyberbully?  Anger, revenge or frustration.  For Entertainment  Out of Boredom  To intentionally torment
  • 15. Help Stop Cyberbullying  Educate students – cyberbullying is hurtful to the victim. Don’t be a part of it.  Encourage students not to respond if it happens to them.  Be aware of anonymous methods of reporting cyberbullying…to administration or police.
  • 16. NJ and the law  In 2002, New Jersey adopted its first anti-bullying legislation.  In January 2011 that law was strengthened.  The appointment of specific people in each school and district to run antibullying programs  the investigation of any episodes starting within a day after they occur  Public school employees are required to take training courses on how to pick up on cyberbullying, while forcing all districts to create "school safety teams" to consider complaints of bullying.  School bullies to face suspension or expulsion, and requires school superintendents to report all bullying incidents to the New Jersey Board of Education  Schools and districts will receive grades on how well they handle and defuse such incidents.