SlideShare uma empresa Scribd logo
1 de 19
Cyberbullying
Bullying Goes High Tech
Jim Masucci
November 10, 2010
“It’s one thing when you get made fun of at
school, but to be bullied in your own home, via
your computer, is a disgusting thing for people to
do.” Sixteen year old from Alabama
What is Cyberbullying?
Being cruel to others by sending or posting
harmful material using technological means
An individual or group that uses
information and communication involving
electronic technologies to facilitate
deliberate and repeated harassment or
threats to an individual or group.
Also known as:
‘Electronic Bullying’ &
‘Online Social Cruelty’
Tools for Cyberbullying
 Cell Phones – calls
or messages
 Internet
 Electronic Mail
 Instant Messaging
 Blogs
 Social Networks
 Chat Rooms
 Defamatory Web
Sites (Polling)
Why Cyberbullying?
The Internet has become a way of life
for most teens, and an easy tool
for harassing others.
91% of 12 – 15 year olds use the
Internet
99% of teens 16 – 18 use the Internet
Available 24 hrs/day, 7 days/wk
Victim is a perpetual target
Why Cyberbullying? (cont)
Traditional bullying – the bully is
usually stronger than his or her
victim either physically or
socially. Usually occurs in the
school setting (classroom,
playground, or bus).
Cyberbullying - Internet tends to
level the playing field, affording
less dominant teens the means
they need to bully others.
Sometimes used in revenge for
traditional bullying.
How Big a Problem Is It?
 42% of teens surveyed admitted to being
bullied on-line
 35% claim to have been threatened.
 53% confessed to having said something
mean or hurtful on-line. (I-Safe 2007)
 More girls than boys are cyberbullied.
 For teens that are regular visitors to
social networking sites, the chances of
them being cyberbullied goes up.
 Only 15% of parents knew what
cyberbullying was
Types of Cyberbullies
 Avenging Angel - use technical means to get
back at someone who has been bullying them,
or one of their friends.
 Power Hungry - Closest to traditional school
yard bully. Tends to feel superior, and exerts his
or her strengths over the victim.
Types of Cyberbullies (cont.)
 Mean Girls - Work in
groups, and need an
audience to play to. The
group tends to approve
of the actions, or do
nothing about them.
 Inadvertent Bully –
Probably don’t even
realize they are doing
something wrong. Ex :
passing on gossip or
pictures or answering
polls.
Forms of Cyberbullying
 Flaming – Saying mean or hurtful things
 Harassment and cyberstalking - repeated
actions such as sending messages, or threats to
a victim.
 Denigration – putting someone down
 Outing – spreading secret or embarrassing
information or pictures
 Exclusion - intentionally excluding a person by
leaving them off of the list.
 Impersonation – pretending to be someone else
Cyberbullying – It’s Illegal
All of the following forms of cyberbulling
can lead to arrest & prosecution:
 Making threats of violence to people or
their property
 Making obscene or harassing phone
calls
 Harassment or stalking
 Hate or bias crimes
 Creating or sending sexually explicit
images of teens
 Posting real or doctored photos of
someone without their permission
 Taking a photo of someone in place
where privacy expected
Impacts of Cyberbullying
 Feelings of guilt or self
blame
 Sleep difficulties
 Poor performance in
school
 Violence against
tormentors. Victims are
8X more likely to bring a
weapon to school
 Suicide
What Should You Do?
Teens
 Do not respond in a similar
manner. Block the screen names if
possible.
 Do not forward anything
 Do not delete messages
 Consult an adult
 Safeguard user ID’s and
passwords.
“A password is like a tooth brush.
Choose a good one, and don’t
share it.” (Yahoo Security Center)
What Should You Do?
Parents
 Take the situation seriously,
and be supportive.
 Don’t blame the victim.
 Increase tech awareness.
 Monitor computer use.
(Software & placement of
computer)
 Contact ISP and cell phone
provider. Contact law
enforcement, if threatened.
What Should You Do?
Teachers and Schools
If the incident occurs during
school, investigate and
respond.
Otherwise :
 Respond if the incident
causes disruptions.
 Provide counseling to the
perpetrators and the
victims
 Develop anti-bulllying
programs to educate
students
Teach Our Children
 All actions have consequences
 Cyber bullying hurts
 They are just being used and
manipulated by cyber bully
 Cyber bully and accomplices
often become the target of
cyber bullying themselves
 Care about others and stand
up for what’s right
Legal Issues for Schools
 Privacy Issue – Does a school have the right to
search a student’s computer for evidence.
 Free Speech Issue – Does the school have the
right to discipline a student for remarks published
on the Internet during non-school hours.
Sexting
Sending sexually suggestive messages or images to
others via cell phone, or posting them on social
websites.
Surveys of teenagers :
- 20 percent have sent or posted picture of themselves
- 40 percent of teenagers have sent sexually
suggestive messages.
- More girls than boys
Technology is much more far-reaching and permanent,
and teenagers are not consequential thinkers . . . They
Sexting – Legal
Consequenses
Worst Case scenario
 Possession or distribution of Child
Pornography
 Possible inclusion on sex offenders
registry.
More likely
 Suspension or expulsion from school.
 Probation and attend counseling
Additional Sources
http://www.scottmcleod.net/ties2006
http://www.stopcyberbulling.com
http://www.nertsmartz.org
http://www.isafe.org

Mais conteúdo relacionado

Mais procurados

Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingwirsi
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyinglarsselect
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingSuphaphonP
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying fullLiam1997
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingktast
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 

