SlideShare uma empresa Scribd logo
1 de 11
Cyber – Bullying on School Grounds Kasi Huver EDU 290 Author:  wsilver
What is  Cyber – Bullying? ,[object Object],[object Object],[object Object]
Different Types of Cyber – Bullying
Ways in Which People  Cyber – Bully Others ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Author:  compujeramey
Why Does It Happen? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.qcert.org/tips/cyberbully-workshop-english.pdf
How Does it Affect  the Classroom? ,[object Object],[object Object],[object Object],[object Object]
Current Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Laws ,[object Object],[object Object],http://www.ebasedprevention.org/toolbox/bullying/cyberbullying-legal-issues Author:  mrbil l
What is Being Done to Stop it? ,[object Object],[object Object],[object Object],http://www.bullypolice.org/mi_law.html Author:  Vince Alongi
Recap ,[object Object],[object Object],[object Object],[object Object],[object Object],Author:  geerlingguy
Sources Cited ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620mccready95
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingChristina Gagnier
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Internet safety
Internet safetyInternet safety
Internet safetyzunker
 

Mais procurados (18)

Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Ass1ppt.orgn
Ass1ppt.orgnAss1ppt.orgn
Ass1ppt.orgn
 
Introduction to Cybersafety
Introduction to CybersafetyIntroduction to Cybersafety
Introduction to Cybersafety
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" Bullying
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Destaque

Srg Sydney Conference 2011 Program 15 March
Srg Sydney Conference 2011 Program 15 MarchSrg Sydney Conference 2011 Program 15 March
Srg Sydney Conference 2011 Program 15 MarchAwakino
 
DíA Internacional Da Muller Traballadora
DíA Internacional Da Muller TraballadoraDíA Internacional Da Muller Traballadora
DíA Internacional Da Muller TraballadoraPaula
 
C:\Fakepath\DíA Internacional Da Muller Traballadora
C:\Fakepath\DíA Internacional Da Muller TraballadoraC:\Fakepath\DíA Internacional Da Muller Traballadora
C:\Fakepath\DíA Internacional Da Muller TraballadoraPaula
 
Anna Jakovleva
Anna JakovlevaAnna Jakovleva
Anna JakovlevaPobeda65
 
G:\DíA Internacional Da Muller Traballadora
G:\DíA Internacional Da Muller TraballadoraG:\DíA Internacional Da Muller Traballadora
G:\DíA Internacional Da Muller TraballadoraPaula
 
San Valentín
San ValentínSan Valentín
San ValentínPaula
 
Presentacion Ud
Presentacion UdPresentacion Ud
Presentacion Udtelumi82
 
Paz 2011
Paz 2011Paz 2011
Paz 2011Paula
 
O apalpador
O apalpadorO apalpador
O apalpadorPaula
 
Leonards 2010 Plan
Leonards 2010 PlanLeonards 2010 Plan
Leonards 2010 Planguestb83572
 
Barkley New Product Development Process
Barkley New Product Development ProcessBarkley New Product Development Process
Barkley New Product Development ProcessBrad Hanna
 
Edel231newsletter
Edel231newsletterEdel231newsletter
Edel231newsletterampace
 
Quản trị dự án đầu tư
Quản trị dự án đầu tưQuản trị dự án đầu tư
Quản trị dự án đầu tưLinh Pink
 
Indus Valley Lesson No 1
Indus Valley Lesson No 1Indus Valley Lesson No 1
Indus Valley Lesson No 1Freelanced
 

Destaque (20)

HopeLab
HopeLabHopeLab
HopeLab
 
Srg Sydney Conference 2011 Program 15 March
Srg Sydney Conference 2011 Program 15 MarchSrg Sydney Conference 2011 Program 15 March
Srg Sydney Conference 2011 Program 15 March
 
DíA Internacional Da Muller Traballadora
DíA Internacional Da Muller TraballadoraDíA Internacional Da Muller Traballadora
DíA Internacional Da Muller Traballadora
 
C:\Fakepath\DíA Internacional Da Muller Traballadora
C:\Fakepath\DíA Internacional Da Muller TraballadoraC:\Fakepath\DíA Internacional Da Muller Traballadora
C:\Fakepath\DíA Internacional Da Muller Traballadora
 
Anna Jakovleva
Anna JakovlevaAnna Jakovleva
Anna Jakovleva
 
G:\DíA Internacional Da Muller Traballadora
G:\DíA Internacional Da Muller TraballadoraG:\DíA Internacional Da Muller Traballadora
G:\DíA Internacional Da Muller Traballadora
 
San Valentín
San ValentínSan Valentín
San Valentín
 
Hope Lab
Hope LabHope Lab
Hope Lab
 
Presentacion Ud
Presentacion UdPresentacion Ud
Presentacion Ud
 
Paz 2011
Paz 2011Paz 2011
Paz 2011
 
The Project Trap
The Project TrapThe Project Trap
The Project Trap
 
O apalpador
O apalpadorO apalpador
O apalpador
 
Multitude
MultitudeMultitude
Multitude
 
Leonards 2010 Plan
Leonards 2010 PlanLeonards 2010 Plan
Leonards 2010 Plan
 
Barkley New Product Development Process
Barkley New Product Development ProcessBarkley New Product Development Process
Barkley New Product Development Process
 