Mais procurados (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying full
Cyberbullying fullCyberbullying full
Cyberbullying full
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 

Semelhante a Olmv cyberbullying

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thDoctora2017
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentationColEanna
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 

Semelhante a Olmv cyberbullying (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Parents Association Cyberbullying presentation
Parents Association Cyberbullying presentationParents Association Cyberbullying presentation
Parents Association Cyberbullying presentation
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Angelo G. mendiola
Angelo G. mendiolaAngelo G. mendiola
Angelo G. mendiola
 
cyber bulling
 cyber bulling cyber bulling
cyber bulling
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 

Último

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Último (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Olmv cyberbullying

  • 1. Cyberbullying Bullying Goes High Tech Jim Masucci November 10, 2010 “It’s one thing when you get made fun of at school, but to be bullied in your own home, via your computer, is a disgusting thing for people to do.” Sixteen year old from Alabama
  • 2. What is Cyberbullying? Being cruel to others by sending or posting harmful material using technological means An individual or group that uses information and communication involving electronic technologies to facilitate deliberate and repeated harassment or threats to an individual or group. Also known as: ‘Electronic Bullying’ & ‘Online Social Cruelty’
  • 3. Tools for Cyberbullying  Cell Phones – calls or messages  Internet  Electronic Mail  Instant Messaging  Blogs  Social Networks  Chat Rooms  Defamatory Web Sites (Polling)
  • 4. Why Cyberbullying? The Internet has become a way of life for most teens, and an easy tool for harassing others. 91% of 12 – 15 year olds use the Internet 99% of teens 16 – 18 use the Internet Available 24 hrs/day, 7 days/wk Victim is a perpetual target
  • 5. Why Cyberbullying? (cont) Traditional bullying – the bully is usually stronger than his or her victim either physically or socially. Usually occurs in the school setting (classroom, playground, or bus). Cyberbullying - Internet tends to level the playing field, affording less dominant teens the means they need to bully others. Sometimes used in revenge for traditional bullying.
  • 6. How Big a Problem Is It?  42% of teens surveyed admitted to being bullied on-line  35% claim to have been threatened.  53% confessed to having said something mean or hurtful on-line. (I-Safe 2007)  More girls than boys are cyberbullied.  For teens that are regular visitors to social networking sites, the chances of them being cyberbullied goes up.  Only 15% of parents knew what cyberbullying was
  • 7. Types of Cyberbullies  Avenging Angel - use technical means to get back at someone who has been bullying them, or one of their friends.  Power Hungry - Closest to traditional school yard bully. Tends to feel superior, and exerts his or her strengths over the victim.
  • 8. Types of Cyberbullies (cont.)  Mean Girls - Work in groups, and need an audience to play to. The group tends to approve of the actions, or do nothing about them.  Inadvertent Bully – Probably don’t even realize they are doing something wrong. Ex : passing on gossip or pictures or answering polls.
  • 9. Forms of Cyberbullying  Flaming – Saying mean or hurtful things  Harassment and cyberstalking - repeated actions such as sending messages, or threats to a victim.  Denigration – putting someone down  Outing – spreading secret or embarrassing information or pictures  Exclusion - intentionally excluding a person by leaving them off of the list.  Impersonation – pretending to be someone else
  • 10. Cyberbullying – It’s Illegal All of the following forms of cyberbulling can lead to arrest & prosecution:  Making threats of violence to people or their property  Making obscene or harassing phone calls  Harassment or stalking  Hate or bias crimes  Creating or sending sexually explicit images of teens  Posting real or doctored photos of someone without their permission  Taking a photo of someone in place where privacy expected
  • 11. Impacts of Cyberbullying  Feelings of guilt or self blame  Sleep difficulties  Poor performance in school  Violence against tormentors. Victims are 8X more likely to bring a weapon to school  Suicide
  • 12. What Should You Do? Teens  Do not respond in a similar manner. Block the screen names if possible.  Do not forward anything  Do not delete messages  Consult an adult  Safeguard user ID’s and passwords. “A password is like a tooth brush. Choose a good one, and don’t share it.” (Yahoo Security Center)
  • 13. What Should You Do? Parents  Take the situation seriously, and be supportive.  Don’t blame the victim.  Increase tech awareness.  Monitor computer use. (Software & placement of computer)  Contact ISP and cell phone provider. Contact law enforcement, if threatened.
  • 14. What Should You Do? Teachers and Schools If the incident occurs during school, investigate and respond. Otherwise :  Respond if the incident causes disruptions.  Provide counseling to the perpetrators and the victims  Develop anti-bulllying programs to educate students
  • 15. Teach Our Children  All actions have consequences  Cyber bullying hurts  They are just being used and manipulated by cyber bully  Cyber bully and accomplices often become the target of cyber bullying themselves  Care about others and stand up for what’s right
  • 16. Legal Issues for Schools  Privacy Issue – Does a school have the right to search a student’s computer for evidence.  Free Speech Issue – Does the school have the right to discipline a student for remarks published on the Internet during non-school hours.
  • 17. Sexting Sending sexually suggestive messages or images to others via cell phone, or posting them on social websites. Surveys of teenagers : - 20 percent have sent or posted picture of themselves - 40 percent of teenagers have sent sexually suggestive messages. - More girls than boys Technology is much more far-reaching and permanent, and teenagers are not consequential thinkers . . . They
  • 18. Sexting – Legal Consequenses Worst Case scenario  Possession or distribution of Child Pornography  Possible inclusion on sex offenders registry. More likely  Suspension or expulsion from school.  Probation and attend counseling