Edel231newsletter
Edel231newsletterEdel231newsletter
Edel231newsletter
 
Quản trị dự án đầu tư
Quản trị dự án đầu tưQuản trị dự án đầu tư
Quản trị dự án đầu tư
 
Skills
SkillsSkills
Skills
 
Mass
MassMass
Mass
 
Indus Valley Lesson No 1
Indus Valley Lesson No 1Indus Valley Lesson No 1
Indus Valley Lesson No 1
 

Semelhante a Current Issues Power Point

Real Pp Cyber Bullying
Real Pp Cyber BullyingReal Pp Cyber Bullying
Real Pp Cyber Bullyingkasihuver
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Social justice
Social justiceSocial justice
Social justicekm03john
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Cyber Bullying In Schoolspic
Cyber Bullying In SchoolspicCyber Bullying In Schoolspic
Cyber Bullying In Schoolspicvolta1ad
 
Cyber Bullying In Schoolspic
Cyber Bullying In SchoolspicCyber Bullying In Schoolspic
Cyber Bullying In Schoolspicvolta1ad
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schoolsvolta1ad
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 

Semelhante a Current Issues Power Point (20)

Kasi
KasiKasi
Kasi
 
Real Pp Cyber Bullying
Real Pp Cyber BullyingReal Pp Cyber Bullying
Real Pp Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Social justice
Social justiceSocial justice
Social justice
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Cyber Bullying In Schoolspic
Cyber Bullying In SchoolspicCyber Bullying In Schoolspic
Cyber Bullying In Schoolspic
 
Cyber Bullying In Schoolspic
Cyber Bullying In SchoolspicCyber Bullying In Schoolspic
Cyber Bullying In Schoolspic
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Cyber Bullying In Schools
Cyber Bullying In SchoolsCyber Bullying In Schools
Cyber Bullying In Schools
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 

Current Issues Power Point

Notas do Editor

  1. For my current events project, I researched cyber bullying and how it affects the classroom setting, as well as causes, and ways it occurs.
  2. According to stopcyberbullying.org, cyber bullying is “Being tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.” In order to be considered cyber-bullying, there have to be a minor (or person under 18) involved on both sides of the issue.
  3. There are two different types of cyber-bullying: Direct attacks, which consist of any form of hurtful messages being sent directly to a person. The other is be proxy. This involves the use of other people to help deliver the bully’s messages to the victim. This is usually done with the assistant’s knowledge of the bully’s intentions, but sometimes they are unaware of what is really going on.
  4. People can be affected by texts, emails or instant messages, chat rooms, facebook and myspace, signing the victim up for adult websites, posting photo shopped pictures of the victim online, launching hate websites, building fake websites, and many other ways. These are seemingly simple, everyday things – but can easily be used to hurt others.
  5. People feel the need to bully others for a range of reasons. Some feel a sense of underachievement in their studies, extracurricular activities, at home, etc. Others feel a sense of isolation which leads to a want for more attention. Bullying others puts more attention on them and when they put someone else down, it makes them feel better about themselves. This also leads to oppression – or a need for power over others, most times by making others feel bad about themselves. Some kids have a conflict in values or morals because of the way they were raised, religion, class, and social surroundings. Often times, bullying occurs because two (or more) people were friends and had some sort of disagreement or argument. This results in one person wanting revenge and, if they were friends, they probably know a lot about the person. In the past few years, the rise of technology leads to cyber bullies having an easier time transferring information. Texting, facebook, profiles, and other web and phone browsers were not available a ten years ago…and ways to bully is becoming much easier to do – especially when it no longer has to be done face-to-face.
  6. Cyber bullying can affect the way a student thinks and acts in the school and each classroom. The victim is always aware of what others think of them which makes it hard for them to focus in class. When a student is being bullied, school is the last thing on their mind. They are much more worried about what will be said about them next than commas, colons, or the quadratic formula. Bullying causes a lower self-esteem and lack of self-confidence which results in a lack of willingness to answer questions in class and participate in group activities. Also, if the victim has a shared class with the bully, the are somewhat “afraid” of the classroom. They often don’t want to show up for class, and therefore, fall behind in their work.
  7. The following can be, but is not always, grounds for arrest and prosecution: Making threats of violence to people or their property. Engaging in coercion (trying to force someone to do something he or she doesn’t want to do). Making obscene or harassing telephone calls (this text messaging). Harassment or stalking. Hate or bias crimes. Creating or sending sexually explicit images of teens (this is child pornography). Sexual exploitation Taking a photo of someone in place where privacy is expected (like a locker room)
  8. As a school, they have a duty to ensure that students are using school network or mobile devices correctly, and in a manner that doesn’t hurt other students. This can be ensured by blocking social networking sites (such as facebook, myspace, msn messenger, etc). However, some people fear that a person’s right to free speech is being violated when they are punished for voicing their opinions about someone which partly leads to the government having a hard time passing laws against cyber bullying.
  9. Currently, there is no law in Michigan that protects the victims of cyber bullying. In 2006, Glenn Anderson proposed an anti bullying legislation, but it did not pass. It was reintroduced in 2007 and passed the State House. Once it made it to the Senate Education Committee, no action occurred.
  10. As an overview, cyber bullying is becoming more common among preteens and teens. It comes in a variety of forms and occurs for many different reasons. It often results in a fear of the school and classroom. Despite efforts to create a law protecting victims of cyber bullying, there is no current law in Michigan.